diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json
index 195bd1e6bf..3562d6d9f1 100644
--- a/.openpublishing.publish.config.json
+++ b/.openpublishing.publish.config.json
@@ -444,7 +444,7 @@
""
],
"git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/windows-itpro-docs",
- "git_repository_branch_open_to_public_contributors": "master",
+ "git_repository_branch_open_to_public_contributors": "public",
"skip_source_output_uploading": false,
"need_preview_pull_request": true,
"resolve_user_profile_using_github": true,
diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json
index 72efa7e858..69bede97fa 100644
--- a/.openpublishing.redirection.json
+++ b/.openpublishing.redirection.json
@@ -1,15353 +1,15404 @@
{
-"redirections": [
-{
-"source_path": "windows/application-management/msix-app-packaging-tool-walkthrough.md",
-"redirect_url": "https://docs.microsoft.com/windows/msix/mpt-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-containers-help-protect-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "browsers/edge/enterprise-guidance-using-microsoft-edge-and-ie11.md",
-"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/update/windows-update-sources.md",
-"redirect_url": "/windows/deployment/update/how-windows-update-works",
-"redirect_document_id": true
-},
-{
-"source_path": "browsers/edge/hardware-and-software-requirements.md",
-"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/about-microsoft-edge",
-"redirect_document_id": true
-},
-{
-"source_path": "browsers/edge/security-enhancements-microsoft-edge.md",
-"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/group-policies/security-privacy-management-gp",
-"redirect_document_id": true
-},
-{
-"source_path": "browsers/edge/new-policies.md",
-"redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/change-history-for-microsoft-edge",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/intelligence/av-tests.md",
-"redirect_url": "/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/intelligence/transparency-report.md",
-"redirect_url": "/windows/security/threat-protection/intelligence/av-tests",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/update/waas-windows-insider-for-business-aad.md",
-"redirect_url": "https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-add",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/update/waas-windows-insider-for-business-faq.md",
-"redirect_url": "https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-get-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows.md",
-"redirect_url": "/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/encrypted-hard-drive.md",
-"redirect_url": "/windows/security/information-protection/encrypted-hard-drive",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/secure-the-windows-10-boot-process.md",
-"redirect_url": "/windows/security/information-protection/secure-the-windows-10-boot-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md",
-"redirect_url": "/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/change-the-tpm-owner-password.md",
-"redirect_url": "/windows/security/information-protection/tpm/change-the-tpm-owner-password",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/how-windows-uses-the-tpm.md",
-"redirect_url": "/windows/security/information-protection/tpm/how-windows-uses-the-tpm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md",
-"redirect_url": "/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/manage-tpm-commands.md",
-"redirect_url": "/windows/security/information-protection/tpm/manage-tpm-commands",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/manage-tpm-lockout.md",
-"redirect_url": "/windows/security/information-protection/tpm/manage-tpm-lockout",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md",
-"redirect_url": "/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/tpm-fundamentals.md",
-"redirect_url": "/windows/security/information-protection/tpm/tpm-fundamentals",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/tpm-recommendations.md",
-"redirect_url": "/windows/security/information-protection/tpm/tpm-recommendations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-overview.md",
-"redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings.md",
-"redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-top-node.md",
-"redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-top-node",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/update/waas-windows-insider-for-business.md",
-"redirect_url": "/windows-insider/at-work-pro/wip-4-biz-get-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-guide.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agress.md",
-"redirect_url": "/windows/security/threat-protectionsecurity-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-application-control.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/administer-applocker-using-mdm.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker-using-mdm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/administer-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/applocker-architecture-and-components.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/applocker-functions.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/applocker-overview.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/applocker-policies-deployment-guide.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/applocker-policies-design-guide.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/applocker-policy-use-scenarios.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/applocker-processes-and-interactions.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/applocker-settings.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/applocker-technical-reference.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/configure-the-application-identity-service.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/configure-the-appLocker-reference-device.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/create-applocker-default-rules.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/create-your-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/create-your-applocker-rules.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/delete-an-applocker-rule.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/determine-your-application-control-objectives.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/dll-rules-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/document-your-application-list.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/document-your-applocker-rules.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/edit-an-applocker-policy.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/edit-applocker-rules.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/enable-the-dll-rule-collection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/enforce-applocker-rules.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/executable-rules-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/how-applocker-works-techref.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/maintain-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-manually.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/monitor-application-usage-with-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/optimize-applocker-performance.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/plan-for-applocker-policy-management.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/refresh-an-applocker-policy.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/requirements-to-use-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/script-rules-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/security-considerations-for-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/select-types-of-rules-to-create.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/test-and-update-an-applocker-policy.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/tools-to-use-with-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understand-applocker-enforcement-settings.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understanding-applocker-default-rules.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-behavior.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-collections.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/using-event-viewer-with-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/what-is-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/windows-installer-rules-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/working-with-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/applocker/working-with-applocker-rules.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/oldtoc.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-rules-in-windows-10-enterprise-e3",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md",
-"redirect_url": "windows/security/threat-protection/microsoft-defender-atp/manage-indicators",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/device-guard/steps-to-deploy-windows-defender-application-control.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-managed-installer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-enable-virtualization-based-security.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/enable-virtualization-based-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-family-options.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/controlled-folders",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/emet-exploit-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-network-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-views",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exploit-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/graphics.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/graphics",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/network-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/prerelease.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/prerelease",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-exploit-protection-mitigations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/advanced-features-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-features",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/apis-intro.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/apis-intro",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/api-hello-world.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-hello-world",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-simulations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/automated-investigations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/basic-permissions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/community",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/conditional-access",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-arcsight-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-and-manage-tvm.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-and-manage-tvm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/tvm-dashboard-insights.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configuration-score.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configuration-score",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/additional-configuration-windows-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-siem",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-splunk",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/deprecate.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/deprecate",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-aad-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enable-siem-integration-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/evaluate-atp.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-error-codes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-files",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-ip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-machines",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-user",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/licensing",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-groups",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-reports",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-tags",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-alerts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-edr.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-edr",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/management-apis.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/management-apis",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-incidents",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/mssp-support",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machines",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/onboard-configure-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-configure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/onboard.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/overview.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hunting",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/partner-applications.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/partner-applications",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/portal-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/preferences-setup-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/use-apis.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preferences-setup",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/prerelease.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/prerelease",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/prerelease.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/prerelease",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/python-example-code",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/rbac",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/response-actions.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/response-actions-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/response-actions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-detection-test",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/service-status",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/time-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/troubleshoot-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus",
- "redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/troubleshoot-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-overview.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user-roles",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/whats-new-in-microsoft-defender-atp",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-application-guard/install-wd-app-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-offline.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/block-untrusted-fonts-in-enterprise.md",
-"redirect_url": "/windows/security/threat-protection/block-untrusted-fonts-in-enterprise",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/change-history-for-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/change-history-for-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/override-mitigation-options-for-app-related-security-policies.md",
-"redirect_url": "/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/overview-of-threat-mitigations-in-windows-10.md",
-"redirect_url": "/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md",
-"redirect_url": "/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md",
-"redirect_url": "/windows/security/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-defender-application-control.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/access-this-computer-from-the-network.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/account-lockout-duration.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-duration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/account-lockout-policy.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/account-lockout-threshold.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-threshold",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/account-policies.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/account-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/accounts-administrator-account-status.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/accounts-block-microsoft-accounts.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/accounts-guest-account-status.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/accounts-rename-administrator-account.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/accounts-rename-guest-account.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/act-as-part-of-the-operating-system.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/add-workstations-to-domain.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/administer-security-policy-settings.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/allow-log-on-locally.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-locally",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/audit-policy.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/back-up-files-and-directories.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/bypass-traverse-checking.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/change-the-system-time.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-system-time",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/change-the-time-zone.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-time-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/create-a-pagefile.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-pagefile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/create-a-token-object.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-token-object",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/create-global-objects.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-global-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/create-permanent-shared-objects.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/create-symbolic-links.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/create-symbolic-links",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/debug-programs.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/debug-programs",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-service.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/deny-log-on-locally.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-locally",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/enforce-password-history.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-password-history",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/enforce-user-logon-restrictions.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/generate-security-audits.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/generate-security-audits",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/how-to-configure-security-policy-settings.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/impersonate-a-client-after-authentication.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/increase-a-process-working-set.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/increase-scheduling-priority.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-require-smart-card.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/kerberos-policy.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/kerberos-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/load-and-unload-device-drivers.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/lock-pages-in-memory.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/log-on-as-a-batch-job.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/log-on-as-a-service.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/manage-auditing-and-security-log.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/maximum-password-age.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-password-age",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/minimum-password-age.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-age",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/minimum-password-length.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-length",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/modify-an-object-label.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-an-object-label",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/modify-firmware-environment-values.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-list-manager-policies.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-list-manager-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/password-must-meet-complexity-requirements.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/password-policy.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/password-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/perform-volume-maintenance-tasks.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/profile-single-process.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-single-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/profile-system-performance.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-system-performance",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/remove-computer-from-docking-station.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/replace-a-process-level-token.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/reset-account-lockout-counter-after.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/restore-files-and-directories.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/restore-files-and-directories",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/security-options.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/security-options",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/security-policy-settings-reference.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/security-policy-settings.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/shut-down-the-system.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/shut-down-the-system",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/synchronize-directory-service-data.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/system-settings-optional-subsystems.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-policy-settings/user-rights-assignment.md",
-"redirect_url": "/windows/security/threat-protection/security-policy-settings/user-rights-assignment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/deploy-managed-installer-for-device-guard.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/device-guard-deployment-guide.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/device-guard-deployment-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/memory-integrity",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/advanced-security-audit-policy-settings.md",
-"redirect_url": "/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/advanced-security-auditing-faq.md",
-"redirect_url": "/windows/security/threat-protection/auditing/advanced-security-auditing.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md",
-"redirect_url": "/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-account-lockout.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-application-generated.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-application-group-management.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-audit-policy-change.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-authentication-policy-change.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-authorization-policy-change.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-central-access-policy-staging.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-certification-services.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-computer-account-management.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-credential-validation.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-detailed-directory-service-replication.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-detailed-file-share.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-directory-service-access.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-directory-service-changes.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-directory-service-replication.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-distribution-group-management.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-dpapi-activity.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-file-share.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-file-system.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-filtering-platform-packet-drop.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-group-membership.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-handle-manipulation.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-ipsec-driver.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-ipsec-main-mode.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-kerberos-authentication-service.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-kernel-object.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-logoff.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-logon.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-network-policy-server.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-other-account-logon-events.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-other-account-management-events.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-other-logonlogoff-events.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-other-object-access-events.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-other-policy-change-events.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-other-system-events.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-pnp-activity.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-process-creation.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-process-termination.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-registry.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-removable-storage.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-rpc-events.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-sam.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-security-group-management.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-security-state-change.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-security-system-extension.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-special-logon.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-system-integrity.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/audit-user-account-management.md",
-"redirect_url": "/windows/security/threat-protection/auditing/audit-user-device-claims.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/basic-audit-account-logon-events.md",
-"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-account-management.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/basic-audit-directory-service-access.md",
-"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-logon-events.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/basic-audit-object-access.md",
-"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-policy-change.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/basic-audit-privilege-use.md",
-"redirect_url": "/windows/security/threat-protection/auditing/basic-audit-process-tracking.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/basic-audit-system-events.md",
-"redirect_url": "/windows/security/threat-protection/auditing/basic-security-audit-policies.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/basic-security-audit-policy-settings.md",
-"redirect_url": "/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-1100.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-1102.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-1104.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-1105.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-1108.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4608.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4610.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4611.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4612.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4614.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4615.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4616.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4618.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4621.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4622.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4624.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4625.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4626.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4627.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4634.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4647.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4648.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4649.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4656.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4657.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4658.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4660.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4661.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4662.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4663.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4664.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4670.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4671.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4672.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4673.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4674.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4675.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4688.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4689.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4690.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4691.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4692.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4693.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4694.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4695.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4696.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4697.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4698.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4699.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4700.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4701.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4702.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4703.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4704.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4705.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4706.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4707.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4713.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4714.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4715.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4716.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4717.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4718.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4719.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4720.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4722.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4723.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4724.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4725.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4726.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4731.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4732.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4733.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4734.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4735.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4738.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4739.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4740.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4741.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4742.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4743.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4749.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4750.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4751.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4752.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4753.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4764.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4765.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4766.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4767.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4768.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4769.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4770.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4771.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4772.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4773.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4774.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4775.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4776.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4777.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4778.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4779.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4780.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4781.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4782.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4793.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4794.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4798.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4799.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4800.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4801.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4802.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4803.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4816.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4817.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4818.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4819.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4826.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4864.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4865.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4866.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4867.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4902.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4904.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4905.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4906.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4907.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4908.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4909.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4910.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4911.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4912.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4913.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4928.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4929.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4930.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4931.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4932.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4933.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4934.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4935.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4936.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4937.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4944.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4945.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4946.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4947.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4948.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4949.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4950.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4951.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4952.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4953.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4954.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4956.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4957.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4958.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-4964.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-4985.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5024.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5025.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5027.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5028.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5029.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5030.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5031.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5032.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5033.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5034.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5035.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5037.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5038.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5039.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5051.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5056.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5057.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5058.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5059.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5060.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5061.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5062.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5063.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5064.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5065.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5066.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5067.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5068.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5069.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5070.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5136.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5137.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5138.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5139.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5140.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5141.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5142.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5143.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5144.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5145.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5148.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5149.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5150.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5151.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5152.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5153.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5154.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5155.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5156.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5157.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5158.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5159.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5168.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5376.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5377.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5378.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5447.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5632.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5633.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5712.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5888.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-5889.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-5890.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-6144.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-6145.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-6281.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-6400.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-6401.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-6402.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-6403.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-6404.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-6405.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-6406.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-6407.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-6408.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-6409.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-6410.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-6416.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-6419.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-6420.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-6421.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-6422.md",
-"redirect_url": "/windows/security/threat-protection/auditing/event-6423.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/event-6424.md",
-"redirect_url": "/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions.md",
-"redirect_url": "/windows/security/threat-protection/auditing/monitor-claim-types.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/monitor-resource-attribute-definitions.md",
-"redirect_url": "/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md",
-"redirect_url": "/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/monitor-the-use-of-removable-storage-devices.md",
-"redirect_url": "/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/other-events.md",
-"redirect_url": "/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/registry-global-object-access-auditing.md",
-"redirect_url": "/windows/security/threat-protection/auditing/security-auditing-overview.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md",
-"redirect_url": "/windows/security/threat-protection/auditing/view-the-security-event-log.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md",
-"redirect_url": "/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md",
-"redirect_url": "/windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/administer-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/administer-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/applocker-architecture-and-components.md",
-"redirect_url": "/windows/security/threat-protection/applocker/applocker-architecture-and-components",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/applocker-functions.md",
-"redirect_url": "/windows/security/threat-protection/applocker/applocker-functions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/applocker-overview.md",
-"redirect_url": "/windows/security/threat-protection/applocker/applocker-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/applocker-policies-deployment-guide.md",
-"redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-deployment-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/applocker-policies-design-guide.md",
-"redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-design-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/applocker-policy-use-scenarios.md",
-"redirect_url": "/windows/security/threat-protection/applocker/applocker-policy-use-scenarios",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/applocker-processes-and-interactions.md",
-"redirect_url": "/windows/security/threat-protection/applocker/applocker-processes-and-interactions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/applocker-settings.md",
-"redirect_url": "/windows/security/threat-protection/applocker/applocker-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/applocker-technical-reference.md",
-"redirect_url": "/windows/security/threat-protection/applocker/applocker-technical-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-audit-only.md",
-"redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules.md",
-"redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/configure-exceptions-for-an-applocker-rule.md",
-"redirect_url": "/windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/configure-the-application-identity-service.md",
-"redirect_url": "/windows/security/threat-protection/applocker/configure-the-application-identity-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/configure-the-appLocker-reference-device.md",
-"redirect_url": "/windows/security/threat-protection/applocker/configure-the-appLocker-reference-device",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/create-a-rule-for-packaged-apps.md",
-"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition.md",
-"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-path-condition.md",
-"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition.md",
-"redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/create-applocker-default-rules.md",
-"redirect_url": "/windows/security/threat-protection/applocker/create-applocker-default-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group.md",
-"redirect_url": "/windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/create-your-applocker-planning-document.md",
-"redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-planning-document",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/create-your-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/create-your-applocker-rules.md",
-"redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/delete-an-applocker-rule.md",
-"redirect_url": "/windows/security/threat-protection/applocker/delete-an-applocker-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md",
-"redirect_url": "/windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/deploy-the-applocker-policy-into-production.md",
-"redirect_url": "/windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement.md",
-"redirect_url": "/windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md",
-"redirect_url": "/windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/determine-your-application-control-objectives.md",
-"redirect_url": "/windows/security/threat-protection/applocker/determine-your-application-control-objectives",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md",
-"redirect_url": "/windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/dll-rules-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/dll-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md",
-"redirect_url": "/windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/document-your-application-control-management-processes.md",
-"redirect_url": "/windows/security/threat-protection/applocker/document-your-application-control-management-processes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/document-your-application-list.md",
-"redirect_url": "/windows/security/threat-protection/applocker/document-your-application-list",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/document-your-applocker-rules.md",
-"redirect_url": "/windows/security/threat-protection/applocker/document-your-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/edit-an-applocker-policy.md",
-"redirect_url": "/windows/security/threat-protection/applocker/edit-an-applocker-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/edit-applocker-rules.md",
-"redirect_url": "/windows/security/threat-protection/applocker/edit-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/enable-the-dll-rule-collection.md",
-"redirect_url": "/windows/security/threat-protection/applocker/enable-the-dll-rule-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/enforce-applocker-rules.md",
-"redirect_url": "/windows/security/threat-protection/applocker/enforce-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/executable-rules-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/executable-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/export-an-applocker-policy-from-a-gpo.md",
-"redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file.md",
-"redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/how-applocker-works-techref.md",
-"redirect_url": "/windows/security/threat-protection/applocker/how-applocker-works-techref",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/import-an-applocker-policy-from-another-computer.md",
-"redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/import-an-applocker-policy-into-a-gpo.md",
-"redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/maintain-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/applocker/maintain-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/manage-packaged-apps-with-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md",
-"redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/merge-applocker-policies-manually.md",
-"redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-manually",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/monitor-application-usage-with-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/monitor-application-usage-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/optimize-applocker-performance.md",
-"redirect_url": "/windows/security/threat-protection/applocker/optimize-applocker-performance",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/plan-for-applocker-policy-management.md",
-"redirect_url": "/windows/security/threat-protection/applocker/plan-for-applocker-policy-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/refresh-an-applocker-policy.md",
-"redirect_url": "/windows/security/threat-protection/applocker/refresh-an-applocker-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/requirements-for-deploying-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/requirements-to-use-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/requirements-to-use-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/run-the-automatically-generate-rules-wizard.md",
-"redirect_url": "/windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/script-rules-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/script-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/security-considerations-for-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/security-considerations-for-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/select-types-of-rules-to-create.md",
-"redirect_url": "/windows/security/threat-protection/applocker/select-types-of-rules-to-create",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md",
-"redirect_url": "/windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/test-and-update-an-applocker-policy.md",
-"redirect_url": "/windows/security/threat-protection/applocker/test-and-update-an-applocker-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/tools-to-use-with-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/tools-to-use-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understand-applocker-enforcement-settings.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-enforcement-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understand-applocker-policy-design-decisions.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understand-the-applocker-policy-deployment-process.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understanding-applocker-default-rules.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-default-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understanding-applocker-rule-behavior.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-behavior",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understanding-applocker-rule-collections.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-collections",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understanding-applocker-rule-condition-types.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understanding-applocker-rule-exceptions.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md",
-"redirect_url": "/windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets.md",
-"redirect_url": "/windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/using-event-viewer-with-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/using-event-viewer-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/what-is-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/what-is-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/windows-installer-rules-in-applocker.md",
-"redirect_url": "/windows/security/threat-protection/applocker/windows-installer-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/working-with-applocker-policies.md",
-"redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/applocker/working-with-applocker-rules.md",
-"redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/change-history-for-device-security.md",
-"redirect_url": "/windows/security/threat-protection/change-history-for-device-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/enable-virtualization-based-protection-of-code-integrity.md",
-"redirect_url": "/windows/security/threat-protection/enable-virtualization-based-protection-of-code-integrity",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/get-support-for-security-baselines.md",
-"redirect_url": "/windows/security/threat-protection/get-support-for-security-baselines",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md",
-"redirect_url": "/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/security-compliance-toolkit-10.md",
-"redirect_url": "/windows/security/threat-protection/security-compliance-toolkit-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/windows-10-mobile-security-guide.md",
-"redirect_url": "/windows/security/threat-protection/windows-10-mobile-security-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/windows-security-baselines.md",
-"redirect_url": "/windows/security/threat-protection/windows-security-baselines",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/app-behavior-with-wip.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/app-behavior-with-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune-azure.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/limitations-with-wip.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/limitations-with-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/mandatory-settings-for-wip.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy-sccm.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-sccm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/testing-scenarios-for-wip.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/using-owa-with-wip.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/using-owa-with-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/windows-information-protection/wip-app-enterprise-context.md",
-"redirect_url": "/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/encrypted-hard-drive.md",
-"redirect_url": "/windows/security/hardware-protection/encrypted-hard-drive",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/how-hardware-based-containers-help-protect-windows.md",
-"redirect_url": "/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/secure-the-windows-10-boot-process.md",
-"redirect_url": "/windows/security/hardware-protection/secure-the-windows-10-boot-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds.md",
-"redirect_url": "/windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/change-the-tpm-owner-password.md",
-"redirect_url": "/windows/securityhardware-protection/tpm/change-the-tpm-owner-password",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/how-windows-uses-the-tpm.md",
-"redirect_url": "/windows/securityhardware-protection/tpm/how-windows-uses-the-tpm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm.md",
-"redirect_url": "/windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/manage-tpm-commands.md",
-"redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-commands",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/manage-tpm-lockout.md",
-"redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-lockout",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices.md",
-"redirect_url": "/windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/tpm-fundamentals.md",
-"redirect_url": "/windows/security/hardware-protection/tpm/tpm-fundamentals",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/tpm-recommendations.md",
-"redirect_url": "/windows/security/hardware-protection/tpm/tpm-recommendations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/trusted-platform-module-overview.md",
-"redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/trusted-platform-module-services-group-policy-settings.md",
-"redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/tpm/trusted-platform-module-top-node.md",
-"redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-top-node",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bcd-settings-and-bitlocker.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-basic-deployment.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-basic-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-countermeasures.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-group-policy-settings.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-management-for-enterprises.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-overview.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-recovery-guide-plan.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys.md",
-"redirect_url": "/windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-credential-theft-mitigation-guide-abstract.md",
-"redirect_url": "/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/change-history-for-access-protection.md",
-"redirect_url": "/windows/security/identity-protection/change-history-for-access-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/configure-s-mime.md",
-"redirect_url": "/windows/security/identity-protection/configure-s-mime",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/enterprise-certificate-pinning.md",
-"redirect_url": "/windows/security/identity-protection/enterprise-certificate-pinning",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/installing-digital-certificates-on-windows-10-mobile.md",
-"redirect_url": "/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/remote-credential-guard.md",
-"redirect_url": "/windows/security/identity-protection/remote-credential-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/assign-security-group-filters-to-the-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/basic-firewall-policy-design.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/basic-firewall-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/boundary-zone-gpos.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/boundary-zone.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design-example",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/change-rules-from-request-to-require-mode",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-basic-firewall-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-creating-group-policy-objects.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-group-policy-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-inbound-firewall-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-outbound-firewall-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/configure-authentication-methods.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-authentication-methods",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-data-protection-quick-mode-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-key-exchange-main-mode-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-rules-to-require-encryption",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/configure-the-windows-firewall-log.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-windows-firewall-log",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-workstation-authentication-certificate-template",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/create-a-group-account-in-active-directory.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-account-in-active-directory",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/create-a-group-policy-object.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-policy-object",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-exemption-list-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/create-an-authentication-request-rule.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-request-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/create-an-inbound-icmp-rule.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-icmp-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/create-an-inbound-port-rule.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-port-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-program-or-service-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/create-an-outbound-port-rule.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-port-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-program-or-service-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/create-inbound-rules-to-support-rpc",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/create-wmi-filters-for-the-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/determining-the-trusted-state-of-your-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/documenting-the-zones.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/documenting-the-zones",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design-example.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design-example",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/enable-predefined-inbound-rules.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-inbound-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/enable-predefined-outbound-rules.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-outbound-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/encryption-zone-gpos.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/encryption-zone.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/exempt-icmp-from-authentication.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/exempt-icmp-from-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/exemption-list.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/exemption-list",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/firewall-gpos.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/firewall-policy-design-example.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-policy-design-example",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-active-directory-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-devices.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/gathering-other-relevant-information.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-other-relevant-information",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/gathering-the-information-you-need.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-the-information-you-need",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/gpo-domiso-boundary.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-boundary",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/gpo-domiso-encryption.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-encryption",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/gpo-domiso-firewall.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-firewall",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-clients",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-servers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/isolated-domain-gpos.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/isolated-domain.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/isolating-apps-on-your-network.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/isolating-apps-on-your-network",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/link-the-gpo-to-the-domain.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/link-the-gpo-to-the-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/open-windows-firewall-with-advanced-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/planning-certificate-based-authentication.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-certificate-based-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/planning-domain-isolation-zones.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-domain-isolation-zones",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/planning-gpo-deployment.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-gpo-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-isolation-groups-for-the-zones",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/planning-network-access-groups.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-network-access-groups",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/planning-server-isolation-zones.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-server-isolation-zones",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/planning-the-gpos.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-the-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/procedures-used-in-this-guide.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/procedures-used-in-this-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/protect-devices-from-unwanted-network-traffic",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-trusted-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/server-isolation-gpos.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design-example.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design-example",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/verify-that-network-traffic-is-authenticated",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security.md",
-"redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md",
-"redirect_url": "/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/vpn/vpn-authentication.md",
-"redirect_url": "/windows/security/identity-protection/vpn/vpn-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/vpn/vpn-auto-trigger-profile.md",
-"redirect_url": "/windows/security/identity-protection/vpn/vpn-auto-trigger-profile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/vpn/vpn-conditional-access.md",
-"redirect_url": "/windows/security/identity-protection/vpn/vpn-conditional-access",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/vpn/vpn-connection-type.md",
-"redirect_url": "/windows/security/identity-protection/vpn/vpn-connection-type",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/vpn/vpn-guide.md",
-"redirect_url": "/windows/security/identity-protection/vpn/vpn-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/vpn/vpn-name-resolution.md",
-"redirect_url": "/windows/security/identity-protection/vpn/vpn-name-resolution",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/vpn/vpn-profile-options.md",
-"redirect_url": "/windows/security/identity-protection/vpn/vpn-profile-options",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/vpn/vpn-routing.md",
-"redirect_url": "/windows/security/identity-protection/vpn/vpn-routing",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/vpn/vpn-security-features.md",
-"redirect_url": "/windows/security/identity-protection/vpn/vpn-security-features",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md",
-"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md",
-"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started.md",
-"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-overview.md",
-"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md",
-"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md",
-"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md",
-"redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/user-account-control/how-user-account-control-works.md",
-"redirect_url": "/windows/security/identity-protection/user-account-control/how-user-account-control-works",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md",
-"redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/user-account-control/user-account-control-overview.md",
-"redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/user-account-control/user-account-control-security-policy-settings.md",
-"redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-debugging-information.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-debugging-information",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-events.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-removal-policy-service.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-tools-and-settings.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-and-remote-desktop-services.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-architecture.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-architecture",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/smart-cards/smart-card-certificate-propagation-service.md",
-"redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-and-password-changes.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-and-password-changes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-biometrics-in-enterprise.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-adfs.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-deploy-mfa.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-policy-settings.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-ad-prereq.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-ad-prereq",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-pki.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-deployment-cert-trust.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-cert-trust",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-deployment-guide.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-deployment-key-trust.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-key-trust",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-errors-during-pin-creation.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-event-300.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-event-300",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-features.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-features",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-how-it-works.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-how-it-works",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-new-install.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-new-install.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-devreg.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-provision.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-provision",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-identity-verification.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-identity-verification",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-key-trust-adfs.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-key-trust-deploy-mfa.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-key-trust-policy-settings.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-ad-prereq.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-ad-prereq",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-pki.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-pki",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-manage-in-organization.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-manage-in-organization",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-overview.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-planning-guide.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-planning-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-prepare-people-to-use.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password.md",
-"redirect_url": "/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/credential-guard/additional-mitigations.md",
-"redirect_url": "/windows/security/identity-protection/credential-guard/additional-mitigations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/credential-guard/credential-guard.md",
-"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/credential-guard/credential-guard-considerations.md",
-"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-considerations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/credential-guard/credential-guard-how-it-works.md",
-"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-how-it-works",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/credential-guard/credential-guard-known-issues.md",
-"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-known-issues",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/credential-guard/credential-guard-manage.md",
-"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-manage",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/credential-guard/credential-guard-not-protected-scenarios.md",
-"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/credential-guard/credential-guard-protection-limits.md",
-"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-protection-limits",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/credential-guard/credential-guard-requirements.md",
-"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/credential-guard/credential-guard-scripts.md",
-"redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-scripts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/access-control/access-control.md",
-"redirect_url": "/windows/security/identity-protection/access-control/access-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/access-control/active-directory-accounts.md",
-"redirect_url": "/windows/security/identity-protection/access-control/active-directory-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/access-control/active-directory-security-groups.md",
-"redirect_url": "/windows/security/identity-protection/access-control/active-directory-security-groups",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/access-control/dynamic-access-control.md",
-"redirect_url": "/windows/security/identity-protection/access-control/dynamic-access-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/access-control/local-accounts.md",
-"redirect_url": "/windows/security/identity-protection/access-control/local-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/access-control/microsoft-accounts.md",
-"redirect_url": "/windows/security/identity-protection/access-control/microsoft-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/access-control/security-identifiers.md",
-"redirect_url": "/windows/security/identity-protection/access-control/security-identifiers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/access-control/security-principals.md",
-"redirect_url": "/windows/security/identity-protection/access-control/security-principals",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/access-control/service-accounts.md",
-"redirect_url": "/windows/security/identity-protection/access-control/service-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/access-protection/access-control/special-identities.md",
-"redirect_url": "/windows/security/identity-protection/access-control/special-identities",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-steps.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md",
-"redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md",
-"redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md",
-"redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies.md",
-"redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies.md",
-"redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection.md",
-"redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/surface/surface-device-compatibility-with-windows-10-ltsb.md",
-"redirect_url": "/devices/surface/surface-device-compatibility-with-windows-10-ltsc",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/windows-diagnostic-data-1709.md",
-"redirect_url": "/windows/configuration/windows-diagnostic-data",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/EventName.md",
-"redirect_url": "/windows/configuration/enhanced-telemetry-windows-analytics-events-and-fields",
-"redirect_document_id": true
-},
-{
-"source_path": "education/windows/windows-10-pro-to-pro-edu-upgrade.md",
-"redirect_url": "/education/windows/switch-to-pro-education",
-"redirect_document_id": false
-},
-{
-"source_path": "education/windows/switch-to-pro-education.md",
-"redirect_url": "/education/windows/change-to-pro-education",
-"redirect_document_id": true
-},
-{
- "source_path": "education/windows/swithc-to-pro-de.md",
+ "redirections": [
+ {
+ "source_path": "windows/application-management/msix-app-packaging-tool-walkthrough.md",
+ "redirect_url": "https://docs.microsoft.com/windows/msix/mpt-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-containers-help-protect-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "browsers/edge/enterprise-guidance-using-microsoft-edge-and-ie11.md",
+ "redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/update/windows-update-sources.md",
+ "redirect_url": "/windows/deployment/update/how-windows-update-works",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "browsers/edge/hardware-and-software-requirements.md",
+ "redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/about-microsoft-edge",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "browsers/edge/security-enhancements-microsoft-edge.md",
+ "redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/group-policies/security-privacy-management-gp",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "browsers/edge/new-policies.md",
+ "redirect_url": "https://docs.microsoft.com/microsoft-edge/deploy/change-history-for-microsoft-edge",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/intelligence/av-tests.md",
+ "redirect_url": "/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/intelligence/transparency-report.md",
+ "redirect_url": "/windows/security/threat-protection/intelligence/av-tests",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/update/waas-windows-insider-for-business-aad.md",
+ "redirect_url": "https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-add",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/update/waas-windows-insider-for-business-faq.md",
+ "redirect_url": "https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-get-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/how-hardware-based-containers-help-protect-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows.md",
+ "redirect_url": "/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/encrypted-hard-drive.md",
+ "redirect_url": "/windows/security/information-protection/encrypted-hard-drive",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/secure-the-windows-10-boot-process.md",
+ "redirect_url": "/windows/security/information-protection/secure-the-windows-10-boot-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md",
+ "redirect_url": "/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/change-the-tpm-owner-password.md",
+ "redirect_url": "/windows/security/information-protection/tpm/change-the-tpm-owner-password",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/how-windows-uses-the-tpm.md",
+ "redirect_url": "/windows/security/information-protection/tpm/how-windows-uses-the-tpm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md",
+ "redirect_url": "/windows/security/information-protection/tpm/initialize-and-configure-ownership-of-the-tpm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/manage-tpm-commands.md",
+ "redirect_url": "/windows/security/information-protection/tpm/manage-tpm-commands",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/manage-tpm-lockout.md",
+ "redirect_url": "/windows/security/information-protection/tpm/manage-tpm-lockout",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md",
+ "redirect_url": "/windows/security/information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/tpm-fundamentals.md",
+ "redirect_url": "/windows/security/information-protection/tpm/tpm-fundamentals",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/tpm-recommendations.md",
+ "redirect_url": "/windows/security/information-protection/tpm/tpm-recommendations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-overview.md",
+ "redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings.md",
+ "redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/hardware-protection/tpm/trusted-platform-module-top-node.md",
+ "redirect_url": "/windows/security/information-protection/tpm/trusted-platform-module-top-node",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/update/waas-windows-insider-for-business.md",
+ "redirect_url": "/windows-insider/at-work-pro/wip-4-biz-get-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-guide.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agress.md",
+ "redirect_url": "/windows/security/threat-protectionsecurity-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-application-control.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/administer-applocker-using-mdm.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker-using-mdm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/administer-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/applocker-architecture-and-components.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/applocker-functions.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/applocker-overview.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/applocker-policies-deployment-guide.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/applocker-policies-design-guide.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/applocker-policy-use-scenarios.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/applocker-processes-and-interactions.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/applocker-settings.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/applocker-technical-reference.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/configure-the-application-identity-service.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/configure-the-appLocker-reference-device.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/create-applocker-default-rules.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/create-your-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/create-your-applocker-rules.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/delete-an-applocker-rule.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/determine-your-application-control-objectives.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/dll-rules-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/document-your-application-list.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/document-your-applocker-rules.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/edit-an-applocker-policy.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/edit-applocker-rules.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/enable-the-dll-rule-collection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/enforce-applocker-rules.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/executable-rules-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/how-applocker-works-techref.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/maintain-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/merge-applocker-policies-manually.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/monitor-application-usage-with-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/optimize-applocker-performance.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/plan-for-applocker-policy-management.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/refresh-an-applocker-policy.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/requirements-to-use-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/script-rules-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/security-considerations-for-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/select-types-of-rules-to-create.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/test-and-update-an-applocker-policy.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/tools-to-use-with-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understand-applocker-enforcement-settings.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understanding-applocker-default-rules.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-behavior.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-collections.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/using-event-viewer-with-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/what-is-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/windows-installer-rules-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/working-with-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/applocker/working-with-applocker-rules.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/oldtoc.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-rules-in-windows-10-enterprise-e3.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction-rules-in-windows-10-enterprise-e3",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list.md",
+ "redirect_url": "windows/security/threat-protection/microsoft-defender-atp/manage-indicators",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/device-guard/steps-to-deploy-windows-defender-application-control.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-managed-installer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/device-guard/device-guard-deployment-enable-virtualization-based-security.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/enable-virtualization-based-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-app-browser-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-device-performance-health",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-family-options.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-family-options",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-hide-notifications",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/audit-windows-defender-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/collect-cab-files-exploit-guard-submission.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/controlled-folders",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-attack-surface-reduction.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-attack-surface-reduction",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/emet-exploit-protection-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/emet-exploit-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-exploit-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/enable-network-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-network-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-attack-surface-reduction",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-controlled-folder-access",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-exploit-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-exploit-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-network-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/evaluate-windows-defender-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-views",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exploit-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/graphics.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/graphics",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/import-export-exploit-protection-emet-xml",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/network-protection-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/network-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/prerelease.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/prerelease",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-exploit-protection-mitigations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/advanced-features-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-features",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/advanced-hunting-reference-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/alerts-queue-endpoint-detection-response.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts-queue-endpoint-detection-response",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/apis-intro.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/apis-intro",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/api-hello-world.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-hello-world",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/assign-portal-access-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/attack-simulations-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/attack-simulations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/automated-investigations-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/automated-investigations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/basic-permissions-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/basic-permissions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/community-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/community",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/conditional-access-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/conditional-access",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-arcsight-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-arcsight-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-and-manage-tvm.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-and-manage-tvm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/tvm-dashboard-insights.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-attack-surface-reduction.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-attack-surface-reduction",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configuration-score.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configuration-score",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-conditional-access-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/additional-configuration-windows-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/monitor-onboarding-windows-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-endpoints-vdi-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-mssp-support-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-siem",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-splunk",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/custom-detection-rules.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/data-retention-settings-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-retention-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/deprecate.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/deprecate",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/enable-custom-ti.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/enable-security-analytics-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/enable-secure-score-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-aad-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enable-siem-integration-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/enable-siem-integration-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/evaluate-atp.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/event-error-codes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/experiment-custom-ti",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/fix-unhealthy-sensors.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/fix-unhealthy-sensors",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-cvekbmap-collection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-cvekbmap-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-kbinfo-collection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-kbinfo-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machinesecuritystates-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-config.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-config",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/information-protection-in-windows-overview.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-alerts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-files",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-incidents-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-incidents",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-ip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-machines",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/investigate-user",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/licensing-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/licensing",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-groups",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-reports",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/machine-tags-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine-tags",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-alerts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-auto-investigation-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-allowed-blocked-list-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-allowed-blocked-list",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-file-uploads-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-file-uploads",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-automation-folder-exclusions-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-edr.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-edr",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/management-apis.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/management-apis",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-incidents-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-incidents",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-suppression-rules-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-suppression-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/mssp-support",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machines-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machines",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/onboard-configure-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-configure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-downlevel",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/onboard.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/onboard-offline-machines.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/overview.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/overview-attack-surface-reduction.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-attack-surface-reduction",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/overview-endpoint-detection-response.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/overview-hardware-based-isolation.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hardware-based-isolation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-hunting",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/partner-applications.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/partner-applications",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/portal-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/powerbi-reports-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powerbi-reports",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/powershell-example-code",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/preferences-setup-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/preferences-setup-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/use-apis.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preferences-setup",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/prerelease.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/prerelease",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/prerelease.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/prerelease",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/preview-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/python-example-code",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/rbac-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/rbac",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-file-alerts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/response-actions.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/response-actions-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/response-actions-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/response-actions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/run-detection-test-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-detection-test",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/security-analytics-dashboard-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/secure-score-dashboard-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/security-operations-dashboard-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/service-status",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-indicator-concepts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-integration.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-protection-reports",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/time-settings-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/time-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/troubleshoot-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/troubleshoot-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-overview.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-custom-ti",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-siem",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-custom-ti",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user-roles",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/whats-new-in-microsoft-defender-atp",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-config.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-config",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-cloud-app-security-integration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/windows-defender-security-center-atp.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-security-center",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-threat-experts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-application-guard/install-wd-app-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-offline.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/block-untrusted-fonts-in-enterprise.md",
+ "redirect_url": "/windows/security/threat-protection/block-untrusted-fonts-in-enterprise",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/change-history-for-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/change-history-for-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/override-mitigation-options-for-app-related-security-policies.md",
+ "redirect_url": "/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/overview-of-threat-mitigations-in-windows-10.md",
+ "redirect_url": "/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md",
+ "redirect_url": "/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md",
+ "redirect_url": "/windows/security/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-defender-application-control.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/access-this-computer-from-the-network.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/account-lockout-duration.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-duration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/account-lockout-policy.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/account-lockout-threshold.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-lockout-threshold",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/account-policies.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/account-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/accounts-administrator-account-status.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/accounts-block-microsoft-accounts.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/accounts-guest-account-status.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/accounts-rename-administrator-account.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/accounts-rename-guest-account.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/act-as-part-of-the-operating-system.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/add-workstations-to-domain.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/administer-security-policy-settings.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/allow-log-on-locally.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-locally",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/audit-policy.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/back-up-files-and-directories.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/bypass-traverse-checking.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/change-the-system-time.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-system-time",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/change-the-time-zone.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/change-the-time-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/create-a-pagefile.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-pagefile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/create-a-token-object.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-a-token-object",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/create-global-objects.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-global-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/create-permanent-shared-objects.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/create-symbolic-links.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/create-symbolic-links",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/debug-programs.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/debug-programs",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/deny-log-on-as-a-service.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/deny-log-on-locally.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-locally",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/enforce-password-history.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-password-history",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/enforce-user-logon-restrictions.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/generate-security-audits.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/generate-security-audits",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/how-to-configure-security-policy-settings.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/impersonate-a-client-after-authentication.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/increase-a-process-working-set.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/increase-scheduling-priority.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-require-smart-card.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/kerberos-policy.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/kerberos-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/load-and-unload-device-drivers.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/lock-pages-in-memory.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/log-on-as-a-batch-job.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/log-on-as-a-service.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/log-on-as-a-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/manage-auditing-and-security-log.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/maximum-password-age.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-password-age",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/minimum-password-age.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-age",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/minimum-password-length.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/minimum-password-length",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/modify-an-object-label.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-an-object-label",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/modify-firmware-environment-values.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-list-manager-policies.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-list-manager-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/password-must-meet-complexity-requirements.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/password-policy.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/password-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/perform-volume-maintenance-tasks.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/profile-single-process.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-single-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/profile-system-performance.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/profile-system-performance",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/remove-computer-from-docking-station.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/replace-a-process-level-token.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/reset-account-lockout-counter-after.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/restore-files-and-directories.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/restore-files-and-directories",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/security-options.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/security-options",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/security-policy-settings-reference.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/security-policy-settings.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/security-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/shut-down-the-system.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/shut-down-the-system",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/synchronize-directory-service-data.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/system-settings-optional-subsystems.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-policy-settings/user-rights-assignment.md",
+ "redirect_url": "/windows/security/threat-protection/security-policy-settings/user-rights-assignment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/deploy-catalog-files-to-support-windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/deploy-managed-installer-for-device-guard.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/deploy-managed-installer-for-device-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/deploy-windows-defender-application-control.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/deploy-windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/device-guard-deployment-guide.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/device-guard-deployment-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/memory-integrity.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/memory-integrity",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/advanced-security-audit-policy-settings.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/advanced-security-auditing-faq.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/advanced-security-auditing.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-account-lockout.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-application-generated.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-application-group-management.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-audit-policy-change.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-authentication-policy-change.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-authorization-policy-change.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-central-access-policy-staging.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-certification-services.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-computer-account-management.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-credential-validation.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-detailed-directory-service-replication.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-detailed-file-share.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-directory-service-access.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-directory-service-changes.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-directory-service-replication.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-distribution-group-management.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-dpapi-activity.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-file-share.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-file-system.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-filtering-platform-packet-drop.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-group-membership.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-handle-manipulation.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-ipsec-driver.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-ipsec-main-mode.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-kerberos-authentication-service.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-kernel-object.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-logoff.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-logon.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-network-policy-server.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-other-account-logon-events.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-other-account-management-events.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-other-logonlogoff-events.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-other-object-access-events.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-other-policy-change-events.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-other-system-events.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-pnp-activity.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-process-creation.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-process-termination.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-registry.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-removable-storage.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-rpc-events.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-sam.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-security-group-management.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-security-state-change.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-security-system-extension.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-special-logon.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-system-integrity.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/audit-user-account-management.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/audit-user-device-claims.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/basic-audit-account-logon-events.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-account-management.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/basic-audit-directory-service-access.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-logon-events.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/basic-audit-object-access.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-policy-change.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/basic-audit-privilege-use.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/basic-audit-process-tracking.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/basic-audit-system-events.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/basic-security-audit-policies.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/basic-security-audit-policy-settings.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-1100.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-1102.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-1104.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-1105.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-1108.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4608.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4610.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4611.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4612.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4614.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4615.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4616.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4618.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4621.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4622.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4624.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4625.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4626.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4627.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4634.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4647.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4648.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4649.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4656.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4657.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4658.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4660.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4661.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4662.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4663.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4664.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4670.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4671.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4672.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4673.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4674.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4675.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4688.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4689.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4690.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4691.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4692.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4693.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4694.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4695.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4696.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4697.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4698.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4699.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4700.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4701.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4702.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4703.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4704.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4705.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4706.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4707.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4713.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4714.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4715.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4716.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4717.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4718.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4719.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4720.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4722.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4723.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4724.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4725.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4726.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4731.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4732.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4733.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4734.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4735.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4738.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4739.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4740.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4741.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4742.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4743.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4749.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4750.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4751.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4752.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4753.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4764.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4765.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4766.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4767.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4768.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4769.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4770.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4771.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4772.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4773.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4774.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4775.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4776.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4777.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4778.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4779.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4780.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4781.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4782.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4793.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4794.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4798.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4799.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4800.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4801.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4802.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4803.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4816.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4817.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4818.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4819.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4826.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4864.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4865.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4866.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4867.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4902.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4904.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4905.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4906.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4907.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4908.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4909.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4910.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4911.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4912.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4913.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4928.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4929.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4930.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4931.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4932.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4933.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4934.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4935.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4936.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4937.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4944.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4945.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4946.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4947.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4948.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4949.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4950.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4951.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4952.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4953.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4954.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4956.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4957.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4958.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-4964.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-4985.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5024.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5025.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5027.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5028.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5029.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5030.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5031.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5032.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5033.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5034.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5035.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5037.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5038.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5039.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5051.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5056.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5057.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5058.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5059.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5060.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5061.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5062.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5063.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5064.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5065.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5066.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5067.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5068.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5069.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5070.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5136.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5137.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5138.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5139.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5140.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5141.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5142.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5143.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5144.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5145.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5148.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5149.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5150.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5151.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5152.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5153.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5154.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5155.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5156.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5157.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5158.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5159.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5168.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5376.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5377.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5378.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5447.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5632.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5633.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5712.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5888.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-5889.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-5890.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-6144.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-6145.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-6281.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-6400.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-6401.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-6402.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-6403.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-6404.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-6405.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-6406.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-6407.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-6408.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-6409.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-6410.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-6416.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-6419.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-6420.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-6421.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-6422.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/event-6423.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/event-6424.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/monitor-claim-types.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/monitor-resource-attribute-definitions.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/monitor-the-use-of-removable-storage-devices.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/other-events.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/registry-global-object-access-auditing.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/security-auditing-overview.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/view-the-security-event-log.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md",
+ "redirect_url": "/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/administer-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/administer-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/applocker-architecture-and-components.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/applocker-architecture-and-components",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/applocker-functions.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/applocker-functions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/applocker-overview.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/applocker-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/applocker-policies-deployment-guide.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-deployment-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/applocker-policies-design-guide.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/applocker-policies-design-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/applocker-policy-use-scenarios.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/applocker-policy-use-scenarios",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/applocker-processes-and-interactions.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/applocker-processes-and-interactions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/applocker-settings.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/applocker-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/applocker-technical-reference.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/applocker-technical-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-audit-only.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-audit-only",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/configure-an-applocker-policy-for-enforce-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/configure-exceptions-for-an-applocker-rule.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/configure-exceptions-for-an-applocker-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/configure-the-application-identity-service.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/configure-the-application-identity-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/configure-the-appLocker-reference-device.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/configure-the-appLocker-reference-device",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/create-a-rule-for-packaged-apps.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-for-packaged-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-file-hash-condition",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-path-condition.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-path-condition",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/create-a-rule-that-uses-a-publisher-condition",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/create-applocker-default-rules.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/create-applocker-default-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/create-list-of-applications-deployed-to-each-business-group",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/create-your-applocker-planning-document.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-planning-document",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/create-your-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/create-your-applocker-rules.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/create-your-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/delete-an-applocker-rule.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/delete-an-applocker-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/deploy-the-applocker-policy-into-production.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/deploy-the-applocker-policy-into-production",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/determine-group-policy-structure-and-rule-enforcement",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/determine-your-application-control-objectives.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/determine-your-application-control-objectives",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/dll-rules-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/dll-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/document-group-policy-structure-and-applocker-rule-enforcement",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/document-your-application-control-management-processes.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/document-your-application-control-management-processes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/document-your-application-list.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/document-your-application-list",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/document-your-applocker-rules.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/document-your-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/edit-an-applocker-policy.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/edit-an-applocker-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/edit-applocker-rules.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/edit-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/enable-the-dll-rule-collection.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/enable-the-dll-rule-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/enforce-applocker-rules.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/enforce-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/executable-rules-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/executable-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/export-an-applocker-policy-from-a-gpo.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-from-a-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/export-an-applocker-policy-to-an-xml-file",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/how-applocker-works-techref.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/how-applocker-works-techref",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/import-an-applocker-policy-from-another-computer.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-from-another-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/import-an-applocker-policy-into-a-gpo.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/import-an-applocker-policy-into-a-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/maintain-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/maintain-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/manage-packaged-apps-with-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/manage-packaged-apps-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-by-using-set-applockerpolicy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/merge-applocker-policies-manually.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/merge-applocker-policies-manually",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/monitor-application-usage-with-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/monitor-application-usage-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/optimize-applocker-performance.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/optimize-applocker-performance",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/plan-for-applocker-policy-management.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/plan-for-applocker-policy-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/refresh-an-applocker-policy.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/refresh-an-applocker-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/requirements-for-deploying-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/requirements-for-deploying-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/requirements-to-use-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/requirements-to-use-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/run-the-automatically-generate-rules-wizard.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/run-the-automatically-generate-rules-wizard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/script-rules-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/script-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/security-considerations-for-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/security-considerations-for-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/select-types-of-rules-to-create.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/select-types-of-rules-to-create",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/test-an-applocker-policy-by-using-test-applockerpolicy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/test-and-update-an-applocker-policy.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/test-and-update-an-applocker-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/tools-to-use-with-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/tools-to-use-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understand-applocker-enforcement-settings.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-enforcement-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understand-applocker-policy-design-decisions.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-policy-design-decisions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understand-the-applocker-policy-deployment-process.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understand-the-applocker-policy-deployment-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-allow-and-deny-actions-on-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understanding-applocker-default-rules.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-default-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understanding-applocker-rule-behavior.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-behavior",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understanding-applocker-rule-collections.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-collections",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understanding-applocker-rule-condition-types.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-condition-types",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understanding-applocker-rule-exceptions.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understanding-applocker-rule-exceptions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understanding-the-file-hash-rule-condition-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understanding-the-path-rule-condition-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/understanding-the-publisher-rule-condition-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/use-the-applocker-windows-powershell-cmdlets",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/using-event-viewer-with-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/using-event-viewer-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/using-software-restriction-policies-and-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/what-is-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/what-is-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/windows-installer-rules-in-applocker.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/windows-installer-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/working-with-applocker-policies.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/applocker/working-with-applocker-rules.md",
+ "redirect_url": "/windows/security/threat-protection/applocker/working-with-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/change-history-for-device-security.md",
+ "redirect_url": "/windows/security/threat-protection/change-history-for-device-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/enable-virtualization-based-protection-of-code-integrity.md",
+ "redirect_url": "/windows/security/threat-protection/enable-virtualization-based-protection-of-code-integrity",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/get-support-for-security-baselines.md",
+ "redirect_url": "/windows/security/threat-protection/get-support-for-security-baselines",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md",
+ "redirect_url": "/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/security-compliance-toolkit-10.md",
+ "redirect_url": "/windows/security/threat-protection/security-compliance-toolkit-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/windows-10-mobile-security-guide.md",
+ "redirect_url": "/windows/security/threat-protection/windows-10-mobile-security-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/windows-security-baselines.md",
+ "redirect_url": "/windows/security/threat-protection/windows-security-baselines",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/app-behavior-with-wip.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/app-behavior-with-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune-azure.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-intune.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-mam-intune-azure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/create-wip-policy-using-sccm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/limitations-with-wip.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/limitations-with-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/mandatory-settings-for-wip.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy-sccm.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-sccm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/overview-create-wip-policy.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/overview-create-wip-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/testing-scenarios-for-wip.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/using-owa-with-wip.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/using-owa-with-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/windows-information-protection/wip-app-enterprise-context.md",
+ "redirect_url": "/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/encrypted-hard-drive.md",
+ "redirect_url": "/windows/security/hardware-protection/encrypted-hard-drive",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/how-hardware-based-containers-help-protect-windows.md",
+ "redirect_url": "/windows/security/hardware-protection/how-hardware-based-containers-help-protect-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/secure-the-windows-10-boot-process.md",
+ "redirect_url": "/windows/security/hardware-protection/secure-the-windows-10-boot-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds.md",
+ "redirect_url": "/windows/security/hardware-protection/tpm/backup-tpm-recovery-information-to-ad-ds",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/change-the-tpm-owner-password.md",
+ "redirect_url": "/windows/securityhardware-protection/tpm/change-the-tpm-owner-password",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/how-windows-uses-the-tpm.md",
+ "redirect_url": "/windows/securityhardware-protection/tpm/how-windows-uses-the-tpm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm.md",
+ "redirect_url": "/windows/security/hardware-protection/tpm/initialize-and-configure-ownership-of-the-tpm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/manage-tpm-commands.md",
+ "redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-commands",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/manage-tpm-lockout.md",
+ "redirect_url": "/windows/security/hardware-protection/tpm/manage-tpm-lockout",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices.md",
+ "redirect_url": "/windows/security/hardware-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/tpm-fundamentals.md",
+ "redirect_url": "/windows/security/hardware-protection/tpm/tpm-fundamentals",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/tpm-recommendations.md",
+ "redirect_url": "/windows/security/hardware-protection/tpm/tpm-recommendations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/trusted-platform-module-overview.md",
+ "redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/trusted-platform-module-services-group-policy-settings.md",
+ "redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/tpm/trusted-platform-module-top-node.md",
+ "redirect_url": "/windows/security/hardware-protection/tpm/trusted-platform-module-top-node",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bcd-settings-and-bitlocker.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-basic-deployment.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-basic-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-countermeasures.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-countermeasures",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-frequently-asked-questions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-group-policy-settings.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-management-for-enterprises.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-overview.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-recovery-guide-plan.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-recovery-guide-plan",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/choose-the-right-bitlocker-countermeasure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/protect-bitlocker-from-pre-boot-attacks",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys.md",
+ "redirect_url": "/windows/security/information-protection/bitlocker/types-of-attacks-for-volume-encryption-keys",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-credential-theft-mitigation-guide-abstract.md",
+ "redirect_url": "/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/change-history-for-access-protection.md",
+ "redirect_url": "/windows/security/identity-protection/change-history-for-access-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/configure-s-mime.md",
+ "redirect_url": "/windows/security/identity-protection/configure-s-mime",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/enterprise-certificate-pinning.md",
+ "redirect_url": "/windows/security/identity-protection/enterprise-certificate-pinning",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/installing-digital-certificates-on-windows-10-mobile.md",
+ "redirect_url": "/windows/security/identity-protection/installing-digital-certificates-on-windows-10-mobile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/remote-credential-guard.md",
+ "redirect_url": "/windows/security/identity-protection/remote-credential-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/assign-security-group-filters-to-the-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/basic-firewall-policy-design.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/basic-firewall-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/boundary-zone-gpos.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/boundary-zone.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/boundary-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design-example",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/certificate-based-isolation-policy-design.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/certificate-based-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/change-rules-from-request-to-require-mode",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-basic-firewall-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-creating-group-policy-objects.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-group-policy-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-inbound-firewall-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-outbound-firewall-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/configure-authentication-methods.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-authentication-methods",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-data-protection-quick-mode-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-key-exchange-main-mode-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-rules-to-require-encryption",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/configure-the-windows-firewall-log.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-windows-firewall-log",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-the-workstation-authentication-certificate-template",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/create-a-group-account-in-active-directory.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-account-in-active-directory",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/create-a-group-policy-object.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/create-a-group-policy-object",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-exemption-list-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/create-an-authentication-request-rule.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-authentication-request-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/create-an-inbound-icmp-rule.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-icmp-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/create-an-inbound-port-rule.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-port-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-inbound-program-or-service-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/create-an-outbound-port-rule.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-port-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/create-an-outbound-program-or-service-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/create-inbound-rules-to-support-rpc",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/create-wmi-filters-for-the-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/determining-the-trusted-state-of-your-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/documenting-the-zones.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/documenting-the-zones",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design-example.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design-example",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/domain-isolation-policy-design.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/domain-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/enable-predefined-inbound-rules.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-inbound-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/enable-predefined-outbound-rules.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/enable-predefined-outbound-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/encryption-zone-gpos.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/encryption-zone.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/encryption-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/exempt-icmp-from-authentication.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/exempt-icmp-from-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/exemption-list.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/exemption-list",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/firewall-gpos.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/firewall-policy-design-example.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/firewall-policy-design-example",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-active-directory-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/gathering-information-about-your-devices.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-information-about-your-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/gathering-other-relevant-information.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-other-relevant-information",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/gathering-the-information-you-need.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/gathering-the-information-you-need",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/gpo-domiso-boundary.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-boundary",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/gpo-domiso-encryption.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-encryption",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/gpo-domiso-firewall.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-firewall",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-clients",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/gpo-domiso-isolateddomain-servers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/isolated-domain-gpos.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/isolated-domain.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/isolated-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/isolating-apps-on-your-network.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/isolating-apps-on-your-network",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/link-the-gpo-to-the-domain.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/link-the-gpo-to-the-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/open-windows-firewall-with-advanced-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/planning-certificate-based-authentication.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-certificate-based-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/planning-domain-isolation-zones.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-domain-isolation-zones",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/planning-gpo-deployment.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-gpo-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-isolation-groups-for-the-zones",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/planning-network-access-groups.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-network-access-groups",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/planning-server-isolation-zones.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-server-isolation-zones",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/planning-the-gpos.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-the-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/procedures-used-in-this-guide.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/procedures-used-in-this-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/protect-devices-from-unwanted-network-traffic",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-access-to-only-trusted-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/server-isolation-gpos.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design-example.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design-example",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/server-isolation-policy-design.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/server-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/verify-that-network-traffic-is-authenticated",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/windows-firewall/windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md",
+ "redirect_url": "/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/vpn/vpn-authentication.md",
+ "redirect_url": "/windows/security/identity-protection/vpn/vpn-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/vpn/vpn-auto-trigger-profile.md",
+ "redirect_url": "/windows/security/identity-protection/vpn/vpn-auto-trigger-profile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/vpn/vpn-conditional-access.md",
+ "redirect_url": "/windows/security/identity-protection/vpn/vpn-conditional-access",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/vpn/vpn-connection-type.md",
+ "redirect_url": "/windows/security/identity-protection/vpn/vpn-connection-type",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/vpn/vpn-guide.md",
+ "redirect_url": "/windows/security/identity-protection/vpn/vpn-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/vpn/vpn-name-resolution.md",
+ "redirect_url": "/windows/security/identity-protection/vpn/vpn-name-resolution",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/vpn/vpn-profile-options.md",
+ "redirect_url": "/windows/security/identity-protection/vpn/vpn-profile-options",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/vpn/vpn-routing.md",
+ "redirect_url": "/windows/security/identity-protection/vpn/vpn-routing",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/vpn/vpn-security-features.md",
+ "redirect_url": "/windows/security/identity-protection/vpn/vpn-security-features",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md",
+ "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md",
+ "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started.md",
+ "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-overview.md",
+ "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md",
+ "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md",
+ "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md",
+ "redirect_url": "/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/user-account-control/how-user-account-control-works.md",
+ "redirect_url": "/windows/security/identity-protection/user-account-control/how-user-account-control-works",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md",
+ "redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/user-account-control/user-account-control-overview.md",
+ "redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/user-account-control/user-account-control-security-policy-settings.md",
+ "redirect_url": "/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-debugging-information.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-debugging-information",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-events.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-removal-policy-service.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-tools-and-settings.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-and-remote-desktop-services.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-architecture.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-architecture",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/smart-cards/smart-card-certificate-propagation-service.md",
+ "redirect_url": "/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-and-password-changes.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-and-password-changes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-biometrics-in-enterprise.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-adfs.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-deploy-mfa.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-deploy-mfa",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-policy-settings.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-ad-prereq.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-ad-prereq",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-deploy-mfa",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-cert-trust-validate-pki.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-deployment-cert-trust.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-cert-trust",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-deployment-guide.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-deployment-key-trust.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-deployment-key-trust",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-errors-during-pin-creation.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-event-300.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-event-300",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-features.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-features",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-how-it-works.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-how-it-works",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-new-install.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-new-install",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-devreg.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-devreg",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-trust-prereqs.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust-prereqs",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-ad",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-new-install.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-new-install",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-devreg.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-devreg",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-dirsync.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-dirsync",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-trust-prereqs.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-prereqs",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-provision.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-provision",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-ad",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-dir-sync",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-identity-verification.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-identity-verification",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-key-trust-adfs.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-key-trust-deploy-mfa.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-deploy-mfa",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-key-trust-policy-settings.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-ad-prereq.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-ad-prereq",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-deploy-mfa.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-deploy-mfa",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-key-trust-validate-pki.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-key-trust-validate-pki",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-manage-in-organization.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-manage-in-organization",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-overview.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-planning-guide.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-planning-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-prepare-people-to-use.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password.md",
+ "redirect_url": "/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/credential-guard/additional-mitigations.md",
+ "redirect_url": "/windows/security/identity-protection/credential-guard/additional-mitigations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/credential-guard/credential-guard.md",
+ "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/credential-guard/credential-guard-considerations.md",
+ "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-considerations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/credential-guard/credential-guard-how-it-works.md",
+ "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-how-it-works",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/credential-guard/credential-guard-known-issues.md",
+ "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-known-issues",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/credential-guard/credential-guard-manage.md",
+ "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-manage",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/credential-guard/credential-guard-not-protected-scenarios.md",
+ "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-not-protected-scenarios",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/credential-guard/credential-guard-protection-limits.md",
+ "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-protection-limits",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/credential-guard/credential-guard-requirements.md",
+ "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/credential-guard/credential-guard-scripts.md",
+ "redirect_url": "/windows/security/identity-protection/credential-guard/credential-guard-scripts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/access-control/access-control.md",
+ "redirect_url": "/windows/security/identity-protection/access-control/access-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/access-control/active-directory-accounts.md",
+ "redirect_url": "/windows/security/identity-protection/access-control/active-directory-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/access-control/active-directory-security-groups.md",
+ "redirect_url": "/windows/security/identity-protection/access-control/active-directory-security-groups",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/access-control/dynamic-access-control.md",
+ "redirect_url": "/windows/security/identity-protection/access-control/dynamic-access-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/access-control/local-accounts.md",
+ "redirect_url": "/windows/security/identity-protection/access-control/local-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/access-control/microsoft-accounts.md",
+ "redirect_url": "/windows/security/identity-protection/access-control/microsoft-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/access-control/security-identifiers.md",
+ "redirect_url": "/windows/security/identity-protection/access-control/security-identifiers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/access-control/security-principals.md",
+ "redirect_url": "/windows/security/identity-protection/access-control/security-principals",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/access-control/service-accounts.md",
+ "redirect_url": "/windows/security/identity-protection/access-control/service-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/access-protection/access-control/special-identities.md",
+ "redirect_url": "/windows/security/identity-protection/access-control/special-identities",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-steps.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md",
+ "redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md",
+ "redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md",
+ "redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies.md",
+ "redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies.md",
+ "redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection.md",
+ "redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/surface/surface-device-compatibility-with-windows-10-ltsb.md",
+ "redirect_url": "/devices/surface/surface-device-compatibility-with-windows-10-ltsc",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/windows-diagnostic-data-1709.md",
+ "redirect_url": "/windows/configuration/windows-diagnostic-data",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/EventName.md",
+ "redirect_url": "/windows/configuration/enhanced-telemetry-windows-analytics-events-and-fields",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "education/windows/windows-10-pro-to-pro-edu-upgrade.md",
"redirect_url": "/education/windows/switch-to-pro-education",
"redirect_document_id": false
},
-{
-"source_path": "windows/client-management/mdm/policy-admx-backed.md",
-"redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/client-management/mdm/policy-csp-location.md",
-"redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/configure-windows-defender-in-windows-10.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enable-pua-windows-defender-for-windows-10.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/get-started-with-windows-defender-for-windows-10.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/run-cmd-scan-windows-defender-for-windows-10.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-for-windows-10.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-block-at-first-sight.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-in-windows-10.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-enhanced-notifications.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-scenario-7.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/surface/surface-diagnostic-toolkit.md",
-"redirect_url": "/surface/index",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/surface/manage-surface-dock-firmware-updates.md",
-"redirect_url": "devices/surface/update",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/surface-hub/i-am-done-finishing-your-surface-hub-meeting.md",
-"redirect_url": "/surface-hub/finishing-your-surface-hub-meeting",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/hololens/hololens-microsoft-layout-app.md",
-"redirect_url": "/hololens/hololens-microsoft-dynamics-365-layout-app",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/hololens/hololens-microsoft-dynamics-365-layout-app.md",
-"redirect_url": "https://docs.microsoft.com/dynamics365/mixed-reality/layout/",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/hololens/hololens-microsoft-remote-assist-app.md",
-"redirect_url": "https://docs.microsoft.com/dynamics365/mixed-reality/remote-assist/",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/hololens/hololens-public-preview-apps.md",
-"redirect_url": "https://docs.microsoft.com/dynamics365/#pivot=mixed-reality-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/surface-hub/provisioning-packages-for-certificates-surface-hub.md",
-"redirect_url": "/surface-hub/provisioning-packages-for-surface-hub",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/surface-hub/manage-settings-with-local-admin-account-surface-hub.md",
-"redirect_url": "/surface-hub/admin-group-management-for-surface-hub",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/surface-hub/surface-hub-administrators-guide.md",
-"redirect_url": "/surface-hub/index",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/surface-hub/intro-to-surface-hub.md",
-"redirect_url": "/surface-hub/index",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/manage/waas-quick-start.md",
-"redirect_url": "/windows/deployment/update/waas-quick-start",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-overview.md",
-"redirect_url": "/windows/deployment/update/waas-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-servicing-strategy-windows-10-updates.md",
-"redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-deployment-rings-windows-10-updates.md",
-"redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-servicing-branches-windows-10-updates.md",
-"redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/update-compliance-monitor.md",
-"redirect_url": "/windows/deployment/update/update-compliance-monitor",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/update-compliance-get-started.md",
-"redirect_url": "/windows/deployment/update/update-compliance-get-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/update-compliance-using.md",
-"redirect_url": "/windows/deployment/update/update-compliance-using",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-optimize-windows-10-updates.md",
-"redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-delivery-optimization.md",
-"redirect_url": "/windows/deployment/update/waas-delivery-optimization",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-branchcache.md",
-"redirect_url": "/windows/deployment/update/waas-branchcache",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-mobile-updates.md",
-"redirect_url": "/windows/deployment/update/waas-mobile-updates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-manage-updates-wufb.md",
-"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-configure-wufb.md",
-"redirect_url": "/windows/deployment/update/waas-configure-wufb",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-integrate-wufb.md",
-"redirect_url": "/windows/deployment/update/waas-integrate-wufb",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-wufb-group-policy.md",
-"redirect_url": "/windows/deployment/update/waas-wufb-group-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-wufb-intune.md",
-"redirect_url": "/windows/deployment/update/waas-wufb-intune.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-manage-updates-wsus.md",
-"redirect_url": "/windows/deployment/update/waas-manage-updates-wsus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-manage-updates-configuration-manager.md",
-"redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-restart.md",
-"redirect_url": "/windows/deployment/update/waas-restart",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/waas-update-windows-10.md",
-"redirect_url": "/windows/deployment/update/index",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/manage/configure-windows-telemetry-in-your-organization.md",
-"redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/lockdown-features-windows-10.md",
-"redirect_url": "/windows/configuration/lockdown-features-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/set-up-shared-or-guest-pc.md",
-"redirect_url": "/windows/configuration/set-up-shared-or-guest-pc",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md",
-"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/manage/set-up-a-device-for-anyone-to-use.md",
-"redirect_url": "/windows/configuration/kiosk-shared-pc",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/configuration/set-up-a-device-for-anyone-to-use.md",
-"redirect_url": "/windows/configuration/kiosk-shared-pc",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md",
-"redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/guidelines-for-assigned-access-app.md",
-"redirect_url": "/windows/configuration/guidelines-for-assigned-access-app",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/lock-down-windows-10-to-specific-apps.md",
-"redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md",
-"redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/lockdown-xml.md",
-"redirect_url": "/windows/configuration/mobile-devices/lockdown-xml",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/settings-that-can-be-locked-down.md",
-"redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/product-ids-in-windows-10-mobile.md",
-"redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-tips-and-suggestions.md",
-"redirect_url": "/windows/configuration/manage-tips-and-suggestions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/windows-10-start-layout-options-and-policies.md",
-"redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/configure-windows-10-taskbar.md",
-"redirect_url": "/windows/configuration//configure-windows-10-taskbar",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/customize-and-export-start-layout.md",
-"redirect_url": "/windows/configuration//customize-and-export-start-layout",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/start-layout-xml-desktop.md",
-"redirect_url": "/windows/configuration/start-layout-xml-desktop",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/start-layout-xml-mobile.md",
-"redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/customize-windows-10-start-screens-by-using-group-policy.md",
-"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md",
-"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management.md",
-"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-testing-scenarios.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-scenario-1.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-scenario-2.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-scenario-3.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-scenario-4.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-scenario-5.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-scenario-6.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-o365.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-crm.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-powerbi.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-voice-commands.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-policy-settings.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-feedback.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/stop-employees-from-using-the-windows-store.md",
-"redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/stop-employees-from-using-the-windows-store.md",
-"redirect_url": "/windows/configuration/stop-employees-from-using-microsoft-store",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/configure-devices-without-mdm.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/manage/changes-to-start-policies-in-windows-10.md",
-"redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/how-it-pros-can-use-configuration-service-providers.md",
-"redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/lock-down-windows-10.md",
-"redirect_url": "/windows/configuration/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-wifi-sense-in-enterprise.md",
-"redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provisioning-packages.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provisioning-how-it-works.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provisioning-install-icd.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provisioning-create-package.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provisioning-apply-package.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provisioning-uninstall-package.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provision-pcs-for-initial-deployment.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provision-pcs-with-apps-and-certificates.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provisioning-script-to-install-app.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provisioning-nfc.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-nfc",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provisioning-command-line.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/provisioning-multivariant.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-edp-policy-using-intune.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-edp-policy-using-sccm.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-vpn-and-edp-policy-using-intune.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/hello-enable-phone-signin.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/deploy-edp-policy-using-intune.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/guidance-and-best-practices-edp.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/overview-create-edp-policy.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/protect-enterprise-data-using-edp.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/testing-scenarios-for-edp.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/wip-enterprise-overview.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/enlightened-microsoft-apps-and-edp.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/update-windows-10-images-with-provisioning-packages.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-prepare-your-environment.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-release-notes.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-review-site-discovery.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/ad-ds-schema-extensions-to-support-tpm-backup.md",
-"redirect_url": "https://technet.microsoft.com/library/jj635854.aspx",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/creating-a-device-guard-policy-for-signed-apps.md",
-"redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/device-guard-certification-and-compliance.md",
-"redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/enable-phone-signin-to-pc-and-vpn.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-enable-phone-signin",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/getting-apps-to-run-on-device-guard-protected-devices.md",
-"redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/implement-microsoft-passport-in-your-organization.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-identity-verification-using-microsoft-passport.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-passport-and-password-changes.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-passport-errors-during-pin-creation.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-passport-guide.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/passport-event-300.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-event-300",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/prepare-people-to-use-microsoft-passport.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/why-a-pin-is-better-than-a-password.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-hello-in-enterprise.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/app-inventory-managemement-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business#manage-apps-in-your-inventory",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/app-inventory-management-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/manage/application-development-for-windows-as-a-service.md",
-"redirect_url": "https://msdn.microsoft.com/windows/uwp/get-started/application-development-for-windows-as-a-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-accessibility.md",
-"redirect_url": "/windows/application-management/app-v/appv-getting-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-accessing-the-client-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-install-the-appv-client-for-shared-content-store-mode.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-modify-client-configuration-with-the-admx-template-and-group-policy.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/manage/appv-planning-for-migrating-from-a-previous-version-of-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/configure-windows-10-devices-to-stop-data-flow-to-microsoft.md",
-"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/disconnect-your-organization-from-microsoft.md",
-"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/manage/introduction-to-windows-10-servicing.md",
-"redirect_url": "/windows/deployment/update/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-cortana-in-enterprise.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/cortana-at-work-overview.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/manage/manage-inventory-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/app-inventory-managemement-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-accessibility.md",
-"redirect_url": "/windows/configuration/ue-v/uev-for-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-privacy-statement.md",
-"redirect_url": "/windows/configuration/ue-v/uev-security-considerations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/act-community-ratings-and-process.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/act-database-configuration.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-database-migration.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-deployment-options.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-glossary.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/activating-and-closing-windows-in-acm.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-lps-share-permissions.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-operatingsystem-application-report.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-operatingsystem-computer-report.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-operatingsystem-device-report.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-product-and-documentation-resources.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-settings-dialog-box-preferences-tab.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-settings-dialog-box-settings-tab.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-toolbar-icons-in-acm.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-tools-packages-and-services.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/act-user-interface-reference.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/adding-or-editing-an-issue.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/adding-or-editing-a-solution.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/analyzing-your-compatibility-data.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/application-dialog-box.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/categorizing-your-compatibility-data.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/chromebook-migration-guide.md",
-"redirect_url": "edu/windows/chromebook-migration-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/common-compatibility-issues.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/compatibility-monitor-users-guide.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/computer-dialog-box.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/configuring-act.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/creating-and-editing-issues-and-solutions.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/creating-an-enterprise-environment-for-compatibility-testing.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/creating-an-inventory-collector-package.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/creating-a-runtime-analysis-package.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/customizing-your-report-views.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/data-sent-through-the-microsoft-compatibility-exchange.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/deciding-whether-to-fix-an-application-or-deploy-a-workaround.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/deciding-which-applications-to-test.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/deleting-a-data-collection-package.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/deploying-an-inventory-collector-package.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/deploying-a-runtime-analysis-package.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/deploy-windows-10-in-a-school.md",
-"redirect_url": "/edu/windows/deploy-windows-10-in-a-school",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/example-filter-queries.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/exporting-a-data-collection-package.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/filtering-your-compatibility-data.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/fixing-compatibility-issues.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/identifying-computers-for-inventory-collection.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/integration-with-management-solutions-.md",
-"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/internet-explorer-web-site-report.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/labeling-data-in-acm.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/log-file-locations-for-data-collection-packages.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/managing-your-data-collection-packages.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/organizational-tasks-for-each-report-type.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/organizing-your-compatibility-data.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/prioritizing-your-compatibility-data.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/ratings-icons-in-acm.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/resolving-an-issue.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/saving-opening-and-exporting-reports.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/selecting-the-send-and-receive-status-for-an-application.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/selecting-your-compatibility-rating.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/selecting-your-deployment-status.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/sending-and-receiving-compatibility-data.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/settings-for-acm.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/setup-and-deployment.md",
-"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/software-requirements-for-act.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/software-requirements-for-rap.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/taking-inventory-of-your-organization.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/testing-compatibility-on-the-target-platform.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/troubleshooting-act.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/troubleshooting-act-database-issues.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/troubleshooting-the-act-configuration-wizard.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/troubleshooting-the-act-log-processing-service.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/using-act.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/using-compatibility-monitor-to-send-feedback.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/viewing-your-compatibility-reports.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/websiteurl-dialog-box.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/welcome-to-act.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/whats-new-in-act-60.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/windows-10-guidance-for-education-environments.md",
-"redirect_url": "/edu/windows/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/windows-10-servicing-options.md",
-"redirect_url": "/windows/deployment/update/waas-overview",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/plan/windows-update-for-business.md",
-"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/whats-new/applocker.md",
-"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/whats-new/bitlocker.md",
-"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/whats-new/change-history-for-what-s-new-in-windows-10.md",
-"redirect_url": "/windows/whats-new/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/whats-new/credential-guard.md",
-"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/whats-new/device-guard-overview.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/whats-new/device-management.md",
-"redirect_url": "/windows/client-management/index",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/whats-new/edge-ie11-whats-new-overview.md",
-"redirect_url": "/microsoft-edge/deploy/enterprise-guidance-using-microsoft-edge-and-ie11",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/whats-new/edp-whats-new-overview.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/whats-new/lockdown-features-windows-10.md",
-"redirect_url": "/windows/configuration/lockdown-features-windows-10",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/whats-new/microsoft-passport.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/whats-new/new-provisioning-packages.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/whats-new/security-auditing.md",
-"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/whats-new/trusted-platform-module.md",
-"redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/whats-new/user-account-control.md",
-"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/whats-new/windows-spotlight.md",
-"redirect_url": "/windows/configuration/windows-spotlight",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/whats-new/windows-store-for-business-overview.md",
-"redirect_url": "/microsoft-store/windows-store-for-business-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/windows-store-for-business-overview.md",
-"redirect_url": "/microsoft-store/microsoft-store-for-business-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/whats-new/windows-update-for-business.md",
-"redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/windows-10-security-guide.md",
-"redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/whats-new/security.md",
-"redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/configure/basic-level-windows-diagnostic-events-and-fields-1703.md",
-"redirect_url": "/windows/configuration/basic-level-windows-diagnostic-events-and-fields",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/change-history-for-configure-windows-10.md",
-"redirect_url": "/windows/configuration/change-history-for-configure-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/changes-to-start-policies-in-windows-10.md",
-"redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/configure-devices-without-mdm.md",
-"redirect_url": "/windows/configuration/configure-devices-without-mdm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/configure-devices-without-mdm.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/configure-mobile.md",
-"redirect_url": "/windows/configuration/mobile-devices/configure-mobile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/configure-windows-10-taskbar.md",
-"redirect_url": "/windows/configuration/configure-windows-10-taskbar",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/configure-windows-telemetry-in-your-organization.md",
-"redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/configure-windows-telemetry-in-your-organization.md",
-"redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-crm.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-feedback.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-o365.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-overview.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-policy-settings.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-powerbi.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-scenario-1.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-scenario-2.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-scenario-3.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-scenario-4.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-scenario-5.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-scenario-6.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-scenario-7.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-testing-scenarios.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/cortana-at-work-voice-commands.md",
-"redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/customize-and-export-start-layout.md",
-"redirect_url": "/windows/configuration/customize-and-export-start-layout",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/customize-windows-10-start-screens-by-using-group-policy.md",
-"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/customize-windows-10-start-screens-by-using-mobile-device-management.md",
-"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md",
-"redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/guidelines-for-assigned-access-app.md",
-"redirect_url": "/windows/configuration/guidelines-for-assigned-access-app",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/how-it-pros-can-use-configuration-service-providers.md",
-"redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/kiosk-shared-pc.md",
-"redirect_url": "/windows/configuration/kiosk-shared-pc",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/kiosk-shared-pc.md",
-"redirect_url": "/windows/configuration/kiosk-methods",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/setup-kiosk-digital-signage.md",
-"redirect_url": "/windows/configuration/kiosk-single-app",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/multi-app-kiosk-xml.md",
-"redirect_url": "/windows/configuration/kiosk-xml",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/multi-app-kiosk-troubleshoot.md",
-"redirect_url": "/windows/configuration/kiosk-troubleshoot",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/lock-down-windows-10-to-specific-apps.md",
-"redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/lock-down-windows-10.md",
-"redirect_url": "/windows/configuration/lock-down-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/lockdown-features-windows-10.md",
-"redirect_url": "/windows/configuration/lockdown-features-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/lockdown-xml.md",
-"redirect_url": "/windows/configuration/mobile-devices/lockdown-xml",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/manage-connections-from-windows-operating-system-components-to-microsoft-services.md",
-"redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/manage-tips-and-suggestions.md",
-"redirect_url": "/windows/configuration/manage-tips-and-suggestions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/manage-wifi-sense-in-enterprise.md",
-"redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/mobile-lockdown-designer.md",
-"redirect_url": "/windows/configuration/mobile-devices/mobile-lockdown-designer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/product-ids-in-windows-10-mobile.md",
-"redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provision-pcs-for-initial-deployment.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provision-pcs-with-apps-and-certificates.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps-and-certificates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provision-pcs-with-apps.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-apply-package.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-command-line.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-configure-mobile.md",
-"redirect_url": "/windows/configuration/mobile-devices/provisioning-configure-mobile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-create-package.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-how-it-works.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-install-icd.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-multivariant.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-nfc.md",
-"redirect_url": "/windows/configuration/mobile-devices/provisioning-nfc",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-package-splitter.md",
-"redirect_url": "/windows/configuration/mobile-devices/provisioning-package-splitter",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-packages.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-powershell.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-script-to-install-app.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/provisioning-uninstall-package.md",
-"redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/set-up-a-device-for-anyone-to-use.md",
-"redirect_url": "/windows/configuration/set-up-a-device-for-anyone-to-use",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-desktop-editions.md",
-"redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions",
-"redirect_document_id": true
-},
-{
- "source_path": "windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md",
- "redirect_url": "/windows/configuration/setup-kiosk-digital-signage",
+ {
+ "source_path": "education/windows/switch-to-pro-education.md",
+ "redirect_url": "/education/windows/change-to-pro-education",
"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-mobile-edition.md",
-"redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/set-up-shared-or-guest-pc.md",
-"redirect_url": "/windows/configuration/set-up-shared-or-guest-pc",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/settings-that-can-be-locked-down.md",
-"redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/start-layout-xml-desktop.md",
-"redirect_url": "/windows/configuration/start-layout-xml-desktop",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/start-layout-xml-mobile.md",
-"redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/start-secondary-tiles.md",
-"redirect_url": "/windows/configuration/start-secondary-tiles",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/start-taskbar-lockscreen.md",
-"redirect_url": "/windows/configuration/start-taskbar-lockscreen",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/start-taskbar-lockscreen.md",
-"redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/stop-employees-from-using-the-windows-store.md",
-"redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/windows-10-start-layout-options-and-policies.md",
-"redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/windows-diagnostic-data-1703.md",
-"redirect_url": "/windows/configuration/windows-diagnostic-data",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/windows-spotlight.md",
-"redirect_url": "/windows/configuration/windows-spotlight",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/windows-spotlight.md",
-"redirect_url": "/windows/configuration/windows-spotlight",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/activate-forest-by-proxy-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/activate-forest-by-proxy-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/activate-forest-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/activate-forest-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/activate-using-active-directory-based-activation-client.md",
-"redirect_url": "/windows/deployment/volume-activation/activate-using-active-directory-based-activation-client",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/activate-using-key-management-service-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/activate-using-key-management-service-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/activate-windows-10-clients-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/activate-windows-10-clients-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/active-directory-based-activation-overview.md",
-"redirect_url": "/windows/deployment/volume-activation/active-directory-based-activation-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/add-a-windows-10-operating-system-image-using-configuration-manager.md",
-"redirect_url": "/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md",
-"redirect_url": "/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/add-manage-products-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/add-manage-products-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/add-remove-computers-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/add-remove-computers-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/add-remove-product-key-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/add-remove-product-key-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/appendix-information-sent-to-microsoft-during-activation-client.md",
-"redirect_url": "/windows/deployment/volume-activation/appendix-information-sent-to-microsoft-during-activation-client",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/assign-applications-using-roles-in-mdt-2013.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt-2013",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/assign-applications-using-roles-in-mdt.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/build-a-distributed-environment-for-windows-10-deployment.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/change-history-for-deploy-windows-10.md",
-"redirect_url": "/windows/deployment/change-history-for-deploy-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/configure-a-pxe-server-to-load-windows-pe.md",
-"redirect_url": "/windows/deployment/configure-a-pxe-server-to-load-windows-pe",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/configure-client-computers-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/configure-client-computers-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/configure-mdt-2013-for-userexit-scripts.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-for-userexit-scripts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/configure-mdt-2013-settings.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/configure-mdt-deployment-share-rules.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/configure-mdt-for-userexit-scripts.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/configure-mdt-settings.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/create-a-custom-windows-pe-boot-image-with-configuration-manager.md",
-"redirect_url": "/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/create-a-windows-10-reference-image.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md",
-"redirect_url": "/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/deploy-a-windows-10-image-using-mdt.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/deploy-whats-new.md",
-"redirect_url": "/windows/deployment/deploy-whats-new",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/deploy-windows-10-using-pxe-and-configuration-manager.md",
-"redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md",
-"redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/deploy-windows-10-with-the-microsoft-deployment-toolkit.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/deploy-windows-to-go.md",
-"redirect_url": "/windows/deployment/deploy-windows-to-go",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md",
-"redirect_url": "/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/get-started-with-the-microsoft-deployment-toolkit.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/getting-started-with-the-user-state-migration-tool.md",
-"redirect_url": "/windows/deployment/usmt/getting-started-with-the-user-state-migration-tool",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/import-export-vamt-data.md",
-"redirect_url": "/windows/deployment/volume-activation/import-export-vamt-data",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/install-configure-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/install-configure-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/install-kms-client-key-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/install-kms-client-key-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/install-product-key-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/install-product-key-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/install-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/install-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/integrate-configuration-manager-with-mdt-2013.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt-2013",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/integrate-configuration-manager-with-mdt.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/introduction-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/introduction-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/key-features-in-mdt-2013.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt-2013",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/key-features-in-mdt.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/kms-activation-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/kms-activation-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/local-reactivation-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/local-reactivation-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/manage-activations-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/manage-activations-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/manage-product-keys-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/manage-product-keys-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/manage-vamt-data.md",
-"redirect_url": "/windows/deployment/volume-activation/manage-vamt-data",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-analytics.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-readiness.md",
-"redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/mbr-to-gpt.md",
-"redirect_url": "/windows/deployment/mbr-to-gpt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/mdt-2013-lite-touch-components.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-2013-lite-touch-components",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/mdt-lite-touch-components.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-lite-touch-components",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/migrate-application-settings.md",
-"redirect_url": "/windows/deployment/usmt/migrate-application-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/migration-store-types-overview.md",
-"redirect_url": "/windows/deployment/usmt/migration-store-types-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/monitor-activation-client.md",
-"redirect_url": "/windows/deployment/volume-activation/monitor-activation-client",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/monitor-windows-10-deployment-with-configuration-manager.md",
-"redirect_url": "/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/offline-migration-reference.md",
-"redirect_url": "/windows/deployment/usmt/offline-migration-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/online-activation-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/online-activation-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/plan-for-volume-activation-client.md",
-"redirect_url": "/windows/deployment/volume-activation/plan-for-volume-activation-client",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt-2013.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt-2013",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md",
-"redirect_url": "/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/proxy-activation-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/proxy-activation-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md",
-"redirect_url": "/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/refresh-a-windows-7-computer-with-windows-10.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/remove-products-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/remove-products-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md",
-"redirect_url": "/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/replace-a-windows-7-computer-with-a-windows-10-computer.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/resolve-windows-10-upgrade-errors.md",
-"redirect_url": "/windows/deployment/upgrade/resolve-windows-10-upgrade-errors",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/scenario-kms-activation-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/scenario-kms-activation-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/scenario-online-activation-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/scenario-online-activation-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/scenario-proxy-activation-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/scenario-proxy-activation-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/set-up-mdt-2013-for-bitlocker.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-2013-for-bitlocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/set-up-mdt-for-bitlocker.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/sideload-apps-in-windows-10.md",
-"redirect_url": "/windows/application-management/sideload-apps-in-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/simulate-a-windows-10-deployment-in-a-test-environment.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/troubleshoot-upgrade-analytics.md",
-"redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/troubleshoot-upgrade-readiness.md",
-"redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/understanding-migration-xml-files.md",
-"redirect_url": "/windows/deployment/usmt/understanding-migration-xml-files",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/update-product-status-vamt.md",
-"redirect_url": "/windows/deployment/volume-activation/update-product-status-vamt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-additional-insights.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-architecture.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-deploy-windows.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-deployment-script.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-get-started.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-identify-apps.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-requirements.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-resolve-issues.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-analytics-upgrade-overview.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-readiness-additional-insights.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-readiness-architecture.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-readiness-deploy-windows.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-readiness-deployment-script.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-readiness-get-started.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-readiness-identify-apps.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-readiness-release-notes.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-release-notes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-readiness-requirements.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-readiness-resolve-issues.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-readiness-upgrade-overview.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-to-windows-10-with-system-center-configuraton-manager.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-windows-phone-8-1-to-10.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt-2013.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt-2013",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/use-the-mdt-database-to-stage-windows-10-deployment-information.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/use-the-volume-activation-management-tool-client.md",
-"redirect_url": "/windows/deployment/volume-activation/use-the-volume-activation-management-tool-client",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/use-upgrade-analytics-to-manage-windows-upgrades.md",
-"redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/use-upgrade-readiness-to-manage-windows-upgrades.md",
-"redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/use-vamt-in-windows-powershell.md",
-"redirect_url": "/windows/deployment/volume-activation/use-vamt-in-windows-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/use-web-services-in-mdt-2013.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt-2013",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/use-web-services-in-mdt.md",
-"redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-best-practices.md",
-"redirect_url": "/windows/deployment/usmt/usmt-best-practices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-choose-migration-store-type.md",
-"redirect_url": "/windows/deployment/usmt/usmt-choose-migration-store-type",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-command-line-syntax.md",
-"redirect_url": "/windows/deployment/usmt/usmt-command-line-syntax",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-common-issues.md",
-"redirect_url": "/windows/deployment/usmt/usmt-common-issues",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-common-migration-scenarios.md",
-"redirect_url": "/windows/deployment/usmt/usmt-common-migration-scenarios",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-configxml-file.md",
-"redirect_url": "/windows/deployment/usmt/usmt-configxml-file",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-conflicts-and-precedence.md",
-"redirect_url": "/windows/deployment/usmt/usmt-conflicts-and-precedence",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-custom-xml-examples.md",
-"redirect_url": "/windows/deployment/usmt/usmt-custom-xml-examples",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-customize-xml-files.md",
-"redirect_url": "/windows/deployment/usmt/usmt-customize-xml-files",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-determine-what-to-migrate.md",
-"redirect_url": "/windows/deployment/usmt/usmt-determine-what-to-migrate",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-estimate-migration-store-size.md",
-"redirect_url": "/windows/deployment/usmt/usmt-estimate-migration-store-size",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-exclude-files-and-settings.md",
-"redirect_url": "/windows/deployment/usmt/usmt-exclude-files-and-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-extract-files-from-a-compressed-migration-store.md",
-"redirect_url": "/windows/deployment/usmt/usmt-extract-files-from-a-compressed-migration-store",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-faq.md",
-"redirect_url": "/windows/deployment/usmt/usmt-faq",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-general-conventions.md",
-"redirect_url": "/windows/deployment/usmt/usmt-general-conventions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-hard-link-migration-store.md",
-"redirect_url": "/windows/deployment/usmt/usmt-hard-link-migration-store",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-how-it-works.md",
-"redirect_url": "/windows/deployment/usmt/usmt-how-it-works",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-how-to.md",
-"redirect_url": "/windows/deployment/usmt/usmt-how-to",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-identify-application-settings.md",
-"redirect_url": "/windows/deployment/usmt/usmt-identify-application-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-identify-file-types-files-and-folders.md",
-"redirect_url": "/windows/deployment/usmt/usmt-identify-file-types-files-and-folders",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-identify-operating-system-settings.md",
-"redirect_url": "/windows/deployment/usmt/usmt-identify-operating-system-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-identify-users.md",
-"redirect_url": "/windows/deployment/usmt/usmt-identify-users",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-include-files-and-settings.md",
-"redirect_url": "/windows/deployment/usmt/usmt-include-files-and-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-loadstate-syntax.md",
-"redirect_url": "/windows/deployment/usmt/usmt-loadstate-syntax",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-log-files.md",
-"redirect_url": "/windows/deployment/usmt/usmt-log-files",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-migrate-efs-files-and-certificates.md",
-"redirect_url": "/windows/deployment/usmt/usmt-migrate-efs-files-and-certificates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-migrate-user-accounts.md",
-"redirect_url": "/windows/deployment/usmt/usmt-migrate-user-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-migration-store-encryption.md",
-"redirect_url": "/windows/deployment/usmt/usmt-migration-store-encryption",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-overview.md",
-"redirect_url": "/windows/deployment/usmt/usmt-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-plan-your-migration.md",
-"redirect_url": "/windows/deployment/usmt/usmt-plan-your-migration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-recognized-environment-variables.md",
-"redirect_url": "/windows/deployment/usmt/usmt-recognized-environment-variables",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-reference.md",
-"redirect_url": "/windows/deployment/usmt/usmt-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-requirements.md",
-"redirect_url": "/windows/deployment/usmt/usmt-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-reroute-files-and-settings.md",
-"redirect_url": "/windows/deployment/usmt/usmt-reroute-files-and-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-resources.md",
-"redirect_url": "/windows/deployment/usmt/usmt-resources",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-return-codes.md",
-"redirect_url": "/windows/deployment/usmt/usmt-return-codes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-scanstate-syntax.md",
-"redirect_url": "/windows/deployment/usmt/usmt-scanstate-syntax",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-technical-reference.md",
-"redirect_url": "/windows/deployment/usmt/usmt-technical-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-test-your-migration.md",
-"redirect_url": "/windows/deployment/usmt/usmt-test-your-migration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-topics.md",
-"redirect_url": "/windows/deployment/usmt/usmt-topics",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-troubleshooting.md",
-"redirect_url": "/windows/deployment/usmt/usmt-troubleshooting",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-utilities.md",
-"redirect_url": "/windows/deployment/usmt/usmt-utilities",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-what-does-usmt-migrate.md",
-"redirect_url": "/windows/deployment/usmt/usmt-what-does-usmt-migrate",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-xml-elements-library.md",
-"redirect_url": "/windows/deployment/usmt/usmt-xml-elements-library",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/usmt-xml-reference.md",
-"redirect_url": "/windows/deployment/usmt/usmt-xml-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/vamt-known-issues.md",
-"redirect_url": "/windows/deployment/volume-activation/vamt-known-issues",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/vamt-requirements.md",
-"redirect_url": "/windows/deployment/volume-activation/vamt-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/vamt-step-by-step.md",
-"redirect_url": "/windows/deployment/volume-activation/vamt-step-by-step",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/verify-the-condition-of-a-compressed-migration-store.md",
-"redirect_url": "/windows/deployment/usmt/verify-the-condition-of-a-compressed-migration-store",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/volume-activation-management-tool.md",
-"redirect_url": "/windows/deployment/volume-activation/volume-activation-management-tool",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/volume-activation-windows-10.md",
-"redirect_url": "/windows/deployment/volume-activation/volume-activation-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/windows-10-deployment-scenarios.md",
-"redirect_url": "/windows/deployment/windows-10-deployment-scenarios",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/windows-10-deployment-tools-reference.md",
-"redirect_url": "/windows/deployment/windows-10-deployment-tools-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/windows-10-edition-upgrades.md",
-"redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/windows-10-enterprise-e3-overview.md",
-"redirect_url": "/windows/deployment/windows-10-enterprise-e3-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/windows-10-poc-mdt.md",
-"redirect_url": "/windows/deployment/windows-10-poc-mdt",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/windows-10-poc-sc-config-mgr.md",
-"redirect_url": "/windows/deployment/windows-10-poc-sc-config-mgr",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/windows-10-poc.md",
-"redirect_url": "/windows/deployment/windows-10-poc",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/windows-10-upgrade-paths.md",
-"redirect_url": "/windows/deployment/upgrade/windows-10-upgrade-paths",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/windows-adk-scenarios-for-it-pros.md",
-"redirect_url": "/windows/deployment/windows-adk-scenarios-for-it-pros",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/windows-deployment-scenarios-and-tools.md",
-"redirect_url": "/windows/deployment/windows-deployment-scenarios-and-tools",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/windows-upgrade-and-migration-considerations.md",
-"redirect_url": "/windows/deployment/upgrade/windows-upgrade-and-migration-considerations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/xml-file-requirements.md",
-"redirect_url": "/windows/deployment/usmt/xml-file-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/access-control.md",
-"redirect_url": "/windows/access-protection/access-control/access-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/access-credential-manager-as-a-trusted-caller.md",
-"redirect_url": "/windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/access-this-computer-from-the-network.md",
-"redirect_url": "/windows/device-security/security-policy-settings/access-this-computer-from-the-network",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/account-lockout-duration.md",
-"redirect_url": "/windows/device-security/security-policy-settings/account-lockout-duration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/account-lockout-policy.md",
-"redirect_url": "/windows/device-security/security-policy-settings/account-lockout-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/account-lockout-threshold.md",
-"redirect_url": "/windows/device-security/security-policy-settings/account-lockout-threshold",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/account-policies.md",
-"redirect_url": "/windows/device-security/security-policy-settings/account-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/accounts-administrator-account-status.md",
-"redirect_url": "/windows/device-security/security-policy-settings/accounts-administrator-account-status",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/accounts-block-microsoft-accounts.md",
-"redirect_url": "/windows/device-security/security-policy-settings/accounts-block-microsoft-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/accounts-guest-account-status.md",
-"redirect_url": "/windows/device-security/security-policy-settings/accounts-guest-account-status",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md",
-"redirect_url": "/windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/accounts-rename-administrator-account.md",
-"redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-administrator-account",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/accounts-rename-guest-account.md",
-"redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-guest-account",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/act-as-part-of-the-operating-system.md",
-"redirect_url": "/windows/device-security/security-policy-settings/act-as-part-of-the-operating-system",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/active-directory-accounts.md",
-"redirect_url": "/windows/access-protection/access-control/active-directory-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/active-directory-security-groups.md",
-"redirect_url": "/windows/access-protection/access-control/active-directory-security-groups",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/add-production-devices-to-the-membership-group-for-a-zone.md",
-"redirect_url": "/windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md",
-"redirect_url": "/windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/add-test-devices-to-the-membership-group-for-a-zone.md",
-"redirect_url": "/windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/add-workstations-to-domain.md",
-"redirect_url": "/windows/device-security/security-policy-settings/add-workstations-to-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/additional-mitigations.md",
-"redirect_url": "/windows/access-protection/credential-guard/additional-mitigations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/adjust-memory-quotas-for-a-process.md",
-"redirect_url": "/windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/administer-applocker.md",
-"redirect_url": "/windows/device-security/applocker/administer-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/administer-security-policy-settings.md",
-"redirect_url": "/windows/device-security/security-policy-settings/administer-security-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/advanced-security-audit-policy-settings.md",
-"redirect_url": "/windows/device-security/auditing/advanced-security-audit-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/advanced-security-auditing-faq.md",
-"redirect_url": "/windows/device-security/auditing/advanced-security-auditing-faq",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/advanced-security-auditing.md",
-"redirect_url": "/windows/device-security/auditing/advanced-security-auditing",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/alerts-queue-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/allow-log-on-locally.md",
-"redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-locally",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/allow-log-on-through-remote-desktop-services.md",
-"redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/api-portal-mapping-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/app-behavior-with-wip.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/app-behavior-with-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md",
-"redirect_url": "/windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/appendix-a-security-monitoring-recommendations-for-many-audit-events.md",
-"redirect_url": "/windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/applocker-architecture-and-components.md",
-"redirect_url": "/windows/device-security/applocker/applocker-architecture-and-components",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/applocker-functions.md",
-"redirect_url": "/windows/device-security/applocker/applocker-functions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/applocker-overview.md",
-"redirect_url": "/windows/device-security/applocker/applocker-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/applocker-policies-deployment-guide.md",
-"redirect_url": "/windows/device-security/applocker/applocker-policies-deployment-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/applocker-policies-design-guide.md",
-"redirect_url": "/windows/device-security/applocker/applocker-policies-design-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/applocker-policy-use-scenarios.md",
-"redirect_url": "/windows/device-security/applocker/applocker-policy-use-scenarios",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/applocker-processes-and-interactions.md",
-"redirect_url": "/windows/device-security/applocker/applocker-processes-and-interactions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/applocker-settings.md",
-"redirect_url": "/windows/device-security/applocker/applocker-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/applocker-technical-reference.md",
-"redirect_url": "/windows/device-security/applocker/applocker-technical-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/apply-a-basic-audit-policy-on-a-file-or-folder.md",
-"redirect_url": "/windows/device-security/auditing/apply-a-basic-audit-policy-on-a-file-or-folder",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/assign-security-group-filters-to-the-gpo.md",
-"redirect_url": "/windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-account-lockout.md",
-"redirect_url": "/windows/device-security/auditing/audit-account-lockout",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-application-generated.md",
-"redirect_url": "/windows/device-security/auditing/audit-application-generated",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-application-group-management.md",
-"redirect_url": "/windows/device-security/auditing/audit-application-group-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-audit-policy-change.md",
-"redirect_url": "/windows/device-security/auditing/audit-audit-policy-change",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-audit-the-access-of-global-system-objects.md",
-"redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-audit-the-use-of-backup-and-restore-privilege.md",
-"redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-authentication-policy-change.md",
-"redirect_url": "/windows/device-security/auditing/audit-authentication-policy-change",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-authorization-policy-change.md",
-"redirect_url": "/windows/device-security/auditing/audit-authorization-policy-change",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-central-access-policy-staging.md",
-"redirect_url": "/windows/device-security/auditing/audit-central-access-policy-staging",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-certification-services.md",
-"redirect_url": "/windows/device-security/auditing/audit-certification-services",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-computer-account-management.md",
-"redirect_url": "/windows/device-security/auditing/audit-computer-account-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-credential-validation.md",
-"redirect_url": "/windows/device-security/auditing/audit-credential-validation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-detailed-directory-service-replication.md",
-"redirect_url": "/windows/device-security/auditing/audit-detailed-directory-service-replication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-detailed-file-share.md",
-"redirect_url": "/windows/device-security/auditing/audit-detailed-file-share",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-directory-service-access.md",
-"redirect_url": "/windows/device-security/auditing/audit-directory-service-access",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-directory-service-changes.md",
-"redirect_url": "/windows/device-security/auditing/audit-directory-service-changes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-directory-service-replication.md",
-"redirect_url": "/windows/device-security/auditing/audit-directory-service-replication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-distribution-group-management.md",
-"redirect_url": "/windows/device-security/auditing/audit-distribution-group-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-dpapi-activity.md",
-"redirect_url": "/windows/device-security/auditing/audit-dpapi-activity",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-file-share.md",
-"redirect_url": "/windows/device-security/auditing/audit-file-share",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-file-system.md",
-"redirect_url": "/windows/device-security/auditing/audit-file-system",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-filtering-platform-connection.md",
-"redirect_url": "/windows/device-security/auditing/audit-filtering-platform-connection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-filtering-platform-packet-drop.md",
-"redirect_url": "/windows/device-security/auditing/audit-filtering-platform-packet-drop",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-filtering-platform-policy-change.md",
-"redirect_url": "/windows/device-security/auditing/audit-filtering-platform-policy-change",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-force-audit-policy-subcategory-settings-to-override.md",
-"redirect_url": "/windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-group-membership.md",
-"redirect_url": "/windows/device-security/auditing/audit-group-membership",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-handle-manipulation.md",
-"redirect_url": "/windows/device-security/auditing/audit-handle-manipulation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-ipsec-driver.md",
-"redirect_url": "/windows/device-security/auditing/audit-ipsec-driver",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-ipsec-extended-mode.md",
-"redirect_url": "/windows/device-security/auditing/audit-ipsec-extended-mode",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-ipsec-main-mode.md",
-"redirect_url": "/windows/device-security/auditing/audit-ipsec-main-mode",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-ipsec-quick-mode.md",
-"redirect_url": "/windows/device-security/auditing/audit-ipsec-quick-mode",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-kerberos-authentication-service.md",
-"redirect_url": "/windows/device-security/auditing/audit-kerberos-authentication-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-kerberos-service-ticket-operations.md",
-"redirect_url": "/windows/device-security/auditing/audit-kerberos-service-ticket-operations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-kernel-object.md",
-"redirect_url": "/windows/device-security/auditing/audit-kernel-object",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-logoff.md",
-"redirect_url": "/windows/device-security/auditing/audit-logoff",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-logon.md",
-"redirect_url": "/windows/device-security/auditing/audit-logon",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-mpssvc-rule-level-policy-change.md",
-"redirect_url": "/windows/device-security/auditing/audit-mpssvc-rule-level-policy-change",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-network-policy-server.md",
-"redirect_url": "/windows/device-security/auditing/audit-network-policy-server",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-non-sensitive-privilege-use.md",
-"redirect_url": "/windows/device-security/auditing/audit-non-sensitive-privilege-use",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-other-account-logon-events.md",
-"redirect_url": "/windows/device-security/auditing/audit-other-account-logon-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-other-account-management-events.md",
-"redirect_url": "/windows/device-security/auditing/audit-other-account-management-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-other-logonlogoff-events.md",
-"redirect_url": "/windows/device-security/auditing/audit-other-logonlogoff-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-other-object-access-events.md",
-"redirect_url": "/windows/device-security/auditing/audit-other-object-access-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-other-policy-change-events.md",
-"redirect_url": "/windows/device-security/auditing/audit-other-policy-change-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-other-privilege-use-events.md",
-"redirect_url": "/windows/device-security/auditing/audit-other-privilege-use-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-other-system-events.md",
-"redirect_url": "/windows/device-security/auditing/audit-other-system-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-pnp-activity.md",
-"redirect_url": "/windows/device-security/auditing/audit-pnp-activity",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-policy.md",
-"redirect_url": "/windows/device-security/security-policy-settings/audit-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-process-creation.md",
-"redirect_url": "/windows/device-security/auditing/audit-process-creation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-process-termination.md",
-"redirect_url": "/windows/device-security/auditing/audit-process-termination",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-registry.md",
-"redirect_url": "/windows/device-security/auditing/audit-registry",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-removable-storage.md",
-"redirect_url": "/windows/device-security/auditing/audit-removable-storage",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-rpc-events.md",
-"redirect_url": "/windows/device-security/auditing/audit-rpc-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-sam.md",
-"redirect_url": "/windows/device-security/auditing/audit-sam",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-security-group-management.md",
-"redirect_url": "/windows/device-security/auditing/audit-security-group-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-security-state-change.md",
-"redirect_url": "/windows/device-security/auditing/audit-security-state-change",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-security-system-extension.md",
-"redirect_url": "/windows/device-security/auditing/audit-security-system-extension",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-sensitive-privilege-use.md",
-"redirect_url": "/windows/device-security/auditing/audit-sensitive-privilege-use",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md",
-"redirect_url": "/windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-special-logon.md",
-"redirect_url": "/windows/device-security/auditing/audit-special-logon",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-system-integrity.md",
-"redirect_url": "/windows/device-security/auditing/audit-system-integrity",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-user-account-management.md",
-"redirect_url": "/windows/device-security/auditing/audit-user-account-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/audit-user-device-claims.md",
-"redirect_url": "/windows/device-security/auditing/audit-user-device-claims",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/back-up-files-and-directories.md",
-"redirect_url": "/windows/device-security/security-policy-settings/back-up-files-and-directories",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/backup-tpm-recovery-information-to-ad-ds.md",
-"redirect_url": "/windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-audit-account-logon-events.md",
-"redirect_url": "/windows/device-security/auditing/basic-audit-account-logon-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-audit-account-management.md",
-"redirect_url": "/windows/device-security/auditing/basic-audit-account-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-audit-directory-service-access.md",
-"redirect_url": "/windows/device-security/auditing/basic-audit-directory-service-access",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-audit-logon-events.md",
-"redirect_url": "/windows/device-security/auditing/basic-audit-logon-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-audit-object-access.md",
-"redirect_url": "/windows/device-security/auditing/basic-audit-object-access",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-audit-policy-change.md",
-"redirect_url": "/windows/device-security/auditing/basic-audit-policy-change",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-audit-privilege-use.md",
-"redirect_url": "/windows/device-security/auditing/basic-audit-privilege-use",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-audit-process-tracking.md",
-"redirect_url": "/windows/device-security/auditing/basic-audit-process-tracking",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-audit-system-events.md",
-"redirect_url": "/windows/device-security/auditing/basic-audit-system-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-firewall-policy-design.md",
-"redirect_url": "/windows/access-protection/windows-firewall/basic-firewall-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-security-audit-policies.md",
-"redirect_url": "/windows/device-security/auditing/basic-security-audit-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/basic-security-audit-policy-settings.md",
-"redirect_url": "/windows/device-security/auditing/basic-security-audit-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bcd-settings-and-bitlocker.md",
-"redirect_url": "/windows/device-security/bitlocker/bcd-settings-and-bitlocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bitlocker-basic-deployment.md",
-"redirect_url": "/windows/device-security/bitlocker/bitlocker-basic-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bitlocker-countermeasures.md",
-"redirect_url": "/windows/device-security/bitlocker/bitlocker-countermeasures",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bitlocker-device-encryption-overview-windows-10.md",
-"redirect_url": "/windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bitlocker-frequently-asked-questions.md",
-"redirect_url": "/windows/device-security/bitlocker/bitlocker-frequently-asked-questions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bitlocker-group-policy-settings.md",
-"redirect_url": "/windows/device-security/bitlocker/bitlocker-group-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bitlocker-how-to-deploy-on-windows-server.md",
-"redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bitlocker-how-to-enable-network-unlock.md",
-"redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bitlocker-overview.md",
-"redirect_url": "/windows/device-security/bitlocker/bitlocker-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bitlocker-recovery-guide-plan.md",
-"redirect_url": "/windows/device-security/bitlocker/bitlocker-recovery-guide-plan",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md",
-"redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bitlocker-use-bitlocker-recovery-password-viewer.md",
-"redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/block-untrusted-fonts-in-enterprise.md",
-"redirect_url": "/windows/threat-protection/block-untrusted-fonts-in-enterprise",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/boundary-zone-gpos.md",
-"redirect_url": "/windows/access-protection/windows-firewall/boundary-zone-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/boundary-zone.md",
-"redirect_url": "/windows/access-protection/windows-firewall/boundary-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/bypass-traverse-checking.md",
-"redirect_url": "/windows/device-security/security-policy-settings/bypass-traverse-checking",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/certificate-based-isolation-policy-design-example.md",
-"redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/certificate-based-isolation-policy-design.md",
-"redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/change-rules-from-request-to-require-mode.md",
-"redirect_url": "/windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/change-the-system-time.md",
-"redirect_url": "/windows/device-security/security-policy-settings/change-the-system-time",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/change-the-time-zone.md",
-"redirect_url": "/windows/device-security/security-policy-settings/change-the-time-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/change-the-tpm-owner-password.md",
-"redirect_url": "/windows/device-security/tpm/change-the-tpm-owner-password",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/check-sensor-status-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-configuring-basic-firewall-settings.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-configuring-rules-for-an-isolated-server-zone.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-configuring-rules-for-the-boundary-zone.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-configuring-rules-for-the-encryption-zone.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-configuring-rules-for-the-isolated-domain.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-creating-group-policy-objects.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-group-policy-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-creating-inbound-firewall-rules.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-creating-outbound-firewall-rules.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-implementing-a-basic-firewall-policy-design.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-implementing-a-certificate-based-isolation-policy-design.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-implementing-a-domain-isolation-policy-design.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/checklist-implementing-a-standalone-server-isolation-policy-design.md",
-"redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/choose-the-right-bitlocker-countermeasure.md",
-"redirect_url": "/windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/command-line-arguments-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configuration-management-reference-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-advanced-scan-types-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-an-applocker-policy-for-audit-only.md",
-"redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-audit-only",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-an-applocker-policy-for-enforce-rules.md",
-"redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-authentication-methods.md",
-"redirect_url": "/windows/access-protection/windows-firewall/configure-authentication-methods",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-block-at-first-sight-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-cloud-block-timeout-period-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-data-protection-quick-mode-settings.md",
-"redirect_url": "/windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-email-notifications-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-end-user-interaction-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-endpoints-gp-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-endpoints-script-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-exceptions-for-an-applocker-rule.md",
-"redirect_url": "/windows/device-security/applocker/configure-exceptions-for-an-applocker-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-exclusions-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-extension-file-exclusions-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-group-policy-to-autoenroll-and-deploy-certificates.md",
-"redirect_url": "/windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-key-exchange-main-mode-settings.md",
-"redirect_url": "/windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-local-policy-overrides-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-network-connections-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-notifications-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-process-opened-file-exclusions-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-protection-features-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-proxy-internet-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-real-time-protection-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-remediation-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-s-mime.md",
-"redirect_url": "/windows/access-protection/configure-s-mime",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-server-exclusions-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-siem-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-the-application-identity-service.md",
-"redirect_url": "/windows/device-security/applocker/configure-the-application-identity-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-the-appLocker-reference-device.md",
-"redirect_url": "/windows/device-security/applocker/configure-the-appLocker-reference-device",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-the-rules-to-require-encryption.md",
-"redirect_url": "/windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-the-windows-firewall-log.md",
-"redirect_url": "/windows/access-protection/windows-firewall/configure-the-windows-firewall-log",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-the-workstation-authentication-certificate-template.md",
-"redirect_url": "/windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-windows-defender-antivirus-features.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md",
-"redirect_url": "/windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/confirm-that-certificates-are-deployed-correctly.md",
-"redirect_url": "/windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/copy-a-gpo-to-create-a-new-gpo.md",
-"redirect_url": "/windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-a-basic-audit-policy-settings-for-an-event-category.md",
-"redirect_url": "/windows/device-security/auditing/create-a-basic-audit-policy-settings-for-an-event-category",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-a-group-account-in-active-directory.md",
-"redirect_url": "/windows/access-protection/windows-firewall/create-a-group-account-in-active-directory",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-a-group-policy-object.md",
-"redirect_url": "/windows/access-protection/windows-firewall/create-a-group-policy-object",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-a-pagefile.md",
-"redirect_url": "/windows/device-security/security-policy-settings/create-a-pagefile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-a-rule-for-packaged-apps.md",
-"redirect_url": "/windows/device-security/applocker/create-a-rule-for-packaged-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-a-rule-that-uses-a-file-hash-condition.md",
-"redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-a-rule-that-uses-a-path-condition.md",
-"redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-path-condition",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-a-rule-that-uses-a-publisher-condition.md",
-"redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-a-token-object.md",
-"redirect_url": "/windows/device-security/security-policy-settings/create-a-token-object",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-an-authentication-exemption-list-rule.md",
-"redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-an-authentication-request-rule.md",
-"redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-request-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-an-inbound-icmp-rule.md",
-"redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-icmp-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-an-inbound-port-rule.md",
-"redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-port-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-an-inbound-program-or-service-rule.md",
-"redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-an-outbound-port-rule.md",
-"redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-port-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-an-outbound-program-or-service-rule.md",
-"redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-and-verify-an-efs-dra-certificate.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-applocker-default-rules.md",
-"redirect_url": "/windows/device-security/applocker/create-applocker-default-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-global-objects.md",
-"redirect_url": "/windows/device-security/security-policy-settings/create-global-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-inbound-rules-to-support-rpc.md",
-"redirect_url": "/windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-list-of-applications-deployed-to-each-business-group.md",
-"redirect_url": "/windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-permanent-shared-objects.md",
-"redirect_url": "/windows/device-security/security-policy-settings/create-permanent-shared-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-symbolic-links.md",
-"redirect_url": "/windows/device-security/security-policy-settings/create-symbolic-links",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-vpn-and-wip-policy-using-intune.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-wip-policy-using-intune.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-wip-policy-using-sccm.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-wmi-filters-for-the-gpo.md",
-"redirect_url": "/windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-your-applocker-planning-document.md",
-"redirect_url": "/windows/device-security/applocker/create-your-applocker-planning-document",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-your-applocker-policies.md",
-"redirect_url": "/windows/device-security/applocker/create-your-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/create-your-applocker-rules.md",
-"redirect_url": "/windows/device-security/applocker/create-your-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/credential-guard-considerations.md",
-"redirect_url": "/windows/access-protection/credential-guard/credential-guard-considerations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/credential-guard-how-it-works.md",
-"redirect_url": "/windows/access-protection/credential-guard/credential-guard-how-it-works",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/credential-guard-manage.md",
-"redirect_url": "/windows/access-protection/credential-guard/credential-guard-manage",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/credential-guard-not-protected-scenarios.md",
-"redirect_url": "/windows/access-protection/credential-guard/credential-guard-not-protected-scenarios",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/credential-guard-protection-limits.md",
-"redirect_url": "/windows/access-protection/credential-guard/credential-guard-protection-limits",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/credential-guard-requirements.md",
-"redirect_url": "/windows/access-protection/credential-guard/credential-guard-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/credential-guard-scripts.md",
-"redirect_url": "/windows/access-protection/credential-guard/credential-guard-scripts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/credential-guard.md",
-"redirect_url": "/windows/access-protection/credential-guard/credential-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/customize-run-review-remediate-scans-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/dashboard-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md",
-"redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md",
-"redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/debug-programs.md",
-"redirect_url": "/windows/device-security/security-policy-settings/debug-programs",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/defender-compatibility-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/delete-an-applocker-rule.md",
-"redirect_url": "/windows/device-security/applocker/delete-an-applocker-rule",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deny-access-to-this-computer-from-the-network.md",
-"redirect_url": "/windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deny-log-on-as-a-batch-job.md",
-"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deny-log-on-as-a-service.md",
-"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deny-log-on-locally.md",
-"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-locally",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deny-log-on-through-remote-desktop-services.md",
-"redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deploy-applocker-policies-by-using-the-enforce-rules-setting.md",
-"redirect_url": "/windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deploy-catalog-files-to-support-code-integrity-policies.md",
-"redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deploy-code-integrity-policies-policy-rules-and-file-rules.md",
-"redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deploy-code-integrity-policies-steps.md",
-"redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-steps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deploy-device-guard-deploy-code-integrity-policies.md",
-"redirect_url": "/windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deploy-device-guard-enable-virtualization-based-security.md",
-"redirect_url": "/windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md",
-"redirect_url": "/windows/security/threat-protection/device-guard/deploy-device-guard-enable-virtualization-based-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deploy-the-applocker-policy-into-production.md",
-"redirect_url": "/windows/device-security/applocker/deploy-the-applocker-policy-into-production",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deploy-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deploy-wip-policy-using-intune.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deployment-vdi-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/designing-a-windows-firewall-with-advanced-security-strategy.md",
-"redirect_url": "/windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/determine-group-policy-structure-and-rule-enforcement.md",
-"redirect_url": "/windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/determine-which-applications-are-digitally-signed-on-a-reference-computer.md",
-"redirect_url": "/windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/determine-your-application-control-objectives.md",
-"redirect_url": "/windows/device-security/applocker/determine-your-application-control-objectives",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/determining-the-trusted-state-of-your-devices.md",
-"redirect_url": "/windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/device-guard-deployment-guide.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/devices-allow-undock-without-having-to-log-on.md",
-"redirect_url": "/windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/devices-allowed-to-format-and-eject-removable-media.md",
-"redirect_url": "/windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/devices-prevent-users-from-installing-printer-drivers.md",
-"redirect_url": "/windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md",
-"redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/devices-restrict-floppy-access-to-locally-logged-on-user-only.md",
-"redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md",
-"redirect_url": "/windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/dll-rules-in-applocker.md",
-"redirect_url": "/windows/device-security/applocker/dll-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/document-group-policy-structure-and-applocker-rule-enforcement.md",
-"redirect_url": "/windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/document-your-application-control-management-processes.md",
-"redirect_url": "/windows/device-security/applocker/document-your-application-control-management-processes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/document-your-application-list.md",
-"redirect_url": "/windows/device-security/applocker/document-your-application-list",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/document-your-applocker-rules.md",
-"redirect_url": "/windows/device-security/applocker/document-your-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/documenting-the-zones.md",
-"redirect_url": "/windows/access-protection/windows-firewall/documenting-the-zones",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/domain-controller-allow-server-operators-to-schedule-tasks.md",
-"redirect_url": "/windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/domain-controller-ldap-server-signing-requirements.md",
-"redirect_url": "/windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/domain-controller-refuse-machine-account-password-changes.md",
-"redirect_url": "/windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/domain-isolation-policy-design-example.md",
-"redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design-example",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/domain-isolation-policy-design.md",
-"redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md",
-"redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/domain-member-digitally-encrypt-secure-channel-data-when-possible.md",
-"redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/domain-member-digitally-sign-secure-channel-data-when-possible.md",
-"redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/domain-member-disable-machine-account-password-changes.md",
-"redirect_url": "/windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/domain-member-maximum-machine-account-password-age.md",
-"redirect_url": "/windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/domain-member-require-strong-windows-2000-or-later-session-key.md",
-"redirect_url": "/windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/dynamic-access-control.md",
-"redirect_url": "/windows/access-protection/access-control/dynamic-access-control",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/edit-an-applocker-policy.md",
-"redirect_url": "/windows/device-security/applocker/edit-an-applocker-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/edit-applocker-rules.md",
-"redirect_url": "/windows/device-security/applocker/edit-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enable-cloud-protection-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md",
-"redirect_url": "/windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enable-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enable-predefined-inbound-rules.md",
-"redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-inbound-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enable-predefined-outbound-rules.md",
-"redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-outbound-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enable-the-dll-rule-collection.md",
-"redirect_url": "/windows/device-security/applocker/enable-the-dll-rule-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/encrypted-hard-drive.md",
-"redirect_url": "/windows/device-security/encrypted-hard-drive",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/encryption-zone-gpos.md",
-"redirect_url": "/windows/access-protection/windows-firewall/encryption-zone-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/encryption-zone.md",
-"redirect_url": "/windows/access-protection/windows-firewall/encryption-zone",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enforce-applocker-rules.md",
-"redirect_url": "/windows/device-security/applocker/enforce-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enforce-password-history.md",
-"redirect_url": "/windows/device-security/security-policy-settings/enforce-password-history",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enforce-user-logon-restrictions.md",
-"redirect_url": "/windows/device-security/security-policy-settings/enforce-user-logon-restrictions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enlightened-microsoft-apps-and-wip.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/enterprise-certificate-pinning.md",
-"redirect_url": "/windows/access-protection/enterprise-certificate-pinning",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/evaluate-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/evaluating-windows-firewall-with-advanced-security-design-examples.md",
-"redirect_url": "/windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-1100.md",
-"redirect_url": "/windows/device-security/auditing/event-1100",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-1102.md",
-"redirect_url": "/windows/device-security/auditing/event-1102",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-1104.md",
-"redirect_url": "/windows/device-security/auditing/event-1104",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-1105.md",
-"redirect_url": "/windows/device-security/auditing/event-1105",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-1108.md",
-"redirect_url": "/windows/device-security/auditing/event-1108",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4608.md",
-"redirect_url": "/windows/device-security/auditing/event-4608",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4610.md",
-"redirect_url": "/windows/device-security/auditing/event-4610",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4611.md",
-"redirect_url": "/windows/device-security/auditing/event-4611",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4612.md",
-"redirect_url": "/windows/device-security/auditing/event-4612",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4614.md",
-"redirect_url": "/windows/device-security/auditing/event-4614",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4615.md",
-"redirect_url": "/windows/device-security/auditing/event-4615",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4616.md",
-"redirect_url": "/windows/device-security/auditing/event-4616",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4618.md",
-"redirect_url": "/windows/device-security/auditing/event-4618",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4621.md",
-"redirect_url": "/windows/device-security/auditing/event-4621",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4622.md",
-"redirect_url": "/windows/device-security/auditing/event-4622",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4624.md",
-"redirect_url": "/windows/device-security/auditing/event-4624",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4625.md",
-"redirect_url": "/windows/device-security/auditing/event-4625",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4626.md",
-"redirect_url": "/windows/device-security/auditing/event-4626",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4627.md",
-"redirect_url": "/windows/device-security/auditing/event-4627",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4634.md",
-"redirect_url": "/windows/device-security/auditing/event-4634",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4647.md",
-"redirect_url": "/windows/device-security/auditing/event-4647",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4648.md",
-"redirect_url": "/windows/device-security/auditing/event-4648",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4649.md",
-"redirect_url": "/windows/device-security/auditing/event-4649",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4656.md",
-"redirect_url": "/windows/device-security/auditing/event-4656",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4657.md",
-"redirect_url": "/windows/device-security/auditing/event-4657",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4658.md",
-"redirect_url": "/windows/device-security/auditing/event-4658",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4660.md",
-"redirect_url": "/windows/device-security/auditing/event-4660",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4661.md",
-"redirect_url": "/windows/device-security/auditing/event-4661",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4662.md",
-"redirect_url": "/windows/device-security/auditing/event-4662",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4663.md",
-"redirect_url": "/windows/device-security/auditing/event-4663",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4664.md",
-"redirect_url": "/windows/device-security/auditing/event-4664",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4670.md",
-"redirect_url": "/windows/device-security/auditing/event-4670",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4671.md",
-"redirect_url": "/windows/device-security/auditing/event-4671",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4672.md",
-"redirect_url": "/windows/device-security/auditing/event-4672",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4673.md",
-"redirect_url": "/windows/device-security/auditing/event-4673",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4674.md",
-"redirect_url": "/windows/device-security/auditing/event-4674",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4675.md",
-"redirect_url": "/windows/device-security/auditing/event-4675",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4688.md",
-"redirect_url": "/windows/device-security/auditing/event-4688",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4689.md",
-"redirect_url": "/windows/device-security/auditing/event-4689",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4690.md",
-"redirect_url": "/windows/device-security/auditing/event-4690",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4691.md",
-"redirect_url": "/windows/device-security/auditing/event-4691",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4692.md",
-"redirect_url": "/windows/device-security/auditing/event-4692",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4693.md",
-"redirect_url": "/windows/device-security/auditing/event-4693",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4694.md",
-"redirect_url": "/windows/device-security/auditing/event-4694",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4695.md",
-"redirect_url": "/windows/device-security/auditing/event-4695",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4696.md",
-"redirect_url": "/windows/device-security/auditing/event-4696",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4697.md",
-"redirect_url": "/windows/device-security/auditing/event-4697",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4698.md",
-"redirect_url": "/windows/device-security/auditing/event-4698",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4699.md",
-"redirect_url": "/windows/device-security/auditing/event-4699",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4700.md",
-"redirect_url": "/windows/device-security/auditing/event-4700",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4701.md",
-"redirect_url": "/windows/device-security/auditing/event-4701",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4702.md",
-"redirect_url": "/windows/device-security/auditing/event-4702",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4703.md",
-"redirect_url": "/windows/device-security/auditing/event-4703",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4704.md",
-"redirect_url": "/windows/device-security/auditing/event-4704",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4705.md",
-"redirect_url": "/windows/device-security/auditing/event-4705",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4706.md",
-"redirect_url": "/windows/device-security/auditing/event-4706",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4707.md",
-"redirect_url": "/windows/device-security/auditing/event-4707",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4713.md",
-"redirect_url": "/windows/device-security/auditing/event-4713",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4714.md",
-"redirect_url": "/windows/device-security/auditing/event-4714",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4715.md",
-"redirect_url": "/windows/device-security/auditing/event-4715",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4716.md",
-"redirect_url": "/windows/device-security/auditing/event-4716",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4717.md",
-"redirect_url": "/windows/device-security/auditing/event-4717",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4718.md",
-"redirect_url": "/windows/device-security/auditing/event-4718",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4719.md",
-"redirect_url": "/windows/device-security/auditing/event-4719",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4720.md",
-"redirect_url": "/windows/device-security/auditing/event-4720",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4722.md",
-"redirect_url": "/windows/device-security/auditing/event-4722",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4723.md",
-"redirect_url": "/windows/device-security/auditing/event-4723",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4724.md",
-"redirect_url": "/windows/device-security/auditing/event-4724",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4725.md",
-"redirect_url": "/windows/device-security/auditing/event-4725",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4726.md",
-"redirect_url": "/windows/device-security/auditing/event-4726",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4731.md",
-"redirect_url": "/windows/device-security/auditing/event-4731",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4732.md",
-"redirect_url": "/windows/device-security/auditing/event-4732",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4733.md",
-"redirect_url": "/windows/device-security/auditing/event-4733",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4734.md",
-"redirect_url": "/windows/device-security/auditing/event-4734",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4735.md",
-"redirect_url": "/windows/device-security/auditing/event-4735",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4738.md",
-"redirect_url": "/windows/device-security/auditing/event-4738",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4739.md",
-"redirect_url": "/windows/device-security/auditing/event-4739",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4740.md",
-"redirect_url": "/windows/device-security/auditing/event-4740",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4741.md",
-"redirect_url": "/windows/device-security/auditing/event-4741",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4742.md",
-"redirect_url": "/windows/device-security/auditing/event-4742",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4743.md",
-"redirect_url": "/windows/device-security/auditing/event-4743",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4749.md",
-"redirect_url": "/windows/device-security/auditing/event-4749",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4750.md",
-"redirect_url": "/windows/device-security/auditing/event-4750",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4751.md",
-"redirect_url": "/windows/device-security/auditing/event-4751",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4752.md",
-"redirect_url": "/windows/device-security/auditing/event-4752",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4753.md",
-"redirect_url": "/windows/device-security/auditing/event-4753",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4764.md",
-"redirect_url": "/windows/device-security/auditing/event-4764",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4765.md",
-"redirect_url": "/windows/device-security/auditing/event-4765",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4766.md",
-"redirect_url": "/windows/device-security/auditing/event-4766",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4767.md",
-"redirect_url": "/windows/device-security/auditing/event-4767",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4768.md",
-"redirect_url": "/windows/device-security/auditing/event-4768",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4769.md",
-"redirect_url": "/windows/device-security/auditing/event-4769",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4770.md",
-"redirect_url": "/windows/device-security/auditing/event-4770",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4771.md",
-"redirect_url": "/windows/device-security/auditing/event-4771",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4772.md",
-"redirect_url": "/windows/device-security/auditing/event-4772",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4773.md",
-"redirect_url": "/windows/device-security/auditing/event-4773",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4774.md",
-"redirect_url": "/windows/device-security/auditing/event-4774",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4775.md",
-"redirect_url": "/windows/device-security/auditing/event-4775",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4776.md",
-"redirect_url": "/windows/device-security/auditing/event-4776",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4777.md",
-"redirect_url": "/windows/device-security/auditing/event-4777",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4778.md",
-"redirect_url": "/windows/device-security/auditing/event-4778",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4779.md",
-"redirect_url": "/windows/device-security/auditing/event-4779",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4780.md",
-"redirect_url": "/windows/device-security/auditing/event-4780",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4781.md",
-"redirect_url": "/windows/device-security/auditing/event-4781",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4782.md",
-"redirect_url": "/windows/device-security/auditing/event-4782",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4793.md",
-"redirect_url": "/windows/device-security/auditing/event-4793",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4794.md",
-"redirect_url": "/windows/device-security/auditing/event-4794",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4798.md",
-"redirect_url": "/windows/device-security/auditing/event-4798",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4799.md",
-"redirect_url": "/windows/device-security/auditing/event-4799",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4800.md",
-"redirect_url": "/windows/device-security/auditing/event-4800",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4801.md",
-"redirect_url": "/windows/device-security/auditing/event-4801",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4802.md",
-"redirect_url": "/windows/device-security/auditing/event-4802",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4803.md",
-"redirect_url": "/windows/device-security/auditing/event-4803",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4816.md",
-"redirect_url": "/windows/device-security/auditing/event-4816",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4817.md",
-"redirect_url": "/windows/device-security/auditing/event-4817",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4818.md",
-"redirect_url": "/windows/device-security/auditing/event-4818",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4819.md",
-"redirect_url": "/windows/device-security/auditing/event-4819",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4826.md",
-"redirect_url": "/windows/device-security/auditing/event-4826",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4864.md",
-"redirect_url": "/windows/device-security/auditing/event-4864",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4865.md",
-"redirect_url": "/windows/device-security/auditing/event-4865",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4866.md",
-"redirect_url": "/windows/device-security/auditing/event-4866",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4867.md",
-"redirect_url": "/windows/device-security/auditing/event-4867",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4902.md",
-"redirect_url": "/windows/device-security/auditing/event-4902",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4904.md",
-"redirect_url": "/windows/device-security/auditing/event-4904",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4905.md",
-"redirect_url": "/windows/device-security/auditing/event-4905",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4906.md",
-"redirect_url": "/windows/device-security/auditing/event-4906",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4907.md",
-"redirect_url": "/windows/device-security/auditing/event-4907",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4908.md",
-"redirect_url": "/windows/device-security/auditing/event-4908",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4909.md",
-"redirect_url": "/windows/device-security/auditing/event-4909",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4910.md",
-"redirect_url": "/windows/device-security/auditing/event-4910",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4911.md",
-"redirect_url": "/windows/device-security/auditing/event-4911",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4912.md",
-"redirect_url": "/windows/device-security/auditing/event-4912",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4913.md",
-"redirect_url": "/windows/device-security/auditing/event-4913",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4928.md",
-"redirect_url": "/windows/device-security/auditing/event-4928",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4929.md",
-"redirect_url": "/windows/device-security/auditing/event-4929",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4930.md",
-"redirect_url": "/windows/device-security/auditing/event-4930",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4931.md",
-"redirect_url": "/windows/device-security/auditing/event-4931",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4932.md",
-"redirect_url": "/windows/device-security/auditing/event-4932",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4933.md",
-"redirect_url": "/windows/device-security/auditing/event-4933",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4934.md",
-"redirect_url": "/windows/device-security/auditing/event-4934",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4935.md",
-"redirect_url": "/windows/device-security/auditing/event-4935",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4936.md",
-"redirect_url": "/windows/device-security/auditing/event-4936",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4937.md",
-"redirect_url": "/windows/device-security/auditing/event-4937",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4944.md",
-"redirect_url": "/windows/device-security/auditing/event-4944",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4945.md",
-"redirect_url": "/windows/device-security/auditing/event-4945",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4946.md",
-"redirect_url": "/windows/device-security/auditing/event-4946",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4947.md",
-"redirect_url": "/windows/device-security/auditing/event-4947",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4948.md",
-"redirect_url": "/windows/device-security/auditing/event-4948",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4949.md",
-"redirect_url": "/windows/device-security/auditing/event-4949",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4950.md",
-"redirect_url": "/windows/device-security/auditing/event-4950",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4951.md",
-"redirect_url": "/windows/device-security/auditing/event-4951",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4952.md",
-"redirect_url": "/windows/device-security/auditing/event-4952",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4953.md",
-"redirect_url": "/windows/device-security/auditing/event-4953",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4954.md",
-"redirect_url": "/windows/device-security/auditing/event-4954",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4956.md",
-"redirect_url": "/windows/device-security/auditing/event-4956",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4957.md",
-"redirect_url": "/windows/device-security/auditing/event-4957",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4958.md",
-"redirect_url": "/windows/device-security/auditing/event-4958",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4964.md",
-"redirect_url": "/windows/device-security/auditing/event-4964",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-4985.md",
-"redirect_url": "/windows/device-security/auditing/event-4985",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5024.md",
-"redirect_url": "/windows/device-security/auditing/event-5024",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5025.md",
-"redirect_url": "/windows/device-security/auditing/event-5025",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5027.md",
-"redirect_url": "/windows/device-security/auditing/event-5027",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5028.md",
-"redirect_url": "/windows/device-security/auditing/event-5028",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5029.md",
-"redirect_url": "/windows/device-security/auditing/event-5029",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5030.md",
-"redirect_url": "/windows/device-security/auditing/event-5030",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5031.md",
-"redirect_url": "/windows/device-security/auditing/event-5031",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5032.md",
-"redirect_url": "/windows/device-security/auditing/event-5032",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5033.md",
-"redirect_url": "/windows/device-security/auditing/event-5033",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5034.md",
-"redirect_url": "/windows/device-security/auditing/event-5034",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5035.md",
-"redirect_url": "/windows/device-security/auditing/event-5035",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5037.md",
-"redirect_url": "/windows/device-security/auditing/event-5037",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5038.md",
-"redirect_url": "/windows/device-security/auditing/event-5038",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5039.md",
-"redirect_url": "/windows/device-security/auditing/event-5039",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5051.md",
-"redirect_url": "/windows/device-security/auditing/event-5051",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5056.md",
-"redirect_url": "/windows/device-security/auditing/event-5056",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5057.md",
-"redirect_url": "/windows/device-security/auditing/event-5057",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5058.md",
-"redirect_url": "/windows/device-security/auditing/event-5058",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5059.md",
-"redirect_url": "/windows/device-security/auditing/event-5059",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5060.md",
-"redirect_url": "/windows/device-security/auditing/event-5060",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5061.md",
-"redirect_url": "/windows/device-security/auditing/event-5061",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5062.md",
-"redirect_url": "/windows/device-security/auditing/event-5062",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5063.md",
-"redirect_url": "/windows/device-security/auditing/event-5063",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5064.md",
-"redirect_url": "/windows/device-security/auditing/event-5064",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5065.md",
-"redirect_url": "/windows/device-security/auditing/event-5065",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5066.md",
-"redirect_url": "/windows/device-security/auditing/event-5066",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5067.md",
-"redirect_url": "/windows/device-security/auditing/event-5067",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5068.md",
-"redirect_url": "/windows/device-security/auditing/event-5068",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5069.md",
-"redirect_url": "/windows/device-security/auditing/event-5069",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5070.md",
-"redirect_url": "/windows/device-security/auditing/event-5070",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5136.md",
-"redirect_url": "/windows/device-security/auditing/event-5136",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5137.md",
-"redirect_url": "/windows/device-security/auditing/event-5137",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5138.md",
-"redirect_url": "/windows/device-security/auditing/event-5138",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5139.md",
-"redirect_url": "/windows/device-security/auditing/event-5139",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5140.md",
-"redirect_url": "/windows/device-security/auditing/event-5140",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5141.md",
-"redirect_url": "/windows/device-security/auditing/event-5141",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5142.md",
-"redirect_url": "/windows/device-security/auditing/event-5142",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5143.md",
-"redirect_url": "/windows/device-security/auditing/event-5143",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5144.md",
-"redirect_url": "/windows/device-security/auditing/event-5144",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5145.md",
-"redirect_url": "/windows/device-security/auditing/event-5145",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5148.md",
-"redirect_url": "/windows/device-security/auditing/event-5148",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5149.md",
-"redirect_url": "/windows/device-security/auditing/event-5149",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5150.md",
-"redirect_url": "/windows/device-security/auditing/event-5150",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5151.md",
-"redirect_url": "/windows/device-security/auditing/event-5151",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5152.md",
-"redirect_url": "/windows/device-security/auditing/event-5152",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5153.md",
-"redirect_url": "/windows/device-security/auditing/event-5153",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5154.md",
-"redirect_url": "/windows/device-security/auditing/event-5154",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5155.md",
-"redirect_url": "/windows/device-security/auditing/event-5155",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5156.md",
-"redirect_url": "/windows/device-security/auditing/event-5156",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5157.md",
-"redirect_url": "/windows/device-security/auditing/event-5157",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5158.md",
-"redirect_url": "/windows/device-security/auditing/event-5158",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5159.md",
-"redirect_url": "/windows/device-security/auditing/event-5159",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5168.md",
-"redirect_url": "/windows/device-security/auditing/event-5168",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5376.md",
-"redirect_url": "/windows/device-security/auditing/event-5376",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5377.md",
-"redirect_url": "/windows/device-security/auditing/event-5377",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5378.md",
-"redirect_url": "/windows/device-security/auditing/event-5378",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5447.md",
-"redirect_url": "/windows/device-security/auditing/event-5447",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5632.md",
-"redirect_url": "/windows/device-security/auditing/event-5632",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5633.md",
-"redirect_url": "/windows/device-security/auditing/event-5633",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5712.md",
-"redirect_url": "/windows/device-security/auditing/event-5712",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5888.md",
-"redirect_url": "/windows/device-security/auditing/event-5888",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5889.md",
-"redirect_url": "/windows/device-security/auditing/event-5889",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-5890.md",
-"redirect_url": "/windows/device-security/auditing/event-5890",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6144.md",
-"redirect_url": "/windows/device-security/auditing/event-6144",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6145.md",
-"redirect_url": "/windows/device-security/auditing/event-6145",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6281.md",
-"redirect_url": "/windows/device-security/auditing/event-6281",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6400.md",
-"redirect_url": "/windows/device-security/auditing/event-6400",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6401.md",
-"redirect_url": "/windows/device-security/auditing/event-6401",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6402.md",
-"redirect_url": "/windows/device-security/auditing/event-6402",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6403.md",
-"redirect_url": "/windows/device-security/auditing/event-6403",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6404.md",
-"redirect_url": "/windows/device-security/auditing/event-6404",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6405.md",
-"redirect_url": "/windows/device-security/auditing/event-6405",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6406.md",
-"redirect_url": "/windows/device-security/auditing/event-6406",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6407.md",
-"redirect_url": "/windows/device-security/auditing/event-6407",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6408.md",
-"redirect_url": "/windows/device-security/auditing/event-6408",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6409.md",
-"redirect_url": "/windows/device-security/auditing/event-6409",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6410.md",
-"redirect_url": "/windows/device-security/auditing/event-6410",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6416.md",
-"redirect_url": "/windows/device-security/auditing/event-6416",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6419.md",
-"redirect_url": "/windows/device-security/auditing/event-6419",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6420.md",
-"redirect_url": "/windows/device-security/auditing/event-6420",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6421.md",
-"redirect_url": "/windows/device-security/auditing/event-6421",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6422.md",
-"redirect_url": "/windows/device-security/auditing/event-6422",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6423.md",
-"redirect_url": "/windows/device-security/auditing/event-6423",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-6424.md",
-"redirect_url": "/windows/device-security/auditing/event-6424",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/event-error-codes-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/executable-rules-in-applocker.md",
-"redirect_url": "/windows/device-security/applocker/executable-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/exempt-icmp-from-authentication.md",
-"redirect_url": "/windows/access-protection/windows-firewall/exempt-icmp-from-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/exemption-list.md",
-"redirect_url": "/windows/access-protection/windows-firewall/exemption-list",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/export-an-applocker-policy-from-a-gpo.md",
-"redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-from-a-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/export-an-applocker-policy-to-an-xml-file.md",
-"redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/file-system-global-object-access-auditing.md",
-"redirect_url": "/windows/device-security/auditing/file-system-global-object-access-auditing",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/firewall-gpos.md",
-"redirect_url": "/windows/access-protection/windows-firewall/firewall-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/firewall-policy-design-example.md",
-"redirect_url": "/windows/access-protection/windows-firewall/firewall-policy-design-example",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/force-shutdown-from-a-remote-system.md",
-"redirect_url": "/windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/gathering-information-about-your-active-directory-deployment.md",
-"redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/gathering-information-about-your-current-network-infrastructure.md",
-"redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/gathering-information-about-your-devices.md",
-"redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/gathering-other-relevant-information.md",
-"redirect_url": "/windows/access-protection/windows-firewall/gathering-other-relevant-information",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/gathering-the-information-you-need.md",
-"redirect_url": "/windows/access-protection/windows-firewall/gathering-the-information-you-need",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/general-settings-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/generate-security-audits.md",
-"redirect_url": "/windows/device-security/security-policy-settings/generate-security-audits",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/gpo-domiso-boundary.md",
-"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-boundary",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/gpo-domiso-encryption.md",
-"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-encryption",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/gpo-domiso-firewall.md",
-"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-firewall",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/gpo-domiso-isolateddomain-clients.md",
-"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/gpo-domiso-isolateddomain-servers.md",
-"redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/guidance-and-best-practices-wip.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/hello-and-password-changes.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/hello-biometrics-in-enterprise.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/hello-errors-during-pin-creation.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/hello-event-300.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-event-300",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/hello-how-it-works.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-how-it-works",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/hello-identity-verification.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/hello-manage-in-organization.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/hello-prepare-people-to-use.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/hello-why-pin-is-better-than-password.md",
-"redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/how-applocker-works-techref.md",
-"redirect_url": "/windows/device-security/applocker/how-applocker-works-techref",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/how-to-configure-security-policy-settings.md",
-"redirect_url": "/windows/device-security/security-policy-settings/how-to-configure-security-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md",
-"redirect_url": "/windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/how-user-account-control-works.md",
-"redirect_url": "/windows/access-protection/user-account-control/how-user-account-control-works",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md",
-"redirect_url": "/windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/impersonate-a-client-after-authentication.md",
-"redirect_url": "/windows/device-security/security-policy-settings/impersonate-a-client-after-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/implementing-your-windows-firewall-with-advanced-security-design-plan.md",
-"redirect_url": "/windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/import-an-applocker-policy-from-another-computer.md",
-"redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-from-another-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/import-an-applocker-policy-into-a-gpo.md",
-"redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-into-a-gpo",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/increase-a-process-working-set.md",
-"redirect_url": "/windows/device-security/security-policy-settings/increase-a-process-working-set",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/increase-scheduling-priority.md",
-"redirect_url": "/windows/device-security/security-policy-settings/increase-scheduling-priority",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/initialize-and-configure-ownership-of-the-tpm.md",
-"redirect_url": "/windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/installing-digital-certificates-on-windows-10-mobile.md",
-"redirect_url": "/windows/access-protection/installing-digital-certificates-on-windows-10-mobile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-do-not-display-last-user-name.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-do-not-require-ctrl-alt-del.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-dont-display-username-at-sign-in.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-machine-account-lockout-threshold.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-machine-inactivity-limit.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-message-text-for-users-attempting-to-log-on.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-message-title-for-users-attempting-to-log-on.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-prompt-user-to-change-password-before-expiration.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-require-smart-card.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-smart-card",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/interactive-logon-smart-card-removal-behavior.md",
-"redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md",
-"redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/investigate-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/investigate-domain-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/investigate-files-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/investigate-ip-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/investigate-machines-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/investigate-user-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/isolated-domain-gpos.md",
-"redirect_url": "/windows/access-protection/windows-firewall/isolated-domain-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/isolated-domain.md",
-"redirect_url": "/windows/access-protection/windows-firewall/isolated-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/isolating-apps-on-your-network.md",
-"redirect_url": "/windows/access-protection/windows-firewall/isolating-apps-on-your-network",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/kerberos-policy.md",
-"redirect_url": "/windows/device-security/security-policy-settings/kerberos-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/limitations-with-wip.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/limitations-with-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/link-the-gpo-to-the-domain.md",
-"redirect_url": "/windows/access-protection/windows-firewall/link-the-gpo-to-the-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/load-and-unload-device-drivers.md",
-"redirect_url": "/windows/device-security/security-policy-settings/load-and-unload-device-drivers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/local-accounts.md",
-"redirect_url": "/windows/access-protection/access-control/local-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/lock-pages-in-memory.md",
-"redirect_url": "/windows/device-security/security-policy-settings/lock-pages-in-memory",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/log-on-as-a-batch-job.md",
-"redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-batch-job",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/log-on-as-a-service.md",
-"redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/machines-view-overview-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/maintain-applocker-policies.md",
-"redirect_url": "/windows/device-security/applocker/maintain-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-auditing-and-security-log.md",
-"redirect_url": "/windows/device-security/security-policy-settings/manage-auditing-and-security-log",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-event-based-updates-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-outdated-endpoints-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-packaged-apps-with-applocker.md",
-"redirect_url": "/windows/device-security/applocker/manage-packaged-apps-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-protection-update-schedule-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-protection-updates-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-tpm-commands.md",
-"redirect_url": "/windows/device-security/tpm/manage-tpm-commands",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-tpm-lockout.md",
-"redirect_url": "/windows/device-security/tpm/manage-tpm-lockout",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-updates-baselines-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/manage-updates-mobile-devices-vms-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/mandatory-settings-for-wip.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/mandatory-settings-for-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md",
-"redirect_url": "/windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/maximum-lifetime-for-service-ticket.md",
-"redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket-renewal.md",
-"redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket.md",
-"redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/maximum-password-age.md",
-"redirect_url": "/windows/device-security/security-policy-settings/maximum-password-age",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/maximum-tolerance-for-computer-clock-synchronization.md",
-"redirect_url": "/windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/merge-applocker-policies-by-using-set-applockerpolicy.md",
-"redirect_url": "/windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/merge-applocker-policies-manually.md",
-"redirect_url": "/windows/device-security/applocker/merge-applocker-policies-manually",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-accounts.md",
-"redirect_url": "/windows/access-protection/access-control/microsoft-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-always.md",
-"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-if-server-agrees.md",
-"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md",
-"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md",
-"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md",
-"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-always.md",
-"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-if-client-agrees.md",
-"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md",
-"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/microsoft-network-server-server-spn-target-name-validation-level.md",
-"redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/minimum-password-age.md",
-"redirect_url": "/windows/device-security/security-policy-settings/minimum-password-age",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/minimum-password-length.md",
-"redirect_url": "/windows/device-security/security-policy-settings/minimum-password-length",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/modify-an-object-label.md",
-"redirect_url": "/windows/device-security/security-policy-settings/modify-an-object-label",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/modify-firmware-environment-values.md",
-"redirect_url": "/windows/device-security/security-policy-settings/modify-firmware-environment-values",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md",
-"redirect_url": "/windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/monitor-application-usage-with-applocker.md",
-"redirect_url": "/windows/device-security/applocker/monitor-application-usage-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/monitor-central-access-policy-and-rule-definitions.md",
-"redirect_url": "/windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/monitor-claim-types.md",
-"redirect_url": "/windows/device-security/auditing/monitor-claim-types",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/monitor-resource-attribute-definitions.md",
-"redirect_url": "/windows/device-security/auditing/monitor-resource-attribute-definitions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/monitor-the-central-access-policies-associated-with-files-and-folders.md",
-"redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-associated-with-files-and-folders",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/monitor-the-central-access-policies-that-apply-on-a-file-server.md",
-"redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/monitor-the-resource-attributes-on-files-and-folders.md",
-"redirect_url": "/windows/device-security/auditing/monitor-the-resource-attributes-on-files-and-folders",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/monitor-the-use-of-removable-storage-devices.md",
-"redirect_url": "/windows/device-security/auditing/monitor-the-use-of-removable-storage-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/monitor-user-and-device-claims-during-sign-in.md",
-"redirect_url": "/windows/device-security/auditing/monitor-user-and-device-claims-during-sign-in",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-access-allow-anonymous-sidname-translation.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-access-let-everyone-permissions-apply-to-anonymous-users.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-access-named-pipes-that-can-be-accessed-anonymously.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths-and-subpaths.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-access-shares-that-can-be-accessed-anonymously.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-access-sharing-and-security-model-for-local-accounts.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-list-manager-policies.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-list-manager-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-allow-localsystem-null-session-fallback.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-configure-encryption-types-allowed-for-kerberos.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-force-logoff-when-logon-hours-expire.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-lan-manager-authentication-level.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-ldap-client-signing-requirements.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-restrict-ntlm-incoming-ntlm-traffic.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md",
-"redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/open-the-group-policy-management-console-to-ip-security-policies.md",
-"redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md",
-"redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall.md",
-"redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/open-windows-firewall-with-advanced-security.md",
-"redirect_url": "/windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/optimize-applocker-performance.md",
-"redirect_url": "/windows/device-security/applocker/optimize-applocker-performance",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/optional-create-a-code-signing-certificate-for-code-integrity-policies.md",
-"redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/other-events.md",
-"redirect_url": "/windows/device-security/auditing/other-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/override-mitigation-options-for-app-related-security-policies.md",
-"redirect_url": "/windows/threat-protection/override-mitigation-options-for-app-related-security-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/overview-create-wip-policy.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md",
-"redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/packaged-apps-and-packaged-app-installer-rules-in-applocker.md",
-"redirect_url": "/windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/password-must-meet-complexity-requirements.md",
-"redirect_url": "/windows/device-security/security-policy-settings/password-must-meet-complexity-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/password-policy.md",
-"redirect_url": "/windows/device-security/security-policy-settings/password-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/perform-volume-maintenance-tasks.md",
-"redirect_url": "/windows/device-security/security-policy-settings/perform-volume-maintenance-tasks",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/plan-for-applocker-policy-management.md",
-"redirect_url": "/windows/device-security/applocker/plan-for-applocker-policy-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-and-deploying-advanced-security-audit-policies.md",
-"redirect_url": "/windows/device-security/auditing/planning-and-deploying-advanced-security-audit-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-and-getting-started-on-the-device-guard-deployment-process.md",
-"redirect_url": "/windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-certificate-based-authentication.md",
-"redirect_url": "/windows/access-protection/windows-firewall/planning-certificate-based-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-domain-isolation-zones.md",
-"redirect_url": "/windows/access-protection/windows-firewall/planning-domain-isolation-zones",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-gpo-deployment.md",
-"redirect_url": "/windows/access-protection/windows-firewall/planning-gpo-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-group-policy-deployment-for-your-isolation-zones.md",
-"redirect_url": "/windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-isolation-groups-for-the-zones.md",
-"redirect_url": "/windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-network-access-groups.md",
-"redirect_url": "/windows/access-protection/windows-firewall/planning-network-access-groups",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-server-isolation-zones.md",
-"redirect_url": "/windows/access-protection/windows-firewall/planning-server-isolation-zones",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-settings-for-a-basic-firewall-policy.md",
-"redirect_url": "/windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-the-gpos.md",
-"redirect_url": "/windows/access-protection/windows-firewall/planning-the-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-to-deploy-windows-firewall-with-advanced-security.md",
-"redirect_url": "/windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/planning-your-windows-firewall-with-advanced-security-design.md",
-"redirect_url": "/windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/prepare-your-organization-for-bitlocker-planning-and-policies.md",
-"redirect_url": "/windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/prevent-end-user-interaction-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/preview-settings-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/preview-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/procedures-used-in-this-guide.md",
-"redirect_url": "/windows/access-protection/windows-firewall/procedures-used-in-this-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/profile-single-process.md",
-"redirect_url": "/windows/device-security/security-policy-settings/profile-single-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/profile-system-performance.md",
-"redirect_url": "/windows/device-security/security-policy-settings/profile-system-performance",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/protect-bitlocker-from-pre-boot-attacks.md",
-"redirect_url": "/windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/protect-devices-from-unwanted-network-traffic.md",
-"redirect_url": "/windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/protect-enterprise-data-using-wip.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md",
-"redirect_url": "/windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md",
-"redirect_url": "/windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/recommended-network-definitions-for-wip.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/recovery-console-allow-automatic-administrative-logon.md",
-"redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md",
-"redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/refresh-an-applocker-policy.md",
-"redirect_url": "/windows/device-security/applocker/refresh-an-applocker-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/registry-global-object-access-auditing.md",
-"redirect_url": "/windows/device-security/auditing/registry-global-object-access-auditing",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/remote-credential-guard.md",
-"redirect_url": "/windows/access-protection/remote-credential-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/remove-computer-from-docking-station.md",
-"redirect_url": "/windows/device-security/security-policy-settings/remove-computer-from-docking-station",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/replace-a-process-level-token.md",
-"redirect_url": "/windows/device-security/security-policy-settings/replace-a-process-level-token",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/report-monitor-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/require-encryption-when-accessing-sensitive-network-resources.md",
-"redirect_url": "/windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/requirements-for-deploying-applocker-policies.md",
-"redirect_url": "/windows/device-security/applocker/requirements-for-deploying-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/requirements-to-use-applocker.md",
-"redirect_url": "/windows/device-security/applocker/requirements-to-use-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/reset-account-lockout-counter-after.md",
-"redirect_url": "/windows/device-security/security-policy-settings/reset-account-lockout-counter-after",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/respond-file-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/respond-machine-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/restore-files-and-directories.md",
-"redirect_url": "/windows/device-security/security-policy-settings/restore-files-and-directories",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md",
-"redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/restrict-access-to-only-trusted-devices.md",
-"redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/restrict-server-access-to-members-of-a-group-only.md",
-"redirect_url": "/windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/review-scan-results-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/run-scan-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/run-the-automatically-generate-rules-wizard.md",
-"redirect_url": "/windows/device-security/applocker/run-the-automatically-generate-rules-wizard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/scheduled-catch-up-scans-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/script-rules-in-applocker.md",
-"redirect_url": "/windows/device-security/applocker/script-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/secpol-advanced-security-audit-policy-settings.md",
-"redirect_url": "/windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/securing-end-to-end-ipsec-connections-by-using-ikev2.md",
-"redirect_url": "/windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/security-auditing-overview.md",
-"redirect_url": "/windows/device-security/auditing/security-auditing-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/security-considerations-for-applocker.md",
-"redirect_url": "/windows/device-security/applocker/security-considerations-for-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/security-identifiers.md",
-"redirect_url": "/windows/access-protection/access-control/security-identifiers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/security-options.md",
-"redirect_url": "/windows/device-security/security-policy-settings/security-options",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/security-policy-settings-reference.md",
-"redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/security-policy-settings.md",
-"redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/security-principals.md",
-"redirect_url": "/windows/access-protection/access-control/security-principals",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/select-types-of-rules-to-create.md",
-"redirect_url": "/windows/device-security/applocker/select-types-of-rules-to-create",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/server-isolation-gpos.md",
-"redirect_url": "/windows/access-protection/windows-firewall/server-isolation-gpos",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/server-isolation-policy-design-example.md",
-"redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design-example",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/server-isolation-policy-design.md",
-"redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/service-accounts.md",
-"redirect_url": "/windows/access-protection/access-control/service-accounts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/service-status-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/settings-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/shut-down-the-system.md",
-"redirect_url": "/windows/device-security/security-policy-settings/shut-down-the-system",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md",
-"redirect_url": "/windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/shutdown-clear-virtual-memory-pagefile.md",
-"redirect_url": "/windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-and-remote-desktop-services.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-and-remote-desktop-services",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-architecture.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-architecture",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-certificate-propagation-service.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-propagation-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-certificate-requirements-and-enumeration.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-debugging-information.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-debugging-information",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-events.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-group-policy-and-registry-settings.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-how-smart-card-sign-in-works-in-windows.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-removal-policy-service.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-removal-policy-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-smart-cards-for-windows-service.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-tools-and-settings.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-tools-and-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/smart-card-windows-smart-card-technical-reference.md",
-"redirect_url": "/windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/special-identities.md",
-"redirect_url": "/windows/access-protection/access-control/special-identities",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/specify-cloud-protection-level-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/store-passwords-using-reversible-encryption.md",
-"redirect_url": "/windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/switch-pcr-banks-on-tpm-2-0-devices.md",
-"redirect_url": "/windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/synchronize-directory-service-data.md",
-"redirect_url": "/windows/device-security/security-policy-settings/synchronize-directory-service-data",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md",
-"redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md",
-"redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/system-objects-require-case-insensitivity-for-non-windows-subsystems.md",
-"redirect_url": "/windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/system-objects-strengthen-default-permissions-of-internal-system-objects.md",
-"redirect_url": "/windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/system-settings-optional-subsystems.md",
-"redirect_url": "/windows/device-security/security-policy-settings/system-settings-optional-subsystems",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md",
-"redirect_url": "/windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/take-ownership-of-files-or-other-objects.md",
-"redirect_url": "/windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/test-an-applocker-policy-by-using-test-applockerpolicy.md",
-"redirect_url": "/windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/test-and-update-an-applocker-policy.md",
-"redirect_url": "/windows/device-security/applocker/test-and-update-an-applocker-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/testing-scenarios-for-wip.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/tools-to-use-with-applocker.md",
-"redirect_url": "/windows/device-security/applocker/tools-to-use-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/tpm-fundamentals.md",
-"redirect_url": "/windows/device-security/tpm/tpm-fundamentals",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/tpm-recommendations.md",
-"redirect_url": "/windows/device-security/tpm/tpm-recommendations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/troubleshoot-siem-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/trusted-platform-module-overview.md",
-"redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/trusted-platform-module-services-group-policy-settings.md",
-"redirect_url": "/windows/device-security/tpm/trusted-platform-module-services-group-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/trusted-platform-module-top-node.md",
-"redirect_url": "/windows/device-security/tpm/trusted-platform-module-top-node",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/turn-on-windows-firewall-and-configure-default-behavior.md",
-"redirect_url": "/windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/types-of-attacks-for-volume-encryption-keys.md",
-"redirect_url": "/windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understand-applocker-enforcement-settings.md",
-"redirect_url": "/windows/device-security/applocker/understand-applocker-enforcement-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understand-applocker-policy-design-decisions.md",
-"redirect_url": "/windows/device-security/applocker/understand-applocker-policy-design-decisions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md",
-"redirect_url": "/windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understand-the-applocker-policy-deployment-process.md",
-"redirect_url": "/windows/device-security/applocker/understand-the-applocker-policy-deployment-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understanding-applocker-allow-and-deny-actions-on-rules.md",
-"redirect_url": "/windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understanding-applocker-default-rules.md",
-"redirect_url": "/windows/device-security/applocker/understanding-applocker-default-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understanding-applocker-rule-behavior.md",
-"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-behavior",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understanding-applocker-rule-collections.md",
-"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-collections",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understanding-applocker-rule-condition-types.md",
-"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-condition-types",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understanding-applocker-rule-exceptions.md",
-"redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-exceptions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understanding-the-file-hash-rule-condition-in-applocker.md",
-"redirect_url": "/windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understanding-the-path-rule-condition-in-applocker.md",
-"redirect_url": "/windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understanding-the-publisher-rule-condition-in-applocker.md",
-"redirect_url": "/windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/understanding-the-windows-firewall-with-advanced-security-design-process.md",
-"redirect_url": "/windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/use-a-reference-computer-to-create-and-maintain-applocker-policies.md",
-"redirect_url": "/windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/use-applocker-and-software-restriction-policies-in-the-same-domain.md",
-"redirect_url": "/windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/use-group-policy-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/use-the-applocker-windows-powershell-cmdlets.md",
-"redirect_url": "/windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/use-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/use-windows-event-forwarding-to-assist-in-instrusion-detection.md",
-"redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/use-wmi-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md",
-"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md",
-"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md",
-"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md",
-"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-detect-application-installations-and-prompt-for-elevation.md",
-"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-group-policy-and-registry-key-settings.md",
-"redirect_url": "/windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-only-elevate-executables-that-are-signed-and-validated.md",
-"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md",
-"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-overview.md",
-"redirect_url": "/windows/access-protection/user-account-control/user-account-control-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-run-all-administrators-in-admin-approval-mode.md",
-"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-security-policy-settings.md",
-"redirect_url": "/windows/access-protection/user-account-control/user-account-control-security-policy-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md",
-"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md",
-"redirect_url": "/windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/user-rights-assignment.md",
-"redirect_url": "/windows/device-security/security-policy-settings/user-rights-assignment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md",
-"redirect_url": "/windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/using-event-viewer-with-applocker.md",
-"redirect_url": "/windows/device-security/applocker/using-event-viewer-with-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/using-owa-with-wip.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/using-owa-with-wip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/using-software-restriction-policies-and-applocker-policies.md",
-"redirect_url": "/windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/utilize-microsoft-cloud-protection-windows-defender-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/verify-that-network-traffic-is-authenticated.md",
-"redirect_url": "/windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/view-the-security-event-log.md",
-"redirect_url": "/windows/device-security/auditing/view-the-security-event-log",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/virtual-smart-card-deploy-virtual-smart-cards.md",
-"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/virtual-smart-card-evaluate-security.md",
-"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/virtual-smart-card-get-started.md",
-"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/virtual-smart-card-overview.md",
-"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/virtual-smart-card-tpmvscmgr.md",
-"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/virtual-smart-card-understanding-and-evaluating.md",
-"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/virtual-smart-card-use-virtual-smart-cards.md",
-"redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/vpn-authentication.md",
-"redirect_url": "/windows/access-protection/vpn/vpn-authentication",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/vpn-auto-trigger-profile.md",
-"redirect_url": "/windows/access-protection/vpn/vpn-auto-trigger-profile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/vpn-conditional-access.md",
-"redirect_url": "/windows/access-protection/vpn/vpn-conditional-access",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/vpn-connection-type.md",
-"redirect_url": "/windows/access-protection/vpn/vpn-connection-type",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/vpn-guide.md",
-"redirect_url": "/windows/access-protection/vpn/vpn-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/vpn-name-resolution.md",
-"redirect_url": "/windows/access-protection/vpn/vpn-name-resolution",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/vpn-profile-options.md",
-"redirect_url": "/windows/access-protection/vpn/vpn-profile-options",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/vpn-routing.md",
-"redirect_url": "/windows/access-protection/vpn/vpn-routing",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/vpn-security-features.md",
-"redirect_url": "/windows/access-protection/vpn/vpn-security-features",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/what-is-applocker.md",
-"redirect_url": "/windows/device-security/applocker/what-is-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/which-editions-of-windows-support-advanced-audit-policy-configuration.md",
-"redirect_url": "/windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-10-mobile-security-guide.md",
-"redirect_url": "/windows/device-security/windows-10-mobile-security-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-credential-theft-mitigation-guide-abstract.md",
-"redirect_url": "/windows/access-protection/windows-credential-theft-mitigation-guide-abstract",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-antivirus-compatibility.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-antivirus-in-windows-10.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-antivirus-on-windows-server-2016.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-offline.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-offline",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-security-center-antivirus.md",
-"redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-smartscreen-available-settings.md",
-"redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-smartscreen-overview.md",
-"redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-defender-smartscreen-set-individual-device.md",
-"redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-firewall-with-advanced-security-administration-with-windows-powershell.md",
-"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-firewall-with-advanced-security-deployment-guide.md",
-"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-firewall-with-advanced-security-design-guide.md",
-"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-firewall-with-advanced-security.md",
-"redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-installer-rules-in-applocker.md",
-"redirect_url": "/windows/device-security/applocker/windows-installer-rules-in-applocker",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-security-baselines.md",
-"redirect_url": "/windows/device-security/windows-security-baselines",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/wip-app-enterprise-context.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/wip-app-enterprise-context",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/working-with-applocker-policies.md",
-"redirect_url": "/windows/device-security/applocker/working-with-applocker-policies",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/working-with-applocker-rules.md",
-"redirect_url": "/windows/device-security/applocker/working-with-applocker-rules",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/acquire-apps-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/acquire-apps-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/acquire-apps-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/acquire-apps-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/add-unsigned-app-to-code-integrity-policy.md",
-"redirect_url": "/microsoft-store/add-unsigned-app-to-code-integrity-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/administrative-tools-in-windows-10.md",
-"redirect_url": "/windows/client-management/administrative-tools-in-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/app-inventory-management-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/apps-in-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/apps-in-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/apps-in-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/apps-in-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-about-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-about-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-add-or-remove-an-administrator-with-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-add-or-remove-an-administrator-with-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-add-or-upgrade-packages-with-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-add-or-upgrade-packages-with-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-administering-appv-with-powershell.md",
-"redirect_url": "/windows/application-management/app-v/appv-administering-appv-with-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-administering-virtual-applications-with-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-administering-virtual-applications-with-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-allow-administrators-to-enable-connection-groups.md",
-"redirect_url": "/windows/application-management/app-v/appv-allow-administrators-to-enable-connection-groups",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-application-publishing-and-client-interaction.md",
-"redirect_url": "/windows/application-management/app-v/appv-application-publishing-and-client-interaction",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-apply-the-deployment-configuration-file-with-powershell.md",
-"redirect_url": "/windows/application-management/app-v/appv-apply-the-deployment-configuration-file-with-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-apply-the-user-configuration-file-with-powershell.md",
-"redirect_url": "/windows/application-management/app-v/appv-apply-the-user-configuration-file-with-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-auto-batch-sequencing.md",
-"redirect_url": "/windows/application-management/app-v/appv-auto-batch-sequencing",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-auto-batch-updating.md",
-"redirect_url": "/windows/application-management/app-v/appv-auto-batch-updating",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-auto-clean-unpublished-packages.md",
-"redirect_url": "/windows/application-management/app-v/appv-auto-clean-unpublished-packages",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-auto-provision-a-vm.md",
-"redirect_url": "/windows/application-management/app-v/appv-auto-provision-a-vm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-available-mdm-settings.md",
-"redirect_url": "/windows/application-management/app-v/appv-available-mdm-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-capacity-planning.md",
-"redirect_url": "/windows/application-management/app-v/appv-capacity-planning",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-client-configuration-settings.md",
-"redirect_url": "/windows/application-management/app-v/appv-client-configuration-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-configure-access-to-packages-with-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-configure-access-to-packages-with-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-configure-connection-groups-to-ignore-the-package-version.md",
-"redirect_url": "/windows/application-management/app-v/appv-configure-connection-groups-to-ignore-the-package-version",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-configure-the-client-to-receive-updates-from-the-publishing-server.md",
-"redirect_url": "/windows/application-management/app-v/appv-configure-the-client-to-receive-updates-from-the-publishing-server",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-connect-to-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-connect-to-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-connection-group-file.md",
-"redirect_url": "/windows/application-management/app-v/appv-connection-group-file",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-connection-group-virtual-environment.md",
-"redirect_url": "/windows/application-management/app-v/appv-connection-group-virtual-environment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-convert-a-package-created-in-a-previous-version-of-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md",
-"redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-create-a-connection-group.md",
-"redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-create-a-custom-configuration-file-with-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-create-a-custom-configuration-file-with-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-create-a-package-accelerator-with-powershell.md",
-"redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-create-a-package-accelerator.md",
-"redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-create-a-virtual-application-package-package-accelerator.md",
-"redirect_url": "/windows/application-management/app-v/appv-create-a-virtual-application-package-package-accelerator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-create-and-use-a-project-template.md",
-"redirect_url": "/windows/application-management/app-v/appv-create-and-use-a-project-template",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-creating-and-managing-virtualized-applications.md",
-"redirect_url": "/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-customize-virtual-application-extensions-with-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-customize-virtual-application-extensions-with-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-delete-a-connection-group.md",
-"redirect_url": "/windows/application-management/app-v/appv-delete-a-connection-group",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-delete-a-package-with-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-delete-a-package-with-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deploy-appv-databases-with-sql-scripts.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploy-appv-databases-with-sql-scripts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deploy-the-appv-server-with-a-script.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server-with-a-script",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deploy-the-appv-server.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deploying-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploying-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deploying-microsoft-office-2010-wth-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2010-wth-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deploying-microsoft-office-2013-with-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deploying-microsoft-office-2016-with-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deploying-packages-with-electronic-software-distribution-solutions.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploying-packages-with-electronic-software-distribution-solutions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deploying-the-appv-sequencer-and-client.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deploying-the-appv-server.md",
-"redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-server",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-deployment-checklist.md",
-"redirect_url": "/windows/application-management/app-v/appv-deployment-checklist",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-dynamic-configuration.md",
-"redirect_url": "/windows/application-management/app-v/appv-dynamic-configuration",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md",
-"redirect_url": "/windows/application-management/app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-enable-reporting-on-the-appv-client-with-powershell.md",
-"redirect_url": "/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-enable-the-app-v-desktop-client.md",
-"redirect_url": "/windows/application-management/app-v/appv-enable-the-app-v-desktop-client",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-evaluating-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-evaluating-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-for-windows.md",
-"redirect_url": "/windows/application-management/app-v/appv-for-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-getting-started.md",
-"redirect_url": "/windows/application-management/app-v/appv-getting-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-high-level-architecture.md",
-"redirect_url": "/windows/application-management/app-v/appv-high-level-architecture",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md",
-"redirect_url": "/windows/application-management/app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-install-the-management-and-reporting-databases-on-separate-computers.md",
-"redirect_url": "/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-install-the-management-server-on-a-standalone-computer.md",
-"redirect_url": "/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-install-the-publishing-server-on-a-remote-computer.md",
-"redirect_url": "/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-install-the-reporting-server-on-a-standalone-computer.md",
-"redirect_url": "/windows/application-management/app-v/appv-install-the-reporting-server-on-a-standalone-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-install-the-sequencer.md",
-"redirect_url": "/windows/application-management/app-v/appv-install-the-sequencer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md",
-"redirect_url": "/windows/application-management/app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-maintaining-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-maintaining-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md",
-"redirect_url": "/windows/application-management/app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md",
-"redirect_url": "/windows/application-management/app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-managing-connection-groups.md",
-"redirect_url": "/windows/application-management/app-v/appv-managing-connection-groups",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-migrating-to-appv-from-a-previous-version.md",
-"redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-modify-an-existing-virtual-application-package.md",
-"redirect_url": "/windows/application-management/app-v/appv-modify-an-existing-virtual-application-package",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-modify-client-configuration-with-powershell.md",
-"redirect_url": "/windows/application-management/app-v/appv-modify-client-configuration-with-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-move-the-appv-server-to-another-computer.md",
-"redirect_url": "/windows/application-management/app-v/appv-move-the-appv-server-to-another-computer",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-operations.md",
-"redirect_url": "/windows/application-management/app-v/appv-operations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-performance-guidance.md",
-"redirect_url": "/windows/application-management/app-v/appv-performance-guidance",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-planning-checklist.md",
-"redirect_url": "/windows/application-management/app-v/appv-planning-checklist",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-planning-folder-redirection-with-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-planning-folder-redirection-with-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-planning-for-appv-server-deployment.md",
-"redirect_url": "/windows/application-management/app-v/appv-planning-for-appv-server-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-planning-for-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-planning-for-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-planning-for-high-availability-with-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-planning-for-high-availability-with-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-planning-for-sequencer-and-client-deployment.md",
-"redirect_url": "/windows/application-management/app-v/appv-planning-for-sequencer-and-client-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-planning-for-using-appv-with-office.md",
-"redirect_url": "/windows/application-management/app-v/appv-planning-for-using-appv-with-office",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md",
-"redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-planning-to-deploy-appv.md",
-"redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-preparing-your-environment.md",
-"redirect_url": "/windows/application-management/app-v/appv-preparing-your-environment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-prerequisites.md",
-"redirect_url": "/windows/application-management/app-v/appv-prerequisites",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-publish-a-connection-group.md",
-"redirect_url": "/windows/application-management/app-v/appv-publish-a-connection-group",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-publish-a-packages-with-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-publish-a-packages-with-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-register-and-unregister-a-publishing-server-with-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-release-notes-for-appv-for-windows-1703.md",
-"redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-release-notes-for-appv-for-windows.md",
-"redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-reporting.md",
-"redirect_url": "/windows/application-management/app-v/appv-reporting",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-running-locally-installed-applications-inside-a-virtual-environment.md",
-"redirect_url": "/windows/application-management/app-v/appv-running-locally-installed-applications-inside-a-virtual-environment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-security-considerations.md",
-"redirect_url": "/windows/application-management/app-v/appv-security-considerations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-sequence-a-new-application.md",
-"redirect_url": "/windows/application-management/app-v/appv-sequence-a-new-application",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-sequence-a-package-with-powershell.md",
-"redirect_url": "/windows/application-management/app-v/appv-sequence-a-package-with-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-supported-configurations.md",
-"redirect_url": "/windows/application-management/app-v/appv-supported-configurations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-technical-reference.md",
-"redirect_url": "/windows/application-management/app-v/appv-technical-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-troubleshooting.md",
-"redirect_url": "/windows/application-management/app-v/appv-troubleshooting",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md",
-"redirect_url": "/windows/application-management/app-v/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-using-the-client-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md",
-"redirect_url": "/windows/application-management/app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/appv-viewing-appv-server-publishing-metadata.md",
-"redirect_url": "/windows/application-management/app-v/appv-viewing-appv-server-publishing-metadata",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/assign-apps-to-employees.md",
-"redirect_url": "/microsoft-store/assign-apps-to-employees",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/configure-mdm-provider-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/configure-mdm-provider-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/configure-mdm-provider-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/configure-mdm-provider-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/connect-to-remote-aadj-pc.md",
-"redirect_url": "/windows/client-management/connect-to-remote-aadj-pc",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/device-guard-signing-portal.md",
-"redirect_url": "/microsoft-store/device-guard-signing-portal",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/distribute-apps-from-your-private-store.md",
-"redirect_url": "/microsoft-store/distribute-apps-from-your-private-store",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/distribute-apps-to-your-employees-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/distribute-apps-to-your-employees-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/distribute-apps-to-your-employees-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/distribute-apps-to-your-employees-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/distribute-apps-with-management-tool.md",
-"redirect_url": "/microsoft-store/distribute-apps-with-management-tool",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/distribute-offline-apps.md",
-"redirect_url": "/microsoft-store/distribute-offline-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/find-and-acquire-apps-overview.md",
-"redirect_url": "/microsoft-store/find-and-acquire-apps-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/group-policies-for-enterprise-and-education-editions.md",
-"redirect_url": "/windows/client-management/group-policies-for-enterprise-and-education-editions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/join-windows-10-mobile-to-azure-active-directory.md",
-"redirect_url": "/windows/client-management/join-windows-10-mobile-to-azure-active-directory",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-access-to-private-store.md",
-"redirect_url": "/microsoft-store/manage-access-to-private-store",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-apps-windows-store-for-business-overview.md",
-"redirect_url": "/microsoft-store/manage-apps-windows-store-for-business-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/manage-apps-windows-store-for-business-overview.md",
-"redirect_url": "/microsoft-store/manage-apps-microsoft-store-for-business-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-corporate-devices.md",
-"redirect_url": "/windows/client-management/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-orders-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/manage-orders-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/manage-orders-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/manage-orders-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-private-store-settings.md",
-"redirect_url": "/microsoft-store/manage-private-store-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-settings-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/manage-settings-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/manage-settings-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/manage-settings-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-users-and-groups-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/manage-users-and-groups-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/manage-users-and-groups-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/manage-users-and-groups-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-windows-10-in-your-organization-modern-management.md",
-"redirect_url": "/windows/client-management/manage-windows-10-in-your-organization-modern-management",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/mandatory-user-profile.md",
-"redirect_url": "/windows/client-management/mandatory-user-profile",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/new-policies-for-windows-10.md",
-"redirect_url": "/windows/client-management/new-policies-for-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/prerequisites-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/prerequisites-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/prerequisites-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/prerequisites-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/reset-a-windows-10-mobile-device.md",
-"redirect_url": "/windows/client-management/reset-a-windows-10-mobile-device",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/roles-and-permissions-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/roles-and-permissions-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/roles-and-permissions-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/roles-and-permissions-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/settings-reference-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/settings-reference-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/settings-reference-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/settings-reference-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/sign-code-integrity-policy-with-device-guard-signing.md",
-"redirect_url": "/microsoft-store/sign-code-integrity-policy-with-device-guard-signing",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/sign-up-windows-store-for-business-overview.md",
-"redirect_url": "/microsoft-store/sign-up-windows-store-for-business-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/sign-up-windows-store-for-business-overview.md",
-"redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/sign-up-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/sign-up-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/sign-up-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/troubleshoot-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/troubleshoot-windows-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/troubleshoot-windows-store-for-business.md",
-"redirect_url": "/microsoft-store/troubleshoot-microsoft-store-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-administering-uev-with-windows-powershell-and-wmi.md",
-"redirect_url": "/windows/configuration/ue-v/uev-administering-uev-with-windows-powershell-and-wmi",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-administering-uev.md",
-"redirect_url": "/windows/configuration/ue-v/uev-administering-uev",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-application-template-schema-reference.md",
-"redirect_url": "/windows/configuration/ue-v/uev-application-template-schema-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-changing-the-frequency-of-scheduled-tasks.md",
-"redirect_url": "/windows/configuration/ue-v/uev-changing-the-frequency-of-scheduled-tasks",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-configuring-uev-with-group-policy-objects.md",
-"redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-group-policy-objects",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-configuring-uev-with-system-center-configuration-manager.md",
-"redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-system-center-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-deploy-required-features.md",
-"redirect_url": "/windows/configuration/ue-v/uev-deploy-required-features",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-deploy-uev-for-custom-applications.md",
-"redirect_url": "/windows/configuration/ue-v/uev-deploy-uev-for-custom-applications",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-for-windows.md",
-"redirect_url": "/windows/configuration/ue-v/uev-for-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-getting-started.md",
-"redirect_url": "/windows/configuration/ue-v/uev-getting-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-manage-administrative-backup-and-restore.md",
-"redirect_url": "/windows/configuration/ue-v/uev-manage-administrative-backup-and-restore",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-manage-configurations.md",
-"redirect_url": "/windows/configuration/ue-v/uev-manage-configurations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md",
-"redirect_url": "/windows/configuration/ue-v/uev-managing-settings-location-templates-using-windows-powershell-and-wmi",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi.md",
-"redirect_url": "/windows/configuration/ue-v/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-migrating-settings-packages.md",
-"redirect_url": "/windows/configuration/ue-v/uev-migrating-settings-packages",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-prepare-for-deployment.md",
-"redirect_url": "/windows/configuration/ue-v/uev-prepare-for-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-release-notes-1607.md",
-"redirect_url": "/windows/configuration/ue-v/uev-release-notes-1607",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-security-considerations.md",
-"redirect_url": "/windows/configuration/ue-v/uev-security-considerations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-sync-methods.md",
-"redirect_url": "/windows/configuration/ue-v/uev-sync-methods",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-sync-trigger-events.md",
-"redirect_url": "/windows/configuration/ue-v/uev-sync-trigger-events",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-synchronizing-microsoft-office-with-uev.md",
-"redirect_url": "/windows/configuration/ue-v/uev-synchronizing-microsoft-office-with-uev",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-technical-reference.md",
-"redirect_url": "/windows/configuration/ue-v/uev-technical-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-troubleshooting.md",
-"redirect_url": "/windows/configuration/ue-v/uev-troubleshooting",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-upgrade-uev-from-previous-releases.md",
-"redirect_url": "/windows/configuration/ue-v/uev-upgrade-uev-from-previous-releases",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-using-uev-with-application-virtualization-applications.md",
-"redirect_url": "/windows/configuration/ue-v/uev-using-uev-with-application-virtualization-applications",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-whats-new-in-uev-for-windows.md",
-"redirect_url": "/windows/configuration/ue-v/uev-whats-new-in-uev-for-windows",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/uev-working-with-custom-templates-and-the-uev-generator.md",
-"redirect_url": "/windows/configuration/ue-v/uev-working-with-custom-templates-and-the-uev-generator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/update-windows-store-for-business-account-settings.md",
-"redirect_url": "/microsoft-store/update-windows-store-for-business-account-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "store-for-business/update-windows-store-for-business-account-settings.md",
-"redirect_url": "/microsoft-store/update-microsoft-store-for-business-account-settings",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/windows-10-mobile-and-mdm.md",
-"redirect_url": "/windows/client-management/windows-10-mobile-and-mdm",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/windows-libraries.md",
-"redirect_url": "/windows/client-management/windows-libraries",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/windows-store-for-business-overview.md",
-"redirect_url": "/microsoft-store/windows-store-for-business-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/working-with-line-of-business-apps.md",
-"redirect_url": "/microsoft-store/working-with-line-of-business-apps",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/act-technical-reference.md",
-"redirect_url": "/windows/deployment/planning/act-technical-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/applying-filters-to-data-in-the-sua-tool.md",
-"redirect_url": "/windows/deployment/planning/applying-filters-to-data-in-the-sua-tool",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/available-data-types-and-operators-in-compatibility-administrator.md",
-"redirect_url": "/windows/deployment/planning/available-data-types-and-operators-in-compatibility-administrator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/best-practice-recommendations-for-windows-to-go.md",
-"redirect_url": "/windows/deployment/planning/best-practice-recommendations-for-windows-to-go",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/change-history-for-plan-for-windows-10-deployment.md",
-"redirect_url": "/windows/deployment/planning/change-history-for-plan-for-windows-10-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/compatibility-administrator-users-guide.md",
-"redirect_url": "/windows/deployment/planning/compatibility-administrator-users-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/compatibility-fix-database-management-strategies-and-deployment.md",
-"redirect_url": "/windows/deployment/planning/compatibility-fix-database-management-strategies-and-deployment",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md",
-"redirect_url": "/windows/deployment/planning/compatibility-fixes-for-windows-8-windows-7-and-windows-vista",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/creating-a-custom-compatibility-fix-in-compatibility-administrator.md",
-"redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-fix-in-compatibility-administrator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/creating-a-custom-compatibility-mode-in-compatibility-administrator.md",
-"redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-mode-in-compatibility-administrator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/creating-an-apphelp-message-in-compatibility-administrator.md",
-"redirect_url": "/windows/deployment/planning/creating-an-apphelp-message-in-compatibility-administrator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/deployment-considerations-for-windows-to-go.md",
-"redirect_url": "/windows/deployment/planning/deployment-considerations-for-windows-to-go",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/device-dialog-box.md",
-"redirect_url": "/windows/deployment/planning/device-dialog-box",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md",
-"redirect_url": "/windows/deployment/planning/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/fixing-applications-by-using-the-sua-tool.md",
-"redirect_url": "/windows/deployment/planning/fixing-applications-by-using-the-sua-tool",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md",
-"redirect_url": "/windows/deployment/planning/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/managing-application-compatibility-fixes-and-custom-fix-databases.md",
-"redirect_url": "/windows/deployment/planning/managing-application-compatibility-fixes-and-custom-fix-databases",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/prepare-your-organization-for-windows-to-go.md",
-"redirect_url": "/windows/deployment/planning/prepare-your-organization-for-windows-to-go",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/searching-for-fixed-applications-in-compatibility-administrator.md",
-"redirect_url": "/windows/deployment/planning/searching-for-fixed-applications-in-compatibility-administrator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md",
-"redirect_url": "/windows/deployment/planning/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/security-and-data-protection-considerations-for-windows-to-go.md",
-"redirect_url": "/windows/deployment/planning/security-and-data-protection-considerations-for-windows-to-go",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/showing-messages-generated-by-the-sua-tool.md",
-"redirect_url": "/windows/deployment/planning/showing-messages-generated-by-the-sua-tool",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/sua-users-guide.md",
-"redirect_url": "/windows/deployment/planning/sua-users-guide",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/tabs-on-the-sua-tool-interface.md",
-"redirect_url": "/windows/deployment/planning/tabs-on-the-sua-tool-interface",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/testing-your-application-mitigation-packages.md",
-"redirect_url": "/windows/deployment/planning/testing-your-application-mitigation-packages",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/understanding-and-using-compatibility-fixes.md",
-"redirect_url": "/windows/deployment/planning/understanding-and-using-compatibility-fixes",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/using-the-compatibility-administrator-tool.md",
-"redirect_url": "/windows/deployment/planning/using-the-compatibility-administrator-tool",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/using-the-sdbinstexe-command-line-tool.md",
-"redirect_url": "/windows/deployment/planning/using-the-sdbinstexe-command-line-tool",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/using-the-sua-tool.md",
-"redirect_url": "/windows/deployment/planning/using-the-sua-tool",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/using-the-sua-wizard.md",
-"redirect_url": "/windows/deployment/planning/using-the-sua-wizard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/viewing-the-events-screen-in-compatibility-administrator.md",
-"redirect_url": "/windows/deployment/planning/viewing-the-events-screen-in-compatibility-administrator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/windows-10-compatibility.md",
-"redirect_url": "/windows/deployment/planning/windows-10-compatibility",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/windows-10-deployment-considerations.md",
-"redirect_url": "/windows/deployment/planning/windows-10-deployment-considerations",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/windows-10-enterprise-faq-itpro.md",
-"redirect_url": "/windows/deployment/planning/windows-10-enterprise-faq-itpro",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/windows-10-infrastructure-requirements.md",
-"redirect_url": "/windows/deployment/planning/windows-10-infrastructure-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/windows-to-go-frequently-asked-questions.md",
-"redirect_url": "/windows/deployment/planning/windows-to-go-frequently-asked-questions",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/windows-to-go-overview.md",
-"redirect_url": "/windows/deployment/planning/windows-to-go-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/change-history-for-update-windows-10.md",
-"redirect_url": "/windows/deployment/update/change-history-for-update-windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/update-compliance-get-started.md",
-"redirect_url": "/windows/deployment/update/update-compliance-get-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/update-compliance-monitor.md",
-"redirect_url": "/windows/deployment/update/update-compliance-monitor",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/update-compliance-using.md",
-"redirect_url": "/windows/deployment/update/update-compliance-using",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-branchcache.md",
-"redirect_url": "/windows/deployment/update/waas-branchcache",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-configure-wufb.md",
-"redirect_url": "/windows/deployment/update/waas-configure-wufb",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-delivery-optimization.md",
-"redirect_url": "/windows/deployment/update/waas-delivery-optimization",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-deployment-rings-windows-10-updates.md",
-"redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-integrate-wufb.md",
-"redirect_url": "/windows/deployment/update/waas-integrate-wufb",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-manage-updates-configuration-manager.md",
-"redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-manage-updates-wsus.md",
-"redirect_url": "/windows/deployment/update/waas-manage-updates-wsus",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-manage-updates-wufb.md",
-"redirect_url": "/windows/deployment/update/waas-manage-updates-wufb",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-mobile-updates.md",
-"redirect_url": "/windows/deployment/update/waas-mobile-updates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-optimize-windows-10-updates.md",
-"redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-overview.md",
-"redirect_url": "/windows/deployment/update/waas-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-quick-start.md",
-"redirect_url": "/windows/deployment/update/waas-quick-start",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-restart.md",
-"redirect_url": "/windows/deployment/update/waas-restart",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-servicing-branches-windows-10-updates.md",
-"redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-servicing-strategy-windows-10-updates.md",
-"redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-windows-insider-for-business-aad.md",
-"redirect_url": "/windows/deployment/update/waas-windows-insider-for-business-aad",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-windows-insider-for-business.md",
-"redirect_url": "/windows/deployment/update/waas-windows-insider-for-business",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-wufb-group-policy.md",
-"redirect_url": "/windows/deployment/update/waas-wufb-group-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/waas-wufb-intune.md",
-"redirect_url": "/windows/deployment/update/waas-wufb-intune",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/manage-settings-app-with-group-policy.md",
-"redirect_url": "/windows/client-management/manage-settings-app-with-group-policy",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/client-management/mdm/create-a-custom-configuration-service-provider.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/client-management/mdm/design-a-custom-windows-csp.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/iconfigserviceprovider2.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/iconfigserviceprovider2configmanagernotification.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/iconfigserviceprovider2getnode.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnode.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodeadd.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodeclear.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodecopy.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodedeletechild.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodedeleteproperty.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodeexecute.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodegetchildnodenames.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodegetproperty.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodegetpropertyidentifiers.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodegetvalue.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodemove.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodesetproperty.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodesetvalue.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspnodetransactioning.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/icspvalidate.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/client-management/mdm/samples-for-writing-a-custom-configuration-service-provider.md",
-"redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/keep-secure/collect-wip-audit-event-logs.md",
-"redirect_url": "/windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/deploy-managed-installer-for-device-guard.md",
-"redirect_url": "/windows/device-security/device-guard/deploy-managed-installer-for-device-guard",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/upgrade-readiness-data-sharing.md",
-"redirect_url": "/windows/deployment/upgrade/upgrade-readiness-data-sharing",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/index.md",
-"redirect_url": "/windows/windows-10/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/index.md",
-"redirect_url": "/windows/windows-10/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deploy/index.md",
-"redirect_url": "/windows/deployment/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/plan/index.md",
-"redirect_url": "/windows/deployment/planning/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/index.md",
-"redirect_url": "/windows/windows-10/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/windows-store-for-business.md",
-"redirect_url": "/microsoft-store/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/update/index.md",
-"redirect_url": "/windows/deployment/update/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configure/index.md",
-"redirect_url": "/windows/configuration/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/security-technologies.md",
-"redirect_url": "/windows/windows-10/index",
-"redirect_document_id": true
-},
-{
-"source_path": "education/get-started/index.md",
-"redirect_url": "/education/get-started/get-started-with-microsoft-education",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/windows-10-enterprise-security-guides.md",
-"redirect_url": "/windows/windows-10/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/keep-secure/change-history-for-keep-windows-10-secure.md",
-"redirect_url": "/windows/windows-10/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/manage/change-history-for-manage-and-update-windows-10.md",
-"redirect_url": "/windows/windows-10/index",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/update/waas-servicing-branches-windows-10-updates.md",
-"redirect_url": "/windows/deployment/update/waas-servicing-channels-windows-10-updates",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-10-enterprise-activation-subscription.md",
-"redirect_url": "/windows/deployment/windows-10-enterprise-subscription-activation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-10-auto-pilot.md",
-"redirect_url": "/windows/deployment/windows-autopilot/windows-10-autopilot",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/privacy/basic-level-windows-diagnostic-events-and-fields.md",
-"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1703.md",
-"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1709.md",
-"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields.md",
-"redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/configure-windows-diagnostic-data-in-your-organization.md",
-"redirect_url": "/windows/privacy/configure-windows-diagnostic-data-in-your-organization",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/diagnostic-data-viewer-overview.md",
-"redirect_url": "/windows/privacy/diagnostic-data-viewer-overview",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/enhanced-diagnostic-data-windows-analytics-events-and-fields.md",
-"redirect_url": "/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/gdpr-win10-whitepaper.md",
-"redirect_url": "/windows/privacy/gdpr-win10-whitepaper",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md",
-"redirect_url": "/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/manage-windows-endpoints-version-1709.md",
-"redirect_url": "/windows/privacy/manage-windows-endpoints",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/windows-diagnostic-data-1703.md",
-"redirect_url": "/windows/privacy/windows-diagnostic-data-1703",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/configuration/windows-diagnostic-data.md",
-"redirect_url": "/windows/privacy/windows-diagnostic-data",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/upgrade/windows-10-edition-downgrades.md",
-"redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades",
-"redirect_document_id": true
-},
-{
-"source_path": "education/windows/windows-automatic-redeployment.md",
-"redirect_url": "/education/windows/autopilot-reset",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-autopilot/windows-10-autopilot.md",
-"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/privacy/manage-windows-endpoints.md",
-"redirect_url": "/windows/privacy/manage-windows-1809-endpoints",
-"redirect_document_id": true
-},
-{
-"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-nativeapp.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp",
-"redirect_document_id": false
-},
-{
-"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-webapp.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp",
-"redirect_document_id": false
- },
-{
-"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-full-sample-powershell.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell",
-"redirect_document_id": false
-},
-{
-"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-list.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list",
-"redirect_document_id": false
-},
-{
-"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-odata-samples.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples",
-"redirect_document_id": false
-},
-{
-"source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alerts",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-information",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineaction-object",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineactions-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineaction-object",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machines",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-started.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-started",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/get-started.md",
-"redirect_url": "/windows/security/threat-protection/index.md",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/machine-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/isolate-machine",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-api.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api",
-"redirect_document_id": true
-},
-{
- "source_path": "windows/security/threat-protection/windows-defender-atp/api-microsoft-flow.md",
- "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow",
- "redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-power-bi",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-powershell.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-python.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-av-scan",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-information",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicator-by-id-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-analytics",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/threat-and-vuln-mgt-scenarios.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/files-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/files",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/is-ip-seen-org.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/exposed-apis-list",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineaction",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/machineactionsnote.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/ti-indicator",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/update-alert",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/incidents-queue.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/incidents-queue",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp",
-"redirect_document_id": true
-},
-{
-"source_path":"windows/security/threat-protection/windows-defender-atp/use-apis.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/user-alert-windows-defender-advanced-threat-protection-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user",
-"source_path": "windows/deployment/planning/windows-10-fall-creators-deprecation.md",
-"redirect_url": "/windows/deployment/planning/windows-10-1709-removed-features",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/planning/windows-10-creators-update-deprecation.md",
-"redirect_url": "/windows/deployment/planning/windows-10-1703-removed-features",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators-windows-defender-advanced-threat-protection.md",
-"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list",
-"redirect_document_id": false
-},
-{
-"source_path": "windows/deployment/windows-10-enterprise-subscription-activation.md",
-"redirect_url": "/windows/deployment/windows-10-subscription-activation",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/hub/windows-10-landing.yml",
-"redirect_url": "/windows/windows-10",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/improverequestperformance-new.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/improve-request-performance",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md",
-"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md",
-"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#networking-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md",
-"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#licensing-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-configuration.md",
-"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#configuration-requirements",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-autopilot/user-driven-aad.md",
-"redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-azure-active-directory-join",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-autopilot/user-driven-hybrid.md",
-"redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-hybrid-azure-active-directory-join",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-autopilot/intune-connector.md",
-"redirect_url": "https://docs.microsoft.com/intune/windows-autopilot-hybrid",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-remote.md",
-"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-remote-windows-autopilot-reset",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-local.md",
-"redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-local-windows-autopilot-reset",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-autopilot/configure-autopilot.md",
-"redirect_url": "/windows/deployment/windows-autopilot/add-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-autopilot/administer.md",
-"redirect_url": "/windows/deployment/windows-autopilot/add-devices#registering-devices",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/hub/release-information.md",
-"redirect_url": "/windows/release-information",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/deployment/windows-10-architecture-posters.md",
-"redirect_url": "/windows/deployment/windows-10-deployment-scenarios",
-"redirect_document_id": true
-},
-{
-"source_path": "windows/device-security/index.md",
-"redirect_url": "/windows/security/threat-protection",
-"redirect_document_id": true
-},
-{
-"source_path": "browsers/internet-explorer/ie11-deploy-guide/group-policy-compatability-with-ie11.md",
-"redirect_url": "/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11",
-"redirect_document_id": true
-},
-{
-"source_path": "devices/surface/surface.yml",
-"redirect_url": "/surface/get-started",
-"redirect_document_id": true
-}
-]
-}
-
-
+ },
+ {
+ "source_path": "education/windows/swithc-to-pro-de.md",
+ "redirect_url": "/education/windows/switch-to-pro-education",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/policy-admx-backed.md",
+ "redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/client-management/mdm/policy-csp-location.md",
+ "redirect_url": "/windows/client-management/mdm/policy-configuration-service-provider",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/configure-windows-defender-in-windows-10.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enable-pua-windows-defender-for-windows-10.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/get-started-with-windows-defender-for-windows-10.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/run-cmd-scan-windows-defender-for-windows-10.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-for-windows-10.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-block-at-first-sight.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-in-windows-10.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-enhanced-notifications.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-scenario-7.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/surface/surface-diagnostic-toolkit.md",
+ "redirect_url": "/surface/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/surface/manage-surface-dock-firmware-updates.md",
+ "redirect_url": "devices/surface/update",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/surface-hub/i-am-done-finishing-your-surface-hub-meeting.md",
+ "redirect_url": "/surface-hub/finishing-your-surface-hub-meeting",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/hololens/hololens-microsoft-layout-app.md",
+ "redirect_url": "/hololens/hololens-microsoft-dynamics-365-layout-app",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/hololens/hololens-microsoft-dynamics-365-layout-app.md",
+ "redirect_url": "https://docs.microsoft.com/dynamics365/mixed-reality/layout/",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/hololens/hololens-microsoft-remote-assist-app.md",
+ "redirect_url": "https://docs.microsoft.com/dynamics365/mixed-reality/remote-assist/",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/hololens/hololens-public-preview-apps.md",
+ "redirect_url": "https://docs.microsoft.com/dynamics365/#pivot=mixed-reality-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/hololens/hololens-clicker.md",
+ "redirect_url": "/hololens/hololens1-clicker",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "devices/hololens/hololens-clicker-restart-recover.md",
+ "redirect_url": "/hololens/hololens1-clicker",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "devices/hololens/hololens-upgrade-enterprise.md",
+ "redirect_url": "/hololens/hololens1-upgrade-enterprise",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/hololens/hololens-setup.md",
+ "redirect_url": "/hololens/hololens1-setup",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/hololens/hololens-install-localized.md",
+ "redirect_url": "/hololens/hololens1-install-localized",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/hololens/hololens-spaces-on-hololens.md",
+ "redirect_url": "/hololens/hololens-spaces",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/hololens/hololens-get-apps.md",
+ "redirect_url": "/hololens/holographic-store-apps",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "devices/hololens/hololens-install-apps.md",
+ "redirect_url": "/hololens/holographic-store-apps",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "devices/hololens/hololens-use-apps.md",
+ "redirect_url": "/hololens/holographic-home",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/surface-hub/provisioning-packages-for-certificates-surface-hub.md",
+ "redirect_url": "/surface-hub/provisioning-packages-for-surface-hub",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/surface-hub/manage-settings-with-local-admin-account-surface-hub.md",
+ "redirect_url": "/surface-hub/admin-group-management-for-surface-hub",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/surface-hub/surface-hub-administrators-guide.md",
+ "redirect_url": "/surface-hub/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/surface-hub/intro-to-surface-hub.md",
+ "redirect_url": "/surface-hub/index",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/manage/waas-quick-start.md",
+ "redirect_url": "/windows/deployment/update/waas-quick-start",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-overview.md",
+ "redirect_url": "/windows/deployment/update/waas-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-servicing-strategy-windows-10-updates.md",
+ "redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-deployment-rings-windows-10-updates.md",
+ "redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-servicing-branches-windows-10-updates.md",
+ "redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/update-compliance-monitor.md",
+ "redirect_url": "/windows/deployment/update/update-compliance-monitor",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/update-compliance-get-started.md",
+ "redirect_url": "/windows/deployment/update/update-compliance-get-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/update-compliance-using.md",
+ "redirect_url": "/windows/deployment/update/update-compliance-using",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-optimize-windows-10-updates.md",
+ "redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-delivery-optimization.md",
+ "redirect_url": "/windows/deployment/update/waas-delivery-optimization",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-branchcache.md",
+ "redirect_url": "/windows/deployment/update/waas-branchcache",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-mobile-updates.md",
+ "redirect_url": "/windows/deployment/update/waas-mobile-updates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-manage-updates-wufb.md",
+ "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-configure-wufb.md",
+ "redirect_url": "/windows/deployment/update/waas-configure-wufb",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-integrate-wufb.md",
+ "redirect_url": "/windows/deployment/update/waas-integrate-wufb",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-wufb-group-policy.md",
+ "redirect_url": "/windows/deployment/update/waas-wufb-group-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-wufb-intune.md",
+ "redirect_url": "/windows/deployment/update/waas-wufb-intune.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-manage-updates-wsus.md",
+ "redirect_url": "/windows/deployment/update/waas-manage-updates-wsus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-manage-updates-configuration-manager.md",
+ "redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-restart.md",
+ "redirect_url": "/windows/deployment/update/waas-restart",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/waas-update-windows-10.md",
+ "redirect_url": "/windows/deployment/update/index",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/manage/configure-windows-telemetry-in-your-organization.md",
+ "redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/lockdown-features-windows-10.md",
+ "redirect_url": "/windows/configuration/lockdown-features-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/set-up-shared-or-guest-pc.md",
+ "redirect_url": "/windows/configuration/set-up-shared-or-guest-pc",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md",
+ "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/manage/set-up-a-device-for-anyone-to-use.md",
+ "redirect_url": "/windows/configuration/kiosk-shared-pc",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/configuration/set-up-a-device-for-anyone-to-use.md",
+ "redirect_url": "/windows/configuration/kiosk-shared-pc",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md",
+ "redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/guidelines-for-assigned-access-app.md",
+ "redirect_url": "/windows/configuration/guidelines-for-assigned-access-app",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/lock-down-windows-10-to-specific-apps.md",
+ "redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/set-up-a-kiosk-for-windows-10-for-mobile-edition.md",
+ "redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/lockdown-xml.md",
+ "redirect_url": "/windows/configuration/mobile-devices/lockdown-xml",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/settings-that-can-be-locked-down.md",
+ "redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/product-ids-in-windows-10-mobile.md",
+ "redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-tips-and-suggestions.md",
+ "redirect_url": "/windows/configuration/manage-tips-and-suggestions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/windows-10-start-layout-options-and-policies.md",
+ "redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/configure-windows-10-taskbar.md",
+ "redirect_url": "/windows/configuration//configure-windows-10-taskbar",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/customize-and-export-start-layout.md",
+ "redirect_url": "/windows/configuration//customize-and-export-start-layout",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/start-layout-xml-desktop.md",
+ "redirect_url": "/windows/configuration/start-layout-xml-desktop",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/start-layout-xml-mobile.md",
+ "redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/customize-windows-10-start-screens-by-using-group-policy.md",
+ "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md",
+ "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/customize-windows-10-start-screens-by-using-mobile-device-management.md",
+ "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-testing-scenarios.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-scenario-1.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-scenario-2.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-scenario-3.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-scenario-4.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-scenario-5.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-scenario-6.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-o365.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-crm.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-powerbi.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-voice-commands.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-policy-settings.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-feedback.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/stop-employees-from-using-the-windows-store.md",
+ "redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/stop-employees-from-using-the-windows-store.md",
+ "redirect_url": "/windows/configuration/stop-employees-from-using-microsoft-store",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/configure-devices-without-mdm.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/manage/changes-to-start-policies-in-windows-10.md",
+ "redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/how-it-pros-can-use-configuration-service-providers.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/lock-down-windows-10.md",
+ "redirect_url": "/windows/configuration/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-wifi-sense-in-enterprise.md",
+ "redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provisioning-packages.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provisioning-how-it-works.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provisioning-install-icd.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provisioning-create-package.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provisioning-apply-package.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provisioning-uninstall-package.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provision-pcs-for-initial-deployment.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provision-pcs-with-apps-and-certificates.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provisioning-script-to-install-app.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provisioning-nfc.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-nfc",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provisioning-command-line.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/provisioning-multivariant.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-edp-policy-using-intune.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-edp-policy-using-sccm.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-vpn-and-edp-policy-using-intune.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/hello-enable-phone-signin.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-edp-policy-using-intune.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/guidance-and-best-practices-edp.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/overview-create-edp-policy.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/protect-enterprise-data-using-edp.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/testing-scenarios-for-edp.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/wip-enterprise-overview.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/enlightened-microsoft-apps-and-edp.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/update-windows-10-images-with-provisioning-packages.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-prepare-your-environment.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-release-notes.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-review-site-discovery.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/ad-ds-schema-extensions-to-support-tpm-backup.md",
+ "redirect_url": "https://technet.microsoft.com/library/jj635854.aspx",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/creating-a-device-guard-policy-for-signed-apps.md",
+ "redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/device-guard-certification-and-compliance.md",
+ "redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/enable-phone-signin-to-pc-and-vpn.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-enable-phone-signin",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/getting-apps-to-run-on-device-guard-protected-devices.md",
+ "redirect_url": "/windows/device-security/device-guard/device-guard-deployment-guide",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/implement-microsoft-passport-in-your-organization.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-identity-verification-using-microsoft-passport.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-passport-and-password-changes.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-passport-errors-during-pin-creation.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-passport-guide.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/passport-event-300.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-event-300",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/prepare-people-to-use-microsoft-passport.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/why-a-pin-is-better-than-a-password.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-hello-in-enterprise.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/app-inventory-managemement-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business#manage-apps-in-your-inventory",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/app-inventory-management-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/manage/application-development-for-windows-as-a-service.md",
+ "redirect_url": "https://msdn.microsoft.com/windows/uwp/get-started/application-development-for-windows-as-a-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-accessibility.md",
+ "redirect_url": "/windows/application-management/app-v/appv-getting-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-accessing-the-client-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-install-the-appv-client-for-shared-content-store-mode.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-modify-client-configuration-with-the-admx-template-and-group-policy.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/manage/appv-planning-for-migrating-from-a-previous-version-of-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/configure-windows-10-devices-to-stop-data-flow-to-microsoft.md",
+ "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/disconnect-your-organization-from-microsoft.md",
+ "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/manage/introduction-to-windows-10-servicing.md",
+ "redirect_url": "/windows/deployment/update/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-cortana-in-enterprise.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/cortana-at-work-overview.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/manage/manage-inventory-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/app-inventory-managemement-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/app-inventory-management-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-accessibility.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-for-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-privacy-statement.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-security-considerations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/act-community-ratings-and-process.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/act-database-configuration.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-database-migration.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-deployment-options.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-glossary.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/activating-and-closing-windows-in-acm.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-lps-share-permissions.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-operatingsystem-application-report.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-operatingsystem-computer-report.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-operatingsystem-device-report.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-product-and-documentation-resources.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-settings-dialog-box-preferences-tab.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-settings-dialog-box-settings-tab.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-toolbar-icons-in-acm.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-tools-packages-and-services.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/act-user-interface-reference.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/adding-or-editing-an-issue.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/adding-or-editing-a-solution.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/analyzing-your-compatibility-data.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/application-dialog-box.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/categorizing-your-compatibility-data.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/chromebook-migration-guide.md",
+ "redirect_url": "edu/windows/chromebook-migration-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/common-compatibility-issues.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/compatibility-monitor-users-guide.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/computer-dialog-box.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/configuring-act.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/creating-and-editing-issues-and-solutions.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/creating-an-enterprise-environment-for-compatibility-testing.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/creating-an-inventory-collector-package.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/creating-a-runtime-analysis-package.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/customizing-your-report-views.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/data-sent-through-the-microsoft-compatibility-exchange.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/deciding-whether-to-fix-an-application-or-deploy-a-workaround.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/deciding-which-applications-to-test.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/deleting-a-data-collection-package.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/deploying-an-inventory-collector-package.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/deploying-a-runtime-analysis-package.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/deploy-windows-10-in-a-school.md",
+ "redirect_url": "/edu/windows/deploy-windows-10-in-a-school",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/example-filter-queries.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/exporting-a-data-collection-package.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/filtering-your-compatibility-data.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/fixing-compatibility-issues.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/identifying-computers-for-inventory-collection.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/integration-with-management-solutions-.md",
+ "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/internet-explorer-web-site-report.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/labeling-data-in-acm.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/log-file-locations-for-data-collection-packages.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/managing-your-data-collection-packages.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/organizational-tasks-for-each-report-type.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/organizing-your-compatibility-data.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/prioritizing-your-compatibility-data.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/ratings-icons-in-acm.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/resolving-an-issue.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/saving-opening-and-exporting-reports.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/selecting-the-send-and-receive-status-for-an-application.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/selecting-your-compatibility-rating.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/selecting-your-deployment-status.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/sending-and-receiving-compatibility-data.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/settings-for-acm.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/setup-and-deployment.md",
+ "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/software-requirements-for-act.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/software-requirements-for-rap.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/taking-inventory-of-your-organization.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/testing-compatibility-on-the-target-platform.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/troubleshooting-act.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/troubleshooting-act-database-issues.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/troubleshooting-the-act-configuration-wizard.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/troubleshooting-the-act-log-processing-service.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/using-act.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/using-compatibility-monitor-to-send-feedback.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/viewing-your-compatibility-reports.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/websiteurl-dialog-box.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/welcome-to-act.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/whats-new-in-act-60.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/windows-10-guidance-for-education-environments.md",
+ "redirect_url": "/edu/windows/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/windows-10-servicing-options.md",
+ "redirect_url": "/windows/deployment/update/waas-overview",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/plan/windows-update-for-business.md",
+ "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/whats-new/applocker.md",
+ "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/whats-new/bitlocker.md",
+ "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/whats-new/change-history-for-what-s-new-in-windows-10.md",
+ "redirect_url": "/windows/whats-new/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/whats-new/credential-guard.md",
+ "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/whats-new/device-guard-overview.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/whats-new/device-management.md",
+ "redirect_url": "/windows/client-management/index",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/whats-new/edge-ie11-whats-new-overview.md",
+ "redirect_url": "/microsoft-edge/deploy/enterprise-guidance-using-microsoft-edge-and-ie11",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/whats-new/edp-whats-new-overview.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/whats-new/lockdown-features-windows-10.md",
+ "redirect_url": "/windows/configuration/lockdown-features-windows-10",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/whats-new/microsoft-passport.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/whats-new/new-provisioning-packages.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/whats-new/security-auditing.md",
+ "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/whats-new/trusted-platform-module.md",
+ "redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/whats-new/user-account-control.md",
+ "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/whats-new/windows-spotlight.md",
+ "redirect_url": "/windows/configuration/windows-spotlight",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/whats-new/windows-store-for-business-overview.md",
+ "redirect_url": "/microsoft-store/windows-store-for-business-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/windows-store-for-business-overview.md",
+ "redirect_url": "/microsoft-store/microsoft-store-for-business-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/whats-new/windows-update-for-business.md",
+ "redirect_url": "/windows/whats-new/whats-new-windows-10-version-1507-and-1511",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/windows-10-security-guide.md",
+ "redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/whats-new/security.md",
+ "redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/configure/basic-level-windows-diagnostic-events-and-fields-1703.md",
+ "redirect_url": "/windows/configuration/basic-level-windows-diagnostic-events-and-fields",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/change-history-for-configure-windows-10.md",
+ "redirect_url": "/windows/configuration/change-history-for-configure-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/changes-to-start-policies-in-windows-10.md",
+ "redirect_url": "/windows/configuration/changes-to-start-policies-in-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/configure-devices-without-mdm.md",
+ "redirect_url": "/windows/configuration/configure-devices-without-mdm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/configure-devices-without-mdm.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/configure-mobile.md",
+ "redirect_url": "/windows/configuration/mobile-devices/configure-mobile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/configure-windows-10-taskbar.md",
+ "redirect_url": "/windows/configuration/configure-windows-10-taskbar",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/configure-windows-telemetry-in-your-organization.md",
+ "redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/configure-windows-telemetry-in-your-organization.md",
+ "redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-crm.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-crm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-feedback.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-feedback",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-o365.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-o365",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-overview.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-policy-settings.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-powerbi.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-powerbi",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-scenario-1.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-1",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-scenario-2.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-2",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-scenario-3.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-3",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-scenario-4.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-4",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-scenario-5.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-5",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-scenario-6.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-6",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-scenario-7.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-scenario-7",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-testing-scenarios.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-testing-scenarios",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/cortana-at-work-voice-commands.md",
+ "redirect_url": "/windows/configuration/cortana-at-work/cortana-at-work-voice-commands",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/customize-and-export-start-layout.md",
+ "redirect_url": "/windows/configuration/customize-and-export-start-layout",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/customize-windows-10-start-screens-by-using-group-policy.md",
+ "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-group-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/customize-windows-10-start-screens-by-using-mobile-device-management.md",
+ "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-mobile-device-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md",
+ "redirect_url": "/windows/configuration/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/guidelines-for-assigned-access-app.md",
+ "redirect_url": "/windows/configuration/guidelines-for-assigned-access-app",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/how-it-pros-can-use-configuration-service-providers.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/how-it-pros-can-use-configuration-service-providers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/kiosk-shared-pc.md",
+ "redirect_url": "/windows/configuration/kiosk-shared-pc",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/kiosk-shared-pc.md",
+ "redirect_url": "/windows/configuration/kiosk-methods",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/setup-kiosk-digital-signage.md",
+ "redirect_url": "/windows/configuration/kiosk-single-app",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/multi-app-kiosk-xml.md",
+ "redirect_url": "/windows/configuration/kiosk-xml",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/multi-app-kiosk-troubleshoot.md",
+ "redirect_url": "/windows/configuration/kiosk-troubleshoot",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/lock-down-windows-10-to-specific-apps.md",
+ "redirect_url": "/windows/configuration/lock-down-windows-10-to-specific-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/lock-down-windows-10.md",
+ "redirect_url": "/windows/configuration/lock-down-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/lockdown-features-windows-10.md",
+ "redirect_url": "/windows/configuration/lockdown-features-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/lockdown-xml.md",
+ "redirect_url": "/windows/configuration/mobile-devices/lockdown-xml",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/manage-connections-from-windows-operating-system-components-to-microsoft-services.md",
+ "redirect_url": "/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/manage-tips-and-suggestions.md",
+ "redirect_url": "/windows/configuration/manage-tips-and-suggestions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/manage-wifi-sense-in-enterprise.md",
+ "redirect_url": "/windows/configuration/manage-wifi-sense-in-enterprise",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/mobile-lockdown-designer.md",
+ "redirect_url": "/windows/configuration/mobile-devices/mobile-lockdown-designer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/product-ids-in-windows-10-mobile.md",
+ "redirect_url": "/windows/configuration/mobile-devices/product-ids-in-windows-10-mobile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provision-pcs-for-initial-deployment.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provision-pcs-with-apps-and-certificates.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps-and-certificates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provision-pcs-with-apps.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provision-pcs-with-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-apply-package.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-apply-package",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-command-line.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-command-line",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-configure-mobile.md",
+ "redirect_url": "/windows/configuration/mobile-devices/provisioning-configure-mobile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-create-package.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-create-package",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-how-it-works.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-how-it-works",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-install-icd.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-install-icd",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-multivariant.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-multivariant",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-nfc.md",
+ "redirect_url": "/windows/configuration/mobile-devices/provisioning-nfc",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-package-splitter.md",
+ "redirect_url": "/windows/configuration/mobile-devices/provisioning-package-splitter",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-packages.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-packages",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-powershell.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-script-to-install-app.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-script-to-install-app",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/provisioning-uninstall-package.md",
+ "redirect_url": "/windows/configuration/provisioning-packages/provisioning-uninstall-package",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/set-up-a-device-for-anyone-to-use.md",
+ "redirect_url": "/windows/configuration/set-up-a-device-for-anyone-to-use",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-desktop-editions.md",
+ "redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md",
+ "redirect_url": "/windows/configuration/setup-kiosk-digital-signage",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-mobile-edition.md",
+ "redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/set-up-shared-or-guest-pc.md",
+ "redirect_url": "/windows/configuration/set-up-shared-or-guest-pc",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/settings-that-can-be-locked-down.md",
+ "redirect_url": "/windows/configuration/mobile-devices/settings-that-can-be-locked-down",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/start-layout-xml-desktop.md",
+ "redirect_url": "/windows/configuration/start-layout-xml-desktop",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/start-layout-xml-mobile.md",
+ "redirect_url": "/windows/configuration/mobile-devices/start-layout-xml-mobile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/start-secondary-tiles.md",
+ "redirect_url": "/windows/configuration/start-secondary-tiles",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/start-taskbar-lockscreen.md",
+ "redirect_url": "/windows/configuration/start-taskbar-lockscreen",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/start-taskbar-lockscreen.md",
+ "redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/stop-employees-from-using-the-windows-store.md",
+ "redirect_url": "/windows/configuration/stop-employees-from-using-the-windows-store",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/windows-10-start-layout-options-and-policies.md",
+ "redirect_url": "/windows/configuration/windows-10-start-layout-options-and-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/windows-diagnostic-data-1703.md",
+ "redirect_url": "/windows/configuration/windows-diagnostic-data",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/windows-spotlight.md",
+ "redirect_url": "/windows/configuration/windows-spotlight",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/windows-spotlight.md",
+ "redirect_url": "/windows/configuration/windows-spotlight",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/activate-forest-by-proxy-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/activate-forest-by-proxy-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/activate-forest-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/activate-forest-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/activate-using-active-directory-based-activation-client.md",
+ "redirect_url": "/windows/deployment/volume-activation/activate-using-active-directory-based-activation-client",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/activate-using-key-management-service-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/activate-using-key-management-service-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/activate-windows-10-clients-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/activate-windows-10-clients-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/active-directory-based-activation-overview.md",
+ "redirect_url": "/windows/deployment/volume-activation/active-directory-based-activation-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/add-a-windows-10-operating-system-image-using-configuration-manager.md",
+ "redirect_url": "/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md",
+ "redirect_url": "/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/add-manage-products-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/add-manage-products-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/add-remove-computers-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/add-remove-computers-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/add-remove-product-key-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/add-remove-product-key-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/appendix-information-sent-to-microsoft-during-activation-client.md",
+ "redirect_url": "/windows/deployment/volume-activation/appendix-information-sent-to-microsoft-during-activation-client",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/assign-applications-using-roles-in-mdt-2013.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt-2013",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/assign-applications-using-roles-in-mdt.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/assign-applications-using-roles-in-mdt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/build-a-distributed-environment-for-windows-10-deployment.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/build-a-distributed-environment-for-windows-10-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/change-history-for-deploy-windows-10.md",
+ "redirect_url": "/windows/deployment/change-history-for-deploy-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/configure-a-pxe-server-to-load-windows-pe.md",
+ "redirect_url": "/windows/deployment/configure-a-pxe-server-to-load-windows-pe",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/configure-client-computers-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/configure-client-computers-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/configure-mdt-2013-for-userexit-scripts.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-for-userexit-scripts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/configure-mdt-2013-settings.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-2013-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/configure-mdt-deployment-share-rules.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-deployment-share-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/configure-mdt-for-userexit-scripts.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-for-userexit-scripts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/configure-mdt-settings.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/configure-mdt-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/create-a-custom-windows-pe-boot-image-with-configuration-manager.md",
+ "redirect_url": "/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/create-a-windows-10-reference-image.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-windows-10-reference-image",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md",
+ "redirect_url": "/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/deploy-a-windows-10-image-using-mdt.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/deploy-whats-new.md",
+ "redirect_url": "/windows/deployment/deploy-whats-new",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/deploy-windows-10-using-pxe-and-configuration-manager.md",
+ "redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md",
+ "redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/deploy-windows-10-with-the-microsoft-deployment-toolkit.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/deploy-windows-to-go.md",
+ "redirect_url": "/windows/deployment/deploy-windows-to-go",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md",
+ "redirect_url": "/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/get-started-with-the-microsoft-deployment-toolkit.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/getting-started-with-the-user-state-migration-tool.md",
+ "redirect_url": "/windows/deployment/usmt/getting-started-with-the-user-state-migration-tool",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/import-export-vamt-data.md",
+ "redirect_url": "/windows/deployment/volume-activation/import-export-vamt-data",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/install-configure-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/install-configure-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/install-kms-client-key-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/install-kms-client-key-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/install-product-key-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/install-product-key-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/install-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/install-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/integrate-configuration-manager-with-mdt-2013.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt-2013",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/integrate-configuration-manager-with-mdt.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/integrate-configuration-manager-with-mdt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/introduction-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/introduction-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/key-features-in-mdt-2013.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt-2013",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/key-features-in-mdt.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/key-features-in-mdt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/kms-activation-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/kms-activation-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/local-reactivation-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/local-reactivation-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/manage-activations-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/manage-activations-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/manage-product-keys-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/manage-product-keys-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/manage-vamt-data.md",
+ "redirect_url": "/windows/deployment/volume-activation/manage-vamt-data",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-analytics.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/manage-windows-upgrades-with-upgrade-readiness.md",
+ "redirect_url": "/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/mbr-to-gpt.md",
+ "redirect_url": "/windows/deployment/mbr-to-gpt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/mdt-2013-lite-touch-components.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-2013-lite-touch-components",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/mdt-lite-touch-components.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/mdt-lite-touch-components",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/migrate-application-settings.md",
+ "redirect_url": "/windows/deployment/usmt/migrate-application-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/migration-store-types-overview.md",
+ "redirect_url": "/windows/deployment/usmt/migration-store-types-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/monitor-activation-client.md",
+ "redirect_url": "/windows/deployment/volume-activation/monitor-activation-client",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/monitor-windows-10-deployment-with-configuration-manager.md",
+ "redirect_url": "/windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/offline-migration-reference.md",
+ "redirect_url": "/windows/deployment/usmt/offline-migration-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/online-activation-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/online-activation-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/plan-for-volume-activation-client.md",
+ "redirect_url": "/windows/deployment/volume-activation/plan-for-volume-activation-client",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt-2013.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt-2013",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/prepare-for-windows-deployment-with-mdt.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/prepare-for-windows-deployment-with-mdt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md",
+ "redirect_url": "/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/proxy-activation-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/proxy-activation-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md",
+ "redirect_url": "/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/refresh-a-windows-7-computer-with-windows-10.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/remove-products-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/remove-products-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md",
+ "redirect_url": "/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/replace-a-windows-7-computer-with-a-windows-10-computer.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/resolve-windows-10-upgrade-errors.md",
+ "redirect_url": "/windows/deployment/upgrade/resolve-windows-10-upgrade-errors",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/scenario-kms-activation-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/scenario-kms-activation-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/scenario-online-activation-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/scenario-online-activation-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/scenario-proxy-activation-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/scenario-proxy-activation-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/set-up-mdt-2013-for-bitlocker.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-2013-for-bitlocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/set-up-mdt-for-bitlocker.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/set-up-mdt-for-bitlocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/sideload-apps-in-windows-10.md",
+ "redirect_url": "/windows/application-management/sideload-apps-in-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/simulate-a-windows-10-deployment-in-a-test-environment.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/simulate-a-windows-10-deployment-in-a-test-environment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/troubleshoot-upgrade-analytics.md",
+ "redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/troubleshoot-upgrade-readiness.md",
+ "redirect_url": "/windows/deployment/upgrade/troubleshoot-upgrade-readiness",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/understanding-migration-xml-files.md",
+ "redirect_url": "/windows/deployment/usmt/understanding-migration-xml-files",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/update-product-status-vamt.md",
+ "redirect_url": "/windows/deployment/volume-activation/update-product-status-vamt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-additional-insights.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-architecture.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-deploy-windows.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-deployment-script.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-get-started.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-identify-apps.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-requirements.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-resolve-issues.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-analytics-upgrade-overview.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-readiness-additional-insights.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-additional-insights",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-readiness-architecture.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-architecture",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-readiness-deploy-windows.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deploy-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-readiness-deployment-script.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-deployment-script",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-readiness-get-started.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-get-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-readiness-identify-apps.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-identify-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-readiness-release-notes.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-release-notes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-readiness-requirements.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-readiness-resolve-issues.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-resolve-issues",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-readiness-upgrade-overview.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-upgrade-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-to-windows-10-with-system-center-configuraton-manager.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-windows-phone-8-1-to-10.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt-2013.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt-2013",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/use-orchestrator-runbooks-with-mdt.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/use-orchestrator-runbooks-with-mdt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/use-the-mdt-database-to-stage-windows-10-deployment-information.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/use-the-mdt-database-to-stage-windows-10-deployment-information",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/use-the-volume-activation-management-tool-client.md",
+ "redirect_url": "/windows/deployment/volume-activation/use-the-volume-activation-management-tool-client",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/use-upgrade-analytics-to-manage-windows-upgrades.md",
+ "redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/use-upgrade-readiness-to-manage-windows-upgrades.md",
+ "redirect_url": "/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/use-vamt-in-windows-powershell.md",
+ "redirect_url": "/windows/deployment/volume-activation/use-vamt-in-windows-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/use-web-services-in-mdt-2013.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt-2013",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/use-web-services-in-mdt.md",
+ "redirect_url": "/windows/deployment/deploy-windows-mdt/use-web-services-in-mdt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-best-practices.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-best-practices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-choose-migration-store-type.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-choose-migration-store-type",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-command-line-syntax.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-command-line-syntax",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-common-issues.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-common-issues",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-common-migration-scenarios.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-common-migration-scenarios",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-configxml-file.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-configxml-file",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-conflicts-and-precedence.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-conflicts-and-precedence",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-custom-xml-examples.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-custom-xml-examples",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-customize-xml-files.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-customize-xml-files",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-determine-what-to-migrate.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-determine-what-to-migrate",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-estimate-migration-store-size.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-estimate-migration-store-size",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-exclude-files-and-settings.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-exclude-files-and-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-extract-files-from-a-compressed-migration-store.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-extract-files-from-a-compressed-migration-store",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-faq.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-faq",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-general-conventions.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-general-conventions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-hard-link-migration-store.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-hard-link-migration-store",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-how-it-works.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-how-it-works",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-how-to.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-how-to",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-identify-application-settings.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-identify-application-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-identify-file-types-files-and-folders.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-identify-file-types-files-and-folders",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-identify-operating-system-settings.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-identify-operating-system-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-identify-users.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-identify-users",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-include-files-and-settings.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-include-files-and-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-loadstate-syntax.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-loadstate-syntax",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-log-files.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-log-files",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-migrate-efs-files-and-certificates.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-migrate-efs-files-and-certificates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-migrate-user-accounts.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-migrate-user-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-migration-store-encryption.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-migration-store-encryption",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-overview.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-plan-your-migration.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-plan-your-migration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-recognized-environment-variables.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-recognized-environment-variables",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-reference.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-requirements.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-reroute-files-and-settings.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-reroute-files-and-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-resources.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-resources",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-return-codes.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-return-codes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-scanstate-syntax.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-scanstate-syntax",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-technical-reference.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-technical-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-test-your-migration.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-test-your-migration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-topics.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-topics",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-troubleshooting.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-troubleshooting",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-utilities.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-utilities",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-what-does-usmt-migrate.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-what-does-usmt-migrate",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-xml-elements-library.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-xml-elements-library",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/usmt-xml-reference.md",
+ "redirect_url": "/windows/deployment/usmt/usmt-xml-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/vamt-known-issues.md",
+ "redirect_url": "/windows/deployment/volume-activation/vamt-known-issues",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/vamt-requirements.md",
+ "redirect_url": "/windows/deployment/volume-activation/vamt-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/vamt-step-by-step.md",
+ "redirect_url": "/windows/deployment/volume-activation/vamt-step-by-step",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/verify-the-condition-of-a-compressed-migration-store.md",
+ "redirect_url": "/windows/deployment/usmt/verify-the-condition-of-a-compressed-migration-store",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/volume-activation-management-tool.md",
+ "redirect_url": "/windows/deployment/volume-activation/volume-activation-management-tool",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/volume-activation-windows-10.md",
+ "redirect_url": "/windows/deployment/volume-activation/volume-activation-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/windows-10-deployment-scenarios.md",
+ "redirect_url": "/windows/deployment/windows-10-deployment-scenarios",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/windows-10-deployment-tools-reference.md",
+ "redirect_url": "/windows/deployment/windows-10-deployment-tools-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/windows-10-edition-upgrades.md",
+ "redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/windows-10-enterprise-e3-overview.md",
+ "redirect_url": "/windows/deployment/windows-10-enterprise-e3-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/windows-10-poc-mdt.md",
+ "redirect_url": "/windows/deployment/windows-10-poc-mdt",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/windows-10-poc-sc-config-mgr.md",
+ "redirect_url": "/windows/deployment/windows-10-poc-sc-config-mgr",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/windows-10-poc.md",
+ "redirect_url": "/windows/deployment/windows-10-poc",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/windows-10-upgrade-paths.md",
+ "redirect_url": "/windows/deployment/upgrade/windows-10-upgrade-paths",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/windows-adk-scenarios-for-it-pros.md",
+ "redirect_url": "/windows/deployment/windows-adk-scenarios-for-it-pros",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/windows-deployment-scenarios-and-tools.md",
+ "redirect_url": "/windows/deployment/windows-deployment-scenarios-and-tools",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/windows-upgrade-and-migration-considerations.md",
+ "redirect_url": "/windows/deployment/upgrade/windows-upgrade-and-migration-considerations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/xml-file-requirements.md",
+ "redirect_url": "/windows/deployment/usmt/xml-file-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/access-control.md",
+ "redirect_url": "/windows/access-protection/access-control/access-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/access-credential-manager-as-a-trusted-caller.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/access-credential-manager-as-a-trusted-caller",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/access-this-computer-from-the-network.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/access-this-computer-from-the-network",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/account-lockout-duration.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/account-lockout-duration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/account-lockout-policy.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/account-lockout-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/account-lockout-threshold.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/account-lockout-threshold",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/account-policies.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/account-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/accounts-administrator-account-status.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/accounts-administrator-account-status",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/accounts-block-microsoft-accounts.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/accounts-block-microsoft-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/accounts-guest-account-status.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/accounts-guest-account-status",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/accounts-rename-administrator-account.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-administrator-account",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/accounts-rename-guest-account.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/accounts-rename-guest-account",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/act-as-part-of-the-operating-system.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/act-as-part-of-the-operating-system",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/active-directory-accounts.md",
+ "redirect_url": "/windows/access-protection/access-control/active-directory-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/active-directory-security-groups.md",
+ "redirect_url": "/windows/access-protection/access-control/active-directory-security-groups",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/add-production-devices-to-the-membership-group-for-a-zone.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md",
+ "redirect_url": "/windows/device-security/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/add-test-devices-to-the-membership-group-for-a-zone.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/add-workstations-to-domain.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/add-workstations-to-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/additional-mitigations.md",
+ "redirect_url": "/windows/access-protection/credential-guard/additional-mitigations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/adjust-memory-quotas-for-a-process.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/administer-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/administer-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/administer-security-policy-settings.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/administer-security-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/advanced-security-audit-policy-settings.md",
+ "redirect_url": "/windows/device-security/auditing/advanced-security-audit-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/advanced-security-auditing-faq.md",
+ "redirect_url": "/windows/device-security/auditing/advanced-security-auditing-faq",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/advanced-security-auditing.md",
+ "redirect_url": "/windows/device-security/auditing/advanced-security-auditing",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/alerts-queue-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/allow-log-on-locally.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-locally",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/allow-log-on-through-remote-desktop-services.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/api-portal-mapping-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/api-portal-mapping-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/app-behavior-with-wip.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/app-behavior-with-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/appendix-a-security-monitoring-recommendations-for-many-audit-events.md",
+ "redirect_url": "/windows/device-security/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/applocker-architecture-and-components.md",
+ "redirect_url": "/windows/device-security/applocker/applocker-architecture-and-components",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/applocker-functions.md",
+ "redirect_url": "/windows/device-security/applocker/applocker-functions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/applocker-overview.md",
+ "redirect_url": "/windows/device-security/applocker/applocker-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/applocker-policies-deployment-guide.md",
+ "redirect_url": "/windows/device-security/applocker/applocker-policies-deployment-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/applocker-policies-design-guide.md",
+ "redirect_url": "/windows/device-security/applocker/applocker-policies-design-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/applocker-policy-use-scenarios.md",
+ "redirect_url": "/windows/device-security/applocker/applocker-policy-use-scenarios",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/applocker-processes-and-interactions.md",
+ "redirect_url": "/windows/device-security/applocker/applocker-processes-and-interactions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/applocker-settings.md",
+ "redirect_url": "/windows/device-security/applocker/applocker-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/applocker-technical-reference.md",
+ "redirect_url": "/windows/device-security/applocker/applocker-technical-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/apply-a-basic-audit-policy-on-a-file-or-folder.md",
+ "redirect_url": "/windows/device-security/auditing/apply-a-basic-audit-policy-on-a-file-or-folder",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/assign-security-group-filters-to-the-gpo.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/assign-security-group-filters-to-the-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-account-lockout.md",
+ "redirect_url": "/windows/device-security/auditing/audit-account-lockout",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-application-generated.md",
+ "redirect_url": "/windows/device-security/auditing/audit-application-generated",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-application-group-management.md",
+ "redirect_url": "/windows/device-security/auditing/audit-application-group-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-audit-policy-change.md",
+ "redirect_url": "/windows/device-security/auditing/audit-audit-policy-change",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-audit-the-access-of-global-system-objects.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-access-of-global-system-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-audit-the-use-of-backup-and-restore-privilege.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-authentication-policy-change.md",
+ "redirect_url": "/windows/device-security/auditing/audit-authentication-policy-change",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-authorization-policy-change.md",
+ "redirect_url": "/windows/device-security/auditing/audit-authorization-policy-change",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-central-access-policy-staging.md",
+ "redirect_url": "/windows/device-security/auditing/audit-central-access-policy-staging",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-certification-services.md",
+ "redirect_url": "/windows/device-security/auditing/audit-certification-services",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-computer-account-management.md",
+ "redirect_url": "/windows/device-security/auditing/audit-computer-account-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-credential-validation.md",
+ "redirect_url": "/windows/device-security/auditing/audit-credential-validation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-detailed-directory-service-replication.md",
+ "redirect_url": "/windows/device-security/auditing/audit-detailed-directory-service-replication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-detailed-file-share.md",
+ "redirect_url": "/windows/device-security/auditing/audit-detailed-file-share",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-directory-service-access.md",
+ "redirect_url": "/windows/device-security/auditing/audit-directory-service-access",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-directory-service-changes.md",
+ "redirect_url": "/windows/device-security/auditing/audit-directory-service-changes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-directory-service-replication.md",
+ "redirect_url": "/windows/device-security/auditing/audit-directory-service-replication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-distribution-group-management.md",
+ "redirect_url": "/windows/device-security/auditing/audit-distribution-group-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-dpapi-activity.md",
+ "redirect_url": "/windows/device-security/auditing/audit-dpapi-activity",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-file-share.md",
+ "redirect_url": "/windows/device-security/auditing/audit-file-share",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-file-system.md",
+ "redirect_url": "/windows/device-security/auditing/audit-file-system",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-filtering-platform-connection.md",
+ "redirect_url": "/windows/device-security/auditing/audit-filtering-platform-connection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-filtering-platform-packet-drop.md",
+ "redirect_url": "/windows/device-security/auditing/audit-filtering-platform-packet-drop",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-filtering-platform-policy-change.md",
+ "redirect_url": "/windows/device-security/auditing/audit-filtering-platform-policy-change",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-force-audit-policy-subcategory-settings-to-override.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-group-membership.md",
+ "redirect_url": "/windows/device-security/auditing/audit-group-membership",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-handle-manipulation.md",
+ "redirect_url": "/windows/device-security/auditing/audit-handle-manipulation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-ipsec-driver.md",
+ "redirect_url": "/windows/device-security/auditing/audit-ipsec-driver",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-ipsec-extended-mode.md",
+ "redirect_url": "/windows/device-security/auditing/audit-ipsec-extended-mode",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-ipsec-main-mode.md",
+ "redirect_url": "/windows/device-security/auditing/audit-ipsec-main-mode",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-ipsec-quick-mode.md",
+ "redirect_url": "/windows/device-security/auditing/audit-ipsec-quick-mode",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-kerberos-authentication-service.md",
+ "redirect_url": "/windows/device-security/auditing/audit-kerberos-authentication-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-kerberos-service-ticket-operations.md",
+ "redirect_url": "/windows/device-security/auditing/audit-kerberos-service-ticket-operations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-kernel-object.md",
+ "redirect_url": "/windows/device-security/auditing/audit-kernel-object",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-logoff.md",
+ "redirect_url": "/windows/device-security/auditing/audit-logoff",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-logon.md",
+ "redirect_url": "/windows/device-security/auditing/audit-logon",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-mpssvc-rule-level-policy-change.md",
+ "redirect_url": "/windows/device-security/auditing/audit-mpssvc-rule-level-policy-change",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-network-policy-server.md",
+ "redirect_url": "/windows/device-security/auditing/audit-network-policy-server",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-non-sensitive-privilege-use.md",
+ "redirect_url": "/windows/device-security/auditing/audit-non-sensitive-privilege-use",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-other-account-logon-events.md",
+ "redirect_url": "/windows/device-security/auditing/audit-other-account-logon-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-other-account-management-events.md",
+ "redirect_url": "/windows/device-security/auditing/audit-other-account-management-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-other-logonlogoff-events.md",
+ "redirect_url": "/windows/device-security/auditing/audit-other-logonlogoff-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-other-object-access-events.md",
+ "redirect_url": "/windows/device-security/auditing/audit-other-object-access-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-other-policy-change-events.md",
+ "redirect_url": "/windows/device-security/auditing/audit-other-policy-change-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-other-privilege-use-events.md",
+ "redirect_url": "/windows/device-security/auditing/audit-other-privilege-use-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-other-system-events.md",
+ "redirect_url": "/windows/device-security/auditing/audit-other-system-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-pnp-activity.md",
+ "redirect_url": "/windows/device-security/auditing/audit-pnp-activity",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-policy.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/audit-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-process-creation.md",
+ "redirect_url": "/windows/device-security/auditing/audit-process-creation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-process-termination.md",
+ "redirect_url": "/windows/device-security/auditing/audit-process-termination",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-registry.md",
+ "redirect_url": "/windows/device-security/auditing/audit-registry",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-removable-storage.md",
+ "redirect_url": "/windows/device-security/auditing/audit-removable-storage",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-rpc-events.md",
+ "redirect_url": "/windows/device-security/auditing/audit-rpc-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-sam.md",
+ "redirect_url": "/windows/device-security/auditing/audit-sam",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-security-group-management.md",
+ "redirect_url": "/windows/device-security/auditing/audit-security-group-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-security-state-change.md",
+ "redirect_url": "/windows/device-security/auditing/audit-security-state-change",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-security-system-extension.md",
+ "redirect_url": "/windows/device-security/auditing/audit-security-system-extension",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-sensitive-privilege-use.md",
+ "redirect_url": "/windows/device-security/auditing/audit-sensitive-privilege-use",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-special-logon.md",
+ "redirect_url": "/windows/device-security/auditing/audit-special-logon",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-system-integrity.md",
+ "redirect_url": "/windows/device-security/auditing/audit-system-integrity",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-user-account-management.md",
+ "redirect_url": "/windows/device-security/auditing/audit-user-account-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/audit-user-device-claims.md",
+ "redirect_url": "/windows/device-security/auditing/audit-user-device-claims",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/back-up-files-and-directories.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/back-up-files-and-directories",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/backup-tpm-recovery-information-to-ad-ds.md",
+ "redirect_url": "/windows/device-security/tpm/backup-tpm-recovery-information-to-ad-ds",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-audit-account-logon-events.md",
+ "redirect_url": "/windows/device-security/auditing/basic-audit-account-logon-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-audit-account-management.md",
+ "redirect_url": "/windows/device-security/auditing/basic-audit-account-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-audit-directory-service-access.md",
+ "redirect_url": "/windows/device-security/auditing/basic-audit-directory-service-access",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-audit-logon-events.md",
+ "redirect_url": "/windows/device-security/auditing/basic-audit-logon-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-audit-object-access.md",
+ "redirect_url": "/windows/device-security/auditing/basic-audit-object-access",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-audit-policy-change.md",
+ "redirect_url": "/windows/device-security/auditing/basic-audit-policy-change",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-audit-privilege-use.md",
+ "redirect_url": "/windows/device-security/auditing/basic-audit-privilege-use",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-audit-process-tracking.md",
+ "redirect_url": "/windows/device-security/auditing/basic-audit-process-tracking",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-audit-system-events.md",
+ "redirect_url": "/windows/device-security/auditing/basic-audit-system-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-firewall-policy-design.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/basic-firewall-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-security-audit-policies.md",
+ "redirect_url": "/windows/device-security/auditing/basic-security-audit-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/basic-security-audit-policy-settings.md",
+ "redirect_url": "/windows/device-security/auditing/basic-security-audit-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bcd-settings-and-bitlocker.md",
+ "redirect_url": "/windows/device-security/bitlocker/bcd-settings-and-bitlocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bitlocker-basic-deployment.md",
+ "redirect_url": "/windows/device-security/bitlocker/bitlocker-basic-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bitlocker-countermeasures.md",
+ "redirect_url": "/windows/device-security/bitlocker/bitlocker-countermeasures",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bitlocker-device-encryption-overview-windows-10.md",
+ "redirect_url": "/windows/device-security/bitlocker/bitlocker-device-encryption-overview-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bitlocker-frequently-asked-questions.md",
+ "redirect_url": "/windows/device-security/bitlocker/bitlocker-frequently-asked-questions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bitlocker-group-policy-settings.md",
+ "redirect_url": "/windows/device-security/bitlocker/bitlocker-group-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bitlocker-how-to-deploy-on-windows-server.md",
+ "redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-deploy-on-windows-server",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bitlocker-how-to-enable-network-unlock.md",
+ "redirect_url": "/windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bitlocker-overview.md",
+ "redirect_url": "/windows/device-security/bitlocker/bitlocker-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bitlocker-recovery-guide-plan.md",
+ "redirect_url": "/windows/device-security/bitlocker/bitlocker-recovery-guide-plan",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md",
+ "redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bitlocker-use-bitlocker-recovery-password-viewer.md",
+ "redirect_url": "/windows/device-security/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/block-untrusted-fonts-in-enterprise.md",
+ "redirect_url": "/windows/threat-protection/block-untrusted-fonts-in-enterprise",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/boundary-zone-gpos.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/boundary-zone-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/boundary-zone.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/boundary-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/bypass-traverse-checking.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/bypass-traverse-checking",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/certificate-based-isolation-policy-design-example.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design-example",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/certificate-based-isolation-policy-design.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/certificate-based-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/change-rules-from-request-to-require-mode.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/change-rules-from-request-to-require-mode",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/change-the-system-time.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/change-the-system-time",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/change-the-time-zone.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/change-the-time-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/change-the-tpm-owner-password.md",
+ "redirect_url": "/windows/device-security/tpm/change-the-tpm-owner-password",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/check-sensor-status-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/check-sensor-status-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-configuring-basic-firewall-settings.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-basic-firewall-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-configuring-rules-for-an-isolated-server-zone.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-configuring-rules-for-the-boundary-zone.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-configuring-rules-for-the-encryption-zone.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-configuring-rules-for-the-isolated-domain.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-creating-group-policy-objects.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-group-policy-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-creating-inbound-firewall-rules.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-inbound-firewall-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-creating-outbound-firewall-rules.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-outbound-firewall-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-implementing-a-basic-firewall-policy-design.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-implementing-a-certificate-based-isolation-policy-design.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-implementing-a-domain-isolation-policy-design.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/checklist-implementing-a-standalone-server-isolation-policy-design.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/choose-the-right-bitlocker-countermeasure.md",
+ "redirect_url": "/windows/device-security/bitlocker/choose-the-right-bitlocker-countermeasure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/command-line-arguments-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configuration-management-reference-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-advanced-scan-types-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-an-applocker-policy-for-audit-only.md",
+ "redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-audit-only",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-an-applocker-policy-for-enforce-rules.md",
+ "redirect_url": "/windows/device-security/applocker/configure-an-applocker-policy-for-enforce-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-authentication-methods.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/configure-authentication-methods",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-block-at-first-sight-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-cloud-block-timeout-period-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-data-protection-quick-mode-settings.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/configure-data-protection-quick-mode-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-email-notifications-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-email-notifications-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-end-user-interaction-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-endpoints-gp-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-gp-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-endpoints-sccm-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-sccm-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-endpoints-script-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-endpoints-script-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-exceptions-for-an-applocker-rule.md",
+ "redirect_url": "/windows/device-security/applocker/configure-exceptions-for-an-applocker-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-exclusions-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-extension-file-exclusions-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-group-policy-to-autoenroll-and-deploy-certificates.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-key-exchange-main-mode-settings.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/configure-key-exchange-main-mode-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-local-policy-overrides-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-network-connections-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-notifications-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-process-opened-file-exclusions-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-protection-features-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-proxy-internet-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-real-time-protection-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-remediation-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-s-mime.md",
+ "redirect_url": "/windows/access-protection/configure-s-mime",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-server-exclusions-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-siem-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-siem-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/configure-splunk-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-the-application-identity-service.md",
+ "redirect_url": "/windows/device-security/applocker/configure-the-application-identity-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-the-appLocker-reference-device.md",
+ "redirect_url": "/windows/device-security/applocker/configure-the-appLocker-reference-device",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-the-rules-to-require-encryption.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/configure-the-rules-to-require-encryption",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-the-windows-firewall-log.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/configure-the-windows-firewall-log",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-the-workstation-authentication-certificate-template.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/configure-the-workstation-authentication-certificate-template",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-windows-defender-antivirus-features.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/confirm-that-certificates-are-deployed-correctly.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/copy-a-gpo-to-create-a-new-gpo.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-a-basic-audit-policy-settings-for-an-event-category.md",
+ "redirect_url": "/windows/device-security/auditing/create-a-basic-audit-policy-settings-for-an-event-category",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-a-group-account-in-active-directory.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/create-a-group-account-in-active-directory",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-a-group-policy-object.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/create-a-group-policy-object",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-a-pagefile.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/create-a-pagefile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-a-rule-for-packaged-apps.md",
+ "redirect_url": "/windows/device-security/applocker/create-a-rule-for-packaged-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-a-rule-that-uses-a-file-hash-condition.md",
+ "redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-file-hash-condition",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-a-rule-that-uses-a-path-condition.md",
+ "redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-path-condition",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-a-rule-that-uses-a-publisher-condition.md",
+ "redirect_url": "/windows/device-security/applocker/create-a-rule-that-uses-a-publisher-condition",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-a-token-object.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/create-a-token-object",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-an-authentication-exemption-list-rule.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-exemption-list-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-an-authentication-request-rule.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/create-an-authentication-request-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-an-inbound-icmp-rule.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-icmp-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-an-inbound-port-rule.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-port-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-an-inbound-program-or-service-rule.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/create-an-inbound-program-or-service-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-an-outbound-port-rule.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-port-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-an-outbound-program-or-service-rule.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/create-an-outbound-program-or-service-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-and-verify-an-efs-dra-certificate.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-applocker-default-rules.md",
+ "redirect_url": "/windows/device-security/applocker/create-applocker-default-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-global-objects.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/create-global-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-inbound-rules-to-support-rpc.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/create-inbound-rules-to-support-rpc",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-list-of-applications-deployed-to-each-business-group.md",
+ "redirect_url": "/windows/device-security/applocker/create-list-of-applications-deployed-to-each-business-group",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-permanent-shared-objects.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/create-permanent-shared-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-symbolic-links.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/create-symbolic-links",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-vpn-and-wip-policy-using-intune.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-wip-policy-using-intune.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-intune",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-wip-policy-using-sccm.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/create-wip-policy-using-sccm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-wmi-filters-for-the-gpo.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/create-wmi-filters-for-the-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-your-applocker-planning-document.md",
+ "redirect_url": "/windows/device-security/applocker/create-your-applocker-planning-document",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-your-applocker-policies.md",
+ "redirect_url": "/windows/device-security/applocker/create-your-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/create-your-applocker-rules.md",
+ "redirect_url": "/windows/device-security/applocker/create-your-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/credential-guard-considerations.md",
+ "redirect_url": "/windows/access-protection/credential-guard/credential-guard-considerations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/credential-guard-how-it-works.md",
+ "redirect_url": "/windows/access-protection/credential-guard/credential-guard-how-it-works",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/credential-guard-manage.md",
+ "redirect_url": "/windows/access-protection/credential-guard/credential-guard-manage",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/credential-guard-not-protected-scenarios.md",
+ "redirect_url": "/windows/access-protection/credential-guard/credential-guard-not-protected-scenarios",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/credential-guard-protection-limits.md",
+ "redirect_url": "/windows/access-protection/credential-guard/credential-guard-protection-limits",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/credential-guard-requirements.md",
+ "redirect_url": "/windows/access-protection/credential-guard/credential-guard-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/credential-guard-scripts.md",
+ "redirect_url": "/windows/access-protection/credential-guard/credential-guard-scripts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/credential-guard.md",
+ "redirect_url": "/windows/access-protection/credential-guard/credential-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/custom-ti-api-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/custom-ti-api-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/customize-run-review-remediate-scans-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/dashboard-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/dashboard-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/data-storage-privacy-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/debug-programs.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/debug-programs",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/defender-compatibility-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/delete-an-applocker-rule.md",
+ "redirect_url": "/windows/device-security/applocker/delete-an-applocker-rule",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deny-access-to-this-computer-from-the-network.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deny-log-on-as-a-batch-job.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-batch-job",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deny-log-on-as-a-service.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-as-a-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deny-log-on-locally.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-locally",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deny-log-on-through-remote-desktop-services.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-applocker-policies-by-using-the-enforce-rules-setting.md",
+ "redirect_url": "/windows/device-security/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-catalog-files-to-support-code-integrity-policies.md",
+ "redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-code-integrity-policies-policy-rules-and-file-rules.md",
+ "redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-code-integrity-policies-steps.md",
+ "redirect_url": "/windows/device-security/device-guard/deploy-code-integrity-policies-steps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-device-guard-deploy-code-integrity-policies.md",
+ "redirect_url": "/windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-device-guard-enable-virtualization-based-security.md",
+ "redirect_url": "/windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md",
+ "redirect_url": "/windows/security/threat-protection/device-guard/deploy-device-guard-enable-virtualization-based-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-the-applocker-policy-into-production.md",
+ "redirect_url": "/windows/device-security/applocker/deploy-the-applocker-policy-into-production",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-wip-policy-using-intune.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/deploy-wip-policy-using-intune",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deployment-vdi-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/designing-a-windows-firewall-with-advanced-security-strategy.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/determine-group-policy-structure-and-rule-enforcement.md",
+ "redirect_url": "/windows/device-security/applocker/determine-group-policy-structure-and-rule-enforcement",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/determine-which-applications-are-digitally-signed-on-a-reference-computer.md",
+ "redirect_url": "/windows/device-security/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/determine-your-application-control-objectives.md",
+ "redirect_url": "/windows/device-security/applocker/determine-your-application-control-objectives",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/determining-the-trusted-state-of-your-devices.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/determining-the-trusted-state-of-your-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/device-guard-deployment-guide.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/devices-allow-undock-without-having-to-log-on.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/devices-allow-undock-without-having-to-log-on",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/devices-allowed-to-format-and-eject-removable-media.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/devices-allowed-to-format-and-eject-removable-media",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/devices-prevent-users-from-installing-printer-drivers.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/devices-prevent-users-from-installing-printer-drivers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/devices-restrict-floppy-access-to-locally-logged-on-user-only.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md",
+ "redirect_url": "/windows/device-security/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/dll-rules-in-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/dll-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/document-group-policy-structure-and-applocker-rule-enforcement.md",
+ "redirect_url": "/windows/device-security/applocker/document-group-policy-structure-and-applocker-rule-enforcement",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/document-your-application-control-management-processes.md",
+ "redirect_url": "/windows/device-security/applocker/document-your-application-control-management-processes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/document-your-application-list.md",
+ "redirect_url": "/windows/device-security/applocker/document-your-application-list",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/document-your-applocker-rules.md",
+ "redirect_url": "/windows/device-security/applocker/document-your-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/documenting-the-zones.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/documenting-the-zones",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/domain-controller-allow-server-operators-to-schedule-tasks.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/domain-controller-ldap-server-signing-requirements.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/domain-controller-ldap-server-signing-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/domain-controller-refuse-machine-account-password-changes.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/domain-controller-refuse-machine-account-password-changes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/domain-isolation-policy-design-example.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design-example",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/domain-isolation-policy-design.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/domain-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/domain-member-digitally-encrypt-secure-channel-data-when-possible.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/domain-member-digitally-sign-secure-channel-data-when-possible.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/domain-member-disable-machine-account-password-changes.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/domain-member-disable-machine-account-password-changes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/domain-member-maximum-machine-account-password-age.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/domain-member-maximum-machine-account-password-age",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/domain-member-require-strong-windows-2000-or-later-session-key.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/dynamic-access-control.md",
+ "redirect_url": "/windows/access-protection/access-control/dynamic-access-control",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/edit-an-applocker-policy.md",
+ "redirect_url": "/windows/device-security/applocker/edit-an-applocker-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/edit-applocker-rules.md",
+ "redirect_url": "/windows/device-security/applocker/edit-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enable-cloud-protection-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enable-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/enable-custom-ti-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enable-predefined-inbound-rules.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-inbound-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enable-predefined-outbound-rules.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/enable-predefined-outbound-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enable-the-dll-rule-collection.md",
+ "redirect_url": "/windows/device-security/applocker/enable-the-dll-rule-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/encrypted-hard-drive.md",
+ "redirect_url": "/windows/device-security/encrypted-hard-drive",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/encryption-zone-gpos.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/encryption-zone-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/encryption-zone.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/encryption-zone",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enforce-applocker-rules.md",
+ "redirect_url": "/windows/device-security/applocker/enforce-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enforce-password-history.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/enforce-password-history",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enforce-user-logon-restrictions.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/enforce-user-logon-restrictions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enlightened-microsoft-apps-and-wip.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/enlightened-microsoft-apps-and-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/enterprise-certificate-pinning.md",
+ "redirect_url": "/windows/access-protection/enterprise-certificate-pinning",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/evaluate-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/evaluating-windows-firewall-with-advanced-security-design-examples.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-1100.md",
+ "redirect_url": "/windows/device-security/auditing/event-1100",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-1102.md",
+ "redirect_url": "/windows/device-security/auditing/event-1102",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-1104.md",
+ "redirect_url": "/windows/device-security/auditing/event-1104",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-1105.md",
+ "redirect_url": "/windows/device-security/auditing/event-1105",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-1108.md",
+ "redirect_url": "/windows/device-security/auditing/event-1108",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4608.md",
+ "redirect_url": "/windows/device-security/auditing/event-4608",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4610.md",
+ "redirect_url": "/windows/device-security/auditing/event-4610",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4611.md",
+ "redirect_url": "/windows/device-security/auditing/event-4611",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4612.md",
+ "redirect_url": "/windows/device-security/auditing/event-4612",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4614.md",
+ "redirect_url": "/windows/device-security/auditing/event-4614",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4615.md",
+ "redirect_url": "/windows/device-security/auditing/event-4615",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4616.md",
+ "redirect_url": "/windows/device-security/auditing/event-4616",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4618.md",
+ "redirect_url": "/windows/device-security/auditing/event-4618",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4621.md",
+ "redirect_url": "/windows/device-security/auditing/event-4621",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4622.md",
+ "redirect_url": "/windows/device-security/auditing/event-4622",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4624.md",
+ "redirect_url": "/windows/device-security/auditing/event-4624",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4625.md",
+ "redirect_url": "/windows/device-security/auditing/event-4625",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4626.md",
+ "redirect_url": "/windows/device-security/auditing/event-4626",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4627.md",
+ "redirect_url": "/windows/device-security/auditing/event-4627",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4634.md",
+ "redirect_url": "/windows/device-security/auditing/event-4634",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4647.md",
+ "redirect_url": "/windows/device-security/auditing/event-4647",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4648.md",
+ "redirect_url": "/windows/device-security/auditing/event-4648",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4649.md",
+ "redirect_url": "/windows/device-security/auditing/event-4649",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4656.md",
+ "redirect_url": "/windows/device-security/auditing/event-4656",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4657.md",
+ "redirect_url": "/windows/device-security/auditing/event-4657",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4658.md",
+ "redirect_url": "/windows/device-security/auditing/event-4658",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4660.md",
+ "redirect_url": "/windows/device-security/auditing/event-4660",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4661.md",
+ "redirect_url": "/windows/device-security/auditing/event-4661",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4662.md",
+ "redirect_url": "/windows/device-security/auditing/event-4662",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4663.md",
+ "redirect_url": "/windows/device-security/auditing/event-4663",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4664.md",
+ "redirect_url": "/windows/device-security/auditing/event-4664",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4670.md",
+ "redirect_url": "/windows/device-security/auditing/event-4670",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4671.md",
+ "redirect_url": "/windows/device-security/auditing/event-4671",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4672.md",
+ "redirect_url": "/windows/device-security/auditing/event-4672",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4673.md",
+ "redirect_url": "/windows/device-security/auditing/event-4673",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4674.md",
+ "redirect_url": "/windows/device-security/auditing/event-4674",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4675.md",
+ "redirect_url": "/windows/device-security/auditing/event-4675",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4688.md",
+ "redirect_url": "/windows/device-security/auditing/event-4688",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4689.md",
+ "redirect_url": "/windows/device-security/auditing/event-4689",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4690.md",
+ "redirect_url": "/windows/device-security/auditing/event-4690",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4691.md",
+ "redirect_url": "/windows/device-security/auditing/event-4691",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4692.md",
+ "redirect_url": "/windows/device-security/auditing/event-4692",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4693.md",
+ "redirect_url": "/windows/device-security/auditing/event-4693",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4694.md",
+ "redirect_url": "/windows/device-security/auditing/event-4694",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4695.md",
+ "redirect_url": "/windows/device-security/auditing/event-4695",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4696.md",
+ "redirect_url": "/windows/device-security/auditing/event-4696",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4697.md",
+ "redirect_url": "/windows/device-security/auditing/event-4697",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4698.md",
+ "redirect_url": "/windows/device-security/auditing/event-4698",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4699.md",
+ "redirect_url": "/windows/device-security/auditing/event-4699",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4700.md",
+ "redirect_url": "/windows/device-security/auditing/event-4700",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4701.md",
+ "redirect_url": "/windows/device-security/auditing/event-4701",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4702.md",
+ "redirect_url": "/windows/device-security/auditing/event-4702",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4703.md",
+ "redirect_url": "/windows/device-security/auditing/event-4703",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4704.md",
+ "redirect_url": "/windows/device-security/auditing/event-4704",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4705.md",
+ "redirect_url": "/windows/device-security/auditing/event-4705",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4706.md",
+ "redirect_url": "/windows/device-security/auditing/event-4706",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4707.md",
+ "redirect_url": "/windows/device-security/auditing/event-4707",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4713.md",
+ "redirect_url": "/windows/device-security/auditing/event-4713",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4714.md",
+ "redirect_url": "/windows/device-security/auditing/event-4714",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4715.md",
+ "redirect_url": "/windows/device-security/auditing/event-4715",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4716.md",
+ "redirect_url": "/windows/device-security/auditing/event-4716",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4717.md",
+ "redirect_url": "/windows/device-security/auditing/event-4717",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4718.md",
+ "redirect_url": "/windows/device-security/auditing/event-4718",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4719.md",
+ "redirect_url": "/windows/device-security/auditing/event-4719",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4720.md",
+ "redirect_url": "/windows/device-security/auditing/event-4720",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4722.md",
+ "redirect_url": "/windows/device-security/auditing/event-4722",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4723.md",
+ "redirect_url": "/windows/device-security/auditing/event-4723",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4724.md",
+ "redirect_url": "/windows/device-security/auditing/event-4724",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4725.md",
+ "redirect_url": "/windows/device-security/auditing/event-4725",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4726.md",
+ "redirect_url": "/windows/device-security/auditing/event-4726",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4731.md",
+ "redirect_url": "/windows/device-security/auditing/event-4731",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4732.md",
+ "redirect_url": "/windows/device-security/auditing/event-4732",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4733.md",
+ "redirect_url": "/windows/device-security/auditing/event-4733",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4734.md",
+ "redirect_url": "/windows/device-security/auditing/event-4734",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4735.md",
+ "redirect_url": "/windows/device-security/auditing/event-4735",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4738.md",
+ "redirect_url": "/windows/device-security/auditing/event-4738",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4739.md",
+ "redirect_url": "/windows/device-security/auditing/event-4739",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4740.md",
+ "redirect_url": "/windows/device-security/auditing/event-4740",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4741.md",
+ "redirect_url": "/windows/device-security/auditing/event-4741",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4742.md",
+ "redirect_url": "/windows/device-security/auditing/event-4742",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4743.md",
+ "redirect_url": "/windows/device-security/auditing/event-4743",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4749.md",
+ "redirect_url": "/windows/device-security/auditing/event-4749",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4750.md",
+ "redirect_url": "/windows/device-security/auditing/event-4750",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4751.md",
+ "redirect_url": "/windows/device-security/auditing/event-4751",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4752.md",
+ "redirect_url": "/windows/device-security/auditing/event-4752",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4753.md",
+ "redirect_url": "/windows/device-security/auditing/event-4753",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4764.md",
+ "redirect_url": "/windows/device-security/auditing/event-4764",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4765.md",
+ "redirect_url": "/windows/device-security/auditing/event-4765",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4766.md",
+ "redirect_url": "/windows/device-security/auditing/event-4766",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4767.md",
+ "redirect_url": "/windows/device-security/auditing/event-4767",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4768.md",
+ "redirect_url": "/windows/device-security/auditing/event-4768",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4769.md",
+ "redirect_url": "/windows/device-security/auditing/event-4769",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4770.md",
+ "redirect_url": "/windows/device-security/auditing/event-4770",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4771.md",
+ "redirect_url": "/windows/device-security/auditing/event-4771",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4772.md",
+ "redirect_url": "/windows/device-security/auditing/event-4772",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4773.md",
+ "redirect_url": "/windows/device-security/auditing/event-4773",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4774.md",
+ "redirect_url": "/windows/device-security/auditing/event-4774",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4775.md",
+ "redirect_url": "/windows/device-security/auditing/event-4775",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4776.md",
+ "redirect_url": "/windows/device-security/auditing/event-4776",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4777.md",
+ "redirect_url": "/windows/device-security/auditing/event-4777",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4778.md",
+ "redirect_url": "/windows/device-security/auditing/event-4778",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4779.md",
+ "redirect_url": "/windows/device-security/auditing/event-4779",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4780.md",
+ "redirect_url": "/windows/device-security/auditing/event-4780",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4781.md",
+ "redirect_url": "/windows/device-security/auditing/event-4781",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4782.md",
+ "redirect_url": "/windows/device-security/auditing/event-4782",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4793.md",
+ "redirect_url": "/windows/device-security/auditing/event-4793",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4794.md",
+ "redirect_url": "/windows/device-security/auditing/event-4794",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4798.md",
+ "redirect_url": "/windows/device-security/auditing/event-4798",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4799.md",
+ "redirect_url": "/windows/device-security/auditing/event-4799",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4800.md",
+ "redirect_url": "/windows/device-security/auditing/event-4800",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4801.md",
+ "redirect_url": "/windows/device-security/auditing/event-4801",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4802.md",
+ "redirect_url": "/windows/device-security/auditing/event-4802",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4803.md",
+ "redirect_url": "/windows/device-security/auditing/event-4803",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4816.md",
+ "redirect_url": "/windows/device-security/auditing/event-4816",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4817.md",
+ "redirect_url": "/windows/device-security/auditing/event-4817",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4818.md",
+ "redirect_url": "/windows/device-security/auditing/event-4818",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4819.md",
+ "redirect_url": "/windows/device-security/auditing/event-4819",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4826.md",
+ "redirect_url": "/windows/device-security/auditing/event-4826",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4864.md",
+ "redirect_url": "/windows/device-security/auditing/event-4864",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4865.md",
+ "redirect_url": "/windows/device-security/auditing/event-4865",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4866.md",
+ "redirect_url": "/windows/device-security/auditing/event-4866",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4867.md",
+ "redirect_url": "/windows/device-security/auditing/event-4867",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4902.md",
+ "redirect_url": "/windows/device-security/auditing/event-4902",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4904.md",
+ "redirect_url": "/windows/device-security/auditing/event-4904",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4905.md",
+ "redirect_url": "/windows/device-security/auditing/event-4905",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4906.md",
+ "redirect_url": "/windows/device-security/auditing/event-4906",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4907.md",
+ "redirect_url": "/windows/device-security/auditing/event-4907",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4908.md",
+ "redirect_url": "/windows/device-security/auditing/event-4908",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4909.md",
+ "redirect_url": "/windows/device-security/auditing/event-4909",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4910.md",
+ "redirect_url": "/windows/device-security/auditing/event-4910",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4911.md",
+ "redirect_url": "/windows/device-security/auditing/event-4911",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4912.md",
+ "redirect_url": "/windows/device-security/auditing/event-4912",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4913.md",
+ "redirect_url": "/windows/device-security/auditing/event-4913",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4928.md",
+ "redirect_url": "/windows/device-security/auditing/event-4928",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4929.md",
+ "redirect_url": "/windows/device-security/auditing/event-4929",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4930.md",
+ "redirect_url": "/windows/device-security/auditing/event-4930",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4931.md",
+ "redirect_url": "/windows/device-security/auditing/event-4931",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4932.md",
+ "redirect_url": "/windows/device-security/auditing/event-4932",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4933.md",
+ "redirect_url": "/windows/device-security/auditing/event-4933",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4934.md",
+ "redirect_url": "/windows/device-security/auditing/event-4934",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4935.md",
+ "redirect_url": "/windows/device-security/auditing/event-4935",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4936.md",
+ "redirect_url": "/windows/device-security/auditing/event-4936",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4937.md",
+ "redirect_url": "/windows/device-security/auditing/event-4937",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4944.md",
+ "redirect_url": "/windows/device-security/auditing/event-4944",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4945.md",
+ "redirect_url": "/windows/device-security/auditing/event-4945",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4946.md",
+ "redirect_url": "/windows/device-security/auditing/event-4946",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4947.md",
+ "redirect_url": "/windows/device-security/auditing/event-4947",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4948.md",
+ "redirect_url": "/windows/device-security/auditing/event-4948",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4949.md",
+ "redirect_url": "/windows/device-security/auditing/event-4949",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4950.md",
+ "redirect_url": "/windows/device-security/auditing/event-4950",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4951.md",
+ "redirect_url": "/windows/device-security/auditing/event-4951",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4952.md",
+ "redirect_url": "/windows/device-security/auditing/event-4952",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4953.md",
+ "redirect_url": "/windows/device-security/auditing/event-4953",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4954.md",
+ "redirect_url": "/windows/device-security/auditing/event-4954",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4956.md",
+ "redirect_url": "/windows/device-security/auditing/event-4956",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4957.md",
+ "redirect_url": "/windows/device-security/auditing/event-4957",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4958.md",
+ "redirect_url": "/windows/device-security/auditing/event-4958",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4964.md",
+ "redirect_url": "/windows/device-security/auditing/event-4964",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-4985.md",
+ "redirect_url": "/windows/device-security/auditing/event-4985",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5024.md",
+ "redirect_url": "/windows/device-security/auditing/event-5024",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5025.md",
+ "redirect_url": "/windows/device-security/auditing/event-5025",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5027.md",
+ "redirect_url": "/windows/device-security/auditing/event-5027",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5028.md",
+ "redirect_url": "/windows/device-security/auditing/event-5028",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5029.md",
+ "redirect_url": "/windows/device-security/auditing/event-5029",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5030.md",
+ "redirect_url": "/windows/device-security/auditing/event-5030",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5031.md",
+ "redirect_url": "/windows/device-security/auditing/event-5031",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5032.md",
+ "redirect_url": "/windows/device-security/auditing/event-5032",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5033.md",
+ "redirect_url": "/windows/device-security/auditing/event-5033",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5034.md",
+ "redirect_url": "/windows/device-security/auditing/event-5034",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5035.md",
+ "redirect_url": "/windows/device-security/auditing/event-5035",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5037.md",
+ "redirect_url": "/windows/device-security/auditing/event-5037",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5038.md",
+ "redirect_url": "/windows/device-security/auditing/event-5038",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5039.md",
+ "redirect_url": "/windows/device-security/auditing/event-5039",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5051.md",
+ "redirect_url": "/windows/device-security/auditing/event-5051",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5056.md",
+ "redirect_url": "/windows/device-security/auditing/event-5056",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5057.md",
+ "redirect_url": "/windows/device-security/auditing/event-5057",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5058.md",
+ "redirect_url": "/windows/device-security/auditing/event-5058",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5059.md",
+ "redirect_url": "/windows/device-security/auditing/event-5059",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5060.md",
+ "redirect_url": "/windows/device-security/auditing/event-5060",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5061.md",
+ "redirect_url": "/windows/device-security/auditing/event-5061",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5062.md",
+ "redirect_url": "/windows/device-security/auditing/event-5062",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5063.md",
+ "redirect_url": "/windows/device-security/auditing/event-5063",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5064.md",
+ "redirect_url": "/windows/device-security/auditing/event-5064",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5065.md",
+ "redirect_url": "/windows/device-security/auditing/event-5065",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5066.md",
+ "redirect_url": "/windows/device-security/auditing/event-5066",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5067.md",
+ "redirect_url": "/windows/device-security/auditing/event-5067",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5068.md",
+ "redirect_url": "/windows/device-security/auditing/event-5068",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5069.md",
+ "redirect_url": "/windows/device-security/auditing/event-5069",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5070.md",
+ "redirect_url": "/windows/device-security/auditing/event-5070",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5136.md",
+ "redirect_url": "/windows/device-security/auditing/event-5136",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5137.md",
+ "redirect_url": "/windows/device-security/auditing/event-5137",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5138.md",
+ "redirect_url": "/windows/device-security/auditing/event-5138",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5139.md",
+ "redirect_url": "/windows/device-security/auditing/event-5139",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5140.md",
+ "redirect_url": "/windows/device-security/auditing/event-5140",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5141.md",
+ "redirect_url": "/windows/device-security/auditing/event-5141",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5142.md",
+ "redirect_url": "/windows/device-security/auditing/event-5142",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5143.md",
+ "redirect_url": "/windows/device-security/auditing/event-5143",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5144.md",
+ "redirect_url": "/windows/device-security/auditing/event-5144",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5145.md",
+ "redirect_url": "/windows/device-security/auditing/event-5145",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5148.md",
+ "redirect_url": "/windows/device-security/auditing/event-5148",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5149.md",
+ "redirect_url": "/windows/device-security/auditing/event-5149",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5150.md",
+ "redirect_url": "/windows/device-security/auditing/event-5150",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5151.md",
+ "redirect_url": "/windows/device-security/auditing/event-5151",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5152.md",
+ "redirect_url": "/windows/device-security/auditing/event-5152",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5153.md",
+ "redirect_url": "/windows/device-security/auditing/event-5153",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5154.md",
+ "redirect_url": "/windows/device-security/auditing/event-5154",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5155.md",
+ "redirect_url": "/windows/device-security/auditing/event-5155",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5156.md",
+ "redirect_url": "/windows/device-security/auditing/event-5156",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5157.md",
+ "redirect_url": "/windows/device-security/auditing/event-5157",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5158.md",
+ "redirect_url": "/windows/device-security/auditing/event-5158",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5159.md",
+ "redirect_url": "/windows/device-security/auditing/event-5159",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5168.md",
+ "redirect_url": "/windows/device-security/auditing/event-5168",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5376.md",
+ "redirect_url": "/windows/device-security/auditing/event-5376",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5377.md",
+ "redirect_url": "/windows/device-security/auditing/event-5377",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5378.md",
+ "redirect_url": "/windows/device-security/auditing/event-5378",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5447.md",
+ "redirect_url": "/windows/device-security/auditing/event-5447",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5632.md",
+ "redirect_url": "/windows/device-security/auditing/event-5632",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5633.md",
+ "redirect_url": "/windows/device-security/auditing/event-5633",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5712.md",
+ "redirect_url": "/windows/device-security/auditing/event-5712",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5888.md",
+ "redirect_url": "/windows/device-security/auditing/event-5888",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5889.md",
+ "redirect_url": "/windows/device-security/auditing/event-5889",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-5890.md",
+ "redirect_url": "/windows/device-security/auditing/event-5890",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6144.md",
+ "redirect_url": "/windows/device-security/auditing/event-6144",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6145.md",
+ "redirect_url": "/windows/device-security/auditing/event-6145",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6281.md",
+ "redirect_url": "/windows/device-security/auditing/event-6281",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6400.md",
+ "redirect_url": "/windows/device-security/auditing/event-6400",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6401.md",
+ "redirect_url": "/windows/device-security/auditing/event-6401",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6402.md",
+ "redirect_url": "/windows/device-security/auditing/event-6402",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6403.md",
+ "redirect_url": "/windows/device-security/auditing/event-6403",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6404.md",
+ "redirect_url": "/windows/device-security/auditing/event-6404",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6405.md",
+ "redirect_url": "/windows/device-security/auditing/event-6405",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6406.md",
+ "redirect_url": "/windows/device-security/auditing/event-6406",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6407.md",
+ "redirect_url": "/windows/device-security/auditing/event-6407",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6408.md",
+ "redirect_url": "/windows/device-security/auditing/event-6408",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6409.md",
+ "redirect_url": "/windows/device-security/auditing/event-6409",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6410.md",
+ "redirect_url": "/windows/device-security/auditing/event-6410",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6416.md",
+ "redirect_url": "/windows/device-security/auditing/event-6416",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6419.md",
+ "redirect_url": "/windows/device-security/auditing/event-6419",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6420.md",
+ "redirect_url": "/windows/device-security/auditing/event-6420",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6421.md",
+ "redirect_url": "/windows/device-security/auditing/event-6421",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6422.md",
+ "redirect_url": "/windows/device-security/auditing/event-6422",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6423.md",
+ "redirect_url": "/windows/device-security/auditing/event-6423",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-6424.md",
+ "redirect_url": "/windows/device-security/auditing/event-6424",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/event-error-codes-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/executable-rules-in-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/executable-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/exempt-icmp-from-authentication.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/exempt-icmp-from-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/exemption-list.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/exemption-list",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/experiment-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/experiment-custom-ti-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/export-an-applocker-policy-from-a-gpo.md",
+ "redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-from-a-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/export-an-applocker-policy-to-an-xml-file.md",
+ "redirect_url": "/windows/device-security/applocker/export-an-applocker-policy-to-an-xml-file",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/file-system-global-object-access-auditing.md",
+ "redirect_url": "/windows/device-security/auditing/file-system-global-object-access-auditing",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/firewall-gpos.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/firewall-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/firewall-policy-design-example.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/firewall-policy-design-example",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/force-shutdown-from-a-remote-system.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/gathering-information-about-your-active-directory-deployment.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-active-directory-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/gathering-information-about-your-current-network-infrastructure.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/gathering-information-about-your-devices.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/gathering-information-about-your-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/gathering-other-relevant-information.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/gathering-other-relevant-information",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/gathering-the-information-you-need.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/gathering-the-information-you-need",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/general-settings-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/general-settings-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/generate-security-audits.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/generate-security-audits",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/gpo-domiso-boundary.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-boundary",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/gpo-domiso-encryption.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-encryption",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/gpo-domiso-firewall.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-firewall",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/gpo-domiso-isolateddomain-clients.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-clients",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/gpo-domiso-isolateddomain-servers.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/gpo-domiso-isolateddomain-servers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/guidance-and-best-practices-wip.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/guidance-and-best-practices-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/hello-and-password-changes.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-and-password-changes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/hello-biometrics-in-enterprise.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-biometrics-in-enterprise",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/hello-errors-during-pin-creation.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-errors-during-pin-creation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/hello-event-300.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-event-300",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/hello-how-it-works.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-how-it-works",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/hello-identity-verification.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-identity-verification",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/hello-manage-in-organization.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-manage-in-organization",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/hello-prepare-people-to-use.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-prepare-people-to-use",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/hello-why-pin-is-better-than-password.md",
+ "redirect_url": "/windows/access-protection/hello-for-business/hello-why-pin-is-better-than-password",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/how-applocker-works-techref.md",
+ "redirect_url": "/windows/device-security/applocker/how-applocker-works-techref",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/how-to-configure-security-policy-settings.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/how-to-configure-security-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md",
+ "redirect_url": "/windows/access-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/how-user-account-control-works.md",
+ "redirect_url": "/windows/access-protection/user-account-control/how-user-account-control-works",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/impersonate-a-client-after-authentication.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/impersonate-a-client-after-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/implementing-your-windows-firewall-with-advanced-security-design-plan.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/import-an-applocker-policy-from-another-computer.md",
+ "redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-from-another-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/import-an-applocker-policy-into-a-gpo.md",
+ "redirect_url": "/windows/device-security/applocker/import-an-applocker-policy-into-a-gpo",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/increase-a-process-working-set.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/increase-a-process-working-set",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/increase-scheduling-priority.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/increase-scheduling-priority",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/initialize-and-configure-ownership-of-the-tpm.md",
+ "redirect_url": "/windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/installing-digital-certificates-on-windows-10-mobile.md",
+ "redirect_url": "/windows/access-protection/installing-digital-certificates-on-windows-10-mobile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-display-user-information-when-the-session-is-locked.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-do-not-display-last-user-name.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-display-last-user-name",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-do-not-require-ctrl-alt-del.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-dont-display-username-at-sign-in.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-dont-display-username-at-sign-in",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-machine-account-lockout-threshold.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-account-lockout-threshold",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-machine-inactivity-limit.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-machine-inactivity-limit",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-message-text-for-users-attempting-to-log-on.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-message-title-for-users-attempting-to-log-on.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-prompt-user-to-change-password-before-expiration.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-require-smart-card.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-require-smart-card",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/interactive-logon-smart-card-removal-behavior.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/interactive-logon-smart-card-removal-behavior",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md",
+ "redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/investigate-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/investigate-domain-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-domain-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/investigate-files-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-files-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/investigate-ip-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-ip-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/investigate-machines-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/investigate-user-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/isolated-domain-gpos.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/isolated-domain-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/isolated-domain.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/isolated-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/isolating-apps-on-your-network.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/isolating-apps-on-your-network",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/kerberos-policy.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/kerberos-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/limitations-with-wip.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/limitations-with-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/link-the-gpo-to-the-domain.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/link-the-gpo-to-the-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/load-and-unload-device-drivers.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/load-and-unload-device-drivers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/local-accounts.md",
+ "redirect_url": "/windows/access-protection/access-control/local-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/lock-pages-in-memory.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/lock-pages-in-memory",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/log-on-as-a-batch-job.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-batch-job",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/log-on-as-a-service.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/log-on-as-a-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/machines-view-overview-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/machines-view-overview-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/maintain-applocker-policies.md",
+ "redirect_url": "/windows/device-security/applocker/maintain-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/manage-alerts-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-auditing-and-security-log.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/manage-auditing-and-security-log",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-event-based-updates-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-outdated-endpoints-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-packaged-apps-with-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/manage-packaged-apps-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-protection-update-schedule-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-protection-updates-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-tpm-commands.md",
+ "redirect_url": "/windows/device-security/tpm/manage-tpm-commands",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-tpm-lockout.md",
+ "redirect_url": "/windows/device-security/tpm/manage-tpm-lockout",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-updates-baselines-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/manage-updates-mobile-devices-vms-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/mandatory-settings-for-wip.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/mandatory-settings-for-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/maximum-lifetime-for-service-ticket.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-service-ticket",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket-renewal.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket-renewal",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/maximum-lifetime-for-user-ticket.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/maximum-lifetime-for-user-ticket",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/maximum-password-age.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/maximum-password-age",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/maximum-tolerance-for-computer-clock-synchronization.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/merge-applocker-policies-by-using-set-applockerpolicy.md",
+ "redirect_url": "/windows/device-security/applocker/merge-applocker-policies-by-using-set-applockerpolicy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/merge-applocker-policies-manually.md",
+ "redirect_url": "/windows/device-security/applocker/merge-applocker-policies-manually",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-accounts.md",
+ "redirect_url": "/windows/access-protection/access-control/microsoft-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-always.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-always",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-network-client-digitally-sign-communications-if-server-agrees.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-digitally-sign-communications-if-server-agrees",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-always.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-always",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-network-server-digitally-sign-communications-if-client-agrees.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-digitally-sign-communications-if-client-agrees",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/microsoft-network-server-server-spn-target-name-validation-level.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/minimum-password-age.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/minimum-password-age",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/minimum-password-length.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/minimum-password-length",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/modify-an-object-label.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/modify-an-object-label",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/modify-firmware-environment-values.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/modify-firmware-environment-values",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/monitor-application-usage-with-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/monitor-application-usage-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/monitor-central-access-policy-and-rule-definitions.md",
+ "redirect_url": "/windows/device-security/auditing/monitor-central-access-policy-and-rule-definitions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/monitor-claim-types.md",
+ "redirect_url": "/windows/device-security/auditing/monitor-claim-types",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/monitor-resource-attribute-definitions.md",
+ "redirect_url": "/windows/device-security/auditing/monitor-resource-attribute-definitions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/monitor-the-central-access-policies-associated-with-files-and-folders.md",
+ "redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-associated-with-files-and-folders",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/monitor-the-central-access-policies-that-apply-on-a-file-server.md",
+ "redirect_url": "/windows/device-security/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/monitor-the-resource-attributes-on-files-and-folders.md",
+ "redirect_url": "/windows/device-security/auditing/monitor-the-resource-attributes-on-files-and-folders",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/monitor-the-use-of-removable-storage-devices.md",
+ "redirect_url": "/windows/device-security/auditing/monitor-the-use-of-removable-storage-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/monitor-user-and-device-claims-during-sign-in.md",
+ "redirect_url": "/windows/device-security/auditing/monitor-user-and-device-claims-during-sign-in",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-access-allow-anonymous-sidname-translation.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-access-allow-anonymous-sidname-translation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-access-let-everyone-permissions-apply-to-anonymous-users.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-access-named-pipes-that-can-be-accessed-anonymously.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths-and-subpaths.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-access-remotely-accessible-registry-paths.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-access-remotely-accessible-registry-paths",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-access-shares-that-can-be-accessed-anonymously.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-access-sharing-and-security-model-for-local-accounts.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-list-manager-policies.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-list-manager-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-allow-localsystem-null-session-fallback.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-localsystem-null-session-fallback",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-configure-encryption-types-allowed-for-kerberos.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-force-logoff-when-logon-hours-expire.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-force-logoff-when-logon-hours-expire",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-lan-manager-authentication-level.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-lan-manager-authentication-level",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-ldap-client-signing-requirements.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-ldap-client-signing-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-restrict-ntlm-incoming-ntlm-traffic.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/open-the-group-policy-management-console-to-ip-security-policies.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/open-the-group-policy-management-console-to-windows-firewall.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/open-windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/open-windows-firewall-with-advanced-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/optimize-applocker-performance.md",
+ "redirect_url": "/windows/device-security/applocker/optimize-applocker-performance",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/optional-create-a-code-signing-certificate-for-code-integrity-policies.md",
+ "redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/other-events.md",
+ "redirect_url": "/windows/device-security/auditing/other-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/override-mitigation-options-for-app-related-security-policies.md",
+ "redirect_url": "/windows/threat-protection/override-mitigation-options-for-app-related-security-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/overview-create-wip-policy.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/overview-create-wip-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md",
+ "redirect_url": "/windows/threat-protection/overview-of-threat-mitigations-in-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/packaged-apps-and-packaged-app-installer-rules-in-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/password-must-meet-complexity-requirements.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/password-must-meet-complexity-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/password-policy.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/password-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/perform-volume-maintenance-tasks.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/perform-volume-maintenance-tasks",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/plan-for-applocker-policy-management.md",
+ "redirect_url": "/windows/device-security/applocker/plan-for-applocker-policy-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-and-deploying-advanced-security-audit-policies.md",
+ "redirect_url": "/windows/device-security/auditing/planning-and-deploying-advanced-security-audit-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-and-getting-started-on-the-device-guard-deployment-process.md",
+ "redirect_url": "/windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-certificate-based-authentication.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/planning-certificate-based-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-domain-isolation-zones.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/planning-domain-isolation-zones",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-gpo-deployment.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/planning-gpo-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-group-policy-deployment-for-your-isolation-zones.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-isolation-groups-for-the-zones.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/planning-isolation-groups-for-the-zones",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-network-access-groups.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/planning-network-access-groups",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-server-isolation-zones.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/planning-server-isolation-zones",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-settings-for-a-basic-firewall-policy.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-the-gpos.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/planning-the-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-to-deploy-windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/planning-your-windows-firewall-with-advanced-security-design.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/powershell-example-code-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/prepare-your-organization-for-bitlocker-planning-and-policies.md",
+ "redirect_url": "/windows/device-security/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/prevent-end-user-interaction-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/preview-settings-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/preview-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/procedures-used-in-this-guide.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/procedures-used-in-this-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/profile-single-process.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/profile-single-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/profile-system-performance.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/profile-system-performance",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/protect-bitlocker-from-pre-boot-attacks.md",
+ "redirect_url": "/windows/device-security/bitlocker/protect-bitlocker-from-pre-boot-attacks",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/protect-devices-from-unwanted-network-traffic.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/protect-devices-from-unwanted-network-traffic",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/protect-enterprise-data-using-wip.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md",
+ "redirect_url": "/windows/device-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md",
+ "redirect_url": "/windows/device-security/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/python-example-code-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/python-example-code-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/recommended-network-definitions-for-wip.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/recommended-network-definitions-for-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/recovery-console-allow-automatic-administrative-logon.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-automatic-administrative-logon",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/refresh-an-applocker-policy.md",
+ "redirect_url": "/windows/device-security/applocker/refresh-an-applocker-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/registry-global-object-access-auditing.md",
+ "redirect_url": "/windows/device-security/auditing/registry-global-object-access-auditing",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/remote-credential-guard.md",
+ "redirect_url": "/windows/access-protection/remote-credential-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/remove-computer-from-docking-station.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/remove-computer-from-docking-station",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/replace-a-process-level-token.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/replace-a-process-level-token",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/report-monitor-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/require-encryption-when-accessing-sensitive-network-resources.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/requirements-for-deploying-applocker-policies.md",
+ "redirect_url": "/windows/device-security/applocker/requirements-for-deploying-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/requirements-to-use-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/requirements-to-use-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/reset-account-lockout-counter-after.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/reset-account-lockout-counter-after",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/respond-file-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/respond-machine-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/restore-files-and-directories.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/restore-files-and-directories",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/restrict-access-to-only-specified-users-or-devices.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/restrict-access-to-only-trusted-devices.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/restrict-access-to-only-trusted-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/restrict-server-access-to-members-of-a-group-only.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/review-scan-results-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/run-scan-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/run-the-automatically-generate-rules-wizard.md",
+ "redirect_url": "/windows/device-security/applocker/run-the-automatically-generate-rules-wizard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/scheduled-catch-up-scans-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/script-rules-in-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/script-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/secpol-advanced-security-audit-policy-settings.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/secpol-advanced-security-audit-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/securing-end-to-end-ipsec-connections-by-using-ikev2.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/security-auditing-overview.md",
+ "redirect_url": "/windows/device-security/auditing/security-auditing-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/security-considerations-for-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/security-considerations-for-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/security-identifiers.md",
+ "redirect_url": "/windows/access-protection/access-control/security-identifiers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/security-options.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/security-options",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/security-policy-settings-reference.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/security-policy-settings.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/security-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/security-principals.md",
+ "redirect_url": "/windows/access-protection/access-control/security-principals",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/select-types-of-rules-to-create.md",
+ "redirect_url": "/windows/device-security/applocker/select-types-of-rules-to-create",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/server-isolation-gpos.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/server-isolation-gpos",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/server-isolation-policy-design-example.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design-example",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/server-isolation-policy-design.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/server-isolation-policy-design",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/service-accounts.md",
+ "redirect_url": "/windows/access-protection/access-control/service-accounts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/service-status-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/service-status-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/settings-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/settings-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/shut-down-the-system.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/shut-down-the-system",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/shutdown-clear-virtual-memory-pagefile.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/shutdown-clear-virtual-memory-pagefile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-and-remote-desktop-services.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-and-remote-desktop-services",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-architecture.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-architecture",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-certificate-propagation-service.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-propagation-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-certificate-requirements-and-enumeration.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-certificate-requirements-and-enumeration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-debugging-information.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-debugging-information",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-events.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-group-policy-and-registry-settings.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-group-policy-and-registry-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-how-smart-card-sign-in-works-in-windows.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-removal-policy-service.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-removal-policy-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-smart-cards-for-windows-service.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-smart-cards-for-windows-service",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-tools-and-settings.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-tools-and-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/smart-card-windows-smart-card-technical-reference.md",
+ "redirect_url": "/windows/access-protection/smart-cards/smart-card-windows-smart-card-technical-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/special-identities.md",
+ "redirect_url": "/windows/access-protection/access-control/special-identities",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/specify-cloud-protection-level-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/store-passwords-using-reversible-encryption.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/store-passwords-using-reversible-encryption",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/switch-pcr-banks-on-tpm-2-0-devices.md",
+ "redirect_url": "/windows/device-security/tpm/switch-pcr-banks-on-tpm-2-0-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/synchronize-directory-service-data.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/synchronize-directory-service-data",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/system-objects-require-case-insensitivity-for-non-windows-subsystems.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/system-objects-strengthen-default-permissions-of-internal-system-objects.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/system-settings-optional-subsystems.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/system-settings-optional-subsystems",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/take-ownership-of-files-or-other-objects.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/test-an-applocker-policy-by-using-test-applockerpolicy.md",
+ "redirect_url": "/windows/device-security/applocker/test-an-applocker-policy-by-using-test-applockerpolicy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/test-and-update-an-applocker-policy.md",
+ "redirect_url": "/windows/device-security/applocker/test-and-update-an-applocker-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/testing-scenarios-for-wip.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/testing-scenarios-for-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/threat-indicator-concepts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/tools-to-use-with-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/tools-to-use-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/tpm-fundamentals.md",
+ "redirect_url": "/windows/device-security/tpm/tpm-fundamentals",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/tpm-recommendations.md",
+ "redirect_url": "/windows/device-security/tpm/tpm-recommendations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-custom-ti-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/troubleshoot-siem-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/troubleshoot-siem-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/trusted-platform-module-overview.md",
+ "redirect_url": "/windows/device-security/tpm/trusted-platform-module-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/trusted-platform-module-services-group-policy-settings.md",
+ "redirect_url": "/windows/device-security/tpm/trusted-platform-module-services-group-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/trusted-platform-module-top-node.md",
+ "redirect_url": "/windows/device-security/tpm/trusted-platform-module-top-node",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/turn-on-windows-firewall-and-configure-default-behavior.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/types-of-attacks-for-volume-encryption-keys.md",
+ "redirect_url": "/windows/device-security/bitlocker/types-of-attacks-for-volume-encryption-keys",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understand-applocker-enforcement-settings.md",
+ "redirect_url": "/windows/device-security/applocker/understand-applocker-enforcement-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understand-applocker-policy-design-decisions.md",
+ "redirect_url": "/windows/device-security/applocker/understand-applocker-policy-design-decisions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md",
+ "redirect_url": "/windows/device-security/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understand-the-applocker-policy-deployment-process.md",
+ "redirect_url": "/windows/device-security/applocker/understand-the-applocker-policy-deployment-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understanding-applocker-allow-and-deny-actions-on-rules.md",
+ "redirect_url": "/windows/device-security/applocker/understanding-applocker-allow-and-deny-actions-on-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understanding-applocker-default-rules.md",
+ "redirect_url": "/windows/device-security/applocker/understanding-applocker-default-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understanding-applocker-rule-behavior.md",
+ "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-behavior",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understanding-applocker-rule-collections.md",
+ "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-collections",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understanding-applocker-rule-condition-types.md",
+ "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-condition-types",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understanding-applocker-rule-exceptions.md",
+ "redirect_url": "/windows/device-security/applocker/understanding-applocker-rule-exceptions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understanding-the-file-hash-rule-condition-in-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/understanding-the-file-hash-rule-condition-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understanding-the-path-rule-condition-in-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/understanding-the-path-rule-condition-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understanding-the-publisher-rule-condition-in-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/understanding-the-publisher-rule-condition-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/understanding-the-windows-firewall-with-advanced-security-design-process.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/use-a-reference-computer-to-create-and-maintain-applocker-policies.md",
+ "redirect_url": "/windows/device-security/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/use-applocker-and-software-restriction-policies-in-the-same-domain.md",
+ "redirect_url": "/windows/device-security/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/use-custom-ti-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/use-group-policy-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/use-the-applocker-windows-powershell-cmdlets.md",
+ "redirect_url": "/windows/device-security/applocker/use-the-applocker-windows-powershell-cmdlets",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/use-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/use-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/use-windows-event-forwarding-to-assist-in-instrusion-detection.md",
+ "redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/use-wmi-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-detect-application-installations-and-prompt-for-elevation.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-group-policy-and-registry-key-settings.md",
+ "redirect_url": "/windows/access-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-only-elevate-executables-that-are-signed-and-validated.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-overview.md",
+ "redirect_url": "/windows/access-protection/user-account-control/user-account-control-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-run-all-administrators-in-admin-approval-mode.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-security-policy-settings.md",
+ "redirect_url": "/windows/access-protection/user-account-control/user-account-control-security-policy-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/user-rights-assignment.md",
+ "redirect_url": "/windows/device-security/security-policy-settings/user-rights-assignment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md",
+ "redirect_url": "/windows/device-security/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/using-event-viewer-with-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/using-event-viewer-with-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/using-owa-with-wip.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/using-owa-with-wip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/using-software-restriction-policies-and-applocker-policies.md",
+ "redirect_url": "/windows/device-security/applocker/using-software-restriction-policies-and-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/utilize-microsoft-cloud-protection-windows-defender-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/verify-that-network-traffic-is-authenticated.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/verify-that-network-traffic-is-authenticated",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/view-the-security-event-log.md",
+ "redirect_url": "/windows/device-security/auditing/view-the-security-event-log",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/virtual-smart-card-deploy-virtual-smart-cards.md",
+ "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/virtual-smart-card-evaluate-security.md",
+ "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-evaluate-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/virtual-smart-card-get-started.md",
+ "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-get-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/virtual-smart-card-overview.md",
+ "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/virtual-smart-card-tpmvscmgr.md",
+ "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/virtual-smart-card-understanding-and-evaluating.md",
+ "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/virtual-smart-card-use-virtual-smart-cards.md",
+ "redirect_url": "/windows/access-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/vpn-authentication.md",
+ "redirect_url": "/windows/access-protection/vpn/vpn-authentication",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/vpn-auto-trigger-profile.md",
+ "redirect_url": "/windows/access-protection/vpn/vpn-auto-trigger-profile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/vpn-conditional-access.md",
+ "redirect_url": "/windows/access-protection/vpn/vpn-conditional-access",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/vpn-connection-type.md",
+ "redirect_url": "/windows/access-protection/vpn/vpn-connection-type",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/vpn-guide.md",
+ "redirect_url": "/windows/access-protection/vpn/vpn-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/vpn-name-resolution.md",
+ "redirect_url": "/windows/access-protection/vpn/vpn-name-resolution",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/vpn-profile-options.md",
+ "redirect_url": "/windows/access-protection/vpn/vpn-profile-options",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/vpn-routing.md",
+ "redirect_url": "/windows/access-protection/vpn/vpn-routing",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/vpn-security-features.md",
+ "redirect_url": "/windows/access-protection/vpn/vpn-security-features",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/what-is-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/what-is-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/which-editions-of-windows-support-advanced-audit-policy-configuration.md",
+ "redirect_url": "/windows/device-security/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-10-mobile-security-guide.md",
+ "redirect_url": "/windows/device-security/windows-10-mobile-security-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-credential-theft-mitigation-guide-abstract.md",
+ "redirect_url": "/windows/access-protection/windows-credential-theft-mitigation-guide-abstract",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-antivirus-compatibility.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-antivirus-in-windows-10.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-antivirus-on-windows-server-2016.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-offline.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-offline",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-security-center-antivirus.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-smartscreen-available-settings.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-smartscreen-overview.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-defender-smartscreen-set-individual-device.md",
+ "redirect_url": "/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-firewall-with-advanced-security-administration-with-windows-powershell.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-firewall-with-advanced-security-deployment-guide.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-firewall-with-advanced-security-design-guide.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-firewall-with-advanced-security.md",
+ "redirect_url": "/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-installer-rules-in-applocker.md",
+ "redirect_url": "/windows/device-security/applocker/windows-installer-rules-in-applocker",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-security-baselines.md",
+ "redirect_url": "/windows/device-security/windows-security-baselines",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/wip-app-enterprise-context.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/wip-app-enterprise-context",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/working-with-applocker-policies.md",
+ "redirect_url": "/windows/device-security/applocker/working-with-applocker-policies",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/working-with-applocker-rules.md",
+ "redirect_url": "/windows/device-security/applocker/working-with-applocker-rules",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/acquire-apps-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/acquire-apps-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/acquire-apps-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/acquire-apps-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/add-unsigned-app-to-code-integrity-policy.md",
+ "redirect_url": "/microsoft-store/add-unsigned-app-to-code-integrity-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/administrative-tools-in-windows-10.md",
+ "redirect_url": "/windows/client-management/administrative-tools-in-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/app-inventory-management-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/app-inventory-management-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/apps-in-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/apps-in-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/apps-in-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/apps-in-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-about-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-about-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-add-or-remove-an-administrator-with-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-add-or-remove-an-administrator-with-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-add-or-upgrade-packages-with-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-add-or-upgrade-packages-with-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-administering-appv-with-powershell.md",
+ "redirect_url": "/windows/application-management/app-v/appv-administering-appv-with-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-administering-virtual-applications-with-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-administering-virtual-applications-with-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-allow-administrators-to-enable-connection-groups.md",
+ "redirect_url": "/windows/application-management/app-v/appv-allow-administrators-to-enable-connection-groups",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-application-publishing-and-client-interaction.md",
+ "redirect_url": "/windows/application-management/app-v/appv-application-publishing-and-client-interaction",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-apply-the-deployment-configuration-file-with-powershell.md",
+ "redirect_url": "/windows/application-management/app-v/appv-apply-the-deployment-configuration-file-with-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-apply-the-user-configuration-file-with-powershell.md",
+ "redirect_url": "/windows/application-management/app-v/appv-apply-the-user-configuration-file-with-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-auto-batch-sequencing.md",
+ "redirect_url": "/windows/application-management/app-v/appv-auto-batch-sequencing",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-auto-batch-updating.md",
+ "redirect_url": "/windows/application-management/app-v/appv-auto-batch-updating",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-auto-clean-unpublished-packages.md",
+ "redirect_url": "/windows/application-management/app-v/appv-auto-clean-unpublished-packages",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-auto-provision-a-vm.md",
+ "redirect_url": "/windows/application-management/app-v/appv-auto-provision-a-vm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-available-mdm-settings.md",
+ "redirect_url": "/windows/application-management/app-v/appv-available-mdm-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-capacity-planning.md",
+ "redirect_url": "/windows/application-management/app-v/appv-capacity-planning",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-client-configuration-settings.md",
+ "redirect_url": "/windows/application-management/app-v/appv-client-configuration-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-configure-access-to-packages-with-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-configure-access-to-packages-with-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-configure-connection-groups-to-ignore-the-package-version.md",
+ "redirect_url": "/windows/application-management/app-v/appv-configure-connection-groups-to-ignore-the-package-version",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-configure-the-client-to-receive-updates-from-the-publishing-server.md",
+ "redirect_url": "/windows/application-management/app-v/appv-configure-the-client-to-receive-updates-from-the-publishing-server",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-connect-to-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-connect-to-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-connection-group-file.md",
+ "redirect_url": "/windows/application-management/app-v/appv-connection-group-file",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-connection-group-virtual-environment.md",
+ "redirect_url": "/windows/application-management/app-v/appv-connection-group-virtual-environment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-convert-a-package-created-in-a-previous-version-of-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-convert-a-package-created-in-a-previous-version-of-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md",
+ "redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-create-a-connection-group.md",
+ "redirect_url": "/windows/application-management/app-v/appv-create-a-connection-group",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-create-a-custom-configuration-file-with-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-create-a-custom-configuration-file-with-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-create-a-package-accelerator-with-powershell.md",
+ "redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator-with-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-create-a-package-accelerator.md",
+ "redirect_url": "/windows/application-management/app-v/appv-create-a-package-accelerator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-create-a-virtual-application-package-package-accelerator.md",
+ "redirect_url": "/windows/application-management/app-v/appv-create-a-virtual-application-package-package-accelerator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-create-and-use-a-project-template.md",
+ "redirect_url": "/windows/application-management/app-v/appv-create-and-use-a-project-template",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-creating-and-managing-virtualized-applications.md",
+ "redirect_url": "/windows/application-management/app-v/appv-creating-and-managing-virtualized-applications",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-customize-virtual-application-extensions-with-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-customize-virtual-application-extensions-with-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-delete-a-connection-group.md",
+ "redirect_url": "/windows/application-management/app-v/appv-delete-a-connection-group",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-delete-a-package-with-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-delete-a-package-with-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deploy-appv-databases-with-sql-scripts.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploy-appv-databases-with-sql-scripts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deploy-the-appv-server-with-a-script.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server-with-a-script",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deploy-the-appv-server.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploy-the-appv-server",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deploying-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploying-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deploying-microsoft-office-2010-wth-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2010-wth-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deploying-microsoft-office-2013-with-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2013-with-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deploying-microsoft-office-2016-with-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploying-microsoft-office-2016-with-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deploying-packages-with-electronic-software-distribution-solutions.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploying-packages-with-electronic-software-distribution-solutions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deploying-the-appv-sequencer-and-client.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-sequencer-and-client",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deploying-the-appv-server.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deploying-the-appv-server",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-deployment-checklist.md",
+ "redirect_url": "/windows/application-management/app-v/appv-deployment-checklist",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-dynamic-configuration.md",
+ "redirect_url": "/windows/application-management/app-v/appv-dynamic-configuration",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md",
+ "redirect_url": "/windows/application-management/app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-enable-reporting-on-the-appv-client-with-powershell.md",
+ "redirect_url": "/windows/application-management/app-v/appv-enable-reporting-on-the-appv-client-with-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-enable-the-app-v-desktop-client.md",
+ "redirect_url": "/windows/application-management/app-v/appv-enable-the-app-v-desktop-client",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-evaluating-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-evaluating-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-for-windows.md",
+ "redirect_url": "/windows/application-management/app-v/appv-for-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-getting-started.md",
+ "redirect_url": "/windows/application-management/app-v/appv-getting-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-high-level-architecture.md",
+ "redirect_url": "/windows/application-management/app-v/appv-high-level-architecture",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md",
+ "redirect_url": "/windows/application-management/app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-install-the-management-and-reporting-databases-on-separate-computers.md",
+ "redirect_url": "/windows/application-management/app-v/appv-install-the-management-and-reporting-databases-on-separate-computers",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-install-the-management-server-on-a-standalone-computer.md",
+ "redirect_url": "/windows/application-management/app-v/appv-install-the-management-server-on-a-standalone-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-install-the-publishing-server-on-a-remote-computer.md",
+ "redirect_url": "/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-install-the-reporting-server-on-a-standalone-computer.md",
+ "redirect_url": "/windows/application-management/app-v/appv-install-the-reporting-server-on-a-standalone-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-install-the-sequencer.md",
+ "redirect_url": "/windows/application-management/app-v/appv-install-the-sequencer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md",
+ "redirect_url": "/windows/application-management/app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-maintaining-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-maintaining-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md",
+ "redirect_url": "/windows/application-management/app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md",
+ "redirect_url": "/windows/application-management/app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-managing-connection-groups.md",
+ "redirect_url": "/windows/application-management/app-v/appv-managing-connection-groups",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-migrating-to-appv-from-a-previous-version.md",
+ "redirect_url": "/windows/application-management/app-v/appv-migrating-to-appv-from-a-previous-version",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-modify-an-existing-virtual-application-package.md",
+ "redirect_url": "/windows/application-management/app-v/appv-modify-an-existing-virtual-application-package",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-modify-client-configuration-with-powershell.md",
+ "redirect_url": "/windows/application-management/app-v/appv-modify-client-configuration-with-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-move-the-appv-server-to-another-computer.md",
+ "redirect_url": "/windows/application-management/app-v/appv-move-the-appv-server-to-another-computer",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-operations.md",
+ "redirect_url": "/windows/application-management/app-v/appv-operations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-performance-guidance.md",
+ "redirect_url": "/windows/application-management/app-v/appv-performance-guidance",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-planning-checklist.md",
+ "redirect_url": "/windows/application-management/app-v/appv-planning-checklist",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-planning-folder-redirection-with-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-planning-folder-redirection-with-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-planning-for-appv-server-deployment.md",
+ "redirect_url": "/windows/application-management/app-v/appv-planning-for-appv-server-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-planning-for-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-planning-for-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-planning-for-high-availability-with-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-planning-for-high-availability-with-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-planning-for-sequencer-and-client-deployment.md",
+ "redirect_url": "/windows/application-management/app-v/appv-planning-for-sequencer-and-client-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-planning-for-using-appv-with-office.md",
+ "redirect_url": "/windows/application-management/app-v/appv-planning-for-using-appv-with-office",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md",
+ "redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-planning-to-deploy-appv.md",
+ "redirect_url": "/windows/application-management/app-v/appv-planning-to-deploy-appv",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-preparing-your-environment.md",
+ "redirect_url": "/windows/application-management/app-v/appv-preparing-your-environment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-prerequisites.md",
+ "redirect_url": "/windows/application-management/app-v/appv-prerequisites",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-publish-a-connection-group.md",
+ "redirect_url": "/windows/application-management/app-v/appv-publish-a-connection-group",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-publish-a-packages-with-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-publish-a-packages-with-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-register-and-unregister-a-publishing-server-with-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-release-notes-for-appv-for-windows-1703.md",
+ "redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows-1703",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-release-notes-for-appv-for-windows.md",
+ "redirect_url": "/windows/application-management/app-v/appv-release-notes-for-appv-for-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-reporting.md",
+ "redirect_url": "/windows/application-management/app-v/appv-reporting",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-running-locally-installed-applications-inside-a-virtual-environment.md",
+ "redirect_url": "/windows/application-management/app-v/appv-running-locally-installed-applications-inside-a-virtual-environment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-security-considerations.md",
+ "redirect_url": "/windows/application-management/app-v/appv-security-considerations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-sequence-a-new-application.md",
+ "redirect_url": "/windows/application-management/app-v/appv-sequence-a-new-application",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-sequence-a-package-with-powershell.md",
+ "redirect_url": "/windows/application-management/app-v/appv-sequence-a-package-with-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-supported-configurations.md",
+ "redirect_url": "/windows/application-management/app-v/appv-supported-configurations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-technical-reference.md",
+ "redirect_url": "/windows/application-management/app-v/appv-technical-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-troubleshooting.md",
+ "redirect_url": "/windows/application-management/app-v/appv-troubleshooting",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation.md",
+ "redirect_url": "/windows/application-management/app-v/appv-upgrading-to-app-v-for-windows-10-from-an-existing-installation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-using-the-client-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-using-the-client-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md",
+ "redirect_url": "/windows/application-management/app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/appv-viewing-appv-server-publishing-metadata.md",
+ "redirect_url": "/windows/application-management/app-v/appv-viewing-appv-server-publishing-metadata",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/assign-apps-to-employees.md",
+ "redirect_url": "/microsoft-store/assign-apps-to-employees",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/configure-mdm-provider-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/configure-mdm-provider-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/configure-mdm-provider-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/configure-mdm-provider-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/connect-to-remote-aadj-pc.md",
+ "redirect_url": "/windows/client-management/connect-to-remote-aadj-pc",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/device-guard-signing-portal.md",
+ "redirect_url": "/microsoft-store/device-guard-signing-portal",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/distribute-apps-from-your-private-store.md",
+ "redirect_url": "/microsoft-store/distribute-apps-from-your-private-store",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/distribute-apps-to-your-employees-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/distribute-apps-to-your-employees-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/distribute-apps-to-your-employees-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/distribute-apps-to-your-employees-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/distribute-apps-with-management-tool.md",
+ "redirect_url": "/microsoft-store/distribute-apps-with-management-tool",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/distribute-offline-apps.md",
+ "redirect_url": "/microsoft-store/distribute-offline-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/find-and-acquire-apps-overview.md",
+ "redirect_url": "/microsoft-store/find-and-acquire-apps-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/group-policies-for-enterprise-and-education-editions.md",
+ "redirect_url": "/windows/client-management/group-policies-for-enterprise-and-education-editions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/join-windows-10-mobile-to-azure-active-directory.md",
+ "redirect_url": "/windows/client-management/join-windows-10-mobile-to-azure-active-directory",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-access-to-private-store.md",
+ "redirect_url": "/microsoft-store/manage-access-to-private-store",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-apps-windows-store-for-business-overview.md",
+ "redirect_url": "/microsoft-store/manage-apps-windows-store-for-business-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/manage-apps-windows-store-for-business-overview.md",
+ "redirect_url": "/microsoft-store/manage-apps-microsoft-store-for-business-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-corporate-devices.md",
+ "redirect_url": "/windows/client-management/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-orders-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/manage-orders-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/manage-orders-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/manage-orders-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-private-store-settings.md",
+ "redirect_url": "/microsoft-store/manage-private-store-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-settings-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/manage-settings-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/manage-settings-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/manage-settings-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-users-and-groups-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/manage-users-and-groups-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/manage-users-and-groups-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/manage-users-and-groups-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-windows-10-in-your-organization-modern-management.md",
+ "redirect_url": "/windows/client-management/manage-windows-10-in-your-organization-modern-management",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/mandatory-user-profile.md",
+ "redirect_url": "/windows/client-management/mandatory-user-profile",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/new-policies-for-windows-10.md",
+ "redirect_url": "/windows/client-management/new-policies-for-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/prerequisites-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/prerequisites-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/prerequisites-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/prerequisites-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/reset-a-windows-10-mobile-device.md",
+ "redirect_url": "/windows/client-management/reset-a-windows-10-mobile-device",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/roles-and-permissions-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/roles-and-permissions-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/roles-and-permissions-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/roles-and-permissions-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/settings-reference-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/settings-reference-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/settings-reference-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/settings-reference-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/sign-code-integrity-policy-with-device-guard-signing.md",
+ "redirect_url": "/microsoft-store/sign-code-integrity-policy-with-device-guard-signing",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/sign-up-windows-store-for-business-overview.md",
+ "redirect_url": "/microsoft-store/sign-up-windows-store-for-business-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/sign-up-windows-store-for-business-overview.md",
+ "redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/sign-up-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/sign-up-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/sign-up-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/sign-up-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/troubleshoot-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/troubleshoot-windows-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/troubleshoot-windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/troubleshoot-microsoft-store-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-administering-uev-with-windows-powershell-and-wmi.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-administering-uev-with-windows-powershell-and-wmi",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-administering-uev.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-administering-uev",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-application-template-schema-reference.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-application-template-schema-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-changing-the-frequency-of-scheduled-tasks.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-changing-the-frequency-of-scheduled-tasks",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-configuring-uev-with-group-policy-objects.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-group-policy-objects",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-configuring-uev-with-system-center-configuration-manager.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-configuring-uev-with-system-center-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-deploy-required-features.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-deploy-required-features",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-deploy-uev-for-custom-applications.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-deploy-uev-for-custom-applications",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-for-windows.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-for-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-getting-started.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-getting-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-manage-administrative-backup-and-restore.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-manage-administrative-backup-and-restore",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-manage-configurations.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-manage-configurations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-managing-settings-location-templates-using-windows-powershell-and-wmi",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-migrating-settings-packages.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-migrating-settings-packages",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-prepare-for-deployment.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-prepare-for-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-release-notes-1607.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-release-notes-1607",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-security-considerations.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-security-considerations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-sync-methods.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-sync-methods",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-sync-trigger-events.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-sync-trigger-events",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-synchronizing-microsoft-office-with-uev.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-synchronizing-microsoft-office-with-uev",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-technical-reference.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-technical-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-troubleshooting.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-troubleshooting",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-upgrade-uev-from-previous-releases.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-upgrade-uev-from-previous-releases",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-using-uev-with-application-virtualization-applications.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-using-uev-with-application-virtualization-applications",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-whats-new-in-uev-for-windows.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-whats-new-in-uev-for-windows",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/uev-working-with-custom-templates-and-the-uev-generator.md",
+ "redirect_url": "/windows/configuration/ue-v/uev-working-with-custom-templates-and-the-uev-generator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/update-windows-store-for-business-account-settings.md",
+ "redirect_url": "/microsoft-store/update-windows-store-for-business-account-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "store-for-business/update-windows-store-for-business-account-settings.md",
+ "redirect_url": "/microsoft-store/update-microsoft-store-for-business-account-settings",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/windows-10-mobile-and-mdm.md",
+ "redirect_url": "/windows/client-management/windows-10-mobile-and-mdm",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/windows-libraries.md",
+ "redirect_url": "/windows/client-management/windows-libraries",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/windows-store-for-business-overview.md",
+ "redirect_url": "/microsoft-store/windows-store-for-business-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/working-with-line-of-business-apps.md",
+ "redirect_url": "/microsoft-store/working-with-line-of-business-apps",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/act-technical-reference.md",
+ "redirect_url": "/windows/deployment/planning/act-technical-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/applying-filters-to-data-in-the-sua-tool.md",
+ "redirect_url": "/windows/deployment/planning/applying-filters-to-data-in-the-sua-tool",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/available-data-types-and-operators-in-compatibility-administrator.md",
+ "redirect_url": "/windows/deployment/planning/available-data-types-and-operators-in-compatibility-administrator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/best-practice-recommendations-for-windows-to-go.md",
+ "redirect_url": "/windows/deployment/planning/best-practice-recommendations-for-windows-to-go",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/change-history-for-plan-for-windows-10-deployment.md",
+ "redirect_url": "/windows/deployment/planning/change-history-for-plan-for-windows-10-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/compatibility-administrator-users-guide.md",
+ "redirect_url": "/windows/deployment/planning/compatibility-administrator-users-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/compatibility-fix-database-management-strategies-and-deployment.md",
+ "redirect_url": "/windows/deployment/planning/compatibility-fix-database-management-strategies-and-deployment",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md",
+ "redirect_url": "/windows/deployment/planning/compatibility-fixes-for-windows-8-windows-7-and-windows-vista",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/creating-a-custom-compatibility-fix-in-compatibility-administrator.md",
+ "redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-fix-in-compatibility-administrator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/creating-a-custom-compatibility-mode-in-compatibility-administrator.md",
+ "redirect_url": "/windows/deployment/planning/creating-a-custom-compatibility-mode-in-compatibility-administrator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/creating-an-apphelp-message-in-compatibility-administrator.md",
+ "redirect_url": "/windows/deployment/planning/creating-an-apphelp-message-in-compatibility-administrator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/deployment-considerations-for-windows-to-go.md",
+ "redirect_url": "/windows/deployment/planning/deployment-considerations-for-windows-to-go",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/device-dialog-box.md",
+ "redirect_url": "/windows/deployment/planning/device-dialog-box",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md",
+ "redirect_url": "/windows/deployment/planning/enabling-and-disabling-compatibility-fixes-in-compatibility-administrator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/fixing-applications-by-using-the-sua-tool.md",
+ "redirect_url": "/windows/deployment/planning/fixing-applications-by-using-the-sua-tool",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md",
+ "redirect_url": "/windows/deployment/planning/installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/managing-application-compatibility-fixes-and-custom-fix-databases.md",
+ "redirect_url": "/windows/deployment/planning/managing-application-compatibility-fixes-and-custom-fix-databases",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/prepare-your-organization-for-windows-to-go.md",
+ "redirect_url": "/windows/deployment/planning/prepare-your-organization-for-windows-to-go",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/searching-for-fixed-applications-in-compatibility-administrator.md",
+ "redirect_url": "/windows/deployment/planning/searching-for-fixed-applications-in-compatibility-administrator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md",
+ "redirect_url": "/windows/deployment/planning/searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/security-and-data-protection-considerations-for-windows-to-go.md",
+ "redirect_url": "/windows/deployment/planning/security-and-data-protection-considerations-for-windows-to-go",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/showing-messages-generated-by-the-sua-tool.md",
+ "redirect_url": "/windows/deployment/planning/showing-messages-generated-by-the-sua-tool",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/sua-users-guide.md",
+ "redirect_url": "/windows/deployment/planning/sua-users-guide",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/tabs-on-the-sua-tool-interface.md",
+ "redirect_url": "/windows/deployment/planning/tabs-on-the-sua-tool-interface",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/testing-your-application-mitigation-packages.md",
+ "redirect_url": "/windows/deployment/planning/testing-your-application-mitigation-packages",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/understanding-and-using-compatibility-fixes.md",
+ "redirect_url": "/windows/deployment/planning/understanding-and-using-compatibility-fixes",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/using-the-compatibility-administrator-tool.md",
+ "redirect_url": "/windows/deployment/planning/using-the-compatibility-administrator-tool",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/using-the-sdbinstexe-command-line-tool.md",
+ "redirect_url": "/windows/deployment/planning/using-the-sdbinstexe-command-line-tool",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/using-the-sua-tool.md",
+ "redirect_url": "/windows/deployment/planning/using-the-sua-tool",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/using-the-sua-wizard.md",
+ "redirect_url": "/windows/deployment/planning/using-the-sua-wizard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/viewing-the-events-screen-in-compatibility-administrator.md",
+ "redirect_url": "/windows/deployment/planning/viewing-the-events-screen-in-compatibility-administrator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/windows-10-compatibility.md",
+ "redirect_url": "/windows/deployment/planning/windows-10-compatibility",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/windows-10-deployment-considerations.md",
+ "redirect_url": "/windows/deployment/planning/windows-10-deployment-considerations",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/windows-10-enterprise-faq-itpro.md",
+ "redirect_url": "/windows/deployment/planning/windows-10-enterprise-faq-itpro",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/windows-10-infrastructure-requirements.md",
+ "redirect_url": "/windows/deployment/planning/windows-10-infrastructure-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/windows-to-go-frequently-asked-questions.md",
+ "redirect_url": "/windows/deployment/planning/windows-to-go-frequently-asked-questions",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/windows-to-go-overview.md",
+ "redirect_url": "/windows/deployment/planning/windows-to-go-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/change-history-for-update-windows-10.md",
+ "redirect_url": "/windows/deployment/update/change-history-for-update-windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/update-compliance-get-started.md",
+ "redirect_url": "/windows/deployment/update/update-compliance-get-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/update-compliance-monitor.md",
+ "redirect_url": "/windows/deployment/update/update-compliance-monitor",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/update-compliance-using.md",
+ "redirect_url": "/windows/deployment/update/update-compliance-using",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-branchcache.md",
+ "redirect_url": "/windows/deployment/update/waas-branchcache",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-configure-wufb.md",
+ "redirect_url": "/windows/deployment/update/waas-configure-wufb",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-delivery-optimization.md",
+ "redirect_url": "/windows/deployment/update/waas-delivery-optimization",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-deployment-rings-windows-10-updates.md",
+ "redirect_url": "/windows/deployment/update/waas-deployment-rings-windows-10-updates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-integrate-wufb.md",
+ "redirect_url": "/windows/deployment/update/waas-integrate-wufb",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-manage-updates-configuration-manager.md",
+ "redirect_url": "/windows/deployment/update/waas-manage-updates-configuration-manager",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-manage-updates-wsus.md",
+ "redirect_url": "/windows/deployment/update/waas-manage-updates-wsus",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-manage-updates-wufb.md",
+ "redirect_url": "/windows/deployment/update/waas-manage-updates-wufb",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-mobile-updates.md",
+ "redirect_url": "/windows/deployment/update/waas-mobile-updates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-optimize-windows-10-updates.md",
+ "redirect_url": "/windows/deployment/update/waas-optimize-windows-10-updates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-overview.md",
+ "redirect_url": "/windows/deployment/update/waas-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-quick-start.md",
+ "redirect_url": "/windows/deployment/update/waas-quick-start",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-restart.md",
+ "redirect_url": "/windows/deployment/update/waas-restart",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-servicing-branches-windows-10-updates.md",
+ "redirect_url": "/windows/deployment/update/waas-servicing-branches-windows-10-updates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-servicing-strategy-windows-10-updates.md",
+ "redirect_url": "/windows/deployment/update/waas-servicing-strategy-windows-10-updates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-windows-insider-for-business-aad.md",
+ "redirect_url": "/windows/deployment/update/waas-windows-insider-for-business-aad",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-windows-insider-for-business.md",
+ "redirect_url": "/windows/deployment/update/waas-windows-insider-for-business",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-wufb-group-policy.md",
+ "redirect_url": "/windows/deployment/update/waas-wufb-group-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/waas-wufb-intune.md",
+ "redirect_url": "/windows/deployment/update/waas-wufb-intune",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/manage-settings-app-with-group-policy.md",
+ "redirect_url": "/windows/client-management/manage-settings-app-with-group-policy",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/client-management/mdm/create-a-custom-configuration-service-provider.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/client-management/mdm/design-a-custom-windows-csp.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/iconfigserviceprovider2.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/iconfigserviceprovider2configmanagernotification.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/iconfigserviceprovider2getnode.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnode.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodeadd.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodeclear.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodecopy.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodedeletechild.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodedeleteproperty.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodeexecute.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodegetchildnodenames.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodegetproperty.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodegetpropertyidentifiers.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodegetvalue.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodemove.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodesetproperty.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodesetvalue.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspnodetransactioning.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/icspvalidate.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/client-management/mdm/samples-for-writing-a-custom-configuration-service-provider.md",
+ "redirect_url": "/windows/client-management/mdm/configuration-service-provider-reference",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/keep-secure/collect-wip-audit-event-logs.md",
+ "redirect_url": "/windows/threat-protection/windows-information-protection/collect-wip-audit-event-logs",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/deploy-managed-installer-for-device-guard.md",
+ "redirect_url": "/windows/device-security/device-guard/deploy-managed-installer-for-device-guard",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/upgrade-readiness-data-sharing.md",
+ "redirect_url": "/windows/deployment/upgrade/upgrade-readiness-data-sharing",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/index.md",
+ "redirect_url": "/windows/windows-10/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/index.md",
+ "redirect_url": "/windows/windows-10/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deploy/index.md",
+ "redirect_url": "/windows/deployment/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/plan/index.md",
+ "redirect_url": "/windows/deployment/planning/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/index.md",
+ "redirect_url": "/windows/windows-10/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/windows-store-for-business.md",
+ "redirect_url": "/microsoft-store/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/update/index.md",
+ "redirect_url": "/windows/deployment/update/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configure/index.md",
+ "redirect_url": "/windows/configuration/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/security-technologies.md",
+ "redirect_url": "/windows/windows-10/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "education/get-started/index.md",
+ "redirect_url": "/education/get-started/get-started-with-microsoft-education",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/windows-10-enterprise-security-guides.md",
+ "redirect_url": "/windows/windows-10/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/keep-secure/change-history-for-keep-windows-10-secure.md",
+ "redirect_url": "/windows/windows-10/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/manage/change-history-for-manage-and-update-windows-10.md",
+ "redirect_url": "/windows/windows-10/index",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/update/waas-servicing-branches-windows-10-updates.md",
+ "redirect_url": "/windows/deployment/update/waas-servicing-channels-windows-10-updates",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-10-enterprise-activation-subscription.md",
+ "redirect_url": "/windows/deployment/windows-10-enterprise-subscription-activation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-10-auto-pilot.md",
+ "redirect_url": "/windows/deployment/windows-autopilot/windows-10-autopilot",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/privacy/basic-level-windows-diagnostic-events-and-fields.md",
+ "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1903",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1703.md",
+ "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1703",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields-1709.md",
+ "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1709",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/basic-level-windows-diagnostic-events-and-fields.md",
+ "redirect_url": "/windows/privacy/basic-level-windows-diagnostic-events-and-fields",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/configure-windows-diagnostic-data-in-your-organization.md",
+ "redirect_url": "/windows/privacy/configure-windows-diagnostic-data-in-your-organization",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/diagnostic-data-viewer-overview.md",
+ "redirect_url": "/windows/privacy/diagnostic-data-viewer-overview",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/enhanced-diagnostic-data-windows-analytics-events-and-fields.md",
+ "redirect_url": "/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/gdpr-win10-whitepaper.md",
+ "redirect_url": "/windows/privacy/gdpr-win10-whitepaper",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md",
+ "redirect_url": "/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/manage-windows-endpoints-version-1709.md",
+ "redirect_url": "/windows/privacy/manage-windows-endpoints",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/windows-diagnostic-data-1703.md",
+ "redirect_url": "/windows/privacy/windows-diagnostic-data-1703",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/configuration/windows-diagnostic-data.md",
+ "redirect_url": "/windows/privacy/windows-diagnostic-data",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/upgrade/windows-10-edition-downgrades.md",
+ "redirect_url": "/windows/deployment/upgrade/windows-10-edition-upgrades",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "education/windows/windows-automatic-redeployment.md",
+ "redirect_url": "/education/windows/autopilot-reset",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-autopilot/windows-10-autopilot.md",
+ "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/privacy/manage-windows-endpoints.md",
+ "redirect_url": "/windows/privacy/manage-windows-1809-endpoints",
+ "redirect_document_id": true
+ },
+ {
+ "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-nativeapp.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-nativeapp",
+ "redirect_document_id": false
+ },
+ {
+ "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-create-app-webapp.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-create-app-webapp",
+ "redirect_document_id": false
+ },
+ {
+ "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-full-sample-powershell.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-full-sample-powershell",
+ "redirect_document_id": false
+ },
+ {
+ "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-list.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list",
+ "redirect_document_id": false
+ },
+ {
+ "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-odata-samples.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-odata-samples",
+ "redirect_document_id": false
+ },
+ {
+ "source_path":"windows/security/threat-protection/windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alerts",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-info-by-id",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-domain-info",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-files-info",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-ip-info",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-machine-info",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-machines",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-statistics",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-information",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-alerts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-related-machines",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-file-statistics",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-statistics",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/is-ip-seen-org",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/collect-investigation-package",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineaction-object",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-filemachineactions-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-by-id",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-log-on-users",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machine-related-alerts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineaction-object",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineaction-object.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineaction-object",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machineactions-collection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machineactions-collection",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-machines",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-started.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-started",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/get-started.md",
+ "redirect_url": "/windows/security/threat-protection/index.md",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-package-sas-uri",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/machine-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machine",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/isolate-machine",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unisolate-machine",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/unrestrict-code-execution",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/restrict-code-execution",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-api.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-api",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/api-microsoft-flow.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-power-bi",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-powershell.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-powershell",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-python.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-python",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-av-scan",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/stop-and-quarantine-file-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/stop-and-quarantine-file",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-alert-related-user-info",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicators-collection-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ti-indicators-collection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-information",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-alerts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-user-related-machines",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/initiate-autoir-investigation-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/initiate-autoir-investigation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/get-ti-indicator-by-id-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics-dashboard-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/threat-analytics.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-analytics",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/threat-and-vuln-mgt-scenarios.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/add-or-remove-machine-tags-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/add-or-remove-machine-tags",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/alerts-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/alerts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/create-alert-by-reference-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/create-alert-by-reference",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/delete-ti-indicator-by-id-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/delete-ti-indicator-by-id",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/files-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/files",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/find-machines-by-ip-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/is-domain-seen-in-org.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-domain-related-alerts",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/get-ip-related-machines.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/get-ip-related-alerts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/is-ip-seen-org.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp/exposed-apis-list",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/machineaction-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineaction",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/machineactionsnote.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/machineactionsnote",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/offboard-machine-api-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/offboard-machine-api",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/post-ti-indicator-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/post-ti-indicator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/ti-indicator-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/ti-indicator",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/update-alert-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/update-alert",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/incidents-queue.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/incidents-queue",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/incidents-queue.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/view-incidents-queue",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/troubleshoot-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/troubleshoot-overview.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp",
+ "redirect_document_id": true
+ },
+ {
+ "source_path":"windows/security/threat-protection/windows-defender-atp/use-apis.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/use-apis",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/user-alert-windows-defender-advanced-threat-protection-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/user",
+ "source_path": "windows/deployment/planning/windows-10-fall-creators-deprecation.md",
+ "redirect_url": "/windows/deployment/planning/windows-10-1709-removed-features",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/planning/windows-10-creators-update-deprecation.md",
+ "redirect_url": "/windows/deployment/planning/windows-10-1703-removed-features",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-indicators",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators-windows-defender-advanced-threat-protection.md",
+ "redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/manage-indicators.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/manage-allowed-blocked-list",
+ "redirect_document_id": false
+ },
+ {
+ "source_path": "windows/deployment/windows-10-enterprise-subscription-activation.md",
+ "redirect_url": "/windows/deployment/windows-10-subscription-activation",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/hub/windows-10-landing.yml",
+ "redirect_url": "/windows/windows-10",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/improverequestperformance-new.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/improve-request-performance",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md",
+ "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-network.md",
+ "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#networking-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md",
+ "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#licensing-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-autopilot/windows-autopilot-requirements-configuration.md",
+ "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-requirements#configuration-requirements",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-autopilot/user-driven-aad.md",
+ "redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-azure-active-directory-join",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-autopilot/user-driven-hybrid.md",
+ "redirect_url": "/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-hybrid-azure-active-directory-join",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-autopilot/intune-connector.md",
+ "redirect_url": "https://docs.microsoft.com/intune/windows-autopilot-hybrid",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-remote.md",
+ "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-remote-windows-autopilot-reset",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-autopilot/windows-autopilot-reset-local.md",
+ "redirect_url": "/windows/deployment/windows-autopilot/windows-autopilot-reset#reset-devices-with-local-windows-autopilot-reset",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-autopilot/configure-autopilot.md",
+ "redirect_url": "/windows/deployment/windows-autopilot/add-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-autopilot/administer.md",
+ "redirect_url": "/windows/deployment/windows-autopilot/add-devices#registering-devices",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/hub/release-information.md",
+ "redirect_url": "/windows/release-information",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/deployment/windows-10-architecture-posters.md",
+ "redirect_url": "/windows/deployment/windows-10-deployment-scenarios",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "windows/device-security/index.md",
+ "redirect_url": "/windows/security/threat-protection",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "browsers/internet-explorer/ie11-deploy-guide/group-policy-compatability-with-ie11.md",
+ "redirect_url": "/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/surface/surface-dock-updater.md",
+ "redirect_url": "/surface/surface-dock-firmware-update",
+ "redirect_document_id": true
+ },
+ {
+ "source_path": "devices/surface/surface.yml",
+ "redirect_url": "/surface/get-started",
+ "redirect_document_id": true
+ }
+ ]
+ }
+
+
+
\ No newline at end of file
diff --git a/browsers/edge/about-microsoft-edge.md b/browsers/edge/about-microsoft-edge.md
index 1b86c5d81f..b58f9167db 100644
--- a/browsers/edge/about-microsoft-edge.md
+++ b/browsers/edge/about-microsoft-edge.md
@@ -1,166 +1,167 @@
----
-title: Microsoft Edge system and language requirements
-description: Overview information about Microsoft Edge, the default browser for Windows 10. This topic includes links to other Microsoft Edge topics.
-ms.assetid: 70377735-b2f9-4b0b-9658-4cf7c1d745bb
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
-ms.prod: edge
-ms.mktglfcycl: general
-ms.topic: reference
-ms.sitesec: library
-title: Microsoft Edge for IT Pros
-ms.localizationpriority: medium
-ms.date: 10/02/2018
----
-
-# Microsoft Edge system and language requirements
->Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile
-
-Microsoft Edge is the new, default web browser for Windows 10, helping you to experience modern web standards, better performance, improved security, and increased reliability. Microsoft Edge lets you stay up-to-date through the Microsoft Store and to manage your enterprise through Group Policy or your mobile device management (MDM) tools.
-
-
->[!IMPORTANT]
->The Long-Term Servicing Branch (LTSB) versions of Windows, including Windows Server 2016, don’t include Microsoft Edge or many other Universal Windows Platform (UWP) apps. Systems running the LTSB operating systems do not support these apps because their services get frequently updated with new functionality. For customers who require the LTSB for specialized devices, we recommend using Internet Explorer 11.
-
-
-## Minimum system requirements
-Some of the components might also need additional system resources. Check the component's documentation for more information.
-
-
-| Item | Minimum requirements |
-|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| Computer/processor | 1 gigahertz (GHz) or faster (32-bit (x86) or 64-bit (x64)) |
-| Operating system |
- Windows 10 (32-bit or 64-bit)
- Windows 10 Mobile
Note
For specific Windows 10 Mobile requirements, see the [Minimum hardware requirements for Windows 10 Mobile](https://go.microsoft.com/fwlink/p/?LinkID=699266) topic. |
-| Memory |
- Windows 10 (32-bit) - 1 GB
- Windows 10 (64-bit) - 2 GB
|
-| Hard drive space | - Windows 10 (32-bit) - 16 GB
- Windows 10 (64-bit) - 20 GB
|
-| DVD drive | DVD-ROM drive (if installing from a DVD-ROM) |
-| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors |
-| Graphics card | Microsoft DirectX 9 or later with Windows Display Driver Model (WDDM) 1.0 driver |
-| Peripherals | Internet connection and a compatible pointing device |
-
----
-
-
-## Supported languages
-
-Microsoft Edge supports all of the same languages as Windows 10 and you can use the [Microsoft Translator extension](https://www.microsoft.com/p/translator-for-microsoft-edge/9nblggh4n4n3) to translate foreign language web pages and text selections for 60+ languages.
-
-If the extension does not work after install, restart Microsoft Edge. If the extension still does not work, provide feedback through the Feedback Hub.
-
-
-| Language | Country/Region | Code |
-|----------------------------------------------------|-----------------------------------------|----------------|
-| Afrikaans (South Africa) | South Africa | af-ZA |
-| Albanian (Albania) | Albania | sq-AL |
-| Amharic | Ethiopia | am-ET |
-| Arabic (Saudi Arabia) | Saudi Arabia | ar-SA |
-| Armenian | Armenia | hy-AM |
-| Assamese | India | as-IN |
-| Azerbaijani (Latin, Azerbaijan) | Azerbaijan | az-Latn-AZ |
-| Bangla (Bangladesh) | Bangladesh | bn-BD |
-| Bangla (India) | India | bn-IN |
-| Basque (Basque) | Spain | eu-ES |
-| Belarusian (Belarus) | Belarus | be-BY |
-| Bosnian (Latin) | Bosnia and Herzegovina | bs-Latn-BA |
-| Bulgarian (Bulgaria) | Bulgaria | bg-BG |
-| Catalan (Catalan) | Spain | ca-ES |
-| Central Kurdish (Arabic) | Iraq | ku-Arab-IQ |
-| Cherokee (Cherokee) | United States | chr-Cher-US |
-| Chinese (Hong Kong SAR) | Hong Kong Special Administrative Region | zh-HK |
-| Chinese (Simplified, China) | People's Republic of China | zh-CN |
-| Chinese (Traditional, Taiwan) | Taiwan | zh-TW |
-| Croatian (Croatia) | Croatia | hr-HR |
-| Czech (Czech Republic) | Czech Republic | cs-CZ |
-| Danish (Denmark) | Denmark | da-DK |
-| Dari | Afghanistan | prs-AF |
-| Dutch (Netherlands) | Netherlands | nl-NL |
-| English (United Kingdom) | United Kingdom | en-GB |
-| English (United States) | United States | en-US |
-| Estonian (Estonia) | Estonia | et-EE |
-| Filipino (Philippines) | Philippines | fil-PH |
-| Finnish (Finland) | Finland | fi_FI |
-| French (Canada) | Canada | fr-CA |
-| French (France) | France | fr-FR |
-| Galician (Galician) | Spain | gl-ES |
-| Georgian | Georgia | ka-GE |
-| German (Germany) | Germany | de-DE |
-| Greek (Greece) | Greece | el-GR |
-| Gujarati | India | gu-IN |
-| Hausa (Latin, Nigeria) | Nigeria | ha-Latn-NG |
-| Hebrew (Israel) | Israel | he-IL |
-| Hindi (India) | India | hi-IN |
-| Hungarian (Hungary) | Hungary | hu-HU |
-| Icelandic | Iceland | is-IS |
-| Igbo | Nigeria | ig-NG |
-| Indonesian (Indonesia) | Indonesia | id-ID |
-| Irish | Ireland | ga-IE |
-| isiXhosa | South Africa | xh-ZA |
-| isiZulu | South Africa | zu-ZA |
-| Italian (Italy) | Italy | it-IT |
-| Japanese (Japan) | Japan | ja-JP |
-| Kannada | India | kn-IN |
-| Kazakh (Kazakhstan) | Kazakhstan | kk-KZ |
-| Khmer (Cambodia) | Cambodia | km-KH |
-| K'iche' | Guatemala | quc-Latn-GT |
-| Kinyarwanda | Rwanda | rw-RW |
-| KiSwahili | Kenya, Tanzania | sw-KE |
-| Konkani | India | kok-IN |
-| Korean (Korea) | Korea | ko-KR |
-| Kyrgyz | Kyrgyzstan | ky-KG |
-| Lao (Laos) | Lao P.D.R. | lo-LA |
-| Latvian (Latvia) | Latvia | lv-LV |
-| Lithuanian (Lithuania) | Lithuania | lt-LT |
-| Luxembourgish (Luxembourg) | Luxembourg | lb-LU |
-| Macedonian (Former Yugoslav Republic of Macedonia) | Macedonia (FYROM) | mk-MK |
-| Malay (Malaysia) | Malaysia, Brunei, and Singapore | ms-MY |
-| Malayalam | India | ml-IN |
-| Maltese | Malta | mt-MT |
-| Maori | New Zealand | mi-NZ |
-| Marathi | India | mr-IN |
-| Mongolian (Cyrillic) | Mongolia | mn-MN |
-| Nepali | Federal Democratic Republic of Nepal | ne-NP |
-| Norwegian (Nynorsk) | Norway | nn-NO |
-| Norwegian, Bokmål (Norway) | Norway | nb-NO |
-| Odia | India | or-IN |
-| Polish (Poland) | Poland | pl-PL |
-| Portuguese (Brazil) | Brazil | pt-BR |
-| Portuguese (Portugal) | Portugal | pt-PT |
-| Punjabi | India | pa-IN |
-| Punjabi (Arabic) | Pakistan | pa-Arab-PK |
-| Quechua | Peru | quz-PE |
-| Romanian (Romania) | Romania | ro-RO |
-| Russian (Russia) | Russia | ru-RU |
-| Scottish Gaelic | United Kingdom | gd-GB |
-| Serbian (Cyrillic, Bosnia, and Herzegovina) | Bosnia and Herzegovina | sr-Cyrl-BA |
-| Serbian (Cyrillic, Serbia) | Serbia | sr-Cyrl-RS |
-| Serbian (Latin, Serbia) | Serbia | sr-Latn-RS |
-| Sesotho sa Leboa | South Africa | nso-ZA |
-| Setswana (South Africa) | South Africa and Botswana | tn-ZA |
-| Sindhi (Arabic) | Pakistan | sd-Arab-PK |
-| Sinhala | Sri Lanka | si-LK |
-| Slovak (Slovakia) | Slovakia | sk-SK |
-| Slovenian (Slovenia) | Slovenia | sl-SL |
-| Spanish (Mexico) | Mexico | es-MX |
-| Spanish (Spain, International Sort) | Spain | en-ES |
-| Swedish (Sweden) | Sweden | sv-SE |
-| Tajik (Cyrillic) | Tajikistan | tg-Cyrl-TJ |
-| Tamil (India) | India and Sri Lanka | ta-IN |
-| Tatar | Russia | tt-RU |
-| Telugu | India | te-IN |
-| Thai (Thailand) | Thailand | th-TH |
-| Tigrinya (Ethiopia) | Ethiopia | ti-ET |
-| Turkish (Turkey) | Turkey | tr-TR |
-| Turkmen | Turkmenistan | tk-TM |
-| Ukrainian (Ukraine) | Ukraine | uk-UA |
-| Urdu | Pakistan | ur-PK |
-| Uyghur | People's Republic of China | ug-CN |
-| Uzbek (Latin, Uzbekistan) | Uzbekistan | uz-Latn-UZ |
-| Valencian | Spain | ca-ES-valencia |
-| Vietnamese | Vietnam | vi-VN |
-| Welsh | United Kingdom | cy-GB |
-| Wolof | Senegal | wo-SN |
-| Yoruba | Nigeria | yo-NG |
-
----
+---
+title: Microsoft Edge system and language requirements
+description: Overview information about Microsoft Edge, the default browser for Windows 10. This topic includes links to other Microsoft Edge topics.
+ms.assetid: 70377735-b2f9-4b0b-9658-4cf7c1d745bb
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+author: dansimp
+ms.prod: edge
+ms.mktglfcycl: general
+ms.topic: reference
+ms.sitesec: library
+title: Microsoft Edge for IT Pros
+ms.localizationpriority: medium
+ms.date: 10/02/2018
+---
+
+# Microsoft Edge system and language requirements
+>Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile
+
+Microsoft Edge is the new, default web browser for Windows 10, helping you to experience modern web standards, better performance, improved security, and increased reliability. Microsoft Edge lets you stay up-to-date through the Microsoft Store and to manage your enterprise through Group Policy or your mobile device management (MDM) tools.
+
+
+>[!IMPORTANT]
+>The Long-Term Servicing Branch (LTSB) versions of Windows, including Windows Server 2016, don’t include Microsoft Edge or many other Universal Windows Platform (UWP) apps. Systems running the LTSB operating systems do not support these apps because their services get frequently updated with new functionality. For customers who require the LTSB for specialized devices, we recommend using Internet Explorer 11.
+
+
+## Minimum system requirements
+Some of the components might also need additional system resources. Check the component's documentation for more information.
+
+
+| Item | Minimum requirements |
+|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Computer/processor | 1 gigahertz (GHz) or faster (32-bit (x86) or 64-bit (x64)) |
+| Operating system | - Windows 10 (32-bit or 64-bit)
- Windows 10 Mobile
Note
For specific Windows 10 Mobile requirements, see the [Minimum hardware requirements for Windows 10 Mobile](https://go.microsoft.com/fwlink/p/?LinkID=699266) topic. |
+| Memory |
- Windows 10 (32-bit) - 1 GB
- Windows 10 (64-bit) - 2 GB
|
+| Hard drive space | - Windows 10 (32-bit) - 16 GB
- Windows 10 (64-bit) - 20 GB
|
+| DVD drive | DVD-ROM drive (if installing from a DVD-ROM) |
+| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors |
+| Graphics card | Microsoft DirectX 9 or later with Windows Display Driver Model (WDDM) 1.0 driver |
+| Peripherals | Internet connection and a compatible pointing device |
+
+---
+
+
+## Supported languages
+
+Microsoft Edge supports all of the same languages as Windows 10 and you can use the [Microsoft Translator extension](https://www.microsoft.com/p/translator-for-microsoft-edge/9nblggh4n4n3) to translate foreign language web pages and text selections for 60+ languages.
+
+If the extension does not work after install, restart Microsoft Edge. If the extension still does not work, provide feedback through the Feedback Hub.
+
+
+| Language | Country/Region | Code |
+|----------------------------------------------------|-----------------------------------------|----------------|
+| Afrikaans (South Africa) | South Africa | af-ZA |
+| Albanian (Albania) | Albania | sq-AL |
+| Amharic | Ethiopia | am-ET |
+| Arabic (Saudi Arabia) | Saudi Arabia | ar-SA |
+| Armenian | Armenia | hy-AM |
+| Assamese | India | as-IN |
+| Azerbaijani (Latin, Azerbaijan) | Azerbaijan | az-Latn-AZ |
+| Bangla (Bangladesh) | Bangladesh | bn-BD |
+| Bangla (India) | India | bn-IN |
+| Basque (Basque) | Spain | eu-ES |
+| Belarusian (Belarus) | Belarus | be-BY |
+| Bosnian (Latin) | Bosnia and Herzegovina | bs-Latn-BA |
+| Bulgarian (Bulgaria) | Bulgaria | bg-BG |
+| Catalan (Catalan) | Spain | ca-ES |
+| Central Kurdish (Arabic) | Iraq | ku-Arab-IQ |
+| Cherokee (Cherokee) | United States | chr-Cher-US |
+| Chinese (Hong Kong SAR) | Hong Kong Special Administrative Region | zh-HK |
+| Chinese (Simplified, China) | People's Republic of China | zh-CN |
+| Chinese (Traditional, Taiwan) | Taiwan | zh-TW |
+| Croatian (Croatia) | Croatia | hr-HR |
+| Czech (Czech Republic) | Czech Republic | cs-CZ |
+| Danish (Denmark) | Denmark | da-DK |
+| Dari | Afghanistan | prs-AF |
+| Dutch (Netherlands) | Netherlands | nl-NL |
+| English (United Kingdom) | United Kingdom | en-GB |
+| English (United States) | United States | en-US |
+| Estonian (Estonia) | Estonia | et-EE |
+| Filipino (Philippines) | Philippines | fil-PH |
+| Finnish (Finland) | Finland | fi_FI |
+| French (Canada) | Canada | fr-CA |
+| French (France) | France | fr-FR |
+| Galician (Galician) | Spain | gl-ES |
+| Georgian | Georgia | ka-GE |
+| German (Germany) | Germany | de-DE |
+| Greek (Greece) | Greece | el-GR |
+| Gujarati | India | gu-IN |
+| Hausa (Latin, Nigeria) | Nigeria | ha-Latn-NG |
+| Hebrew (Israel) | Israel | he-IL |
+| Hindi (India) | India | hi-IN |
+| Hungarian (Hungary) | Hungary | hu-HU |
+| Icelandic | Iceland | is-IS |
+| Igbo | Nigeria | ig-NG |
+| Indonesian (Indonesia) | Indonesia | id-ID |
+| Irish | Ireland | ga-IE |
+| isiXhosa | South Africa | xh-ZA |
+| isiZulu | South Africa | zu-ZA |
+| Italian (Italy) | Italy | it-IT |
+| Japanese (Japan) | Japan | ja-JP |
+| Kannada | India | kn-IN |
+| Kazakh (Kazakhstan) | Kazakhstan | kk-KZ |
+| Khmer (Cambodia) | Cambodia | km-KH |
+| K'iche' | Guatemala | quc-Latn-GT |
+| Kinyarwanda | Rwanda | rw-RW |
+| KiSwahili | Kenya, Tanzania | sw-KE |
+| Konkani | India | kok-IN |
+| Korean (Korea) | Korea | ko-KR |
+| Kyrgyz | Kyrgyzstan | ky-KG |
+| Lao (Laos) | Lao P.D.R. | lo-LA |
+| Latvian (Latvia) | Latvia | lv-LV |
+| Lithuanian (Lithuania) | Lithuania | lt-LT |
+| Luxembourgish (Luxembourg) | Luxembourg | lb-LU |
+| Macedonian (Former Yugoslav Republic of Macedonia) | Macedonia (FYROM) | mk-MK |
+| Malay (Malaysia) | Malaysia, Brunei, and Singapore | ms-MY |
+| Malayalam | India | ml-IN |
+| Maltese | Malta | mt-MT |
+| Maori | New Zealand | mi-NZ |
+| Marathi | India | mr-IN |
+| Mongolian (Cyrillic) | Mongolia | mn-MN |
+| Nepali | Federal Democratic Republic of Nepal | ne-NP |
+| Norwegian (Nynorsk) | Norway | nn-NO |
+| Norwegian, Bokmål (Norway) | Norway | nb-NO |
+| Odia | India | or-IN |
+| Polish (Poland) | Poland | pl-PL |
+| Portuguese (Brazil) | Brazil | pt-BR |
+| Portuguese (Portugal) | Portugal | pt-PT |
+| Punjabi | India | pa-IN |
+| Punjabi (Arabic) | Pakistan | pa-Arab-PK |
+| Quechua | Peru | quz-PE |
+| Romanian (Romania) | Romania | ro-RO |
+| Russian (Russia) | Russia | ru-RU |
+| Scottish Gaelic | United Kingdom | gd-GB |
+| Serbian (Cyrillic, Bosnia, and Herzegovina) | Bosnia and Herzegovina | sr-Cyrl-BA |
+| Serbian (Cyrillic, Serbia) | Serbia | sr-Cyrl-RS |
+| Serbian (Latin, Serbia) | Serbia | sr-Latn-RS |
+| Sesotho sa Leboa | South Africa | nso-ZA |
+| Setswana (South Africa) | South Africa and Botswana | tn-ZA |
+| Sindhi (Arabic) | Pakistan | sd-Arab-PK |
+| Sinhala | Sri Lanka | si-LK |
+| Slovak (Slovakia) | Slovakia | sk-SK |
+| Slovenian (Slovenia) | Slovenia | sl-SL |
+| Spanish (Mexico) | Mexico | es-MX |
+| Spanish (Spain, International Sort) | Spain | en-ES |
+| Swedish (Sweden) | Sweden | sv-SE |
+| Tajik (Cyrillic) | Tajikistan | tg-Cyrl-TJ |
+| Tamil (India) | India and Sri Lanka | ta-IN |
+| Tatar | Russia | tt-RU |
+| Telugu | India | te-IN |
+| Thai (Thailand) | Thailand | th-TH |
+| Tigrinya (Ethiopia) | Ethiopia | ti-ET |
+| Turkish (Turkey) | Turkey | tr-TR |
+| Turkmen | Turkmenistan | tk-TM |
+| Ukrainian (Ukraine) | Ukraine | uk-UA |
+| Urdu | Pakistan | ur-PK |
+| Uyghur | People's Republic of China | ug-CN |
+| Uzbek (Latin, Uzbekistan) | Uzbekistan | uz-Latn-UZ |
+| Valencian | Spain | ca-ES-valencia |
+| Vietnamese | Vietnam | vi-VN |
+| Welsh | United Kingdom | cy-GB |
+| Wolof | Senegal | wo-SN |
+| Yoruba | Nigeria | yo-NG |
+
+---
diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md
index 18890c69ed..37bef54e3a 100644
--- a/browsers/edge/available-policies.md
+++ b/browsers/edge/available-policies.md
@@ -1,221 +1,222 @@
----
-description: You can customize your organization’s browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many.
-ms.assetid: 2e849894-255d-4f68-ae88-c2e4e31fa165
-ms.reviewer:
-author: eavena
-ms.author: eravena
-audience: itpro
manager: dansimp
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.topic: reference
-ms.sitesec: library
-title: Group Policy and Mobile Device Management settings for Microsoft Edge (Microsoft Edge for IT Pros)
-ms.localizationpriority: medium
----
-
-# Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge
-
-> Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile
-
-You can customize your organization’s browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many. For example, you can set up multiple security settings in a Group Policy Object (GPO) linked to a domain, and then apply those settings to every computer in the domain.
-
-Other policy settings in Microsoft Edge include allowing Adobe Flash content to play automatically, provision a favorites list, set default search engine, and more. You configure a Group Policy setting in the Administrative Templates folders, which are registry-based policy settings that Group Policy enforces. Group Policy stores these settings in a specific registry location, which users cannot change. Also, Group Policy-aware Windows features and applications look for these settings in the registry, and if found the policy setting gets used instead of the regular settings.
-
-**_You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor:_**
-
- *Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\*
-
-When you edit a Group Policy setting, you have the following configuration options:
-
-- **Enabled** - writes the policy setting to the registry with a value that enables it.
-- **Disabled** - writes the policy setting to the registry with a value that disables it.
-- **Not configured** - leaves the policy setting undefined. Group Policy does not write the policy setting to the registry and has no impact on computers or users.
-
-Some policy settings have additional options you can configure. For example, if you want to set the default search engine, set the Start page, or configure the Enterprise Mode Site List, you would type the URL.
-
-
-## Allow a shared books folder
-[!INCLUDE [allow-shared-folder-books-include.md](includes/allow-shared-folder-books-include.md)]
-
-## Allow Address bar drop-down list suggestions
-[!INCLUDE [allow-address-bar-suggestions-include.md](includes/allow-address-bar-suggestions-include.md)]
-
-## Allow Adobe Flash
-[!INCLUDE [allow-adobe-flash-include.md](includes/allow-adobe-flash-include.md)]
-
-## Allow clearing browsing data on exit
-[!INCLUDE [allow-clearing-browsing-data-include.md](includes/allow-clearing-browsing-data-include.md)]
-
-## Allow configuration updates for the Books Library
-[!INCLUDE [allow-config-updates-books-include.md](includes/allow-config-updates-books-include.md)]
-
-## Allow Cortana
-[!INCLUDE [allow-cortana-include.md](includes/allow-cortana-include.md)]
-
-## Allow Developer Tools
-[!INCLUDE [allow-dev-tools-include.md](includes/allow-dev-tools-include.md)]
-
-## Allow extended telemetry for the Books tab
-[!INCLUDE [allow-ext-telemetry-books-tab-include.md](includes/allow-ext-telemetry-books-tab-include.md)]
-
-## Allow Extensions
-[!INCLUDE [allow-extensions-include.md](includes/allow-extensions-include.md)]
-
-## Allow fullscreen mode
-[!INCLUDE [allow-full-screen-include](includes/allow-full-screen-include.md)]
-
-## Allow InPrivate browsing
-[!INCLUDE [allow-inprivate-browsing-include.md](includes/allow-inprivate-browsing-include.md)]
-
-## Allow Microsoft Compatibility List
-[!INCLUDE [allow-microsoft-compatibility-list-include.md](includes/allow-microsoft-compatibility-list-include.md)]
-
-## Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed
-[!INCLUDE [allow-prelaunch-include](includes/allow-prelaunch-include.md)]
-
-## Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed
-[!INCLUDE [allow-tab-preloading-include](includes/allow-tab-preloading-include.md)]
-
-## Allow printing
-[!INCLUDE [allow-printing-include.md](includes/allow-printing-include.md)]
-
-## Allow Saving History
-[!INCLUDE [allow-saving-history-include.md](includes/allow-saving-history-include.md)]
-
-## Allow search engine customization
-[!INCLUDE [allow-search-engine-customization-include.md](includes/allow-search-engine-customization-include.md)]
-
-## Allow sideloading of Extensions
-[!INCLUDE [allow-sideloading-extensions-include.md](includes/allow-sideloading-extensions-include.md)]
-
-## Allow web content on New Tab page
-[!INCLUDE [allow-web-content-new-tab-page-include.md](includes/allow-web-content-new-tab-page-include.md)]
-
-## Always show the Books Library in Microsoft Edge
-[!INCLUDE [always-enable-book-library-include.md](includes/always-enable-book-library-include.md)]
-
-## Configure additional search engines
-[!INCLUDE [configure-additional-search-engines-include.md](includes/configure-additional-search-engines-include.md)]
-
-## Configure Autofill
-[!INCLUDE [configure-autofill-include.md](includes/configure-autofill-include.md)]
-
-## Configure collection of browsing data for Microsoft 365 Analytics
-[!INCLUDE [configure-browser-telemetry-for-m365-analytics-include](includes/configure-browser-telemetry-for-m365-analytics-include.md)]
-
-## Configure cookies
-[!INCLUDE [configure-cookies-include.md](includes/configure-cookies-include.md)]
-
-## Configure Do Not Track
-[!INCLUDE [configure-do-not-track-include.md](includes/configure-do-not-track-include.md)]
-
-## Configure Favorites
-[!INCLUDE [configure-favorites-include.md](includes/configure-favorites-include.md)]
-
-## Configure Favorites Bar
-[!INCLUDE [configure-favorites-bar-include.md](includes/configure-favorites-bar-include.md)]
-
-## Configure Home Button
-[!INCLUDE [configure-home-button-include.md](includes/configure-home-button-include.md)]
-
-## Configure kiosk mode
-[!INCLUDE [configure-microsoft-edge-kiosk-mode-include.md](includes/configure-microsoft-edge-kiosk-mode-include.md)]
-
-## Configure kiosk reset after idle timeout
-[!INCLUDE [configure-edge-kiosk-reset-idle-timeout-include.md](includes/configure-edge-kiosk-reset-idle-timeout-include.md)]
-
-## Configure Open Microsoft Edge With
-[!INCLUDE [configure-open-edge-with-include.md](includes/configure-open-edge-with-include.md)]
-
-## Configure Password Manager
-[!INCLUDE [configure-password-manager-include.md](includes/configure-password-manager-include.md)]
-
-## Configure Pop-up Blocker
-[!INCLUDE [configure-pop-up-blocker-include.md](includes/configure-pop-up-blocker-include.md)]
-
-## Configure search suggestions in Address bar
-[!INCLUDE [configure-search-suggestions-address-bar-include.md](includes/configure-search-suggestions-address-bar-include.md)]
-
-## Configure Start pages
-[!INCLUDE [configure-start-pages-include.md](includes/configure-start-pages-include.md)]
-
-## Configure the Adobe Flash Click-to-Run setting
-[!INCLUDE [configure-adobe-flash-click-to-run-include.md](includes/configure-adobe-flash-click-to-run-include.md)]
-
-## Configure the Enterprise Mode Site List
-[!INCLUDE [configure-enterprise-mode-site-list-include.md](includes/configure-enterprise-mode-site-list-include.md)]
-
-## Configure Windows Defender SmartScreen
-[!INCLUDE [configure-windows-defender-smartscreen-include.md](includes/configure-windows-defender-smartscreen-include.md)]
-
-## Disable lockdown of Start pages
-[!INCLUDE [disable-lockdown-of-start-pages-include.md](includes/disable-lockdown-of-start-pages-include.md)]
-
-## Do not sync
-[!INCLUDE [do-not-sync-include.md](includes/do-not-sync-include.md)]
-
-## Do not sync browser settings
-[!INCLUDE [do-not-sync-browser-settings-include.md](includes/do-not-sync-browser-settings-include.md)]
-
-## Keep favorites in sync between Internet Explorer and Microsoft Edge
-[!INCLUDE [keep-fav-sync-ie-edge-include.md](includes/keep-fav-sync-ie-edge-include.md)]
-
-## Prevent access to the about:flags page
-[!INCLUDE [prevent-access-about-flag-include.md](includes/prevent-access-about-flag-include.md)]
-
-## Prevent bypassing Windows Defender SmartScreen prompts for files
-[!INCLUDE [prevent-bypassing-win-defender-files-include.md](includes/prevent-bypassing-win-defender-files-include.md)]
-
-## Prevent bypassing Windows Defender SmartScreen prompts for sites
-[!INCLUDE [prevent-bypassing-win-defender-sites-include.md](includes/prevent-bypassing-win-defender-sites-include.md)]
-
-## Prevent certificate error overrides
-[!INCLUDE [prevent-certificate-error-overrides-include.md](includes/prevent-certificate-error-overrides-include.md)]
-
-## Prevent changes to Favorites on Microsoft Edge
-[!INCLUDE [prevent-changes-to-favorites-include.md](includes/prevent-changes-to-favorites-include.md)]
-
-## Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start
-[!INCLUDE [prevent-live-tile-pinning-start-include](includes/prevent-live-tile-pinning-start-include.md)]
-
-## Prevent the First Run webpage from opening on Microsoft Edge
-[!INCLUDE [prevent-first-run-webpage-open-include.md](includes/prevent-first-run-webpage-open-include.md)]
-
-## Prevent turning off required extensions
-[!INCLUDE [prevent-turning-off-required-extensions-include.md](includes/prevent-turning-off-required-extensions-include.md)]
-
-## Prevent users from turning on browser syncing
-[!INCLUDE [prevent-users-to-turn-on-browser-syncing-include](includes/prevent-users-to-turn-on-browser-syncing-include.md)]
-
-## Prevent using Localhost IP address for WebRTC
-[!INCLUDE [prevent-localhost-address-for-webrtc-include.md](includes/prevent-localhost-address-for-webrtc-include.md)]
-
-## Provision Favorites
-[!INCLUDE [provision-favorites-include](includes/provision-favorites-include.md)]
-
-## Send all intranet sites to Internet Explorer 11
-[!INCLUDE [send-all-intranet-sites-ie-include.md](includes/send-all-intranet-sites-ie-include.md)]
-
-## Set default search engine
-[!INCLUDE [set-default-search-engine-include.md](includes/set-default-search-engine-include.md)]
-
-## Set Home Button URL
-[!INCLUDE [set-home-button-url-include](includes/set-home-button-url-include.md)]
-
-## Set New Tab page URL
-[!INCLUDE [set-new-tab-url-include.md](includes/set-new-tab-url-include.md)]
-
-## Show message when opening sites in Internet Explorer
-[!INCLUDE [show-message-opening-sites-ie-include](includes/show-message-opening-sites-ie-include.md)]
-
-## Unlock Home Button
-[!INCLUDE [unlock-home-button-include.md](includes/unlock-home-button-include.md)]
-
-
-
-## Related topics
-- [Mobile Device Management (MDM) settings](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider)
-- [Group Policy and the Group Policy Management Console (GPMC)](https://go.microsoft.com/fwlink/p/?LinkId=617921)
-- [Group Policy and the Local Group Policy Editor](https://go.microsoft.com/fwlink/p/?LinkId=617922)
-- [Group Policy and the Advanced Group Policy Management (AGPM)](https://go.microsoft.com/fwlink/p/?LinkId=617923)
-- [Group Policy and Windows PowerShell](https://go.microsoft.com/fwlink/p/?LinkId=617924).
+---
+description: You can customize your organization’s browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many.
+ms.assetid: 2e849894-255d-4f68-ae88-c2e4e31fa165
+ms.reviewer:
+author: dansimp
+ms.author: dansimp
+audience: itpro
+manager: dansimp
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.topic: reference
+ms.sitesec: library
+title: Group Policy and Mobile Device Management settings for Microsoft Edge (Microsoft Edge for IT Pros)
+ms.localizationpriority: medium
+---
+
+# Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge
+
+> Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile
+
+You can customize your organization’s browser settings in Microsoft Edge with Group Policy or Microsoft Intune, or other MDM service. When you do this, you set the policy once and then copy it onto many computers—that is, touch once, configure many. For example, you can set up multiple security settings in a Group Policy Object (GPO) linked to a domain, and then apply those settings to every computer in the domain.
+
+Other policy settings in Microsoft Edge include allowing Adobe Flash content to play automatically, provision a favorites list, set default search engine, and more. You configure a Group Policy setting in the Administrative Templates folders, which are registry-based policy settings that Group Policy enforces. Group Policy stores these settings in a specific registry location, which users cannot change. Also, Group Policy-aware Windows features and applications look for these settings in the registry, and if found the policy setting gets used instead of the regular settings.
+
+**_You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor:_**
+
+ *Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\*
+
+When you edit a Group Policy setting, you have the following configuration options:
+
+- **Enabled** - writes the policy setting to the registry with a value that enables it.
+- **Disabled** - writes the policy setting to the registry with a value that disables it.
+- **Not configured** - leaves the policy setting undefined. Group Policy does not write the policy setting to the registry and has no impact on computers or users.
+
+Some policy settings have additional options you can configure. For example, if you want to set the default search engine, set the Start page, or configure the Enterprise Mode Site List, you would type the URL.
+
+
+## Allow a shared books folder
+[!INCLUDE [allow-shared-folder-books-include.md](includes/allow-shared-folder-books-include.md)]
+
+## Allow Address bar drop-down list suggestions
+[!INCLUDE [allow-address-bar-suggestions-include.md](includes/allow-address-bar-suggestions-include.md)]
+
+## Allow Adobe Flash
+[!INCLUDE [allow-adobe-flash-include.md](includes/allow-adobe-flash-include.md)]
+
+## Allow clearing browsing data on exit
+[!INCLUDE [allow-clearing-browsing-data-include.md](includes/allow-clearing-browsing-data-include.md)]
+
+## Allow configuration updates for the Books Library
+[!INCLUDE [allow-config-updates-books-include.md](includes/allow-config-updates-books-include.md)]
+
+## Allow Cortana
+[!INCLUDE [allow-cortana-include.md](includes/allow-cortana-include.md)]
+
+## Allow Developer Tools
+[!INCLUDE [allow-dev-tools-include.md](includes/allow-dev-tools-include.md)]
+
+## Allow extended telemetry for the Books tab
+[!INCLUDE [allow-ext-telemetry-books-tab-include.md](includes/allow-ext-telemetry-books-tab-include.md)]
+
+## Allow Extensions
+[!INCLUDE [allow-extensions-include.md](includes/allow-extensions-include.md)]
+
+## Allow fullscreen mode
+[!INCLUDE [allow-full-screen-include](includes/allow-full-screen-include.md)]
+
+## Allow InPrivate browsing
+[!INCLUDE [allow-inprivate-browsing-include.md](includes/allow-inprivate-browsing-include.md)]
+
+## Allow Microsoft Compatibility List
+[!INCLUDE [allow-microsoft-compatibility-list-include.md](includes/allow-microsoft-compatibility-list-include.md)]
+
+## Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed
+[!INCLUDE [allow-prelaunch-include](includes/allow-prelaunch-include.md)]
+
+## Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed
+[!INCLUDE [allow-tab-preloading-include](includes/allow-tab-preloading-include.md)]
+
+## Allow printing
+[!INCLUDE [allow-printing-include.md](includes/allow-printing-include.md)]
+
+## Allow Saving History
+[!INCLUDE [allow-saving-history-include.md](includes/allow-saving-history-include.md)]
+
+## Allow search engine customization
+[!INCLUDE [allow-search-engine-customization-include.md](includes/allow-search-engine-customization-include.md)]
+
+## Allow sideloading of Extensions
+[!INCLUDE [allow-sideloading-extensions-include.md](includes/allow-sideloading-extensions-include.md)]
+
+## Allow web content on New Tab page
+[!INCLUDE [allow-web-content-new-tab-page-include.md](includes/allow-web-content-new-tab-page-include.md)]
+
+## Always show the Books Library in Microsoft Edge
+[!INCLUDE [always-enable-book-library-include.md](includes/always-enable-book-library-include.md)]
+
+## Configure additional search engines
+[!INCLUDE [configure-additional-search-engines-include.md](includes/configure-additional-search-engines-include.md)]
+
+## Configure Autofill
+[!INCLUDE [configure-autofill-include.md](includes/configure-autofill-include.md)]
+
+## Configure collection of browsing data for Microsoft 365 Analytics
+[!INCLUDE [configure-browser-telemetry-for-m365-analytics-include](includes/configure-browser-telemetry-for-m365-analytics-include.md)]
+
+## Configure cookies
+[!INCLUDE [configure-cookies-include.md](includes/configure-cookies-include.md)]
+
+## Configure Do Not Track
+[!INCLUDE [configure-do-not-track-include.md](includes/configure-do-not-track-include.md)]
+
+## Configure Favorites
+[!INCLUDE [configure-favorites-include.md](includes/configure-favorites-include.md)]
+
+## Configure Favorites Bar
+[!INCLUDE [configure-favorites-bar-include.md](includes/configure-favorites-bar-include.md)]
+
+## Configure Home Button
+[!INCLUDE [configure-home-button-include.md](includes/configure-home-button-include.md)]
+
+## Configure kiosk mode
+[!INCLUDE [configure-microsoft-edge-kiosk-mode-include.md](includes/configure-microsoft-edge-kiosk-mode-include.md)]
+
+## Configure kiosk reset after idle timeout
+[!INCLUDE [configure-edge-kiosk-reset-idle-timeout-include.md](includes/configure-edge-kiosk-reset-idle-timeout-include.md)]
+
+## Configure Open Microsoft Edge With
+[!INCLUDE [configure-open-edge-with-include.md](includes/configure-open-edge-with-include.md)]
+
+## Configure Password Manager
+[!INCLUDE [configure-password-manager-include.md](includes/configure-password-manager-include.md)]
+
+## Configure Pop-up Blocker
+[!INCLUDE [configure-pop-up-blocker-include.md](includes/configure-pop-up-blocker-include.md)]
+
+## Configure search suggestions in Address bar
+[!INCLUDE [configure-search-suggestions-address-bar-include.md](includes/configure-search-suggestions-address-bar-include.md)]
+
+## Configure Start pages
+[!INCLUDE [configure-start-pages-include.md](includes/configure-start-pages-include.md)]
+
+## Configure the Adobe Flash Click-to-Run setting
+[!INCLUDE [configure-adobe-flash-click-to-run-include.md](includes/configure-adobe-flash-click-to-run-include.md)]
+
+## Configure the Enterprise Mode Site List
+[!INCLUDE [configure-enterprise-mode-site-list-include.md](includes/configure-enterprise-mode-site-list-include.md)]
+
+## Configure Windows Defender SmartScreen
+[!INCLUDE [configure-windows-defender-smartscreen-include.md](includes/configure-windows-defender-smartscreen-include.md)]
+
+## Disable lockdown of Start pages
+[!INCLUDE [disable-lockdown-of-start-pages-include.md](includes/disable-lockdown-of-start-pages-include.md)]
+
+## Do not sync
+[!INCLUDE [do-not-sync-include.md](includes/do-not-sync-include.md)]
+
+## Do not sync browser settings
+[!INCLUDE [do-not-sync-browser-settings-include.md](includes/do-not-sync-browser-settings-include.md)]
+
+## Keep favorites in sync between Internet Explorer and Microsoft Edge
+[!INCLUDE [keep-fav-sync-ie-edge-include.md](includes/keep-fav-sync-ie-edge-include.md)]
+
+## Prevent access to the about:flags page
+[!INCLUDE [prevent-access-about-flag-include.md](includes/prevent-access-about-flag-include.md)]
+
+## Prevent bypassing Windows Defender SmartScreen prompts for files
+[!INCLUDE [prevent-bypassing-win-defender-files-include.md](includes/prevent-bypassing-win-defender-files-include.md)]
+
+## Prevent bypassing Windows Defender SmartScreen prompts for sites
+[!INCLUDE [prevent-bypassing-win-defender-sites-include.md](includes/prevent-bypassing-win-defender-sites-include.md)]
+
+## Prevent certificate error overrides
+[!INCLUDE [prevent-certificate-error-overrides-include.md](includes/prevent-certificate-error-overrides-include.md)]
+
+## Prevent changes to Favorites on Microsoft Edge
+[!INCLUDE [prevent-changes-to-favorites-include.md](includes/prevent-changes-to-favorites-include.md)]
+
+## Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start
+[!INCLUDE [prevent-live-tile-pinning-start-include](includes/prevent-live-tile-pinning-start-include.md)]
+
+## Prevent the First Run webpage from opening on Microsoft Edge
+[!INCLUDE [prevent-first-run-webpage-open-include.md](includes/prevent-first-run-webpage-open-include.md)]
+
+## Prevent turning off required extensions
+[!INCLUDE [prevent-turning-off-required-extensions-include.md](includes/prevent-turning-off-required-extensions-include.md)]
+
+## Prevent users from turning on browser syncing
+[!INCLUDE [prevent-users-to-turn-on-browser-syncing-include](includes/prevent-users-to-turn-on-browser-syncing-include.md)]
+
+## Prevent using Localhost IP address for WebRTC
+[!INCLUDE [prevent-localhost-address-for-webrtc-include.md](includes/prevent-localhost-address-for-webrtc-include.md)]
+
+## Provision Favorites
+[!INCLUDE [provision-favorites-include](includes/provision-favorites-include.md)]
+
+## Send all intranet sites to Internet Explorer 11
+[!INCLUDE [send-all-intranet-sites-ie-include.md](includes/send-all-intranet-sites-ie-include.md)]
+
+## Set default search engine
+[!INCLUDE [set-default-search-engine-include.md](includes/set-default-search-engine-include.md)]
+
+## Set Home Button URL
+[!INCLUDE [set-home-button-url-include](includes/set-home-button-url-include.md)]
+
+## Set New Tab page URL
+[!INCLUDE [set-new-tab-url-include.md](includes/set-new-tab-url-include.md)]
+
+## Show message when opening sites in Internet Explorer
+[!INCLUDE [show-message-opening-sites-ie-include](includes/show-message-opening-sites-ie-include.md)]
+
+## Unlock Home Button
+[!INCLUDE [unlock-home-button-include.md](includes/unlock-home-button-include.md)]
+
+
+
+## Related topics
+- [Mobile Device Management (MDM) settings](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider)
+- [Group Policy and the Group Policy Management Console (GPMC)](https://go.microsoft.com/fwlink/p/?LinkId=617921)
+- [Group Policy and the Local Group Policy Editor](https://go.microsoft.com/fwlink/p/?LinkId=617922)
+- [Group Policy and the Advanced Group Policy Management (AGPM)](https://go.microsoft.com/fwlink/p/?LinkId=617923)
+- [Group Policy and Windows PowerShell](https://go.microsoft.com/fwlink/p/?LinkId=617924).
diff --git a/browsers/edge/change-history-for-microsoft-edge.md b/browsers/edge/change-history-for-microsoft-edge.md
index 19530f7f71..e02b6ba010 100644
--- a/browsers/edge/change-history-for-microsoft-edge.md
+++ b/browsers/edge/change-history-for-microsoft-edge.md
@@ -1,102 +1,102 @@
----
-title: Change history for Microsoft Edge (Microsoft Edge for IT Pros)
-description: Discover what's new and updated in the Microsoft Edge for both Windows 10 and Windows 10 Mobile.
-ms.prod: edge
-ms.topic: reference
-ms.mktglfcycl: explore
-ms.sitesec: library
-ms.localizationpriority: medium
-audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
-ms.date: 10/02/2018
-ms.reviewer:
----
-
-# Change history for Microsoft Edge
-Discover what's new and updated in the Microsoft Edge for both Windows 10 and Windows 10 Mobile.
-
-
-#### [2018](#tab/2018/)
-## October 2018
-
-The Microsoft Edge team introduces new group policies and MDM settings for Microsoft Edge on Windows 10. The new policies let you enable/disable
-full-screen mode, printing, favorites bar, saving history. You can also prevent certificate error overrides, and configure the New Tab page, Home button, and startup options, as well as manage extensions.
-
-We have discontinued the **Configure Favorites** group policy, so use the [Provision Favorites](available-policies.md#provision-favorites) policy instead.
-
->>You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
->>
->> **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-
-
-| **New or updated** | **Group Policy** | **Description** |
-|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------|
-| New | [Allow fullscreen mode](group-policies/browser-settings-management-gp.md#allow-fullscreen-mode) | [!INCLUDE [allow-fullscreen-mode-shortdesc](shortdesc/allow-fullscreen-mode-shortdesc.md)] |
-| New | [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-pre-launch-at-windows-startup-when-the-system-is-idle-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-prelaunch-shortdesc](shortdesc/allow-prelaunch-shortdesc.md)] |
-| New | [Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-tab-preloading-shortdesc](shortdesc/allow-tab-preloading-shortdesc.md)] |
-| New | [Allow printing](group-policies/browser-settings-management-gp.md#allow-printing) | [!INCLUDE [allow-printing-shortdesc](shortdesc/allow-printing-shortdesc.md)] |
-| New | [Allow Saving History](group-policies/browser-settings-management-gp.md#allow-saving-history) | [!INCLUDE [allow-saving-history-shortdesc](shortdesc/allow-saving-history-shortdesc.md)] |
-| New | [Allow sideloading of Extensions](group-policies/extensions-management-gp.md#allow-sideloading-of-extensions) | [!INCLUDE [allow-sideloading-of-extensions-shortdesc](shortdesc/allow-sideloading-of-extensions-shortdesc.md)] |
-| New | [Configure collection of browsing data for Microsoft 365 Analytics](group-policies/telemetry-management-gp.md#configure-collection-of-browsing-data-for-microsoft-365-analytics) | [!INCLUDE [configure-browser-telemetry-for-m365-analytics-shortdesc](shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md)] |
-| New | [Configure Favorites Bar](group-policies/favorites-management-gp.md#configure-favorites-bar) | [!INCLUDE [configure-favorites-bar-shortdesc](shortdesc/configure-favorites-bar-shortdesc.md)] |
-| New | [Configure Home Button](group-policies/home-button-gp.md#configure-home-button) | [!INCLUDE [configure-home-button-shortdesc](shortdesc/configure-home-button-shortdesc.md)] |
-| New | [Configure kiosk mode](available-policies.md#configure-kiosk-mode) | [!INCLUDE [configure-kiosk-mode-shortdesc](shortdesc/configure-kiosk-mode-shortdesc.md)] |
-| New | [Configure kiosk reset after idle timeout](available-policies.md#configure-kiosk-reset-after-idle-timeout) | [!INCLUDE [configure-kiosk-reset-after-idle-timeout-shortdesc](shortdesc/configure-kiosk-reset-after-idle-timeout-shortdesc.md)] |
-| New | [Configure Open Microsoft Edge With](group-policies/start-pages-gp.md#configure-open-microsoft-edge-with) | [!INCLUDE [configure-open-microsoft-edge-with-shortdesc](shortdesc/configure-open-microsoft-edge-with-shortdesc.md)] |
-| New | [Prevent certificate error overrides](group-policies/security-privacy-management-gp.md#prevent-certificate-error-overrides) | [!INCLUDE [prevent-certificate-error-overrides-shortdesc](shortdesc/prevent-certificate-error-overrides-shortdesc.md)] |
-| New | [Prevent users from turning on browser syncing](group-policies/sync-browser-settings-gp.md#prevent-users-from-turning-on-browser-syncing) | [!INCLUDE [prevent-users-to-turn-on-browser-syncing-shortdesc](shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md)] |
-| New | [Prevent turning off required extensions](group-policies/extensions-management-gp.md#prevent-turning-off-required-extensions) | [!INCLUDE [prevent-turning-off-required-extensions-shortdesc](shortdesc/prevent-turning-off-required-extensions-shortdesc.md)] |
-| New | [Set Home Button URL](group-policies/home-button-gp.md#set-home-button-url) | [!INCLUDE [set-home-button-url-shortdesc](shortdesc/set-home-button-url-shortdesc.md)] |
-| New | [Set New Tab page URL](group-policies/new-tab-page-settings-gp.md#set-new-tab-page-url) | [!INCLUDE [set-new-tab-url-shortdesc](shortdesc/set-new-tab-url-shortdesc.md)] |
-| Updated | [Show message when opening sites in Internet Explorer](group-policies/interoperability-enterprise-guidance-gp.md#show-message-when-opening-sites-in-internet-explorer) | [!INCLUDE [show-message-when-opening-sites-in-ie-shortdesc](shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md)] |
-| New | [Unlock Home Button](group-policies/home-button-gp.md#unlock-home-button) | [!INCLUDE [unlock-home-button-shortdesc](shortdesc/unlock-home-button-shortdesc.md)] |
-
-#### [2017](#tab/2017/)
-## September 2017
-
-|New or changed topic | Description |
-|---------------------|-------------|
-|[Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros](microsoft-edge-faq.md) | New |
-
-## February 2017
-
-|New or changed topic | Description |
-|----------------------|-------------|
-|[Available Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](available-policies.md) |Added new Group Policy and MDM settings for the Windows Insider Program. Reformatted for easier readability outside of scrolling table. |
-
-
-#### [2016](#tab/2016/)
-## November 2016
-
-|New or changed topic | Description |
-|----------------------|-------------|
-|[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added the infographic image and a download link.|
-|[Use Enterprise Mode to improve compatibility](emie-to-improve-compatibility.md) |Added a note about the 65 second wait before checking for a newer version of the site list .XML file. |
-|[Available policies for Microsoft Edge](available-policies.md) |Added notes to the Configure the Enterprise Mode Site List Group Policy and the EnterpriseModeSiteList MDM policy about the 65 second wait before checking for a newer version of the site list .XML file. |
-|Microsoft Edge - Deployment Guide for IT Pros |Added a link to the Microsoft Edge infographic, helping you to evaluate the potential impact of using Microsoft Edge in your organization. |
-|[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added a link to the Microsoft Edge infographic, helping you to evaluate the potential impact of using Microsoft Edge in your organization. |
-
-## July 2016
-
-|New or changed topic | Description |
-|----------------------|-------------|
-|[Microsoft Edge requirements and language support](hardware-and-software-requirements.md)| Updated to include a note about the Long Term Servicing Branch (LTSB). |
-|[Enterprise guidance about using Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) | Content moved from What's New section. |
-|[Available policies for Microsoft Edge](available-policies.md) |Updated |
-
-
-## June 2016
-
-|New or changed topic | Description |
-|----------------------|-------------|
-|[Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md) |New |
-
-## May 2016
-
-|New or changed topic | Description |
-|----------------------|-------------|
-|[Available Policies for Microsoft Edge](available-policies.md) | Added new policies and the Supported versions column for Windows 10 Insider Preview. |
-
-* * *
+---
+title: Change history for Microsoft Edge (Microsoft Edge for IT Pros)
+description: Discover what's new and updated in the Microsoft Edge for both Windows 10 and Windows 10 Mobile.
+ms.prod: edge
+ms.topic: reference
+ms.mktglfcycl: explore
+ms.sitesec: library
+ms.localizationpriority: medium
+audience: itpro
+manager: dansimp
+author: dansimp
+ms.date: 10/02/2018
+ms.author: dansimp
+---
+
+# Change history for Microsoft Edge
+Discover what's new and updated in the Microsoft Edge for both Windows 10 and Windows 10 Mobile.
+
+
+#### [2018](#tab/2018/)
+## October 2018
+
+The Microsoft Edge team introduces new group policies and MDM settings for Microsoft Edge on Windows 10. The new policies let you enable/disable
+full-screen mode, printing, favorites bar, saving history. You can also prevent certificate error overrides, and configure the New Tab page, Home button, and startup options, as well as manage extensions.
+
+We have discontinued the **Configure Favorites** group policy, so use the [Provision Favorites](available-policies.md#provision-favorites) policy instead.
+
+>>You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+>>
+>> **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+
+
+| **New or updated** | **Group Policy** | **Description** |
+|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------|
+| New | [Allow fullscreen mode](group-policies/browser-settings-management-gp.md#allow-fullscreen-mode) | [!INCLUDE [allow-fullscreen-mode-shortdesc](shortdesc/allow-fullscreen-mode-shortdesc.md)] |
+| New | [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-pre-launch-at-windows-startup-when-the-system-is-idle-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-prelaunch-shortdesc](shortdesc/allow-prelaunch-shortdesc.md)] |
+| New | [Allow Microsoft Edge to load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](group-policies/prelaunch-preload-gp.md#allow-microsoft-edge-to-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed) | [!INCLUDE [allow-tab-preloading-shortdesc](shortdesc/allow-tab-preloading-shortdesc.md)] |
+| New | [Allow printing](group-policies/browser-settings-management-gp.md#allow-printing) | [!INCLUDE [allow-printing-shortdesc](shortdesc/allow-printing-shortdesc.md)] |
+| New | [Allow Saving History](group-policies/browser-settings-management-gp.md#allow-saving-history) | [!INCLUDE [allow-saving-history-shortdesc](shortdesc/allow-saving-history-shortdesc.md)] |
+| New | [Allow sideloading of Extensions](group-policies/extensions-management-gp.md#allow-sideloading-of-extensions) | [!INCLUDE [allow-sideloading-of-extensions-shortdesc](shortdesc/allow-sideloading-of-extensions-shortdesc.md)] |
+| New | [Configure collection of browsing data for Microsoft 365 Analytics](group-policies/telemetry-management-gp.md#configure-collection-of-browsing-data-for-microsoft-365-analytics) | [!INCLUDE [configure-browser-telemetry-for-m365-analytics-shortdesc](shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md)] |
+| New | [Configure Favorites Bar](group-policies/favorites-management-gp.md#configure-favorites-bar) | [!INCLUDE [configure-favorites-bar-shortdesc](shortdesc/configure-favorites-bar-shortdesc.md)] |
+| New | [Configure Home Button](group-policies/home-button-gp.md#configure-home-button) | [!INCLUDE [configure-home-button-shortdesc](shortdesc/configure-home-button-shortdesc.md)] |
+| New | [Configure kiosk mode](available-policies.md#configure-kiosk-mode) | [!INCLUDE [configure-kiosk-mode-shortdesc](shortdesc/configure-kiosk-mode-shortdesc.md)] |
+| New | [Configure kiosk reset after idle timeout](available-policies.md#configure-kiosk-reset-after-idle-timeout) | [!INCLUDE [configure-kiosk-reset-after-idle-timeout-shortdesc](shortdesc/configure-kiosk-reset-after-idle-timeout-shortdesc.md)] |
+| New | [Configure Open Microsoft Edge With](group-policies/start-pages-gp.md#configure-open-microsoft-edge-with) | [!INCLUDE [configure-open-microsoft-edge-with-shortdesc](shortdesc/configure-open-microsoft-edge-with-shortdesc.md)] |
+| New | [Prevent certificate error overrides](group-policies/security-privacy-management-gp.md#prevent-certificate-error-overrides) | [!INCLUDE [prevent-certificate-error-overrides-shortdesc](shortdesc/prevent-certificate-error-overrides-shortdesc.md)] |
+| New | [Prevent users from turning on browser syncing](group-policies/sync-browser-settings-gp.md#prevent-users-from-turning-on-browser-syncing) | [!INCLUDE [prevent-users-to-turn-on-browser-syncing-shortdesc](shortdesc/prevent-users-to-turn-on-browser-syncing-shortdesc.md)] |
+| New | [Prevent turning off required extensions](group-policies/extensions-management-gp.md#prevent-turning-off-required-extensions) | [!INCLUDE [prevent-turning-off-required-extensions-shortdesc](shortdesc/prevent-turning-off-required-extensions-shortdesc.md)] |
+| New | [Set Home Button URL](group-policies/home-button-gp.md#set-home-button-url) | [!INCLUDE [set-home-button-url-shortdesc](shortdesc/set-home-button-url-shortdesc.md)] |
+| New | [Set New Tab page URL](group-policies/new-tab-page-settings-gp.md#set-new-tab-page-url) | [!INCLUDE [set-new-tab-url-shortdesc](shortdesc/set-new-tab-url-shortdesc.md)] |
+| Updated | [Show message when opening sites in Internet Explorer](group-policies/interoperability-enterprise-guidance-gp.md#show-message-when-opening-sites-in-internet-explorer) | [!INCLUDE [show-message-when-opening-sites-in-ie-shortdesc](shortdesc/show-message-when-opening-sites-in-ie-shortdesc.md)] |
+| New | [Unlock Home Button](group-policies/home-button-gp.md#unlock-home-button) | [!INCLUDE [unlock-home-button-shortdesc](shortdesc/unlock-home-button-shortdesc.md)] |
+
+#### [2017](#tab/2017/)
+## September 2017
+
+|New or changed topic | Description |
+|---------------------|-------------|
+|[Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros](microsoft-edge-faq.md) | New |
+
+## February 2017
+
+|New or changed topic | Description |
+|----------------------|-------------|
+|[Available Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](available-policies.md) |Added new Group Policy and MDM settings for the Windows Insider Program. Reformatted for easier readability outside of scrolling table. |
+
+
+#### [2016](#tab/2016/)
+## November 2016
+
+|New or changed topic | Description |
+|----------------------|-------------|
+|[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added the infographic image and a download link.|
+|[Use Enterprise Mode to improve compatibility](emie-to-improve-compatibility.md) |Added a note about the 65 second wait before checking for a newer version of the site list .XML file. |
+|[Available policies for Microsoft Edge](available-policies.md) |Added notes to the Configure the Enterprise Mode Site List Group Policy and the EnterpriseModeSiteList MDM policy about the 65 second wait before checking for a newer version of the site list .XML file. |
+|Microsoft Edge - Deployment Guide for IT Pros |Added a link to the Microsoft Edge infographic, helping you to evaluate the potential impact of using Microsoft Edge in your organization. |
+|[Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) |Added a link to the Microsoft Edge infographic, helping you to evaluate the potential impact of using Microsoft Edge in your organization. |
+
+## July 2016
+
+|New or changed topic | Description |
+|----------------------|-------------|
+|[Microsoft Edge requirements and language support](hardware-and-software-requirements.md)| Updated to include a note about the Long Term Servicing Branch (LTSB). |
+|[Enterprise guidance about using Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md) | Content moved from What's New section. |
+|[Available policies for Microsoft Edge](available-policies.md) |Updated |
+
+
+## June 2016
+
+|New or changed topic | Description |
+|----------------------|-------------|
+|[Security enhancements for Microsoft Edge](security-enhancements-microsoft-edge.md) |New |
+
+## May 2016
+
+|New or changed topic | Description |
+|----------------------|-------------|
+|[Available Policies for Microsoft Edge](available-policies.md) | Added new policies and the Supported versions column for Windows 10 Insider Preview. |
+
+* * *
diff --git a/browsers/edge/edge-technical-demos.md b/browsers/edge/edge-technical-demos.md
index 8326776612..d8eb14bd02 100644
--- a/browsers/edge/edge-technical-demos.md
+++ b/browsers/edge/edge-technical-demos.md
@@ -1,38 +1,39 @@
----
-title: Microsoft Edge training and demonstrations
-ms.reviewer:
-audience: itpro
manager: dansimp
-description: Get access to training and demonstrations for Microsoft Edge.
-ms.prod: edge
-ms.topic: article
-ms.manager: elizapo
-author: msdmaguire
-ms.author: dmaguire
-ms.localizationpriority: high
----
-
-# Microsoft Edge training and demonstrations
-
-Explore security and compatibility features of Microsoft Edge, and get tips to increase manageability, productivity, and support for legacy apps.
-
-## Virtual labs
-
-Microsoft Hands-On Labs let you experience a software product or technology using a cloud-based private virtual machine environment. Get free access to one or more virtual machines, with no additional software or setup required.
-
-Check out the **Use Internet Explorer Enterprise Mode to fix compatibility issues (WS00137)" on the [self-paced labs site](https://www.microsoft.com/handsonlabs/SelfPacedLabs/?storyGuid=e4155067-2c7e-4b46-8496-eca38bedca02).
-
-## Features and functionality
-
-Find out more about new and improved features of Microsoft Edge, and how you can leverage them to bring increased productivity, security, manageability, and support for legacy apps to your secure, modern desktop.
-
-### Building a faster browser: Behind the scenes improvements in Microsoft Edge
-
-Get a behind the scenes look at Microsoft Edge and the improvements we've made to make it faster and more efficient.
-
-> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es14/player]
-
-### Building a safer browser: Four guards to keep users safe
-
-Learn about our security strategy and how we use the Four Guards to keep your users safe while they browse the Internet.
-
-> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es03/player]
+---
+title: Microsoft Edge training and demonstrations
+ms.reviewer:
+audience: itpro
+manager: dansimp
+description: Get access to training and demonstrations for Microsoft Edge.
+ms.prod: edge
+ms.topic: article
+ms.manager: dansimp
+author: dansimp
+ms.author: dansimp
+ms.localizationpriority: high
+---
+
+# Microsoft Edge training and demonstrations
+
+Explore security and compatibility features of Microsoft Edge, and get tips to increase manageability, productivity, and support for legacy apps.
+
+## Virtual labs
+
+Microsoft Hands-On Labs let you experience a software product or technology using a cloud-based private virtual machine environment. Get free access to one or more virtual machines, with no additional software or setup required.
+
+Check out the **Use Internet Explorer Enterprise Mode to fix compatibility issues (WS00137)" on the [self-paced labs site](https://www.microsoft.com/handsonlabs/SelfPacedLabs/?storyGuid=e4155067-2c7e-4b46-8496-eca38bedca02).
+
+## Features and functionality
+
+Find out more about new and improved features of Microsoft Edge, and how you can leverage them to bring increased productivity, security, manageability, and support for legacy apps to your secure, modern desktop.
+
+### Building a faster browser: Behind the scenes improvements in Microsoft Edge
+
+Get a behind the scenes look at Microsoft Edge and the improvements we've made to make it faster and more efficient.
+
+> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es14/player]
+
+### Building a safer browser: Four guards to keep users safe
+
+Learn about our security strategy and how we use the Four Guards to keep your users safe while they browse the Internet.
+
+> [!VIDEO https://channel9.msdn.com/events/webplatformsummit/microsoft-edge-web-summit-2017/es03/player]
diff --git a/browsers/edge/emie-to-improve-compatibility.md b/browsers/edge/emie-to-improve-compatibility.md
index e9ec39db3f..2925106064 100644
--- a/browsers/edge/emie-to-improve-compatibility.md
+++ b/browsers/edge/emie-to-improve-compatibility.md
@@ -4,8 +4,8 @@ ms.assetid: 89c75f7e-35ca-4ca8-96fa-b3b498b53bE4
ms.reviewer:
audience: itpro
manager: dansimp
-author: eavena
-ms.author: eravena
+author: dansimp
+ms.author: dansimp
ms.manager: dansimp
ms.prod: edge
ms.topic: reference
diff --git a/browsers/edge/group-policies/address-bar-settings-gp.md b/browsers/edge/group-policies/address-bar-settings-gp.md
index d29ed1ca88..c9cf088a60 100644
--- a/browsers/edge/group-policies/address-bar-settings-gp.md
+++ b/browsers/edge/group-policies/address-bar-settings-gp.md
@@ -1,33 +1,34 @@
----
-title: Microsoft Edge - Address bar group policies
-description: Microsoft Edge, by default, shows a list of search suggestions in the address bar. You can minimize network connections from Microsoft Edge to Microsoft services, hiding the functionality of the Address bar drop-down list.
-services:
-keywords:
-ms.localizationpriority: medium
-audience: itpro
manager: dansimp
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.topic: reference
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
----
-
-# Address bar
-
-Microsoft Edge, by default, shows a list of search suggestions in the address bar. You can minimize network connections from Microsoft Edge to Microsoft services by hiding the functionality of the Address bar drop-down list.
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-
-
-## Allow Address bar drop-down list suggestions
-[!INCLUDE [allow-address-bar-suggestions-include.md](../includes/allow-address-bar-suggestions-include.md)]
-
-## Configure search suggestions in Address bar
-[!INCLUDE [configure-search-suggestions-address-bar-include.md](../includes/configure-search-suggestions-address-bar-include.md)]
-
+---
+title: Microsoft Edge - Address bar group policies
+description: Microsoft Edge, by default, shows a list of search suggestions in the address bar. You can minimize network connections from Microsoft Edge to Microsoft services, hiding the functionality of the Address bar drop-down list.
+services:
+keywords:
+ms.localizationpriority: medium
+audience: itpro
+manager: dansimp
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.topic: reference
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+---
+
+# Address bar
+
+Microsoft Edge, by default, shows a list of search suggestions in the address bar. You can minimize network connections from Microsoft Edge to Microsoft services by hiding the functionality of the Address bar drop-down list.
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+
+
+## Allow Address bar drop-down list suggestions
+[!INCLUDE [allow-address-bar-suggestions-include.md](../includes/allow-address-bar-suggestions-include.md)]
+
+## Configure search suggestions in Address bar
+[!INCLUDE [configure-search-suggestions-address-bar-include.md](../includes/configure-search-suggestions-address-bar-include.md)]
+
diff --git a/browsers/edge/group-policies/adobe-settings-gp.md b/browsers/edge/group-policies/adobe-settings-gp.md
index 6efc8ee3f8..5fc4021fce 100644
--- a/browsers/edge/group-policies/adobe-settings-gp.md
+++ b/browsers/edge/group-policies/adobe-settings-gp.md
@@ -1,35 +1,36 @@
----
-title: Microsoft Edge - Adobe Flash group policies
-description: Adobe Flash Player still has a significant presence on the internet, such as digital ads. However, open standards, such as HTML5, provide many of the capabilities and functionalities becoming an alternative for content on the web. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the Configure the Adobe Flash Click-to-Run setting group policy giving you a way to control the list of websites that have permission to run Adobe Flash content.
-services:
-keywords:
-ms.localizationpriority: medium
-audience: itpro
manager: dansimp
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.topic: reference
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
----
-
-# Adobe Flash
-
-Adobe Flash Player still has a significant presence on the internet, such as digital ads. However, open standards, such as HTML5, provide many of the capabilities and functionalities becoming an alternative for content on the web. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting](#configure-the-adobe-flash-click-to-run-setting) group policy giving you a way to control the list of websites that have permission to run Adobe Flash content.
-
-To learn more about Microsoft’s plan for phasing out Flash from Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash]( https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article).
-
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Allow Adobe Flash
-[!INCLUDE [allow-adobe-flash-include.md](../includes/allow-adobe-flash-include.md)]
-
-
-## Configure the Adobe Flash Click-to-Run setting
-[!INCLUDE [configure-adobe-flash-click-to-run-include.md](../includes/configure-adobe-flash-click-to-run-include.md)]
-
+---
+title: Microsoft Edge - Adobe Flash group policies
+description: Adobe Flash Player still has a significant presence on the internet, such as digital ads. However, open standards, such as HTML5, provide many of the capabilities and functionalities becoming an alternative for content on the web. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the Configure the Adobe Flash Click-to-Run setting group policy giving you a way to control the list of websites that have permission to run Adobe Flash content.
+services:
+keywords:
+ms.localizationpriority: medium
+audience: itpro
+manager: dansimp
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.topic: reference
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+---
+
+# Adobe Flash
+
+Adobe Flash Player still has a significant presence on the internet, such as digital ads. However, open standards, such as HTML5, provide many of the capabilities and functionalities becoming an alternative for content on the web. With Adobe no longer supporting Flash after 2020, Microsoft has started to phase out Flash from Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting](#configure-the-adobe-flash-click-to-run-setting) group policy giving you a way to control the list of websites that have permission to run Adobe Flash content.
+
+To learn more about Microsoft’s plan for phasing out Flash from Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash]( https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article).
+
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Allow Adobe Flash
+[!INCLUDE [allow-adobe-flash-include.md](../includes/allow-adobe-flash-include.md)]
+
+
+## Configure the Adobe Flash Click-to-Run setting
+[!INCLUDE [configure-adobe-flash-click-to-run-include.md](../includes/configure-adobe-flash-click-to-run-include.md)]
+
diff --git a/browsers/edge/group-policies/books-library-management-gp.md b/browsers/edge/group-policies/books-library-management-gp.md
index 633b5b8b51..c8742367b6 100644
--- a/browsers/edge/group-policies/books-library-management-gp.md
+++ b/browsers/edge/group-policies/books-library-management-gp.md
@@ -1,37 +1,38 @@
----
-title: Microsoft Edge - Books Library group policies
-description: Microsoft Edge decreases the amount of storage used by book files by downloading them to a shared folder. You can also allow Microsoft Edge to update the configuration data for the library automatically.
-services:
-keywords:
-ms.localizationpriority: medium
-audience: itpro
manager: dansimp
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.topic: reference
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
----
-
-# Books Library
-
-Microsoft Edge decreases the amount of storage used by book files by downloading them to a shared folder in Windows. You can configure Microsoft Edge to update the configuration data for the library automatically or gather diagnostic data, such as usage data.
-
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Allow a shared books folder
-[!INCLUDE [allow-shared-folder-books-include.md](../includes/allow-shared-folder-books-include.md)]
-
-## Allow configuration updates for the Books Library
-[!INCLUDE [allow-config-updates-books-include.md](../includes/allow-config-updates-books-include.md)]
-
-## Allow extended telemetry for the Books tab
-[!INCLUDE [allow-ext-telemetry-books-tab-include.md](../includes/allow-ext-telemetry-books-tab-include.md)]
-
-## Always show the Books Library in Microsoft Edge
-[!INCLUDE [always-enable-book-library-include.md](../includes/always-enable-book-library-include.md)]
+---
+title: Microsoft Edge - Books Library group policies
+description: Microsoft Edge decreases the amount of storage used by book files by downloading them to a shared folder. You can also allow Microsoft Edge to update the configuration data for the library automatically.
+services:
+keywords:
+ms.localizationpriority: medium
+audience: itpro
+manager: dansimp
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.topic: reference
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+---
+
+# Books Library
+
+Microsoft Edge decreases the amount of storage used by book files by downloading them to a shared folder in Windows. You can configure Microsoft Edge to update the configuration data for the library automatically or gather diagnostic data, such as usage data.
+
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Allow a shared books folder
+[!INCLUDE [allow-shared-folder-books-include.md](../includes/allow-shared-folder-books-include.md)]
+
+## Allow configuration updates for the Books Library
+[!INCLUDE [allow-config-updates-books-include.md](../includes/allow-config-updates-books-include.md)]
+
+## Allow extended telemetry for the Books tab
+[!INCLUDE [allow-ext-telemetry-books-tab-include.md](../includes/allow-ext-telemetry-books-tab-include.md)]
+
+## Always show the Books Library in Microsoft Edge
+[!INCLUDE [always-enable-book-library-include.md](../includes/always-enable-book-library-include.md)]
diff --git a/browsers/edge/group-policies/browser-settings-management-gp.md b/browsers/edge/group-policies/browser-settings-management-gp.md
index 296b99b037..c4f392209e 100644
--- a/browsers/edge/group-policies/browser-settings-management-gp.md
+++ b/browsers/edge/group-policies/browser-settings-management-gp.md
@@ -1,52 +1,53 @@
----
-title: Microsoft Edge - Browser experience group policies
-description: Not only do the other Microsoft Edge group policies enhance the browsing experience, but we must also talk about some of the most common or somewhat common browsing experiences. For example, printing web content is a common browsing experience. However, if you want to prevent users from printing web content, Microsoft Edge has a group policy that allows you to prevent printing.
-services:
-keywords:
-ms.localizationpriority: medium
-audience: itpro
manager: dansimp
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.topic: reference
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
----
-
-# Browser experience
-
-Not only do the other Microsoft Edge group policies enhance the browsing experience, but we also want to mention some of the other and common browsing experiences. For example, printing web content is a common browsing experience. However, if you want to prevent users from printing web content, Microsoft Edge has a group policy that allows you to prevent printing. The same goes for Pop-up Blocker; Microsoft Edge has a group policy that lets you prevent pop-up windows or let users choose to use Pop-up Blocker. You can use any one of the following group policies to continue enhancing the browsing experience for your users.
-
-
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Allow clearing browsing data on exit
-[!INCLUDE [allow-clearing-browsing-data-include](../includes/allow-clearing-browsing-data-include.md)]
-
-## Allow fullscreen mode
-[!INCLUDE [allow-full-screen-include](../includes/allow-full-screen-include.md)]
-
-## Allow printing
-[!INCLUDE [allow-printing-include](../includes/allow-printing-include.md)]
-
-## Allow Saving History
-[!INCLUDE [allow-saving-history-include](../includes/allow-saving-history-include.md)]
-
-## Configure Autofill
-[!INCLUDE [configure-autofill-include](../includes/configure-autofill-include.md)]
-
-## Configure Pop-up Blocker
-[!INCLUDE [configure-pop-up-blocker-include](../includes/configure-pop-up-blocker-include.md)]
-
-## Do not sync
-[!INCLUDE [do-not-sync-include](../includes/do-not-sync-include.md)]
-
-To learn about the policies to sync the browser settings, see [Sync browser settings](sync-browser-settings-gp.md).
-
-
-
+---
+title: Microsoft Edge - Browser experience group policies
+description: Not only do the other Microsoft Edge group policies enhance the browsing experience, but we must also talk about some of the most common or somewhat common browsing experiences. For example, printing web content is a common browsing experience. However, if you want to prevent users from printing web content, Microsoft Edge has a group policy that allows you to prevent printing.
+services:
+keywords:
+ms.localizationpriority: medium
+audience: itpro
+manager: dansimp
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.topic: reference
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+---
+
+# Browser experience
+
+Not only do the other Microsoft Edge group policies enhance the browsing experience, but we also want to mention some of the other and common browsing experiences. For example, printing web content is a common browsing experience. However, if you want to prevent users from printing web content, Microsoft Edge has a group policy that allows you to prevent printing. The same goes for Pop-up Blocker; Microsoft Edge has a group policy that lets you prevent pop-up windows or let users choose to use Pop-up Blocker. You can use any one of the following group policies to continue enhancing the browsing experience for your users.
+
+
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Allow clearing browsing data on exit
+[!INCLUDE [allow-clearing-browsing-data-include](../includes/allow-clearing-browsing-data-include.md)]
+
+## Allow fullscreen mode
+[!INCLUDE [allow-full-screen-include](../includes/allow-full-screen-include.md)]
+
+## Allow printing
+[!INCLUDE [allow-printing-include](../includes/allow-printing-include.md)]
+
+## Allow Saving History
+[!INCLUDE [allow-saving-history-include](../includes/allow-saving-history-include.md)]
+
+## Configure Autofill
+[!INCLUDE [configure-autofill-include](../includes/configure-autofill-include.md)]
+
+## Configure Pop-up Blocker
+[!INCLUDE [configure-pop-up-blocker-include](../includes/configure-pop-up-blocker-include.md)]
+
+## Do not sync
+[!INCLUDE [do-not-sync-include](../includes/do-not-sync-include.md)]
+
+To learn about the policies to sync the browser settings, see [Sync browser settings](sync-browser-settings-gp.md).
+
+
+
diff --git a/browsers/edge/group-policies/developer-settings-gp.md b/browsers/edge/group-policies/developer-settings-gp.md
index a5d7e4f42b..67fce97c58 100644
--- a/browsers/edge/group-policies/developer-settings-gp.md
+++ b/browsers/edge/group-policies/developer-settings-gp.md
@@ -1,31 +1,31 @@
----
-title: Microsoft Edge - Developer tools
-description: Microsoft Edge, by default, allows users to use the F12 developer tools as well as access the about:flags page. You can prevent users from using the F12 developer tools or from accessing the about:flags page.
-services:
-keywords:
-ms.localizationpriority: medium
-manager: dougkim
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.topic: reference
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
----
-
-# Developer tools
-
-Microsoft Edge, by default, allows users to use the F12 developer tools as well as access the about:flags page. You can prevent users from using the F12 developer tools or from accessing the about:flags page.
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Allow Developer Tools
-[!INCLUDE [allow-dev-tools-include](../includes/allow-dev-tools-include.md)]
-
-## Prevent access to the about:flags page
-[!INCLUDE [prevent-access-about-flag-include](../includes/prevent-access-about-flag-include.md)]
+---
+title: Microsoft Edge - Developer tools
+description: Microsoft Edge, by default, allows users to use the F12 developer tools as well as access the about:flags page. You can prevent users from using the F12 developer tools or from accessing the about:flags page.
+services:
+keywords:
+ms.localizationpriority: medium
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.topic: reference
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+---
+
+# Developer tools
+
+Microsoft Edge, by default, allows users to use the F12 developer tools as well as access the about:flags page. You can prevent users from using the F12 developer tools or from accessing the about:flags page.
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Allow Developer Tools
+[!INCLUDE [allow-dev-tools-include](../includes/allow-dev-tools-include.md)]
+
+## Prevent access to the about:flags page
+[!INCLUDE [prevent-access-about-flag-include](../includes/prevent-access-about-flag-include.md)]
diff --git a/browsers/edge/group-policies/extensions-management-gp.md b/browsers/edge/group-policies/extensions-management-gp.md
index 5230bc5f52..22ad6057c4 100644
--- a/browsers/edge/group-policies/extensions-management-gp.md
+++ b/browsers/edge/group-policies/extensions-management-gp.md
@@ -1,33 +1,34 @@
----
-title: Microsoft Edge - Extensions group policies
-description: Currently, Microsoft Edge allows users to add or personalize, and uninstall extensions. You can prevent users from uninstalling extensions or sideloading of extensions, which does not prevent sideloading using Add-AppxPackage via PowerShell. Allowing sideloading of extensions installs and runs unverified extensions.
-services:
-keywords:
-ms.localizationpriority: medium
-audience: itpro
manager: dansimp
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.topic: reference
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
----
-
-# Extensions
-
-Currently, Microsoft Edge allows users to add or personalize, and uninstall extensions. You can prevent users from uninstalling extensions or sideloading of extensions, which does not prevent sideloading using Add-AppxPackage via PowerShell. Allowing sideloading of extensions installs and runs unverified extensions.
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Allow Extensions
-[!INCLUDE [allow-extensions-include](../includes/allow-extensions-include.md)]
-
-## Allow sideloading of extensions
-[!INCLUDE [allow-sideloading-extensions-include](../includes/allow-sideloading-extensions-include.md)]
-
-## Prevent turning off required extensions
-[!INCLUDE [prevent-turning-off-required-extensions-include](../includes/prevent-turning-off-required-extensions-include.md)]
+---
+title: Microsoft Edge - Extensions group policies
+description: Currently, Microsoft Edge allows users to add or personalize, and uninstall extensions. You can prevent users from uninstalling extensions or sideloading of extensions, which does not prevent sideloading using Add-AppxPackage via PowerShell. Allowing sideloading of extensions installs and runs unverified extensions.
+services:
+keywords:
+ms.localizationpriority: medium
+audience: itpro
+manager: dansimp
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.topic: reference
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+---
+
+# Extensions
+
+Currently, Microsoft Edge allows users to add or personalize, and uninstall extensions. You can prevent users from uninstalling extensions or sideloading of extensions, which does not prevent sideloading using Add-AppxPackage via PowerShell. Allowing sideloading of extensions installs and runs unverified extensions.
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Allow Extensions
+[!INCLUDE [allow-extensions-include](../includes/allow-extensions-include.md)]
+
+## Allow sideloading of extensions
+[!INCLUDE [allow-sideloading-extensions-include](../includes/allow-sideloading-extensions-include.md)]
+
+## Prevent turning off required extensions
+[!INCLUDE [prevent-turning-off-required-extensions-include](../includes/prevent-turning-off-required-extensions-include.md)]
diff --git a/browsers/edge/group-policies/favorites-management-gp.md b/browsers/edge/group-policies/favorites-management-gp.md
index 6ba684a843..58ce30eb7f 100644
--- a/browsers/edge/group-policies/favorites-management-gp.md
+++ b/browsers/edge/group-policies/favorites-management-gp.md
@@ -1,39 +1,40 @@
----
-title: Microsoft Edge - Favorites group policies
-description: Configure Microsoft Edge to either show or hide the favorites bar on all pages. Microsoft Edge hides the favorites bar by default but shows the favorites bar on the Start and New tab pages. Also, by default, the favorites bar toggle, in Settings, is set to Off but enabled allowing users to make changes.
-services:
-keywords:
-ms.localizationpriority: medium
-audience: itpro
manager: dansimp
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.topic: reference
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
----
-
-# Favorites
-
-You can customize the favorites bar, for example, you can turn off features such as Save a Favorite and Import settings, and hide or show the favorites bar on all pages. Another customization you can make is provisioning a standard list of favorites, including folders, to appear in addition to the user’s favorites. If it’s important to keep the favorites in both IE11 and Microsoft Edge synced, you can turn on syncing where changes to the list of favorites in one browser reflect in the other.
-
->[!TIP]
->You can find the Favorites under C:\\Users\\<_username_>\\Favorites.
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Configure Favorites Bar
-[!INCLUDE [configure-favorites-bar-include](../includes/configure-favorites-bar-include.md)]
-
-## Keep favorites in sync between Internet Explorer and Microsoft Edge
-[!INCLUDE [keep-fav-sync-ie-edge-include](../includes/keep-fav-sync-ie-edge-include.md)]
-
-## Prevent changes to Favorites on Microsoft Edge
-[!INCLUDE [prevent-changes-to-favorites-include](../includes/prevent-changes-to-favorites-include.md)]
-
-## Provision Favorites
-[!INCLUDE [provision-favorites-include](../includes/provision-favorites-include.md)]
+---
+title: Microsoft Edge - Favorites group policies
+description: Configure Microsoft Edge to either show or hide the favorites bar on all pages. Microsoft Edge hides the favorites bar by default but shows the favorites bar on the Start and New tab pages. Also, by default, the favorites bar toggle, in Settings, is set to Off but enabled allowing users to make changes.
+services:
+keywords:
+ms.localizationpriority: medium
+audience: itpro
+manager: dansimp
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.topic: reference
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+---
+
+# Favorites
+
+You can customize the favorites bar, for example, you can turn off features such as Save a Favorite and Import settings, and hide or show the favorites bar on all pages. Another customization you can make is provisioning a standard list of favorites, including folders, to appear in addition to the user’s favorites. If it’s important to keep the favorites in both IE11 and Microsoft Edge synced, you can turn on syncing where changes to the list of favorites in one browser reflect in the other.
+
+>[!TIP]
+>You can find the Favorites under C:\\Users\\<_username_>\\Favorites.
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Configure Favorites Bar
+[!INCLUDE [configure-favorites-bar-include](../includes/configure-favorites-bar-include.md)]
+
+## Keep favorites in sync between Internet Explorer and Microsoft Edge
+[!INCLUDE [keep-fav-sync-ie-edge-include](../includes/keep-fav-sync-ie-edge-include.md)]
+
+## Prevent changes to Favorites on Microsoft Edge
+[!INCLUDE [prevent-changes-to-favorites-include](../includes/prevent-changes-to-favorites-include.md)]
+
+## Provision Favorites
+[!INCLUDE [provision-favorites-include](../includes/provision-favorites-include.md)]
diff --git a/browsers/edge/group-policies/home-button-gp.md b/browsers/edge/group-policies/home-button-gp.md
index f9db9cbcb3..8993518748 100644
--- a/browsers/edge/group-policies/home-button-gp.md
+++ b/browsers/edge/group-policies/home-button-gp.md
@@ -1,47 +1,48 @@
----
-title: Microsoft Edge - Home button group policies
-description: Microsoft Edge shows the home button, by default, and by clicking it the Start page loads. With the relevant Home button policies, you can configure the Home button to load the New tab page or a specific page. You can also configure Microsoft Edge to hide the home button.
-audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.localizationpriority: medium
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
-ms.topic: reference
----
-
-# Home button
-
-Microsoft Edge shows the home button, by default, and by clicking it the Start page loads. With the relevant Home button policies, you can configure the Home button to load the New tab page or a specific page. You can also configure Microsoft Edge to hide the home button.
-
-## Relevant group policies
-
-- [Configure Home Button](#configure-home-button)
-- [Set Home Button URL](#set-home-button-url)
-- [Unlock Home Button](#unlock-home-button)
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Configuration options
-
-
-
-
-
-
-
-
-## Configure Home Button
-[!INCLUDE [configure-home-button-include.md](../includes/configure-home-button-include.md)]
-
-## Set Home Button URL
-[!INCLUDE [set-home-button-url-include](../includes/set-home-button-url-include.md)]
-
-## Unlock Home Button
-[!INCLUDE [unlock-home-button-include.md](../includes/unlock-home-button-include.md)]
-
+---
+title: Microsoft Edge - Home button group policies
+description: Microsoft Edge shows the home button, by default, and by clicking it the Start page loads. With the relevant Home button policies, you can configure the Home button to load the New tab page or a specific page. You can also configure Microsoft Edge to hide the home button.
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.localizationpriority: medium
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+ms.topic: reference
+---
+
+# Home button
+
+Microsoft Edge shows the home button, by default, and by clicking it the Start page loads. With the relevant Home button policies, you can configure the Home button to load the New tab page or a specific page. You can also configure Microsoft Edge to hide the home button.
+
+## Relevant group policies
+
+- [Configure Home Button](#configure-home-button)
+- [Set Home Button URL](#set-home-button-url)
+- [Unlock Home Button](#unlock-home-button)
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Configuration options
+
+
+
+
+
+
+
+
+## Configure Home Button
+[!INCLUDE [configure-home-button-include.md](../includes/configure-home-button-include.md)]
+
+## Set Home Button URL
+[!INCLUDE [set-home-button-url-include](../includes/set-home-button-url-include.md)]
+
+## Unlock Home Button
+[!INCLUDE [unlock-home-button-include.md](../includes/unlock-home-button-include.md)]
+
diff --git a/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md b/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md
index 24dc169b1a..009ea51226 100644
--- a/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md
+++ b/browsers/edge/group-policies/interoperability-enterprise-guidance-gp.md
@@ -1,79 +1,80 @@
----
-title: Microsoft Edge - Interoperability and enterprise mode guidance
-description: Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support.
-ms.localizationpriority: medium
-audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
-ms.topic: reference
----
-
-# Interoperability and enterprise mode guidance
-
-Microsoft Edge is the default browser experience for Windows 10 and Windows 10 Mobile. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support.
-
->[!TIP]
->If you are running an earlier version of Internet Explorer, we recommend upgrading to IE11, so that any legacy apps continue to work correctly.
-
-**Technology not supported by Microsoft Edge**
-
-
-- ActiveX controls
-
-- Browser Helper Objects
-
-- VBScript
-
-- x-ua-compatible headers
-
-- \ tags
-
-- Legacy document modes
-
-If you have specific websites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the websites automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work correctly with Microsoft Edge, you can set all intranet sites to open using IE11 automatically.
-
-Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11.
-
-## Relevant group policies
-
-
-1. [Configure the Enterprise Mode Site List](#configure-the-enterprise-mode-site-list)
-
-2. [Send all intranet sites to Internet Explorer 11](#send-all-intranet-sites-to-internet-explorer-11)
-
-3. [Show message when opening sites in Internet Explorer](#show-message-when-opening-sites-in-internet-explorer)
-
-4. [(IE11 policy) Send all sites not included in the Enterprise Mode Site List to Microsoft Edge](#ie11-policy-send-all-sites-not-included-in-the-enterprise-mode-site-list-to-microsoft-edge)
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Configuration options
-
-
-
-
-## Configure the Enterprise Mode Site List
-
-[!INCLUDE [configure-enterprise-mode-site-list-include](../includes/configure-enterprise-mode-site-list-include.md)]
-
-
-## Send all intranet sites to Internet Explorer 11
-
-[!INCLUDE [send-all-intranet-sites-ie-include](../includes/send-all-intranet-sites-ie-include.md)]
-
-
-## Show message when opening sites in Internet Explorer
-
-[!INCLUDE [show-message-opening-sites-ie-include](../includes/show-message-opening-sites-ie-include.md)]
-
-
-## (IE11 policy) Send all sites not included in the Enterprise Mode Site List to Microsoft Edge
-
-[!INCLUDE [ie11-send-all-sites-not-in-site-list-include](../includes/ie11-send-all-sites-not-in-site-list-include.md)]
+---
+title: Microsoft Edge - Interoperability and enterprise mode guidance
+description: Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support.
+ms.localizationpriority: medium
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+ms.topic: reference
+---
+
+# Interoperability and enterprise mode guidance
+
+Microsoft Edge is the default browser experience for Windows 10 and Windows 10 Mobile. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List. If you are running web apps that continue to use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and modern standards support.
+
+>[!TIP]
+>If you are running an earlier version of Internet Explorer, we recommend upgrading to IE11, so that any legacy apps continue to work correctly.
+
+**Technology not supported by Microsoft Edge**
+
+
+- ActiveX controls
+
+- Browser Helper Objects
+
+- VBScript
+
+- x-ua-compatible headers
+
+- \ tags
+
+- Legacy document modes
+
+If you have specific websites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the websites automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work correctly with Microsoft Edge, you can set all intranet sites to open using IE11 automatically.
+
+Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11.
+
+## Relevant group policies
+
+
+1. [Configure the Enterprise Mode Site List](#configure-the-enterprise-mode-site-list)
+
+2. [Send all intranet sites to Internet Explorer 11](#send-all-intranet-sites-to-internet-explorer-11)
+
+3. [Show message when opening sites in Internet Explorer](#show-message-when-opening-sites-in-internet-explorer)
+
+4. [(IE11 policy) Send all sites not included in the Enterprise Mode Site List to Microsoft Edge](#ie11-policy-send-all-sites-not-included-in-the-enterprise-mode-site-list-to-microsoft-edge)
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Configuration options
+
+
+
+
+## Configure the Enterprise Mode Site List
+
+[!INCLUDE [configure-enterprise-mode-site-list-include](../includes/configure-enterprise-mode-site-list-include.md)]
+
+
+## Send all intranet sites to Internet Explorer 11
+
+[!INCLUDE [send-all-intranet-sites-ie-include](../includes/send-all-intranet-sites-ie-include.md)]
+
+
+## Show message when opening sites in Internet Explorer
+
+[!INCLUDE [show-message-opening-sites-ie-include](../includes/show-message-opening-sites-ie-include.md)]
+
+
+## (IE11 policy) Send all sites not included in the Enterprise Mode Site List to Microsoft Edge
+
+[!INCLUDE [ie11-send-all-sites-not-in-site-list-include](../includes/ie11-send-all-sites-not-in-site-list-include.md)]
diff --git a/browsers/edge/group-policies/new-tab-page-settings-gp.md b/browsers/edge/group-policies/new-tab-page-settings-gp.md
index 7e0cf5f89e..838228b705 100644
--- a/browsers/edge/group-policies/new-tab-page-settings-gp.md
+++ b/browsers/edge/group-policies/new-tab-page-settings-gp.md
@@ -1,46 +1,47 @@
----
-title: Microsoft Edge - New Tab page group policies
-description: Microsoft Edge loads the default New tab page by default. With the relevant New Tab policies, you can set a URL to load in the New Tab page and prevent users from making changes. You can also load a blank page instead or let the users choose what loads.
-audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.localizationpriority: medium
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
-ms.topic: reference
----
-
-
-# New Tab page
-
-Microsoft Edge loads the default New tab page by default. With the relevant New Tab policies, you can set a URL to load in the New Tab page and prevent users from making changes. You can also load a blank page instead or let the users choose what loads.
-
->[!NOTE]
->New tab pages do not load while running InPrivate mode.
-
-## Relevant group policies
-
-- [Set New Tab page URL](#set-new-tab-page-url)
-- [Allow web content on New Tab page](#allow-web-content-on-new-tab-page)
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Configuration options
-
-
-
-
-
-
-
-
-## Set New Tab page URL
-[!INCLUDE [set-new-tab-url-include](../includes/set-new-tab-url-include.md)]
-
-## Allow web content on New Tab page
-[!INCLUDE [allow-web-content-new-tab-page-include](../includes/allow-web-content-new-tab-page-include.md)]
+---
+title: Microsoft Edge - New Tab page group policies
+description: Microsoft Edge loads the default New tab page by default. With the relevant New Tab policies, you can set a URL to load in the New Tab page and prevent users from making changes. You can also load a blank page instead or let the users choose what loads.
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.localizationpriority: medium
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+ms.topic: reference
+---
+
+
+# New Tab page
+
+Microsoft Edge loads the default New tab page by default. With the relevant New Tab policies, you can set a URL to load in the New Tab page and prevent users from making changes. You can also load a blank page instead or let the users choose what loads.
+
+>[!NOTE]
+>New tab pages do not load while running InPrivate mode.
+
+## Relevant group policies
+
+- [Set New Tab page URL](#set-new-tab-page-url)
+- [Allow web content on New Tab page](#allow-web-content-on-new-tab-page)
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Configuration options
+
+
+
+
+
+
+
+
+## Set New Tab page URL
+[!INCLUDE [set-new-tab-url-include](../includes/set-new-tab-url-include.md)]
+
+## Allow web content on New Tab page
+[!INCLUDE [allow-web-content-new-tab-page-include](../includes/allow-web-content-new-tab-page-include.md)]
diff --git a/browsers/edge/group-policies/prelaunch-preload-gp.md b/browsers/edge/group-policies/prelaunch-preload-gp.md
index 7ff02e7924..3f41505fce 100644
--- a/browsers/edge/group-policies/prelaunch-preload-gp.md
+++ b/browsers/edge/group-policies/prelaunch-preload-gp.md
@@ -3,8 +3,8 @@ title: Microsoft Edge - Prelaunch and tab preload group policies
description: Microsoft Edge pre-launches as a background process during Windows startup when the system is idle waiting to be launched by the user. Pre-launching helps the performance of Microsoft Edge and minimizes the amount of time required to start up Microsoft Edge.
audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
+ms.author: dansimp
+author: dansimp
ms.prod: edge
ms.reviewer:
ms.localizationpriority: medium
diff --git a/browsers/edge/group-policies/search-engine-customization-gp.md b/browsers/edge/group-policies/search-engine-customization-gp.md
index 6d4876ef46..52cf1ca380 100644
--- a/browsers/edge/group-policies/search-engine-customization-gp.md
+++ b/browsers/edge/group-policies/search-engine-customization-gp.md
@@ -1,10 +1,10 @@
---
title: Microsoft Edge - Search engine customization group policies
-description: Microsoft Edge, by default, uses the search engine specified in App settings, which lets users make changes. You can prevent users from making changes and still use the search engine specified in App settings by disabling the Allow search engine customization policy. You can also use the policy-set search engine specified in the OpenSearch XML file in which you can configure up to five additional search engines and setting any one of them as the default.
+description: Microsoft Edge, by default, uses the search engine specified in App settings, which lets users make changes. You can prevent users from making changes and still use the search engine specified in App settings by disabling the Allow search engine customization policy. You can also use the policy-set search engine specified in the OpenSearch XML file in which you can configure up to five additional search engines and setting any one of them as the default.
audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
+ms.author: dansimp
+author: dansimp
ms.prod: edge
ms.reviewer:
ms.localizationpriority: medium
diff --git a/browsers/edge/group-policies/security-privacy-management-gp.md b/browsers/edge/group-policies/security-privacy-management-gp.md
index 67e656daa8..66fc6f99a7 100644
--- a/browsers/edge/group-policies/security-privacy-management-gp.md
+++ b/browsers/edge/group-policies/security-privacy-management-gp.md
@@ -1,74 +1,75 @@
----
-title: Microsoft Edge - Security and privacy group policies
-description: Microsoft Edge helps to defend from increasingly sophisticated and prevalent web-based attacks against Windows. While most websites are safe, some sites have been designed to steal personal information or gain access to your system’s resources.
-audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.localizationpriority: medium
-ms.topic: reference
----
-
-# Security and privacy
-
-Microsoft Edge is designed with improved security in mind, helping to defend people from increasingly sophisticated and prevalent web-based attacks against Windows. Because Microsoft Edge is designed like a Universal Windows app, changing the browser to an app, it fundamentally changes the process model so that both the outer manager process and the different content processes all live within app container sandboxes.
-
-Microsoft Edge runs in 64-bit not just by default, but anytime it’s running on a 64-bit operating system. Because Microsoft Edge doesn’t support legacy ActiveX controls or 3rd-party binary extensions, there’s no longer a reason to run 32-bit processes on a 64-bit system.
-
-The value of running 64-bit all the time is that it strengthens Windows Address Space Layout Randomization (ASLR), randomizing the memory layout of the browser processes, making it much harder for attackers to hit precise memory locations. In turn, 64-bit processes make ASLR much more effective by making the address space exponentially larger and, therefore, more difficult for attackers to find sensitive memory components.
-
-For more details on the security features in Microsoft Edge, see [Help protect against web-based security threats](#help-protect-against-web-based-security-threats) below.
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Configure cookies
-[!INCLUDE [configure-cookies-include](../includes/configure-cookies-include.md)]
-
-## Configure Password Manager
-[!INCLUDE [configure-password-manager-include](../includes/configure-password-manager-include.md)]
-
-## Configure Windows Defender SmartScreen
-[!INCLUDE [configure-windows-defender-smartscreen-include](../includes/configure-windows-defender-smartscreen-include.md)]
-
-## Prevent bypassing Windows Defender SmartScreen prompts for files
-[!INCLUDE [prevent-bypassing-win-defender-files-include](../includes/prevent-bypassing-win-defender-files-include.md)]
-
-## Prevent bypassing Windows Defender SmartScreen prompts for sites
-[!INCLUDE [prevent-bypassing-win-defender-sites-include](../includes/prevent-bypassing-win-defender-sites-include.md)]
-
-## Prevent certificate error overrides
-[!INCLUDE [prevent-certificate-error-overrides-include](../includes/prevent-certificate-error-overrides-include.md)]
-
-## Prevent using Localhost IP address for WebRTC
-[!INCLUDE [prevent-localhost-address-for-webrtc-include](../includes/prevent-localhost-address-for-webrtc-include.md)]
-
-
-## Help protect against web-based security threats
-
-While most websites are safe, some sites have been intentionally designed to steal sensitive and private information or gain access to your system’s resources. You can help protect against threats by using strong security protocols to ensure against such threats.
-
-Thieves use things like _phishing_ attacks to convince someone to enter personal information, such as a banking password, into a website that looks like a legitimate bank but isn't. Attempts to identify legitimate websites through the HTTPS lock symbol and the EV Cert green bar have met with only limited success since attackers are too good at faking legitimate experiences for many people to notice the difference.
-
-Another method thieves often use _hacking_ to attack a system through malformed content that exploits subtle flaws in the browser or various browser extensions. This exploit lets an attacker run code on a device, taking over a browsing session, and perhaps the entire device.
-
-Microsoft Edge addresses these threats to help make browsing the web a safer experience.
-
-
-| Feature | Description |
-|-----------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **[Windows Hello](https://blogs.windows.com/bloggingwindows/2015/03/17/making-windows-10-more-personal-and-more-secure-with-windows-hello/)** | Microsoft Edge is the first browser to natively support Windows Hello to authenticate the user and the website with asymmetric cryptography technology, powered by early implementation of the [Web Authentication (formerly FIDO 2.0 Web API) specification](https://w3c.github.io/webauthn/). |
-| **Microsoft SmartScreen** | Defends against phishing by performing reputation checks on sites visited and blocking any sites that are thought to be a phishing site. SmartScreen also helps to defend against installing malicious software, drive-by attacks, or file downloads, even from trusted sites. Drive-by attacks are malicious web-based attacks that compromise your system by targeting security vulnerabilities in commonly used software and may be hosted on trusted sites. |
-| **Certificate Reputation system** | Collects data about certificates in use, detecting new certificates and flagging fraudulent certificates automatically, and sends the data to Microsoft. The systems and tools in place include- Certificate Reputation system: Protects users from fraudulent certificates.
- Bing Webmaster Tools (for developers): Reports fake certificates directly to Microsoft.
|
-| **Microsoft EdgeHTML and modern web standards** | Microsoft Edge uses Microsoft EdgeHTML as the rendering engine. This engine focuses on modern standards letting web developers build and maintain a consistent site across all modern browsers. It also helps to defend against hacking through these security standards features:- Support for the W3C standard for [Content Security Policy (CSP)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/content-Security-Policy), which can help web developers defend their sites against cross-site scripting attacks.
- Support for the [HTTP Strict Transport Security (HSTS)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/HSTS/) security feature (IETF-standard compliant). HSTS helps ensure that connections to important sites, such as to your bank, are always secured.
**NOTE:** Both Microsoft Edge and Internet Explorer 11 support HSTS. |
-| **Code integrity and image loading restrictions** | Microsoft Edge content processes support code integrity and image load restrictions, helping to prevent malicious DLLs from loading or injecting into the content processes. Only [properly signed images](https://blogs.windows.com/msedgedev/2015/11/17/microsoft-edge-module-code-integrity/) are allowed to load into Microsoft Edge. Binaries on remote devices (such as UNC or WebDAV) can’t load. |
-| **Memory corruption mitigations** | Memory corruption attacks frequently happen to apps written in C or C++ don’t provide safety or buffer overflow protection. When an attacker provides malformed input to a program, the program’s memory becomes corrupt allowing the attacker to take control of the program. Although attackers have adapted and invented new ways to attack, we’ve responded with memory safety defenses, mitigating the most common forms of attack, including and especially [use-after-free (UAF)](https://cwe.mitre.org/data/definitions/416.html) vulnerabilities. |
-| **Memory Garbage Collector (MemGC) mitigation** | MemGC replaces Memory Protector and helps to protect the browser from UAF vulnerabilities. MemGC frees up memory from the programmer and automating it. Only freeing memory when the automation detects no references left pointing to a given block of memory. |
-| **Control Flow Guard** | Attackers use memory corruption attacks to gain control of the CPU program counter to jump to any code location they want. Control Flow Guard, a Microsoft Visual Studio technology, compiles checks around code that performs indirect jumps based on a pointer. Those jumps get restricted to function entry points with known addresses only making attacker take-overs must more difficult constraining where an attack jumps. |
-| **All web content runs in an app container sandbox** | Microsoft Edge takes the sandbox even farther, running its content processes in containers not just by default, but all of the time. Microsoft Edge doesn’t support 3rd party binary extensions, so there is no reason for it to run outside of the container, making Microsoft Edge more secure. |
-| **Extension model and HTML5 support** | Microsoft Edge does not support binary extensions because they can bring code and data into the browser’s processes without any protection. So if anything goes wrong, the entire browser itself can be compromised or go down. We encourage everyone to use our scripted HTML5-based extension model. For more info about the new extensions, see the [Microsoft Edge Developer Center](https://developer.microsoft.com/microsoft-edge/extensions/). |
-| **Reduced attack surfaces** | Microsoft Edge does not support VBScript, JScript, VML, Browser Helper Objects, Toolbars, ActiveX controls, and [document modes](https://msdn.microsoft.com/library/jj676915.aspx). Many IE browser vulnerabilities only appear in legacy document modes, so removing support reduced attack surface making the browser more secure.
It also means that it’s not as backward compatible. With this reduced backward compatibility, Microsoft Edge automatically falls back to Internet Explorer 11 for any apps that need backward compatibility. This fall back happens when you use the Enterprise Mode Site List. |
-
----
+---
+title: Microsoft Edge - Security and privacy group policies
+description: Microsoft Edge helps to defend from increasingly sophisticated and prevalent web-based attacks against Windows. While most websites are safe, some sites have been designed to steal personal information or gain access to your system’s resources.
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.localizationpriority: medium
+ms.topic: reference
+---
+
+# Security and privacy
+
+Microsoft Edge is designed with improved security in mind, helping to defend people from increasingly sophisticated and prevalent web-based attacks against Windows. Because Microsoft Edge is designed like a Universal Windows app, changing the browser to an app, it fundamentally changes the process model so that both the outer manager process and the different content processes all live within app container sandboxes.
+
+Microsoft Edge runs in 64-bit not just by default, but anytime it’s running on a 64-bit operating system. Because Microsoft Edge doesn’t support legacy ActiveX controls or 3rd-party binary extensions, there’s no longer a reason to run 32-bit processes on a 64-bit system.
+
+The value of running 64-bit all the time is that it strengthens Windows Address Space Layout Randomization (ASLR), randomizing the memory layout of the browser processes, making it much harder for attackers to hit precise memory locations. In turn, 64-bit processes make ASLR much more effective by making the address space exponentially larger and, therefore, more difficult for attackers to find sensitive memory components.
+
+For more details on the security features in Microsoft Edge, see [Help protect against web-based security threats](#help-protect-against-web-based-security-threats) below.
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Configure cookies
+[!INCLUDE [configure-cookies-include](../includes/configure-cookies-include.md)]
+
+## Configure Password Manager
+[!INCLUDE [configure-password-manager-include](../includes/configure-password-manager-include.md)]
+
+## Configure Windows Defender SmartScreen
+[!INCLUDE [configure-windows-defender-smartscreen-include](../includes/configure-windows-defender-smartscreen-include.md)]
+
+## Prevent bypassing Windows Defender SmartScreen prompts for files
+[!INCLUDE [prevent-bypassing-win-defender-files-include](../includes/prevent-bypassing-win-defender-files-include.md)]
+
+## Prevent bypassing Windows Defender SmartScreen prompts for sites
+[!INCLUDE [prevent-bypassing-win-defender-sites-include](../includes/prevent-bypassing-win-defender-sites-include.md)]
+
+## Prevent certificate error overrides
+[!INCLUDE [prevent-certificate-error-overrides-include](../includes/prevent-certificate-error-overrides-include.md)]
+
+## Prevent using Localhost IP address for WebRTC
+[!INCLUDE [prevent-localhost-address-for-webrtc-include](../includes/prevent-localhost-address-for-webrtc-include.md)]
+
+
+## Help protect against web-based security threats
+
+While most websites are safe, some sites have been intentionally designed to steal sensitive and private information or gain access to your system’s resources. You can help protect against threats by using strong security protocols to ensure against such threats.
+
+Thieves use things like _phishing_ attacks to convince someone to enter personal information, such as a banking password, into a website that looks like a legitimate bank but isn't. Attempts to identify legitimate websites through the HTTPS lock symbol and the EV Cert green bar have met with only limited success since attackers are too good at faking legitimate experiences for many people to notice the difference.
+
+Another method thieves often use _hacking_ to attack a system through malformed content that exploits subtle flaws in the browser or various browser extensions. This exploit lets an attacker run code on a device, taking over a browsing session, and perhaps the entire device.
+
+Microsoft Edge addresses these threats to help make browsing the web a safer experience.
+
+
+| Feature | Description |
+|-----------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **[Windows Hello](https://blogs.windows.com/bloggingwindows/2015/03/17/making-windows-10-more-personal-and-more-secure-with-windows-hello/)** | Microsoft Edge is the first browser to natively support Windows Hello to authenticate the user and the website with asymmetric cryptography technology, powered by early implementation of the [Web Authentication (formerly FIDO 2.0 Web API) specification](https://w3c.github.io/webauthn/). |
+| **Microsoft SmartScreen** | Defends against phishing by performing reputation checks on sites visited and blocking any sites that are thought to be a phishing site. SmartScreen also helps to defend against installing malicious software, drive-by attacks, or file downloads, even from trusted sites. Drive-by attacks are malicious web-based attacks that compromise your system by targeting security vulnerabilities in commonly used software and may be hosted on trusted sites. |
+| **Certificate Reputation system** | Collects data about certificates in use, detecting new certificates and flagging fraudulent certificates automatically, and sends the data to Microsoft. The systems and tools in place include
- Certificate Reputation system: Protects users from fraudulent certificates.
- Bing Webmaster Tools (for developers): Reports fake certificates directly to Microsoft.
|
+| **Microsoft EdgeHTML and modern web standards** | Microsoft Edge uses Microsoft EdgeHTML as the rendering engine. This engine focuses on modern standards letting web developers build and maintain a consistent site across all modern browsers. It also helps to defend against hacking through these security standards features:- Support for the W3C standard for [Content Security Policy (CSP)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/content-Security-Policy), which can help web developers defend their sites against cross-site scripting attacks.
- Support for the [HTTP Strict Transport Security (HSTS)](https://developer.microsoft.com/microsoft-edge/platform/documentation/dev-guide/security/HSTS/) security feature (IETF-standard compliant). HSTS helps ensure that connections to important sites, such as to your bank, are always secured.
**NOTE:** Both Microsoft Edge and Internet Explorer 11 support HSTS. |
+| **Code integrity and image loading restrictions** | Microsoft Edge content processes support code integrity and image load restrictions, helping to prevent malicious DLLs from loading or injecting into the content processes. Only [properly signed images](https://blogs.windows.com/msedgedev/2015/11/17/microsoft-edge-module-code-integrity/) are allowed to load into Microsoft Edge. Binaries on remote devices (such as UNC or WebDAV) can’t load. |
+| **Memory corruption mitigations** | Memory corruption attacks frequently happen to apps written in C or C++ don’t provide safety or buffer overflow protection. When an attacker provides malformed input to a program, the program’s memory becomes corrupt allowing the attacker to take control of the program. Although attackers have adapted and invented new ways to attack, we’ve responded with memory safety defenses, mitigating the most common forms of attack, including and especially [use-after-free (UAF)](https://cwe.mitre.org/data/definitions/416.html) vulnerabilities. |
+| **Memory Garbage Collector (MemGC) mitigation** | MemGC replaces Memory Protector and helps to protect the browser from UAF vulnerabilities. MemGC frees up memory from the programmer and automating it. Only freeing memory when the automation detects no references left pointing to a given block of memory. |
+| **Control Flow Guard** | Attackers use memory corruption attacks to gain control of the CPU program counter to jump to any code location they want. Control Flow Guard, a Microsoft Visual Studio technology, compiles checks around code that performs indirect jumps based on a pointer. Those jumps get restricted to function entry points with known addresses only making attacker take-overs must more difficult constraining where an attack jumps. |
+| **All web content runs in an app container sandbox** | Microsoft Edge takes the sandbox even farther, running its content processes in containers not just by default, but all of the time. Microsoft Edge doesn’t support 3rd party binary extensions, so there is no reason for it to run outside of the container, making Microsoft Edge more secure. |
+| **Extension model and HTML5 support** | Microsoft Edge does not support binary extensions because they can bring code and data into the browser’s processes without any protection. So if anything goes wrong, the entire browser itself can be compromised or go down. We encourage everyone to use our scripted HTML5-based extension model. For more info about the new extensions, see the [Microsoft Edge Developer Center](https://developer.microsoft.com/microsoft-edge/extensions/). |
+| **Reduced attack surfaces** | Microsoft Edge does not support VBScript, JScript, VML, Browser Helper Objects, Toolbars, ActiveX controls, and [document modes](https://msdn.microsoft.com/library/jj676915.aspx). Many IE browser vulnerabilities only appear in legacy document modes, so removing support reduced attack surface making the browser more secure.
It also means that it’s not as backward compatible. With this reduced backward compatibility, Microsoft Edge automatically falls back to Internet Explorer 11 for any apps that need backward compatibility. This fall back happens when you use the Enterprise Mode Site List. |
+
+---
diff --git a/browsers/edge/group-policies/start-pages-gp.md b/browsers/edge/group-policies/start-pages-gp.md
index ce15044aad..4b9682362f 100644
--- a/browsers/edge/group-policies/start-pages-gp.md
+++ b/browsers/edge/group-policies/start-pages-gp.md
@@ -1,43 +1,44 @@
----
-title: Microsoft Edge - Start pages group policies
-description: Microsoft Edge loads the pages specified in App settings as the default Start pages. With the relevant Start pages policies, you can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes.
-audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
-ms.localizationpriority: medium
-ms.date: 10/02/2018
-ms.reviewer:
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
-ms.topic: reference
----
-
-# Start pages
-
-Microsoft Edge loads the pages specified in App settings as the default Start pages. With the relevant Start pages policies, you can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes.
-
-## Relevant group policies
-
-- [Configure Open Microsoft Edge With](#configure-open-microsoft-edge-with)
-- [Configure Start Pages](#configure-start-pages)
-- [Disable Lockdown of Start pages](#disable-lockdown-of-start-pages)
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Configuration options
-
-
-
-
-## Configure Open Microsoft Edge With
-[!INCLUDE [configure-open-edge-with-include](../includes/configure-open-edge-with-include.md)]
-
-## Configure Start Pages
-[!INCLUDE [configure-start-pages-include](../includes/configure-start-pages-include.md)]
-
-## Disable Lockdown of Start pages
-[!INCLUDE [disable-lockdown-of-start-pages-include](../includes/disable-lockdown-of-start-pages-include.md)]
-
+---
+title: Microsoft Edge - Start pages group policies
+description: Microsoft Edge loads the pages specified in App settings as the default Start pages. With the relevant Start pages policies, you can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes.
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+author: dansimp
+ms.localizationpriority: medium
+ms.date: 10/02/2018
+ms.reviewer:
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+ms.topic: reference
+---
+
+# Start pages
+
+Microsoft Edge loads the pages specified in App settings as the default Start pages. With the relevant Start pages policies, you can configure Microsoft Edge to load either the Start page, New tab page, previously opened pages, or a specific page or pages. You can also configure Microsoft Edge to prevent users from making changes.
+
+## Relevant group policies
+
+- [Configure Open Microsoft Edge With](#configure-open-microsoft-edge-with)
+- [Configure Start Pages](#configure-start-pages)
+- [Disable Lockdown of Start pages](#disable-lockdown-of-start-pages)
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Configuration options
+
+
+
+
+## Configure Open Microsoft Edge With
+[!INCLUDE [configure-open-edge-with-include](../includes/configure-open-edge-with-include.md)]
+
+## Configure Start Pages
+[!INCLUDE [configure-start-pages-include](../includes/configure-start-pages-include.md)]
+
+## Disable Lockdown of Start pages
+[!INCLUDE [disable-lockdown-of-start-pages-include](../includes/disable-lockdown-of-start-pages-include.md)]
+
diff --git a/browsers/edge/group-policies/sync-browser-settings-gp.md b/browsers/edge/group-policies/sync-browser-settings-gp.md
index 86ed0db6fc..fc5a62e81c 100644
--- a/browsers/edge/group-policies/sync-browser-settings-gp.md
+++ b/browsers/edge/group-policies/sync-browser-settings-gp.md
@@ -1,45 +1,46 @@
----
-title: Microsoft Edge - Sync browser settings
-description: By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites.
-audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.localizationpriority: medium
-ms.topic: reference
----
-
-# Sync browser settings
-
-
-By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites. You can configure Microsoft Edge to prevent the “browser” group from syncing and prevent users from turning on the _Sync your Settings_ toggle in Settings. If you want syncing turned off by default but not disabled, select the _Allow users to turn “browser” syncing_ option in the Do not sync browser policy.
-
-
-## Relevant policies
-- [Do not sync browser settings](#do-not-sync-browser-settings)
-- [Prevent users from turning on browser syncing](#prevent-users-from-turning-on-browser-syncing)
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Configuration options
-
-
-
-
-
-
-### Verify the configuration
-To verify the settings:
-1. In the upper-right corner of Microsoft Edge, click **More** \(**...**\).
-2. Click **Settings**.
-3. Under Account, see if the setting is toggled on or off.

-
-
-## Do not sync browser settings
-[!INCLUDE [do-not-sync-browser-settings-include](../includes/do-not-sync-browser-settings-include.md)]
-
-## Prevent users from turning on browser syncing
-[!INCLUDE [prevent-users-to-turn-on-browser-syncing-include](../includes/prevent-users-to-turn-on-browser-syncing-include.md)]
+---
+title: Microsoft Edge - Sync browser settings
+description: By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites.
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.localizationpriority: medium
+ms.topic: reference
+---
+
+# Sync browser settings
+
+
+By default, the “browser” group syncs automatically between the user’s devices, letting users make changes. The “browser” group uses the Sync your Settings option in Settings to sync information like history and favorites. You can configure Microsoft Edge to prevent the “browser” group from syncing and prevent users from turning on the _Sync your Settings_ toggle in Settings. If you want syncing turned off by default but not disabled, select the _Allow users to turn “browser” syncing_ option in the Do not sync browser policy.
+
+
+## Relevant policies
+- [Do not sync browser settings](#do-not-sync-browser-settings)
+- [Prevent users from turning on browser syncing](#prevent-users-from-turning-on-browser-syncing)
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Configuration options
+
+
+
+
+
+
+### Verify the configuration
+To verify the settings:
+1. In the upper-right corner of Microsoft Edge, click **More** \(**...**\).
+2. Click **Settings**.
+3. Under Account, see if the setting is toggled on or off.

+
+
+## Do not sync browser settings
+[!INCLUDE [do-not-sync-browser-settings-include](../includes/do-not-sync-browser-settings-include.md)]
+
+## Prevent users from turning on browser syncing
+[!INCLUDE [prevent-users-to-turn-on-browser-syncing-include](../includes/prevent-users-to-turn-on-browser-syncing-include.md)]
diff --git a/browsers/edge/group-policies/telemetry-management-gp.md b/browsers/edge/group-policies/telemetry-management-gp.md
index 3de0998564..a14fc3aaf6 100644
--- a/browsers/edge/group-policies/telemetry-management-gp.md
+++ b/browsers/edge/group-policies/telemetry-management-gp.md
@@ -1,31 +1,32 @@
----
-title: Microsoft Edge - Telemetry and data collection group policies
-description: Microsoft Edge gathers diagnostic data, intranet history, internet history, tracking information of sites visited, and Live Tile metadata. You can configure Microsoft Edge to collect all or none of this information.
-audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
-ms.date: 10/02/2018
-ms.reviewer:
-ms.localizationpriority: medium
-ms.topic: reference
----
-
-# Telemetry and data collection
-
-Microsoft Edge gathers diagnostic data, intranet history, internet history, tracking information of sites visited, and Live Tile metadata. You can configure Microsoft Edge to collect all or none of this information.
-
-You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
-
- **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
-
-## Allow extended telemetry for the Books tab
-[!INCLUDE [allow-ext-telemetry-books-tab-include.md](../includes/allow-ext-telemetry-books-tab-include.md)]
-
-## Configure collection of browsing data for Microsoft 365 Analytics
-[!INCLUDE [configure-browser-telemetry-for-m365-analytics-include](../includes/configure-browser-telemetry-for-m365-analytics-include.md)]
-
-## Configure Do Not Track
-[!INCLUDE [configure-do-not-track-include.md](../includes/configure-do-not-track-include.md)]
-
-## Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start
-[!INCLUDE [prevent-live-tile-pinning-start-include](../includes/prevent-live-tile-pinning-start-include.md)]
+---
+title: Microsoft Edge - Telemetry and data collection group policies
+description: Microsoft Edge gathers diagnostic data, intranet history, internet history, tracking information of sites visited, and Live Tile metadata. You can configure Microsoft Edge to collect all or none of this information.
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+ms.localizationpriority: medium
+ms.topic: reference
+---
+
+# Telemetry and data collection
+
+Microsoft Edge gathers diagnostic data, intranet history, internet history, tracking information of sites visited, and Live Tile metadata. You can configure Microsoft Edge to collect all or none of this information.
+
+You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
+
+ **Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\**
+
+## Allow extended telemetry for the Books tab
+[!INCLUDE [allow-ext-telemetry-books-tab-include.md](../includes/allow-ext-telemetry-books-tab-include.md)]
+
+## Configure collection of browsing data for Microsoft 365 Analytics
+[!INCLUDE [configure-browser-telemetry-for-m365-analytics-include](../includes/configure-browser-telemetry-for-m365-analytics-include.md)]
+
+## Configure Do Not Track
+[!INCLUDE [configure-do-not-track-include.md](../includes/configure-do-not-track-include.md)]
+
+## Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start
+[!INCLUDE [prevent-live-tile-pinning-start-include](../includes/prevent-live-tile-pinning-start-include.md)]
diff --git a/browsers/edge/img-microsoft-edge-infographic-lg.md b/browsers/edge/img-microsoft-edge-infographic-lg.md
index 722efc8aa2..9b329c580b 100644
--- a/browsers/edge/img-microsoft-edge-infographic-lg.md
+++ b/browsers/edge/img-microsoft-edge-infographic-lg.md
@@ -1,15 +1,16 @@
----
-description: A full-sized view of the Microsoft Edge infographic.
-title: Full-sized view of the Microsoft Edge infographic
-ms.date: 11/10/2016
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
----
-
-Return to: [Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md)
-Download image: [Total Economic Impact of Microsoft Edge: Infographic](https://www.microsoft.com/download/details.aspx?id=53892)
-
-
-
+---
+description: A full-sized view of the Microsoft Edge infographic.
+title: Full-sized view of the Microsoft Edge infographic
+ms.date: 11/10/2016
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+author: dansimp
+---
+
+Return to: [Browser: Microsoft Edge and Internet Explorer 11](enterprise-guidance-using-microsoft-edge-and-ie11.md)
+Download image: [Total Economic Impact of Microsoft Edge: Infographic](https://www.microsoft.com/download/details.aspx?id=53892)
+
+
+
diff --git a/browsers/edge/managing-group-policy-admx-files.md b/browsers/edge/managing-group-policy-admx-files.md
index f749992d29..8b93e0ebc2 100644
--- a/browsers/edge/managing-group-policy-admx-files.md
+++ b/browsers/edge/managing-group-policy-admx-files.md
@@ -1,26 +1,27 @@
----
-title: Managing group policy ADMX files
-description: Learn how to centrally administer and incorporate ADMX files when editing the administrative template policy settings inside a local or domain-based Group Policy object.
-ms.assetid:
-ms.reviewer:
-audience: itpro
manager: dansimp
-author: eavena
-ms.author: eravena
-ms.prod: edge
-ms.sitesec: library
-ms.localizationpriority: medium
-ms.date: 10/19/2018
----
-
-# Managing group policy ADMX files
-
->Applies to: Microsoft Edge on Windows 10
-
-ADMX files, which are registry-based policy settings provide an XML-based structure for defining the display of the Administrative Template policy settings in the Group Policy Object Editor. The ADMX files replace ADM files, which used a different markup language.
-
->[!NOTE]
->The administrative tools you use—Group Policy Object Editor and Group Policy Management Console—remain mostly unchanged. In the majority of situations, you won’t notice the presence of ADMX files during your day-to-day Group Policy administration tasks.
-
-Unlike ADM files, ADMX files are not stored in individual GPOs by default; however, this behavior supports less common scenarios. For domain-based enterprises, you can create a central store location of ADMX files accessible by anyone with permission to create or edit GPOs. Group Policy tools continue to recognize other earlier ADM files you have in your existing environment. The Group Policy Object Editor automatically reads and displays Administrative Template policy settings from both the ADMX and ADM files.
-
-Some situations require a better understanding of how ADMX files are structured and the location of the files. In this article, we show you how ADMX files are incorporated when editing Administrative Template policy settings in a local or domain-based Group Policy object (GPO).
+---
+title: Managing group policy ADMX files
+description: Learn how to centrally administer and incorporate ADMX files when editing the administrative template policy settings inside a local or domain-based Group Policy object.
+ms.assetid:
+ms.reviewer:
+audience: itpro
+manager: dansimp
+author: dansimp
+ms.author: dansimp
+ms.prod: edge
+ms.sitesec: library
+ms.localizationpriority: medium
+ms.date: 10/19/2018
+---
+
+# Managing group policy ADMX files
+
+>Applies to: Microsoft Edge on Windows 10
+
+ADMX files, which are registry-based policy settings provide an XML-based structure for defining the display of the Administrative Template policy settings in the Group Policy Object Editor. The ADMX files replace ADM files, which used a different markup language.
+
+>[!NOTE]
+>The administrative tools you use—Group Policy Object Editor and Group Policy Management Console—remain mostly unchanged. In the majority of situations, you won’t notice the presence of ADMX files during your day-to-day Group Policy administration tasks.
+
+Unlike ADM files, ADMX files are not stored in individual GPOs by default; however, this behavior supports less common scenarios. For domain-based enterprises, you can create a central store location of ADMX files accessible by anyone with permission to create or edit GPOs. Group Policy tools continue to recognize other earlier ADM files you have in your existing environment. The Group Policy Object Editor automatically reads and displays Administrative Template policy settings from both the ADMX and ADM files.
+
+Some situations require a better understanding of how ADMX files are structured and the location of the files. In this article, we show you how ADMX files are incorporated when editing Administrative Template policy settings in a local or domain-based Group Policy object (GPO).
diff --git a/browsers/edge/microsoft-edge-faq.md b/browsers/edge/microsoft-edge-faq.md
index e73d7bb1a6..4e520db1e3 100644
--- a/browsers/edge/microsoft-edge-faq.md
+++ b/browsers/edge/microsoft-edge-faq.md
@@ -1,54 +1,55 @@
----
-title: Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros
-ms.reviewer:
-audience: itpro
manager: dansimp
-description: Answers to frequently asked questions about Microsoft Edge features, integration, support, and potential problems.
-author: msdmaguire
-ms.author: dmaguire
-ms.prod: edge
-ms.topic: article
-ms.mktglfcycl: general
-ms.sitesec: library
-ms.localizationpriority: medium
----
-
-# Frequently Asked Questions (FAQs) for IT Pros
-
->Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile
-
-## How can I get the next major version of Microsoft Edge, based on Chromium?
-In December 2018, Microsoft [announced](https://blogs.windows.com/windowsexperience/2018/12/06/microsoft-edge-making-the-web-better-through-more-open-source-collaboration/#8jv53blDvL6TIKuS.97) our intention to adopt the Chromium open source project in the development of Microsoft Edge on the desktop, to create better web compatibility for our customers and less fragmentation of the web for all web developers. You can get more information at the [Microsoft Edge Insiders site](https://www.microsoftedgeinsider.com/).
-
-## What’s the difference between Microsoft Edge and Internet Explorer 11? How do I know which one to use?
-Microsoft Edge is the default browser for all Windows 10 devices. It’s built to be highly compatible with the modern web. For some enterprise web apps and a small set of sites that were built to work with older technologies like ActiveX, [you can use Enterprise Mode](emie-to-improve-compatibility.md) to automatically send users to Internet Explorer 11.
-
-For more information on how Internet Explorer and Microsoft Edge work together to support your legacy web apps, while still defaulting to the higher security and modern experiences enabled by Microsoft Edge, see [Legacy apps in the enterprise](https://blogs.windows.com/msedgedev/2017/04/07/legacy-web-apps-enterprise/#RAbtRvJSYFaKu2BI.97).
-
-## Does Microsoft Edge work with Enterprise Mode?
-[Enterprise Mode](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11) helps you run many legacy web applications with better backward compatibility. You can configure both Microsoft Edge and Internet Explorer to use the same Enterprise Mode Site List, switching seamlessly between browsers to support both modern and legacy web apps.
-
-## How do I customize Microsoft Edge and related settings for my organization?
-You can use Group Policy or Microsoft Intune to manage settings related to Microsoft Edge, such as security settings, folder redirection, and preferences. See [Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/group-policies/) for a list of policies currently available for Microsoft Edge and configuration information. Note that the preview release of Chromium-based Microsoft Edge might not include management policies or other enterprise functionality; our focus during the preview is modern browser fundamentals.
-
-## Is Adobe Flash supported in Microsoft Edge?
-Adobe Flash is currently supported as a built-in feature of Microsoft Edge on PCs running Windows 10. In July 2017, Adobe announced that Flash support will end after 2020. With this change to Adobe support, we’ve started to phase Flash out of Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting group policy](https://docs.microsoft.com/microsoft-edge/deploy/available-policies#configure-the-adobe-flash-click-to-run-setting) - this lets you control which websites can run Adobe Flash content.
-
-To learn more about Microsoft’s plan for phasing Flash out of Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash](https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article).
-
-## Does Microsoft Edge support ActiveX controls or BHOs like Silverlight or Java?
-No. Microsoft Edge doesn’t support ActiveX controls and BHOs like Silverlight or Java. If you’re running web apps that use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and standards support.
-
-## How often will Microsoft Edge be updated?
-In Windows 10, we’re delivering Windows as a service, updated on a cadence driven by quality and the availability of new features. Microsoft Edge security updates are released every two to four weeks, while bigger feature updates are included in the Windows 10 releases on a semi-annual cadence.
-
-## How can I provide feedback on Microsoft Edge?
-Microsoft Edge is an evergreen browser - we’ll continue to evolve both the web platform and the user interface with regular updates. To send feedback on user experience, or on broken or malicious sites, use the **Send Feedback** option under the ellipses icon (**...**) in the Microsoft Edge toolbar.
-
-## Will Internet Explorer 11 continue to receive updates?
-We’re committed to keeping Internet Explorer a supported, reliable, and safe browser. Internet Explorer is still a component of Windows and follows the support lifecycle of the OS on which it’s installed. For details, see [Lifecycle FAQ - Internet Explorer](https://support.microsoft.com/help/17454/). While we continue to support and update Internet Explorer, the latest features and platform updates will only be available in Microsoft Edge.
-
-## How do I find out what version of Microsoft Edge I have?
-In the upper right corner of Microsoft Edge, click the ellipses icon (**...**), and then click **Settings**. Look in the **About Microsoft Edge** section to find your version.
-
-## What is Microsoft EdgeHTML?
-Microsoft EdgeHTML is the web rendering engine that powers the current Microsoft Edge web browser and Windows 10 web app platform. (As opposed to *Microsoft Edge, based on Chromium*.)
+---
+title: Microsoft Edge - Frequently Asked Questions (FAQs) for IT Pros
+ms.reviewer:
+audience: itpro
+manager: dansimp
+description: Answers to frequently asked questions about Microsoft Edge features, integration, support, and potential problems.
+author: dansimp
+ms.author: dansimp
+ms.prod: edge
+ms.topic: article
+ms.mktglfcycl: general
+ms.sitesec: library
+ms.localizationpriority: medium
+---
+
+# Frequently Asked Questions (FAQs) for IT Pros
+
+>Applies to: Microsoft Edge on Windows 10 and Windows 10 Mobile
+
+## How can I get the next major version of Microsoft Edge, based on Chromium?
+In December 2018, Microsoft [announced](https://blogs.windows.com/windowsexperience/2018/12/06/microsoft-edge-making-the-web-better-through-more-open-source-collaboration/#8jv53blDvL6TIKuS.97) our intention to adopt the Chromium open source project in the development of Microsoft Edge on the desktop, to create better web compatibility for our customers and less fragmentation of the web for all web developers. You can get more information at the [Microsoft Edge Insiders site](https://www.microsoftedgeinsider.com/).
+
+## What’s the difference between Microsoft Edge and Internet Explorer 11? How do I know which one to use?
+Microsoft Edge is the default browser for all Windows 10 devices. It’s built to be highly compatible with the modern web. For some enterprise web apps and a small set of sites that were built to work with older technologies like ActiveX, [you can use Enterprise Mode](emie-to-improve-compatibility.md) to automatically send users to Internet Explorer 11.
+
+For more information on how Internet Explorer and Microsoft Edge work together to support your legacy web apps, while still defaulting to the higher security and modern experiences enabled by Microsoft Edge, see [Legacy apps in the enterprise](https://blogs.windows.com/msedgedev/2017/04/07/legacy-web-apps-enterprise/#RAbtRvJSYFaKu2BI.97).
+
+## Does Microsoft Edge work with Enterprise Mode?
+[Enterprise Mode](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11) helps you run many legacy web applications with better backward compatibility. You can configure both Microsoft Edge and Internet Explorer to use the same Enterprise Mode Site List, switching seamlessly between browsers to support both modern and legacy web apps.
+
+## How do I customize Microsoft Edge and related settings for my organization?
+You can use Group Policy or Microsoft Intune to manage settings related to Microsoft Edge, such as security settings, folder redirection, and preferences. See [Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/group-policies/) for a list of policies currently available for Microsoft Edge and configuration information. Note that the preview release of Chromium-based Microsoft Edge might not include management policies or other enterprise functionality; our focus during the preview is modern browser fundamentals.
+
+## Is Adobe Flash supported in Microsoft Edge?
+Adobe Flash is currently supported as a built-in feature of Microsoft Edge on PCs running Windows 10. In July 2017, Adobe announced that Flash support will end after 2020. With this change to Adobe support, we’ve started to phase Flash out of Microsoft Edge by adding the [Configure the Adobe Flash Click-to-Run setting group policy](https://docs.microsoft.com/microsoft-edge/deploy/available-policies#configure-the-adobe-flash-click-to-run-setting) - this lets you control which websites can run Adobe Flash content.
+
+To learn more about Microsoft’s plan for phasing Flash out of Microsoft Edge and Internet Explorer, see [The End of an Era — Next Steps for Adobe Flash](https://blogs.windows.com/msedgedev/2017/07/25/flash-on-windows-timeline/#3Bcc3QjRw0l7XsZ4.97) (blog article).
+
+## Does Microsoft Edge support ActiveX controls or BHOs like Silverlight or Java?
+No. Microsoft Edge doesn’t support ActiveX controls and BHOs like Silverlight or Java. If you’re running web apps that use ActiveX controls, x-ua-compatible headers, or legacy document modes, you need to keep running them in IE11. IE11 offers additional security, manageability, performance, backward compatibility, and standards support.
+
+## How often will Microsoft Edge be updated?
+In Windows 10, we’re delivering Windows as a service, updated on a cadence driven by quality and the availability of new features. Microsoft Edge security updates are released every two to four weeks, while bigger feature updates are included in the Windows 10 releases on a semi-annual cadence.
+
+## How can I provide feedback on Microsoft Edge?
+Microsoft Edge is an evergreen browser - we’ll continue to evolve both the web platform and the user interface with regular updates. To send feedback on user experience, or on broken or malicious sites, use the **Send Feedback** option under the ellipses icon (**...**) in the Microsoft Edge toolbar.
+
+## Will Internet Explorer 11 continue to receive updates?
+We’re committed to keeping Internet Explorer a supported, reliable, and safe browser. Internet Explorer is still a component of Windows and follows the support lifecycle of the OS on which it’s installed. For details, see [Lifecycle FAQ - Internet Explorer](https://support.microsoft.com/help/17454/). While we continue to support and update Internet Explorer, the latest features and platform updates will only be available in Microsoft Edge.
+
+## How do I find out what version of Microsoft Edge I have?
+In the upper right corner of Microsoft Edge, click the ellipses icon (**...**), and then click **Settings**. Look in the **About Microsoft Edge** section to find your version.
+
+## What is Microsoft EdgeHTML?
+Microsoft EdgeHTML is the web rendering engine that powers the current Microsoft Edge web browser and Windows 10 web app platform. (As opposed to *Microsoft Edge, based on Chromium*.)
diff --git a/browsers/edge/microsoft-edge-forrester.md b/browsers/edge/microsoft-edge-forrester.md
index b4035d8b3e..23c3505440 100644
--- a/browsers/edge/microsoft-edge-forrester.md
+++ b/browsers/edge/microsoft-edge-forrester.md
@@ -1,36 +1,37 @@
----
-title: Forrester Total Economic Impact - Microsoft Edge
-ms.reviewer:
-audience: itpro
manager: dansimp
-description: Review the results of the Microsoft Edge study carried out by Forrester Research
-ms.prod: edge
-ms.topic: article
-author: msdmaguire
-ms.author: dmaguire
-ms.localizationpriority: high
----
-# Measuring the impact of Microsoft Edge - Total Economic Impact (TEI) of Microsoft Edge
-
-Forrester Research measures the return on investment (ROI) of Microsoft Edge in its latest TEI report and survey. Browse and download these free resources to learn about the impact Microsoft Edge can have in your organization, including significant cost savings in reduced browser help desk tickets and improved browser security, to increased speed, performance, and user productivity.
-
-## Forrester report video summary
-View a brief overview of the Forrester TEI case study that Microsoft commissioned to examine the value your organization can achieve by utilizing Microsoft Edge:
-
-> ![VIDEO ]
-
-## Forrester Study report
-
-Forrester interviewed several customers with more than six months of experience using Microsoft Edge – all customers reported improvements in browser security, increased user productivity, and efficiencies gained in supporting the software.
-
-[Download the full report](https://www.microsoft.com/download/details.aspx?id=55847)
-
-## Forrester Study report infographic
-Get a graphical summary of the TEI of Microsoft Edge Forrester Study report and highlights of the three-year financial impact of Microsoft Edge.
-
-[Download the report infographic](https://www.microsoft.com/download/details.aspx?id=55956)
-
-## Forrester survey infographic
-
-Forrester surveyed 168 customers using Microsoft Edge form the US, Germany, UK, and Japan, ranging in size from 500 to over 100,000 employees. This document is an abridged version of this survey commissioned by Microsoft and delivery by Forrester consulting.
-
-[Download the survey infographic](https://www.microsoft.com/download/details.aspx?id=53892)
+---
+title: Forrester Total Economic Impact - Microsoft Edge
+ms.reviewer:
+audience: itpro
+manager: dansimp
+description: Review the results of the Microsoft Edge study carried out by Forrester Research
+ms.prod: edge
+ms.topic: article
+author: dansimp
+ms.author: dansimp
+ms.localizationpriority: high
+---
+# Measuring the impact of Microsoft Edge - Total Economic Impact (TEI) of Microsoft Edge
+
+Forrester Research measures the return on investment (ROI) of Microsoft Edge in its latest TEI report and survey. Browse and download these free resources to learn about the impact Microsoft Edge can have in your organization, including significant cost savings in reduced browser help desk tickets and improved browser security, to increased speed, performance, and user productivity.
+
+## Forrester report video summary
+View a brief overview of the Forrester TEI case study that Microsoft commissioned to examine the value your organization can achieve by utilizing Microsoft Edge:
+
+> ![VIDEO ]
+
+## Forrester Study report
+
+Forrester interviewed several customers with more than six months of experience using Microsoft Edge – all customers reported improvements in browser security, increased user productivity, and efficiencies gained in supporting the software.
+
+[Download the full report](https://www.microsoft.com/download/details.aspx?id=55847)
+
+## Forrester Study report infographic
+Get a graphical summary of the TEI of Microsoft Edge Forrester Study report and highlights of the three-year financial impact of Microsoft Edge.
+
+[Download the report infographic](https://www.microsoft.com/download/details.aspx?id=55956)
+
+## Forrester survey infographic
+
+Forrester surveyed 168 customers using Microsoft Edge form the US, Germany, UK, and Japan, ranging in size from 500 to over 100,000 employees. This document is an abridged version of this survey commissioned by Microsoft and delivery by Forrester consulting.
+
+[Download the survey infographic](https://www.microsoft.com/download/details.aspx?id=53892)
diff --git a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md
index 9781a1de92..b8899ba2b6 100644
--- a/browsers/edge/microsoft-edge-kiosk-mode-deploy.md
+++ b/browsers/edge/microsoft-edge-kiosk-mode-deploy.md
@@ -5,13 +5,13 @@ ms.assetid:
ms.reviewer:
audience: itpro
manager: dansimp
-author: eavena
-ms.author: eravena
+author: dansimp
+ms.author: dansimp
ms.prod: edge
ms.sitesec: library
ms.topic: article
ms.localizationpriority: medium
-ms.date: 10/29/2018
+ms.date: 10/29/2018
---
# Deploy Microsoft Edge kiosk mode
diff --git a/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md b/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md
index 6ca44ca392..ecfa4c5ca0 100644
--- a/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md
+++ b/browsers/edge/shortdesc/allow-a-shared-books-folder-shortdesc.md
@@ -1,11 +1,12 @@
----
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.prod: edge
-ms.topic: include
----
-
-Microsoft Edge does not use a shared folder by default but downloads book files to a per-user folder for each user. With this policy, you can configure Microsoft Edge to store books from the Books Library to a default, shared folder in Windows, which decreases the amount of storage used by book files. When you enable this policy, Microsoft Edge downloads books to a shared folder after user action to download the book to their device, which allows them to remove downloaded books at any time. For this policy to work correctly, you must also enable the **Allow a Windows app to share application data between users** group policy. Also, the users must be signed in with a school or work account.
+---
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.prod: edge
+ms.topic: include
+---
+
+Microsoft Edge does not use a shared folder by default but downloads book files to a per-user folder for each user. With this policy, you can configure Microsoft Edge to store books from the Books Library to a default, shared folder in Windows, which decreases the amount of storage used by book files. When you enable this policy, Microsoft Edge downloads books to a shared folder after user action to download the book to their device, which allows them to remove downloaded books at any time. For this policy to work correctly, you must also enable the **Allow a Windows app to share application data between users** group policy. Also, the users must be signed in with a school or work account.
diff --git a/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md b/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md
index 4b4897683a..116864a49f 100644
--- a/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md
+++ b/browsers/edge/shortdesc/allow-address-bar-drop-down-shortdesc.md
@@ -1,11 +1,12 @@
----
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.prod: edge
-ms.topic: include
----
-
-Microsoft Edge shows the Address bar drop-down list and makes it available by default, which takes precedence over the Configure search suggestions in Address bar policy. We recommend disabling this policy if you want to minimize network connections from Microsoft Edge to Microsoft service, which hides the functionality of the Address bar drop-down list. When you disable this policy, Microsoft Edge also disables the _Show search and site suggestions as I type_ toggle in Settings.
+---
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.prod: edge
+ms.topic: include
+---
+
+Microsoft Edge shows the Address bar drop-down list and makes it available by default, which takes precedence over the Configure search suggestions in Address bar policy. We recommend disabling this policy if you want to minimize network connections from Microsoft Edge to Microsoft service, which hides the functionality of the Address bar drop-down list. When you disable this policy, Microsoft Edge also disables the _Show search and site suggestions as I type_ toggle in Settings.
diff --git a/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md b/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md
index bd2d105ef2..dca6cf6233 100644
--- a/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md
+++ b/browsers/edge/shortdesc/allow-adobe-flash-shortdesc.md
@@ -1,11 +1,12 @@
----
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.prod: edge
-ms.topic: include
----
-
-Adobe Flash is integrated with Microsoft Edge and runs Adobe Flash content by default. With this policy, you can configure Microsoft Edge to prevent Adobe Flash content from running.
+---
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.prod: edge
+ms.topic: include
+---
+
+Adobe Flash is integrated with Microsoft Edge and runs Adobe Flash content by default. With this policy, you can configure Microsoft Edge to prevent Adobe Flash content from running.
diff --git a/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md b/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md
index 373cac8619..af3d4fefef 100644
--- a/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md
+++ b/browsers/edge/shortdesc/allow-clearing-browsing-data-on-exit-shortdesc.md
@@ -1,11 +1,12 @@
----
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.prod: edge
-ms.topic: include
----
-
-Microsoft Edge does not clear the browsing data on exit by default, but users can configure the _Clear browsing data_ option in Settings. Browsing data includes information you entered in forms, passwords, and even the websites visited. With this policy, you can configure Microsoft Edge to clear the browsing data automatically each time Microsoft Edge closes.
+---
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.prod: edge
+ms.topic: include
+---
+
+Microsoft Edge does not clear the browsing data on exit by default, but users can configure the _Clear browsing data_ option in Settings. Browsing data includes information you entered in forms, passwords, and even the websites visited. With this policy, you can configure Microsoft Edge to clear the browsing data automatically each time Microsoft Edge closes.
diff --git a/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md b/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md
index 4775e4ba3e..40a927c882 100644
--- a/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md
+++ b/browsers/edge/shortdesc/allow-configuration-updates-for-books-library-shortdesc.md
@@ -1,11 +1,12 @@
----
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.prod: edge
-ms.topic: include
----
-
-Microsoft Edge automatically updates the configuration data for the Books library. Disabling this policy prevents Microsoft Edge from updating the configuration data. If Microsoft receives feedback about the amount of data about the Books library, the data comes as a JSON file.
+---
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.prod: edge
+ms.topic: include
+---
+
+Microsoft Edge automatically updates the configuration data for the Books library. Disabling this policy prevents Microsoft Edge from updating the configuration data. If Microsoft receives feedback about the amount of data about the Books library, the data comes as a JSON file.
diff --git a/browsers/edge/shortdesc/allow-cortana-shortdesc.md b/browsers/edge/shortdesc/allow-cortana-shortdesc.md
index 5975b2b148..fbfa0f13b0 100644
--- a/browsers/edge/shortdesc/allow-cortana-shortdesc.md
+++ b/browsers/edge/shortdesc/allow-cortana-shortdesc.md
@@ -1,11 +1,12 @@
----
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.prod: edge
-ms.topic: include
----
-
-Since Microsoft Edge is integration with Cortana, Microsoft Edge allows users to use Cortana voice assistant by default. With this policy, you can configure Microsoft Edge to prevent users from using Cortana but can still search to find items on their device.
+---
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.prod: edge
+ms.topic: include
+---
+
+Since Microsoft Edge is integration with Cortana, Microsoft Edge allows users to use Cortana voice assistant by default. With this policy, you can configure Microsoft Edge to prevent users from using Cortana but can still search to find items on their device.
diff --git a/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md b/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md
index 4084a7dfde..9d134d4a38 100644
--- a/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md
+++ b/browsers/edge/shortdesc/allow-developer-tools-shortdesc.md
@@ -1,11 +1,12 @@
----
-author: eavena
-ms.author: eravena
-ms.date: 10/02/2018
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.prod: edge
-ms.topic: include
----
-
-Microsoft Edge allows users to use the F12 developer tools to build and debug web pages by default. With this policy, you can configure Microsoft Edge to prevent users from using the F12 developer tools.
+---
+author: dansimp
+ms.author: dansimp
+ms.date: 10/02/2018
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.prod: edge
+ms.topic: include
+---
+
+Microsoft Edge allows users to use the F12 developer tools to build and debug web pages by default. With this policy, you can configure Microsoft Edge to prevent users from using the F12 developer tools.
diff --git a/browsers/edge/troubleshooting-microsoft-edge.md b/browsers/edge/troubleshooting-microsoft-edge.md
index 5cd394e473..3c50d4d50e 100644
--- a/browsers/edge/troubleshooting-microsoft-edge.md
+++ b/browsers/edge/troubleshooting-microsoft-edge.md
@@ -1,37 +1,38 @@
----
-title: Troubleshoot Microsoft Edge
-description:
-ms.assetid:
-ms.reviewer:
-audience: itpro
manager: dansimp
-author: eavena
-ms.author: eravena
-ms.prod: edge
-ms.sitesec: library
-title: Deploy Microsoft Edge kiosk mode
-ms.localizationpriority: medium
-ms.date: 10/15/2018
----
-
-# Troubleshoot Microsoft Edge
-
-
-## Microsoft Edge and IPv6
-We are aware of the known issue with Microsoft Edge and all UWP-based apps, such as Store, Mail, Feedback Hub, and so on. It only happens if you have disabled IPv6 (not recommended), so a temporary workaround is to enable it.
-
-## Microsoft Edge hijacks .PDF and .HTM files
-
-
-
-## Citrix Receiver in Microsoft Edge kiosk mode
-If you want to deliver applications to users via Citrix through Microsoft Edge, you must create the kiosk user account and then log into the account to install Citrix Receiver BEFORE setting up assigned access.
-
-1. Create the kiosk user account.
-2. Log into the account.
-3. Install Citrix Receiver.
-4. Set up assigned access.
-
-
-## Missing SettingSync.admx and SettingSync.adml files
-
-Make sure to [download](https://www.microsoft.com/download/windows.aspx) the latest templates to C:\windows\policydefinitions\.
+---
+title: Troubleshoot Microsoft Edge
+description:
+ms.assetid:
+ms.reviewer:
+audience: itpro
+manager: dansimp
+author: dansimp
+ms.author: dansimp
+ms.prod: edge
+ms.sitesec: library
+title: Deploy Microsoft Edge kiosk mode
+ms.localizationpriority: medium
+ms.date: 10/15/2018
+---
+
+# Troubleshoot Microsoft Edge
+
+
+## Microsoft Edge and IPv6
+We are aware of the known issue with Microsoft Edge and all UWP-based apps, such as Store, Mail, Feedback Hub, and so on. It only happens if you have disabled IPv6 (not recommended), so a temporary workaround is to enable it.
+
+## Microsoft Edge hijacks .PDF and .HTM files
+
+
+
+## Citrix Receiver in Microsoft Edge kiosk mode
+If you want to deliver applications to users via Citrix through Microsoft Edge, you must create the kiosk user account and then log into the account to install Citrix Receiver BEFORE setting up assigned access.
+
+1. Create the kiosk user account.
+2. Log into the account.
+3. Install Citrix Receiver.
+4. Set up assigned access.
+
+
+## Missing SettingSync.admx and SettingSync.adml files
+
+Make sure to [download](https://www.microsoft.com/download/windows.aspx) the latest templates to C:\windows\policydefinitions\.
diff --git a/browsers/edge/use-powershell-to manage-group-policy.md b/browsers/edge/use-powershell-to manage-group-policy.md
index 4427c17e84..58a6b06b27 100644
--- a/browsers/edge/use-powershell-to manage-group-policy.md
+++ b/browsers/edge/use-powershell-to manage-group-policy.md
@@ -1,29 +1,30 @@
----
-title: Use Windows PowerShell to manage group policy
-description:
-ms.prod: edge
-ms.mktglfcycl: explore
-ms.sitesec: library
-ms.pagetype: security
-title: Security enhancements for Microsoft Edge (Microsoft Edge for IT Pros)
-ms.localizationpriority: medium
-ms.date: 10/02/2018
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: eravena
-author: eavena
----
-
-# Use Windows PowerShell to manage group policy
-
-Windows PowerShell supports group policy automation of the same tasks you perform in Group Policy Management Console (GPMC) for domain-based group policy objects (GPOs):
-
-- Maintain GPOs (GPO creation, removal, backup, and import)
-- Associate GPOs with Active Directory service containers (group policy link creation, update, and removal)
-- Set permissions on GPOs
-- Modify inheritance flags on Active Directory organization units (OUs) and domains
-- Configure registry-based policy settings and group policy preferences registry settings (update, retrieval, and removal)
-- Create starter GPOs
-
-
-
+---
+title: Use Windows PowerShell to manage group policy
+description:
+ms.prod: edge
+ms.mktglfcycl: explore
+ms.sitesec: library
+ms.pagetype: security
+title: Security enhancements for Microsoft Edge (Microsoft Edge for IT Pros)
+ms.localizationpriority: medium
+ms.date: 10/02/2018
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+author: dansimp
+---
+
+# Use Windows PowerShell to manage group policy
+
+Windows PowerShell supports group policy automation of the same tasks you perform in Group Policy Management Console (GPMC) for domain-based group policy objects (GPOs):
+
+- Maintain GPOs (GPO creation, removal, backup, and import)
+- Associate GPOs with Active Directory service containers (group policy link creation, update, and removal)
+- Set permissions on GPOs
+- Modify inheritance flags on Active Directory organization units (OUs) and domains
+- Configure registry-based policy settings and group policy preferences registry settings (update, retrieval, and removal)
+- Create starter GPOs
+
+
+
diff --git a/browsers/edge/web-app-compat-toolkit.md b/browsers/edge/web-app-compat-toolkit.md
index b502df7292..8ec157e607 100644
--- a/browsers/edge/web-app-compat-toolkit.md
+++ b/browsers/edge/web-app-compat-toolkit.md
@@ -1,57 +1,58 @@
----
-title: Web Application Compatibility lab kit
-ms.reviewer:
-audience: itpro
manager: dansimp
-description: Learn how to use the web application compatibility toolkit for Microsoft Edge.
-ms.prod: edge
-ms.topic: article
-ms.manager: elizapo
-author: eavena
-ms.author: eravena
-ms.localizationpriority: high
----
-
-# Web Application Compatibility lab kit
-
->Updated: October, 2017
-
-Upgrading web applications to modern standards is the best long-term solution to ensure compatibility with today’s web browsers, but using backward compatibility can save time and money. Internet Explorer 11 has features that can ease your browser and operating system upgrades, reducing web application testing and remediation costs. On Windows 10, you can standardize on Microsoft Edge for faster, safer browsing and fall back to Internet Explorer 11 just for sites that need backward compatibility.
-
-The Web Application Compatibility Lab Kit is a primer for the features and techniques used to provide web application compatibility during a typical enterprise migration to Microsoft Edge. It walks you through how to configure and set up Enterprise Mode, leverage Enterprise Site Discovery, test web apps using the F12 developer tools, and manage the Enterprise Mode Site List.
-
-The Web Application Compatibility Lab Kit includes:
-
-- A pre-configured Windows 7 and Windows 10 virtual lab environment with:
- - Windows 7 Enterprise Evaluation
- - Windows 10 Enterprise Evaluation (version 1607)
- - Enterprise Mode Site List Manager
- - Enterprise Site Discovery Toolkit
-- A "lite" lab option to run the lab on your own Windows 7 or Windows 10 operating system
-- A step-by-step lab guide
-- A web application compatibility overview video
-- A white paper and IT Showcase studies
-
-Depending on your environment, your web apps may "just work” using the methods described below. Visit [Microsoft Edge Dev](https://developer.microsoft.com/microsoft-edge/) for tools and guidance for web developers.
-
-There are two versions of the lab kit available:
-
-- Full version (8 GB) - includes a complete virtual lab environment
-- Lite version (400 MB) - includes guidance for running the Lab Kit on your own Windows 7 or Windows 10 operating system
-
-The Web Application Compatibility Lab Kit is also available in the following languages:
-
-- Chinese (Simplified)
-- Chinese (Traditional)
-- French
-- German
-- Italian
-- Japanese
-- Korean
-- Portuguese (Brazil)
-- Russian
-- Spanish
-
-[DOWNLOAD THE LAB KIT](https://www.microsoft.com/evalcenter/evaluate-windows-10-web-application-compatibility-lab)
-
->[!TIP]
->Please use a broad bandwidth to download this content to enhance your downloading experience. Lab environment requires 8 GB of available memory and 100 GB of free disk space.
+---
+title: Web Application Compatibility lab kit
+ms.reviewer:
+audience: itpro
+manager: dansimp
+description: Learn how to use the web application compatibility toolkit for Microsoft Edge.
+ms.prod: edge
+ms.topic: article
+ms.manager: dansimp
+author: dansimp
+ms.author: dansimp
+ms.localizationpriority: high
+---
+
+# Web Application Compatibility lab kit
+
+>Updated: October, 2017
+
+Upgrading web applications to modern standards is the best long-term solution to ensure compatibility with today’s web browsers, but using backward compatibility can save time and money. Internet Explorer 11 has features that can ease your browser and operating system upgrades, reducing web application testing and remediation costs. On Windows 10, you can standardize on Microsoft Edge for faster, safer browsing and fall back to Internet Explorer 11 just for sites that need backward compatibility.
+
+The Web Application Compatibility Lab Kit is a primer for the features and techniques used to provide web application compatibility during a typical enterprise migration to Microsoft Edge. It walks you through how to configure and set up Enterprise Mode, leverage Enterprise Site Discovery, test web apps using the F12 developer tools, and manage the Enterprise Mode Site List.
+
+The Web Application Compatibility Lab Kit includes:
+
+- A pre-configured Windows 7 and Windows 10 virtual lab environment with:
+ - Windows 7 Enterprise Evaluation
+ - Windows 10 Enterprise Evaluation (version 1607)
+ - Enterprise Mode Site List Manager
+ - Enterprise Site Discovery Toolkit
+- A "lite" lab option to run the lab on your own Windows 7 or Windows 10 operating system
+- A step-by-step lab guide
+- A web application compatibility overview video
+- A white paper and IT Showcase studies
+
+Depending on your environment, your web apps may "just work” using the methods described below. Visit [Microsoft Edge Dev](https://developer.microsoft.com/microsoft-edge/) for tools and guidance for web developers.
+
+There are two versions of the lab kit available:
+
+- Full version (8 GB) - includes a complete virtual lab environment
+- Lite version (400 MB) - includes guidance for running the Lab Kit on your own Windows 7 or Windows 10 operating system
+
+The Web Application Compatibility Lab Kit is also available in the following languages:
+
+- Chinese (Simplified)
+- Chinese (Traditional)
+- French
+- German
+- Italian
+- Japanese
+- Korean
+- Portuguese (Brazil)
+- Russian
+- Spanish
+
+[DOWNLOAD THE LAB KIT](https://www.microsoft.com/evalcenter/evaluate-windows-10-web-application-compatibility-lab)
+
+>[!TIP]
+>Please use a broad bandwidth to download this content to enhance your downloading experience. Lab environment requires 8 GB of available memory and 100 GB of free disk space.
diff --git a/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md b/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md
index 6b9f2add8d..08d914e629 100644
--- a/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md
+++ b/browsers/enterprise-mode/add-employees-enterprise-mode-portal.md
@@ -3,14 +3,14 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Details about how to add employees to the Enterprise Mode Site List Portal.
-author: eavena
+author: dansimp
ms.prod: ie11
title: Add employees to the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
---
# Add employees to the Enterprise Mode Site List Portal
diff --git a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md
index 5b336bc92e..39adf2816d 100644
--- a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md
+++ b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: You can add multiple sites to your Enterprise Mode site list by creating a custom text (TXT) or Extensible Markup Language (XML) file of problematic sites and then adding it in the Bulk add from file area of the Enterprise Mode Site List Manager.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 20aF07c4-051a-451f-9c46-5a052d9Ae27c
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1) (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md
index 7561149048..b4da3f64f5 100644
--- a/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md
+++ b/browsers/enterprise-mode/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Add multiple sites to your Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2).
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: da659ff5-70d5-4852-995e-4df67c4871dd
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2) (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 10/24/2017
diff --git a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md
index ccb69e9415..55b2dcd28a 100644
--- a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md
+++ b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that's designed to emulate either Windows Internet Explorer 7 or Windows Internet Explorer 8, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 042e44e8-568d-4717-8fd3-69dd198bbf26
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1) (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md
index d07284e3b6..c1a7aee9b8 100644
--- a/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md
+++ b/browsers/enterprise-mode/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that''s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 513e8f3b-fedf-4d57-8d81-1ea4fdf1ac0b
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2) (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/administrative-templates-and-ie11.md b/browsers/enterprise-mode/administrative-templates-and-ie11.md
index 48dceffb10..d92810ceb5 100644
--- a/browsers/enterprise-mode/administrative-templates-and-ie11.md
+++ b/browsers/enterprise-mode/administrative-templates-and-ie11.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: security
description: Administrative templates and Internet Explorer 11
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 2b390786-f786-41cc-bddc-c55c8a4c5af3
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Administrative templates and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/approve-change-request-enterprise-mode-portal.md b/browsers/enterprise-mode/approve-change-request-enterprise-mode-portal.md
index 16c6da5049..fd58f63df5 100644
--- a/browsers/enterprise-mode/approve-change-request-enterprise-mode-portal.md
+++ b/browsers/enterprise-mode/approve-change-request-enterprise-mode-portal.md
@@ -3,14 +3,14 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Details about how Approvers can approve open change requests in the Enterprise Mode Site List Portal.
-author: eavena
+author: dansimp
ms.prod: ie11
title: Approve a change request using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
---
# Approve a change request using the Enterprise Mode Site List Portal
diff --git a/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md b/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md
index ad4f6bbe08..7696eedaca 100644
--- a/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md
+++ b/browsers/enterprise-mode/check-for-new-enterprise-mode-site-list-xml-file.md
@@ -8,8 +8,8 @@ ms.prod: ie11
ms.mktglfcycl: deploy
ms.pagetype: appcompat
ms.sitesec: library
-author: eavena
-ms.author: eravena
+author: dansimp
+ms.author: dansimp
ms.date: 08/14/2017
ms.localizationpriority: low
---
diff --git a/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md b/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md
index 15560fccc7..64c7c36696 100644
--- a/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md
+++ b/browsers/enterprise-mode/collect-data-using-enterprise-site-discovery.md
@@ -2,12 +2,12 @@
ms.localizationpriority: low
ms.mktglfcycl: deploy
description: Use Internet Explorer to collect data on computers running Windows Internet Explorer 8 through Internet Explorer 11 on Windows 10, Windows 8.1, or Windows 7.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: a145e80f-eb62-4116-82c4-3cc35fd064b6
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Collect data using Enterprise Site Discovery
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/configure-settings-enterprise-mode-portal.md b/browsers/enterprise-mode/configure-settings-enterprise-mode-portal.md
index 070ab271f9..807cc8d2c8 100644
--- a/browsers/enterprise-mode/configure-settings-enterprise-mode-portal.md
+++ b/browsers/enterprise-mode/configure-settings-enterprise-mode-portal.md
@@ -3,14 +3,14 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Details about how the Administrator can use the Settings page to set up Groups and roles, the Enterprise Mode Site List Portal environment, and the freeze dates for production changes.
-author: eavena
+author: dansimp
ms.prod: ie11
title: Use the Settings page to finish setting up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
---
# Use the Settings page to finish setting up the Enterprise Mode Site List Portal
diff --git a/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md b/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md
index 99f9640e54..cbfc5f11b5 100644
--- a/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md
+++ b/browsers/enterprise-mode/create-change-request-enterprise-mode-portal.md
@@ -3,14 +3,14 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Details about how to create a change request within the Enterprise Mode Site List Portal.
-author: eavena
+author: dansimp
ms.prod: ie11
title: Create a change request using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
---
# Create a change request using the Enterprise Mode Site List Portal
diff --git a/browsers/enterprise-mode/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
index 90cef488cc..ad225f2556 100644
--- a/browsers/enterprise-mode/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
+++ b/browsers/enterprise-mode/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
description: Delete a single site from your global Enterprise Mode site list.
ms.pagetype: appcompat
ms.mktglfcycl: deploy
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 41413459-b57f-48da-aedb-4cbec1e2981a
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md
index 8a17c64622..403690d64f 100644
--- a/browsers/enterprise-mode/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md
+++ b/browsers/enterprise-mode/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: You can use Internet Explorer 11 and the Enterprise Mode Site List Manager to change whether page rendering should use Enterprise Mode or the default Internet Explorer browser configuration. You can also add, remove, or delete associated comments.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 76aa9a85-6190-4c3a-bc25-0f914de228ea
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/enterprise-mode-overview-for-ie11.md b/browsers/enterprise-mode/enterprise-mode-overview-for-ie11.md
index 9d297faa8d..ae103d5802 100644
--- a/browsers/enterprise-mode/enterprise-mode-overview-for-ie11.md
+++ b/browsers/enterprise-mode/enterprise-mode-overview-for-ie11.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Use the topics in this section to learn how to set up and use Enterprise Mode, Enterprise Mode Site List Manager, and the Enterprise Mode Site List Portal for your company.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: d52ba8ba-b3c7-4314-ba14-0610e1d8456e
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Enterprise Mode for Internet Explorer 11 (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md b/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md
index 503be19c75..634fd7cd91 100644
--- a/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md
+++ b/browsers/enterprise-mode/enterprise-mode-schema-version-1-guidance.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Use the Enterprise Mode Site List Manager to create and update your Enterprise Mode site list for devices running Windows 7 or Windows 8.1 Update.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 17c61547-82e3-48f2-908d-137a71938823
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Enterprise Mode schema v.1 guidance (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md b/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md
index 135d5914f0..70694a3df2 100644
--- a/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md
+++ b/browsers/enterprise-mode/enterprise-mode-schema-version-2-guidance.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Use the Enterprise Mode Site List Manager to create and update your Enterprise Mode site list for devices running Windows 10.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 909ca359-5654-4df9-b9fb-921232fc05f5
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Enterprise Mode schema v.2 guidance (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 12/04/2017
diff --git a/browsers/enterprise-mode/enterprise-mode.md b/browsers/enterprise-mode/enterprise-mode.md
index 9e9f2933fe..30d32a8d1a 100644
--- a/browsers/enterprise-mode/enterprise-mode.md
+++ b/browsers/enterprise-mode/enterprise-mode.md
@@ -3,8 +3,8 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: security
description: Use this section to learn about how to turn on Enterprise Mode.
-author: eavena
-ms.author: eravena
+author: dansimp
+ms.author: dansimp
ms.prod: edge
ms.assetid:
ms.reviewer:
diff --git a/browsers/enterprise-mode/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md
index fe2074f29f..4f4cbb32bb 100644
--- a/browsers/enterprise-mode/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md
+++ b/browsers/enterprise-mode/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: After you create your Enterprise Mode site list in the Enterprise Mode Site List Manager, you can export the contents to an Enterprise Mode (.EMIE) file.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 9ee7c13d-6fca-4446-bc22-d23a0213a95d
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Export your Enterprise Mode site list from the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
index a0d0943e07..a1d5a8a76b 100644
--- a/browsers/enterprise-mode/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
+++ b/browsers/enterprise-mode/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Instructions about how to clear all of the sites from your global Enterprise Mode site list.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 90f38a6c-e0e2-4c93-9a9e-c425eca99e97
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Remove all sites from your Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/remove-sites-from-a-local-compatibililty-view-list.md b/browsers/enterprise-mode/remove-sites-from-a-local-compatibililty-view-list.md
index 91bb223310..91ff0fab17 100644
--- a/browsers/enterprise-mode/remove-sites-from-a-local-compatibililty-view-list.md
+++ b/browsers/enterprise-mode/remove-sites-from-a-local-compatibililty-view-list.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Instructions about how to remove sites from a local compatibility view list.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: f6ecaa75-ebcb-4f8d-8721-4cd6e73c0ac9
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Remove sites from a local compatibility view list (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/remove-sites-from-a-local-enterprise-mode-site-list.md b/browsers/enterprise-mode/remove-sites-from-a-local-enterprise-mode-site-list.md
index 5a278479ec..4e7e10efde 100644
--- a/browsers/enterprise-mode/remove-sites-from-a-local-enterprise-mode-site-list.md
+++ b/browsers/enterprise-mode/remove-sites-from-a-local-enterprise-mode-site-list.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Instructions about how to remove sites from a local Enterprise Mode site list.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: c7d6dd0b-e264-42bb-8c9d-ac2f837018d2
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Remove sites from a local Enterprise Mode site list (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md
index 5019258eca..2cb578171f 100644
--- a/browsers/enterprise-mode/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md
+++ b/browsers/enterprise-mode/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: You can save your current Enterprise Mode compatibility site list as an XML file, for distribution and use by your managed systems.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 254a986b-494f-4316-92c1-b089ee8b3e0a
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Save your site list to XML in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/schedule-production-change-enterprise-mode-portal.md b/browsers/enterprise-mode/schedule-production-change-enterprise-mode-portal.md
index 455ae58820..c946663dda 100644
--- a/browsers/enterprise-mode/schedule-production-change-enterprise-mode-portal.md
+++ b/browsers/enterprise-mode/schedule-production-change-enterprise-mode-portal.md
@@ -3,14 +3,14 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Details about how Administrators can schedule approved change requests for production in the Enterprise Mode Site List Portal.
-author: eavena
+author: dansimp
ms.prod: ie11
title: Schedule approved change requests for production using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
---
# Schedule approved change requests for production using the Enterprise Mode Site List Portal
diff --git a/browsers/enterprise-mode/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
index cebf4c013d..bf7e73664e 100644
--- a/browsers/enterprise-mode/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
+++ b/browsers/enterprise-mode/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Search to see if a specific site already appears in your global Enterprise Mode site list.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: e399aeaf-6c3b-4cad-93c9-813df6ad47f9
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Search your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md b/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md
index 1be38336f5..47322f0c03 100644
--- a/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md
+++ b/browsers/enterprise-mode/set-up-enterprise-mode-logging-and-data-collection.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Set up and turn on Enterprise Mode logging and data collection in your organization.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 2e98a280-f677-422f-ba2e-f670362afcde
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Set up Enterprise Mode logging and data collection (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/set-up-enterprise-mode-portal.md b/browsers/enterprise-mode/set-up-enterprise-mode-portal.md
index c69c8bd895..21efc17c35 100644
--- a/browsers/enterprise-mode/set-up-enterprise-mode-portal.md
+++ b/browsers/enterprise-mode/set-up-enterprise-mode-portal.md
@@ -3,14 +3,14 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Details about how to set up the Enterprise Mode Site List Portal for your organization.
-author: eavena
+author: dansimp
ms.prod: ie11
title: Set up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
---
# Set up the Enterprise Mode Site List Portal
diff --git a/browsers/enterprise-mode/turn-off-enterprise-mode.md b/browsers/enterprise-mode/turn-off-enterprise-mode.md
index ce1f04eaa1..d34ccca8ce 100644
--- a/browsers/enterprise-mode/turn-off-enterprise-mode.md
+++ b/browsers/enterprise-mode/turn-off-enterprise-mode.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: How to turn Enterprise Mode off temporarily while testing websites and how to turn it off completely if you no longer want to to use it.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 5027c163-71e0-49b8-9dc0-f0a7310c7ae3
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Turn off Enterprise Mode (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md b/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md
index a8e5413241..b34f9be63f 100644
--- a/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md
+++ b/browsers/enterprise-mode/turn-on-local-control-and-logging-for-enterprise-mode.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Turn on local user control and logging for Enterprise Mode.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 6622ecce-24b1-497e-894a-e1fd5a8a66d1
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Turn on local control and logging for Enterprise Mode (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/use-the-enterprise-mode-portal.md b/browsers/enterprise-mode/use-the-enterprise-mode-portal.md
index 2b3d7225f2..010448c58d 100644
--- a/browsers/enterprise-mode/use-the-enterprise-mode-portal.md
+++ b/browsers/enterprise-mode/use-the-enterprise-mode-portal.md
@@ -9,8 +9,8 @@ ms.sitesec: library
ms.date: 07/27/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
-author: eavena
+ms.author: dansimp
+author: dansimp
---
# Use the Enterprise Mode Site List Portal
diff --git a/browsers/enterprise-mode/use-the-enterprise-mode-site-list-manager.md b/browsers/enterprise-mode/use-the-enterprise-mode-site-list-manager.md
index bcef67f64d..f68c42ca3c 100644
--- a/browsers/enterprise-mode/use-the-enterprise-mode-site-list-manager.md
+++ b/browsers/enterprise-mode/use-the-enterprise-mode-site-list-manager.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Use the topics in this section to learn about how to use the Enterprise Mode Site List Manager.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: f4dbed4c-08ff-40b1-ab3f-60d3b6e8ec9b
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Use the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 12/04/2017
diff --git a/browsers/enterprise-mode/using-enterprise-mode.md b/browsers/enterprise-mode/using-enterprise-mode.md
index 79575fbf26..c6f3e6048e 100644
--- a/browsers/enterprise-mode/using-enterprise-mode.md
+++ b/browsers/enterprise-mode/using-enterprise-mode.md
@@ -3,12 +3,12 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: security
description: Use this section to learn about how to turn on and use IE7 Enterprise Mode or IE8 Enterprise Mode.
-author: eavena
+author: dansimp
ms.prod: ie11
ms.assetid: 238ead3d-8920-429a-ac23-02f089c4384a
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
title: Using IE7 Enterprise Mode or IE8 Enterprise Mode (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/enterprise-mode/verify-changes-preprod-enterprise-mode-portal.md b/browsers/enterprise-mode/verify-changes-preprod-enterprise-mode-portal.md
index e003e6bc01..a72f720a3f 100644
--- a/browsers/enterprise-mode/verify-changes-preprod-enterprise-mode-portal.md
+++ b/browsers/enterprise-mode/verify-changes-preprod-enterprise-mode-portal.md
@@ -3,14 +3,14 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Details about how to make sure your change request info is accurate within the pre-production environment of the Enterprise Mode Site List Portal.
-author: eavena
+author: dansimp
ms.prod: ie11
title: Verify your changes using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
---
# Verify your changes using the Enterprise Mode Site List Portal
diff --git a/browsers/enterprise-mode/verify-changes-production-enterprise-mode-portal.md b/browsers/enterprise-mode/verify-changes-production-enterprise-mode-portal.md
index 5751efc6ef..8387697841 100644
--- a/browsers/enterprise-mode/verify-changes-production-enterprise-mode-portal.md
+++ b/browsers/enterprise-mode/verify-changes-production-enterprise-mode-portal.md
@@ -3,14 +3,14 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Details about how the Requester makes sure that the change request update is accurate within the production environment using the Enterprise Mode Site List Portal.
-author: eavena
+author: dansimp
ms.prod: ie11
title: Verify the change request update in the production environment using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
---
# Verify the change request update in the production environment using the Enterprise Mode Site List Portal
diff --git a/browsers/enterprise-mode/view-apps-enterprise-mode-site-list.md b/browsers/enterprise-mode/view-apps-enterprise-mode-site-list.md
index f81d244053..6ae2c865ea 100644
--- a/browsers/enterprise-mode/view-apps-enterprise-mode-site-list.md
+++ b/browsers/enterprise-mode/view-apps-enterprise-mode-site-list.md
@@ -3,14 +3,14 @@ ms.localizationpriority: low
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Details about how to view the active Enterprise Mode Site List from the Enterprise Mode Site List Portal.
-author: eavena
+author: dansimp
ms.prod: ie11
title: View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
---
# View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal
diff --git a/browsers/internet-explorer/ie11-deploy-guide/configure-settings-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/configure-settings-enterprise-mode-portal.md
index 502c425b80..d01fccf729 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/configure-settings-enterprise-mode-portal.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/configure-settings-enterprise-mode-portal.md
@@ -1,97 +1,98 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Details about how the Administrator can use the Settings page to set up Groups and roles, the Enterprise Mode Site List Portal environment, and the freeze dates for production changes.
-author: lomayor
-ms.prod: ie11
-title: Use the Settings page to finish setting up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
----
-
-# Use the Settings page to finish setting up the Enterprise Mode Site List Portal
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-The **Settings** page lets anyone with Administrator rights set up groups and roles, set up the Enterprise Mode Site List Portal environment, and choose the freeze dates for production changes.
-
-## Use the Environment settings area
-This area lets you specify the location of your production and pre-production environments, where to store your attachments, your settings location, and the website domain for email notifications.
-
-**To add location info**
-1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page.
-
- The **Settings** page appears.
-
-2. In the **Environment settings** area of the page, provide the info for your **Pre-production environment**, your **Production environment**, your **Attachments location**, your **Settings location**, and your **Website domain for email notifications**.
-
-3. Click **Credentials** to add the appropriate domain, user name, and password for each location, and then click **OK**.
-
-## Use the Group and role settings area
-After you set up your email credentials, you'll be able to add or edit your Group info, along with picking which roles must be Approvers for the group.
-
-**To add a new group and determine the required change request Approvers**
-1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page.
-
- The **Settings** page appears.
-
-2. In the **Group and role settings** area of the page, click **Group details**.
-
- The **Add or edit group names** box appears.
-
-3. Click the **Add group** tab, and then add the following info:
-
- - **New group name.** Type name of your new group.
-
- - **Group head email.** Type the email address for the primary contact for the group.
-
- - **Group head name.** This box automatically fills, based on the email address.
-
- - **Active.** Click the check box to make the group active in the system. If you want to keep the group in the system, but you want to prevent access, clear this check box.
-
-4. Click **Save**.
-
-
-**To set a group's required Approvers**
-1. In the **Group and role settings** area of the page, choose the group name you want to update with Approvers from the **Group name** box.
-
-2. In the **Required approvers** area, choose which roles are required to approve a change request for the group. You can choose one or many roles.
-
- - **App Manager.** All employees in the selected group must get change request approval by someone assigned this role.
-
- You can change the name of this role by clicking the pencil icon and providing a new name in the **Edit role name** box.
-
- - **Group Head.** All employees in the selected group must get change request approval by someone assigned this role.
-
- You can change the name of this role by clicking the pencil icon and providing a new name in the **Edit role name** box.
-
- - **Administrator.** All employees in the selected group must get change request approval by someone assigned this role.
-
-## Use the Freeze production changes area
-This optional area lets you specify a period when your employees must stop adding changes to the current Enterprise Mode Site List. This must include both a start and an end date.
-
-**To add the start and end dates**
-1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page.
-
- The **Settings** page appears.
-
-2. In the **Freeze production changes** area of the page, use the calendars to provide the **Freeze start date** and the **Freeze end date**. Your employees can't add apps to the production Enterprise Mode Site List during this span of time.
-
-3. Click **Save**.
-
-## Related topics
-- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)
-
-- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)
-
-- [Use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md)
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Details about how the Administrator can use the Settings page to set up Groups and roles, the Enterprise Mode Site List Portal environment, and the freeze dates for production changes.
+author: dansimp
+ms.prod: ie11
+title: Use the Settings page to finish setting up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+---
+
+# Use the Settings page to finish setting up the Enterprise Mode Site List Portal
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+The **Settings** page lets anyone with Administrator rights set up groups and roles, set up the Enterprise Mode Site List Portal environment, and choose the freeze dates for production changes.
+
+## Use the Environment settings area
+This area lets you specify the location of your production and pre-production environments, where to store your attachments, your settings location, and the website domain for email notifications.
+
+**To add location info**
+1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page.
+
+ The **Settings** page appears.
+
+2. In the **Environment settings** area of the page, provide the info for your **Pre-production environment**, your **Production environment**, your **Attachments location**, your **Settings location**, and your **Website domain for email notifications**.
+
+3. Click **Credentials** to add the appropriate domain, user name, and password for each location, and then click **OK**.
+
+## Use the Group and role settings area
+After you set up your email credentials, you'll be able to add or edit your Group info, along with picking which roles must be Approvers for the group.
+
+**To add a new group and determine the required change request Approvers**
+1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page.
+
+ The **Settings** page appears.
+
+2. In the **Group and role settings** area of the page, click **Group details**.
+
+ The **Add or edit group names** box appears.
+
+3. Click the **Add group** tab, and then add the following info:
+
+ - **New group name.** Type name of your new group.
+
+ - **Group head email.** Type the email address for the primary contact for the group.
+
+ - **Group head name.** This box automatically fills, based on the email address.
+
+ - **Active.** Click the check box to make the group active in the system. If you want to keep the group in the system, but you want to prevent access, clear this check box.
+
+4. Click **Save**.
+
+
+**To set a group's required Approvers**
+1. In the **Group and role settings** area of the page, choose the group name you want to update with Approvers from the **Group name** box.
+
+2. In the **Required approvers** area, choose which roles are required to approve a change request for the group. You can choose one or many roles.
+
+ - **App Manager.** All employees in the selected group must get change request approval by someone assigned this role.
+
+ You can change the name of this role by clicking the pencil icon and providing a new name in the **Edit role name** box.
+
+ - **Group Head.** All employees in the selected group must get change request approval by someone assigned this role.
+
+ You can change the name of this role by clicking the pencil icon and providing a new name in the **Edit role name** box.
+
+ - **Administrator.** All employees in the selected group must get change request approval by someone assigned this role.
+
+## Use the Freeze production changes area
+This optional area lets you specify a period when your employees must stop adding changes to the current Enterprise Mode Site List. This must include both a start and an end date.
+
+**To add the start and end dates**
+1. Open the Enterprise Mode Site List Portal and click the **Settings** icon in the upper-right area of the page.
+
+ The **Settings** page appears.
+
+2. In the **Freeze production changes** area of the page, use the calendars to provide the **Freeze start date** and the **Freeze end date**. Your employees can't add apps to the production Enterprise Mode Site List during this span of time.
+
+3. Click **Save**.
+
+## Related topics
+- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)
+
+- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)
+
+- [Use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md)
diff --git a/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md
index 24e93d73e5..d15192b9d3 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/create-change-request-enterprise-mode-portal.md
@@ -1,73 +1,74 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Details about how to create a change request within the Enterprise Mode Site List Portal.
-author: lomayor
-ms.prod: ie11
-title: Create a change request using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
----
-
-# Create a change request using the Enterprise Mode Site List Portal
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Employees assigned to the Requester role can create a change request. A change request is used to tell the Approvers and the Administrator that a website needs to be added or removed from the Enterprise Mode Site List. The employee can navigate to each stage of the process by using the workflow links provided at the top of each page of the portal.
-
->[!Important]
->Each Requester must have access to a test machine with Administrator rights, letting him or her get to the pre-production environment to make sure that the requested change is correct.
-
-**To create a new change request**
-1. The Requester (an employee that has been assigned the Requester role) signs into the Enterprise Mode Site List Portal, and clicks **Create new request**.
-
- The **Create new request** page appears.
-
-2. Fill out the required fields, based on the group and the app, including:
-
- - **Group name.** Select the name of your group from the dropdown box.
-
- - **App name.** Type the name of the app you want to add, delete, or update in the Enterprise Mode Site List.
-
- - **Search all apps.** If you can't remember the name of your app, you can click **Search all apps** and search the list.
-
- - **Add new app.** If your app isn't listed, you can click **Add new app** to add it to the list.
-
- - **Requested by.** Automatically filled in with your name.
-
- - **Description.** Add descriptive info about the app.
-
- - **Requested change.** Select whether you want to **Add to EMIE**, **Delete from EMIE**, or **Update to EMIE**.
-
- - **Reason for request.** Select the best reason for why you want to update, delete, or add the app.
-
- - **Business impact (optional).** An optional area where you can provide info about the business impact of this app and the change.
-
- - **App location (URL).** The full URL location to the app, starting with https:// or https://.
-
- - **App best viewed in.** Select the best browser experience for the app. This can be Internet Explorer 5 through Internet Explorer 11 or one of the IE7Enterprise or IE8Enterprise modes.
-
- - **Is an x-ua tag used?** Select **Yes** or **No** whether an x-ua-compatible tag is used by the app. For more info about x-ua-compatible tags, see the topics in [Defining document compatibility](https://msdn.microsoft.com/library/cc288325(v=vs.85).aspx).
-
-4. Click **Save and continue** to save the request and get the app info sent to the pre-production environment site list for testing.
-
- A message appears that the request was successful, including a **Request ID** number, saying that the change is being made to the pre-production environment site list.
-
-5. The Requester gets an email with a batch script, that when run, configures their test machine for the pre-production environment, along with the necessary steps to make sure the changed info is correct.
-
- - **If the change is correct.** The Requester asks the approvers to approve the change request by selecting **Successful** and clicking **Send for approval**.
-
- - **If the change is incorrect.** The Requester can rollback the change in pre-production or ask for help from the Administrator.
-
-## Next steps
-After the change request is created, the Requester must make sure the suggested changes work in the pre-production environment. For these steps, see the [Verify your changes using the Enterprise Mode Site List Portal](verify-changes-preprod-enterprise-mode-portal.md) topic.
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Details about how to create a change request within the Enterprise Mode Site List Portal.
+author: dansimp
+ms.prod: ie11
+title: Create a change request using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+---
+
+# Create a change request using the Enterprise Mode Site List Portal
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Employees assigned to the Requester role can create a change request. A change request is used to tell the Approvers and the Administrator that a website needs to be added or removed from the Enterprise Mode Site List. The employee can navigate to each stage of the process by using the workflow links provided at the top of each page of the portal.
+
+>[!Important]
+>Each Requester must have access to a test machine with Administrator rights, letting him or her get to the pre-production environment to make sure that the requested change is correct.
+
+**To create a new change request**
+1. The Requester (an employee that has been assigned the Requester role) signs into the Enterprise Mode Site List Portal, and clicks **Create new request**.
+
+ The **Create new request** page appears.
+
+2. Fill out the required fields, based on the group and the app, including:
+
+ - **Group name.** Select the name of your group from the dropdown box.
+
+ - **App name.** Type the name of the app you want to add, delete, or update in the Enterprise Mode Site List.
+
+ - **Search all apps.** If you can't remember the name of your app, you can click **Search all apps** and search the list.
+
+ - **Add new app.** If your app isn't listed, you can click **Add new app** to add it to the list.
+
+ - **Requested by.** Automatically filled in with your name.
+
+ - **Description.** Add descriptive info about the app.
+
+ - **Requested change.** Select whether you want to **Add to EMIE**, **Delete from EMIE**, or **Update to EMIE**.
+
+ - **Reason for request.** Select the best reason for why you want to update, delete, or add the app.
+
+ - **Business impact (optional).** An optional area where you can provide info about the business impact of this app and the change.
+
+ - **App location (URL).** The full URL location to the app, starting with https:// or https://.
+
+ - **App best viewed in.** Select the best browser experience for the app. This can be Internet Explorer 5 through Internet Explorer 11 or one of the IE7Enterprise or IE8Enterprise modes.
+
+ - **Is an x-ua tag used?** Select **Yes** or **No** whether an x-ua-compatible tag is used by the app. For more info about x-ua-compatible tags, see the topics in [Defining document compatibility](https://msdn.microsoft.com/library/cc288325(v=vs.85).aspx).
+
+4. Click **Save and continue** to save the request and get the app info sent to the pre-production environment site list for testing.
+
+ A message appears that the request was successful, including a **Request ID** number, saying that the change is being made to the pre-production environment site list.
+
+5. The Requester gets an email with a batch script, that when run, configures their test machine for the pre-production environment, along with the necessary steps to make sure the changed info is correct.
+
+ - **If the change is correct.** The Requester asks the approvers to approve the change request by selecting **Successful** and clicking **Send for approval**.
+
+ - **If the change is incorrect.** The Requester can rollback the change in pre-production or ask for help from the Administrator.
+
+## Next steps
+After the change request is created, the Requester must make sure the suggested changes work in the pre-production environment. For these steps, see the [Verify your changes using the Enterprise Mode Site List Portal](verify-changes-preprod-enterprise-mode-portal.md) topic.
diff --git a/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md b/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md
index c69b357557..6c260e93aa 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md
@@ -1,43 +1,44 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Create packages for multiple operating systems or languages
-author: lomayor
-ms.prod: ie11
-ms.assetid: 44051f9d-63a7-43bf-a427-d0a0a1c717da
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Create packages for multiple operating systems or languages (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Create packages for multiple operating systems or languages
-You'll create multiple versions of your custom browser package if:
-
-- You support more than 1 version of Windows®.
-
-- You support more than 1 language.
-
-- You have custom installation packages with only minor differences. Like, having a different phone number.
-
- **To create a new package**
-
-1. Create an installation package using the Internet Explorer Customization Wizard 11, as described in the [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](../ie11-ieak/ieak11-wizard-custom-options.md) topic.
-
-2. Go to your **CIE/Custom** folder and rename the `Install.ins`file. For example, if you need a version for employees in Texas, rename the file to Texas.ins.
-
-3. Run the wizard again, using the Custom folder as the destination directory.
-**Important**
-Except for the **Title bar** text, **Favorites**, **Links bar**, **Home page**, and **Search bar**, keep all of your wizard settings the same for all of your build computers.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Create packages for multiple operating systems or languages
+author: dansimp
+ms.prod: ie11
+ms.assetid: 44051f9d-63a7-43bf-a427-d0a0a1c717da
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Create packages for multiple operating systems or languages (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Create packages for multiple operating systems or languages
+You'll create multiple versions of your custom browser package if:
+
+- You support more than 1 version of Windows®.
+
+- You support more than 1 language.
+
+- You have custom installation packages with only minor differences. Like, having a different phone number.
+
+ **To create a new package**
+
+1. Create an installation package using the Internet Explorer Customization Wizard 11, as described in the [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](../ie11-ieak/ieak11-wizard-custom-options.md) topic.
+
+2. Go to your **CIE/Custom** folder and rename the `Install.ins`file. For example, if you need a version for employees in Texas, rename the file to Texas.ins.
+
+3. Run the wizard again, using the Custom folder as the destination directory.
+**Important**
+Except for the **Title bar** text, **Favorites**, **Links bar**, **Home page**, and **Search bar**, keep all of your wizard settings the same for all of your build computers.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/customize-ie11-install-packages.md b/browsers/internet-explorer/ie11-deploy-guide/customize-ie11-install-packages.md
index d5ebc1d49f..fc43585ae7 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/customize-ie11-install-packages.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/customize-ie11-install-packages.md
@@ -1,44 +1,45 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Customize Internet Explorer 11 installation packages
-author: lomayor
-ms.prod: ie11
-ms.assetid: 10a14a09-673b-4f8b-8d12-64036135e7fd
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Customize Internet Explorer 11 installation packages (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Customize Internet Explorer 11 installation packages
-You can customize Internet Explorer 11 to support various browser behaviors, multiple operating system versions and languages, and Setup information (.inf) files.
-
-|Topic |Description |
-|------------------------------------------------------------------------|----------------------------------------------------|
-|[Using IEAK 11 to create packages](using-ieak11-to-create-install-packages.md) |How to use the Internet Explorer Administration Kit 11 (IEAK 11) and the IE Customization Wizard 11 to set up, configure, deploy, and maintain IE11. |
-|[Create packages for multiple operating systems or languages](create-install-packages-for-multiple-operating-systems-or-languages.md) |How to create multiple versions of your custom installation package, to support multiple operating systems or languages. |
-|[Using .INF files to create packages](using-inf-files-to-create-install-packages.md) |How to use the Microsoft® Windows Setup Engine to automate setup tasks and customize your component installations. |
-
-
-
-In addition, you can configure IE before, during, or after deployment, using these tools:
-
-- **IE Administration Kit 11 (IEAK 11)**. Creates customized installation packages that can be deployed through your software distribution system. For more information about the IEAK 11, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md).
-
-- **Group Policy**. Configures and enforces IE11 settings. For more information about settings and configuration options, see [Group policy objects and Internet Explorer 11 (IE11)](group-policy-objects-and-ie11.md).
-
-- **Unattend.xml**. Customizes some of the IE settings during your Windows installation. This option only applies if you're updating a Windows image with IE11.
**Note**
-You'll only see the new IE11 Unattend.xml settings if your Unattend.xml file's associated with a Windows image that includes the IE11 update. For more information about editing and using the Unattend.xml file, see [Unattended Windows Setup Reference](https://go.microsoft.com/fwlink/p/?LinkId=276788). For more information about using the Windows System Image Manager, see [Windows System Image Manager Technical Reference](https://go.microsoft.com/fwlink/p/?LinkId=276789).
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Customize Internet Explorer 11 installation packages
+author: dansimp
+ms.prod: ie11
+ms.assetid: 10a14a09-673b-4f8b-8d12-64036135e7fd
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Customize Internet Explorer 11 installation packages (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Customize Internet Explorer 11 installation packages
+You can customize Internet Explorer 11 to support various browser behaviors, multiple operating system versions and languages, and Setup information (.inf) files.
+
+|Topic |Description |
+|------------------------------------------------------------------------|----------------------------------------------------|
+|[Using IEAK 11 to create packages](using-ieak11-to-create-install-packages.md) |How to use the Internet Explorer Administration Kit 11 (IEAK 11) and the IE Customization Wizard 11 to set up, configure, deploy, and maintain IE11. |
+|[Create packages for multiple operating systems or languages](create-install-packages-for-multiple-operating-systems-or-languages.md) |How to create multiple versions of your custom installation package, to support multiple operating systems or languages. |
+|[Using .INF files to create packages](using-inf-files-to-create-install-packages.md) |How to use the Microsoft® Windows Setup Engine to automate setup tasks and customize your component installations. |
+
+
+
+In addition, you can configure IE before, during, or after deployment, using these tools:
+
+- **IE Administration Kit 11 (IEAK 11)**. Creates customized installation packages that can be deployed through your software distribution system. For more information about the IEAK 11, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md).
+
+- **Group Policy**. Configures and enforces IE11 settings. For more information about settings and configuration options, see [Group policy objects and Internet Explorer 11 (IE11)](group-policy-objects-and-ie11.md).
+
+- **Unattend.xml**. Customizes some of the IE settings during your Windows installation. This option only applies if you're updating a Windows image with IE11.
**Note**
+You'll only see the new IE11 Unattend.xml settings if your Unattend.xml file's associated with a Windows image that includes the IE11 update. For more information about editing and using the Unattend.xml file, see [Unattended Windows Setup Reference](https://go.microsoft.com/fwlink/p/?LinkId=276788). For more information about using the Windows System Image Manager, see [Windows System Image Manager Technical Reference](https://go.microsoft.com/fwlink/p/?LinkId=276789).
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
index 71d871cad1..b2c4c0f80a 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
@@ -1,49 +1,50 @@
----
-ms.localizationpriority: medium
-description: Delete a single site from your global Enterprise Mode site list.
-ms.pagetype: appcompat
-ms.mktglfcycl: deploy
-author: lomayor
-ms.prod: ie11
-ms.assetid: 41413459-b57f-48da-aedb-4cbec1e2981a
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-
- **To delete a single site from your global Enterprise Mode site list**
-
-- From the Enterprise Mode Site List Manager, pick the site you want to delete, and then click **Delete**.
-The site is permanently removed from your list.
-
-If you delete a site by mistake, you’ll need to manually add it back using the instructions in the following topics, based on operating system.
-
-- [Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md)
-
-- [Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md)
-
-## Related topics
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+description: Delete a single site from your global Enterprise Mode site list.
+ms.pagetype: appcompat
+ms.mktglfcycl: deploy
+author: dansimp
+ms.prod: ie11
+ms.assetid: 41413459-b57f-48da-aedb-4cbec1e2981a
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+
+ **To delete a single site from your global Enterprise Mode site list**
+
+- From the Enterprise Mode Site List Manager, pick the site you want to delete, and then click **Delete**.
+The site is permanently removed from your list.
+
+If you delete a site by mistake, you’ll need to manually add it back using the instructions in the following topics, based on operating system.
+
+- [Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md)
+
+- [Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md)
+
+## Related topics
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md b/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md
index 21baca9a6b..b9089ee16a 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md
@@ -1,35 +1,36 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: You can deploy Internet Explorer 11 to your users' computers by using your custom browser packages and Automatic Version Synchronization (AVS).
-author: lomayor
-ms.prod: ie11
-ms.assetid: f51224bd-3371-4551-821d-1d62310e3384
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Deploy Internet Explorer 11 using Automatic Version Synchronization (AVS) (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-# Deploy Internet Explorer 11 using Automatic Version Synchronization (AVS)
-You can deploy Internet Explorer 11 to your users' computers by using your custom browser packages and Automatic Version Synchronization (AVS).
-
-## What is Automatic Version Synchronization?
-Automatic Version Synchronization (AVS) lets you use the Internet Explorer Administration Kit 11 (IEAK 11) to synchronize the IE11 setup files on a local computer with the latest setup files on the web.
-
-You must synchronize the setup files at least once on the local computer, for each language and operating system combination, before proceeding through the rest of the wizard. If your packages have more than one version of IE, you need to keep the versions in separate component download folders, which can be pointed to from the **File Locations** page of the IEAK 11. For more information about using the AVS feature, see [Use the Automatic Version Synchronization page in the IEAK 11 Wizard](../ie11-ieak/auto-version-sync-ieak11-wizard.md)
-.
-
-## Related topics
-- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md)
-- [Customize Internet Explorer 11 installation packages](customize-ie11-install-packages.md)
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: You can deploy Internet Explorer 11 to your users' computers by using your custom browser packages and Automatic Version Synchronization (AVS).
+author: dansimp
+ms.prod: ie11
+ms.assetid: f51224bd-3371-4551-821d-1d62310e3384
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Deploy Internet Explorer 11 using Automatic Version Synchronization (AVS) (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+# Deploy Internet Explorer 11 using Automatic Version Synchronization (AVS)
+You can deploy Internet Explorer 11 to your users' computers by using your custom browser packages and Automatic Version Synchronization (AVS).
+
+## What is Automatic Version Synchronization?
+Automatic Version Synchronization (AVS) lets you use the Internet Explorer Administration Kit 11 (IEAK 11) to synchronize the IE11 setup files on a local computer with the latest setup files on the web.
+
+You must synchronize the setup files at least once on the local computer, for each language and operating system combination, before proceeding through the rest of the wizard. If your packages have more than one version of IE, you need to keep the versions in separate component download folders, which can be pointed to from the **File Locations** page of the IEAK 11. For more information about using the AVS feature, see [Use the Automatic Version Synchronization page in the IEAK 11 Wizard](../ie11-ieak/auto-version-sync-ieak11-wizard.md)
+.
+
+## Related topics
+- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md)
+- [Customize Internet Explorer 11 installation packages](customize-ie11-install-packages.md)
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-software-distribution-tools.md b/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-software-distribution-tools.md
index 1df03c3f05..dc31c3230e 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-software-distribution-tools.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/deploy-ie11-using-software-distribution-tools.md
@@ -1,33 +1,34 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Deploy Internet Explorer 11 using software distribution tools
-author: lomayor
-ms.prod: ie11
-ms.assetid: fd027775-651a-41e1-8ec3-d32eca876d8a
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Deploy Internet Explorer 11 using software distribution tools (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Deploy Internet Explorer 11 using software distribution tools
-If you already manage software distribution and updates on your network through software distribution tools, you can also use these tools for ongoing deployments of Internet Explorer. Software distribution tools include:
-
-- **System Center R2 2012 System Center 2012 R2 Configuration Manager.** Deploy and install Internet Explorer 11 on your user's computers through a software distribution package. For more information about using this tool, see [System Center R2 2012 Configuration Manager](https://go.microsoft.com/fwlink/p/?LinkID=276664).
-
-- **Windows Server Update Services (WSUS).** Download a single copy of the IE11 updates, caching them to local servers so your users' computers can receive the updates directly from the WSUS servers, instead of through Windows Update. For more information about using this tool, see [Windows Server Update Services](https://go.microsoft.com/fwlink/p/?LinkID=276790).
-
-- **Group Policy Software Installation.** Deploy and install IE11 on your user's computers through a combination of Group Policy and Microsoft Active Directory. For more information about using this tool, see [Group Policy Software Installation overview](https://go.microsoft.com/fwlink/p/?LinkId=296365).
-
-- **Microsoft Deployment Toolkit (MDT).** Add the IE11 update to your deployment share, using MDT to update your previously-deployed Windows image. For more information about using this tool, see [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkID=331148).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Deploy Internet Explorer 11 using software distribution tools
+author: dansimp
+ms.prod: ie11
+ms.assetid: fd027775-651a-41e1-8ec3-d32eca876d8a
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Deploy Internet Explorer 11 using software distribution tools (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Deploy Internet Explorer 11 using software distribution tools
+If you already manage software distribution and updates on your network through software distribution tools, you can also use these tools for ongoing deployments of Internet Explorer. Software distribution tools include:
+
+- **System Center R2 2012 System Center 2012 R2 Configuration Manager.** Deploy and install Internet Explorer 11 on your user's computers through a software distribution package. For more information about using this tool, see [System Center R2 2012 Configuration Manager](https://go.microsoft.com/fwlink/p/?LinkID=276664).
+
+- **Windows Server Update Services (WSUS).** Download a single copy of the IE11 updates, caching them to local servers so your users' computers can receive the updates directly from the WSUS servers, instead of through Windows Update. For more information about using this tool, see [Windows Server Update Services](https://go.microsoft.com/fwlink/p/?LinkID=276790).
+
+- **Group Policy Software Installation.** Deploy and install IE11 on your user's computers through a combination of Group Policy and Microsoft Active Directory. For more information about using this tool, see [Group Policy Software Installation overview](https://go.microsoft.com/fwlink/p/?LinkId=296365).
+
+- **Microsoft Deployment Toolkit (MDT).** Add the IE11 update to your deployment share, using MDT to update your previously-deployed Windows image. For more information about using this tool, see [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkID=331148).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md b/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md
index acb447d590..567b8fbeb8 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md
@@ -1,121 +1,122 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: You can pin websites to the Windows 8.1 taskbar for quick access using the Microsoft Deployment Toolkit (MDT) 2013.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 24f4dcac-9032-4fe8-bf6d-2d712d61cb0c
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Deploy pinned websites using Microsoft Deployment Toolkit (MDT) 2013 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Deploy pinned websites using Microsoft Deployment Toolkit (MDT) 2013
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-You can pin websites to the Windows 8.1 taskbar for quick access. You pin a website simply by dragging its tab to the taskbar. Some websites can also extend the icon’s Jump List.
-
-The ability to pin websites to the Windows 8.1 taskbar can help make end users in businesses more productive. As an IT professional, for example, you can pin intranet and SharePoint websites to the taskbar to make them immediately available to users. In this article, you learn how to deploy pinned websites by using Lite Touch Installation in the [Microsoft Deployment Toolkit (MDT) 2013](https://go.microsoft.com/fwlink/p/?LinkId=398474).
-
-## Deploying pinned websites in MDT 2013
-This topic requires that you have a complete MDT 2013 deployment share that contains Windows 8.1 which comes with Internet Explorer 11. If you’re deploying to Windows 7 clients and need to learn how to add IE11 to an MDT 2013 deployment share as an update, see [Installing Internet Explorer 11 using Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkId=398475) in the TechNet library.
-
-Deploying pinned websites in MDT 2013 is a 4-step process:
-
-1. Create a .website file for each website that you want to deploy. When you pin a website to the taskbar, Windows 8.1 creates a .website file that describes how the icon should look and feel.
-
-2. Copy the .website files to your deployment share.
-
-3. Copy the .website files to your target computers.
-
-4. Edit the task sequence of your Unattend.xml answer files to pin the websites to the taskbar. In particular, you want to add each .website file to the **TaskbarLinks** item in Unattend.xml during oobeSystem phase. You can add up to six .website files to the **TaskbarLinks** item.
-
-Pinned websites are immediately available to every user who logs on to the computer although the user must click each icon to populate its Jump List.
-
-**Important**
-To follow the examples in this topic, you’ll need to pin the Bing (https://www.bing.com/) and MSN (https://www.msn.com/) websites to the taskbar.
-
-### Step 1: Creating .website files
-The first step is to create a .website file for each website that you want to pin to the Windows 8.1 taskbar during deployment. A .website file is like a shortcut, except it’s a plain text file that describes not only the website’s URL but also how the icon looks.
-
- **To create each .website file**
-
-1. Open the website in IE11.
-
-2. Drag the website’s tab and drop it on the Windows 8.1 taskbar.
-
-3. Go to `%USERPROFILE%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar` in Windows Explorer, and copy the bing.website and msn.website files to your desktop.
-
-### Step 2: Copying the .website files to the deployment share
-Next, you must enable your deployment share to copy the bing.website and msn.website files to the **Start** menu on each target computer.
-
- **To copy .website files to the deployment share**
-
-1. Open your MDT 2013 deployment share in Windows Explorer.
-
-2. In the `$OEM$` folder, create the path `$1\Users\Public\Public Links`. If the `$OEM$` folder doesn’t exist, create it at the root of your deployment share.
-
-3. Copy the bing.website and msn.website files from your desktop to `$OEM$\$1\Users\Public\Public Links` in your deployment share.
-
-### Step 3: Copying .website files to target computers
-After your operating system is installed on the target computer, you need to copy the .website files over so they can be pinned to the taskbar.
-
- **To copy .website files to target computers**
-
-1. In the **Deployment Workbench** of MDT 2013, open the deployment share containing the task sequence during which you want to deploy pinned websites, and then click **Task Sequences**.
-
-2. In the right pane of the **Deployment Workbench**, right-click your task sequence (create a new one if you don’t have one yet), and click **Properties**.
-
-3. In the **Task Sequence** tab, click the **Postinstall** folder, click **General** from the **Add** button, and then click **Run Command Line**.
-
-4. Rename the newly created item to *Copy Files* and move it up to the top of the **Postinstall** folder.
-
-5. In the **Command Line** box enter the following text, `xcopy "%DEPLOYROOT%\$OEM$\$1" "%OSDisk%\" /yqe`.
-
-6. Click the **Apply** button to save your changes.
-
-### Step 4: Pinning .website files to the Taskbar
-With the .website files ready to copy to the **Public Links** folder on target computers for all users, the last step is to edit the Unattend.xml answer files to pin those .website files to the taskbar. You will need to complete the following steps for each task sequence during which you want to pin these websites to the taskbar.
-
- **To pin .website files to the Taskbar**
-
-1. Open the Windows System Image Manager (Windows SIM).
-
-2. On the **OS Info** tab, click **Edit Unattend.xml** to open the Unattend.xml file.
-
-2. In the **Windows Image** pane, under **Components** and then **Microsoft-Windows-Shell-Setup**, right-click **TaskbarLinks**, and then click **Add Setting to Pass 7 oobeSystem**.
-
-3. In the **TaskbarLinks Properties** pane, add the relative path to the target computer’s (not the deployment share’s) .website files that you created earlier. You can add up to six links to the **TaskbarLinks** item. For example, `%PUBLIC%\Users\Public\Public Links\Bing.website` and `%PUBLIC%\Users\Public\Public Links\MSN.website`
-
-4. On the **File** menu, click **Save Answer File**, and then close Windows SIM.
-
-5. To close the task sequence, click **OK**.
-
-## Updating intranet websites for pinning
-The MDT 2013 deployment share and task sequences are now ready to pin websites to the taskbar during deployment. This pinning feature can include intranet sites important in your organization.
-
-You can make your intranet websites act more like applications by extending them to fully support the Windows 8.1 taskbar. This includes creating custom Jump Lists, thumbnail previews, and notifications. For info about extending your intranet websites, see [Pinned Sites Developer Documentation](https://go.microsoft.com/fwlink/p/?LinkId=398484) on MSDN. For more ideas about what to pin, see [Add-ons](https://go.microsoft.com/fwlink/p/?LinkId=398483) in the Internet Explorer Gallery.
-
-## Related topics
-- [Unattended Windows Setup Reference](https://go.microsoft.com/fwlink/p/?LinkId=276788)
-- [Windows System Image Manager Technical Reference](https://go.microsoft.com/fwlink/p/?LinkId=276789)
-- [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkId=331148)
-- [Windows ADK Overview](https://go.microsoft.com/fwlink/p/?LinkId=276669)
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: You can pin websites to the Windows 8.1 taskbar for quick access using the Microsoft Deployment Toolkit (MDT) 2013.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 24f4dcac-9032-4fe8-bf6d-2d712d61cb0c
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Deploy pinned websites using Microsoft Deployment Toolkit (MDT) 2013 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Deploy pinned websites using Microsoft Deployment Toolkit (MDT) 2013
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+You can pin websites to the Windows 8.1 taskbar for quick access. You pin a website simply by dragging its tab to the taskbar. Some websites can also extend the icon’s Jump List.
+
+The ability to pin websites to the Windows 8.1 taskbar can help make end users in businesses more productive. As an IT professional, for example, you can pin intranet and SharePoint websites to the taskbar to make them immediately available to users. In this article, you learn how to deploy pinned websites by using Lite Touch Installation in the [Microsoft Deployment Toolkit (MDT) 2013](https://go.microsoft.com/fwlink/p/?LinkId=398474).
+
+## Deploying pinned websites in MDT 2013
+This topic requires that you have a complete MDT 2013 deployment share that contains Windows 8.1 which comes with Internet Explorer 11. If you’re deploying to Windows 7 clients and need to learn how to add IE11 to an MDT 2013 deployment share as an update, see [Installing Internet Explorer 11 using Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkId=398475) in the TechNet library.
+
+Deploying pinned websites in MDT 2013 is a 4-step process:
+
+1. Create a .website file for each website that you want to deploy. When you pin a website to the taskbar, Windows 8.1 creates a .website file that describes how the icon should look and feel.
+
+2. Copy the .website files to your deployment share.
+
+3. Copy the .website files to your target computers.
+
+4. Edit the task sequence of your Unattend.xml answer files to pin the websites to the taskbar. In particular, you want to add each .website file to the **TaskbarLinks** item in Unattend.xml during oobeSystem phase. You can add up to six .website files to the **TaskbarLinks** item.
+
+Pinned websites are immediately available to every user who logs on to the computer although the user must click each icon to populate its Jump List.
+
+**Important**
+To follow the examples in this topic, you’ll need to pin the Bing (https://www.bing.com/) and MSN (https://www.msn.com/) websites to the taskbar.
+
+### Step 1: Creating .website files
+The first step is to create a .website file for each website that you want to pin to the Windows 8.1 taskbar during deployment. A .website file is like a shortcut, except it’s a plain text file that describes not only the website’s URL but also how the icon looks.
+
+ **To create each .website file**
+
+1. Open the website in IE11.
+
+2. Drag the website’s tab and drop it on the Windows 8.1 taskbar.
+
+3. Go to `%USERPROFILE%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar` in Windows Explorer, and copy the bing.website and msn.website files to your desktop.
+
+### Step 2: Copying the .website files to the deployment share
+Next, you must enable your deployment share to copy the bing.website and msn.website files to the **Start** menu on each target computer.
+
+ **To copy .website files to the deployment share**
+
+1. Open your MDT 2013 deployment share in Windows Explorer.
+
+2. In the `$OEM$` folder, create the path `$1\Users\Public\Public Links`. If the `$OEM$` folder doesn’t exist, create it at the root of your deployment share.
+
+3. Copy the bing.website and msn.website files from your desktop to `$OEM$\$1\Users\Public\Public Links` in your deployment share.
+
+### Step 3: Copying .website files to target computers
+After your operating system is installed on the target computer, you need to copy the .website files over so they can be pinned to the taskbar.
+
+ **To copy .website files to target computers**
+
+1. In the **Deployment Workbench** of MDT 2013, open the deployment share containing the task sequence during which you want to deploy pinned websites, and then click **Task Sequences**.
+
+2. In the right pane of the **Deployment Workbench**, right-click your task sequence (create a new one if you don’t have one yet), and click **Properties**.
+
+3. In the **Task Sequence** tab, click the **Postinstall** folder, click **General** from the **Add** button, and then click **Run Command Line**.
+
+4. Rename the newly created item to *Copy Files* and move it up to the top of the **Postinstall** folder.
+
+5. In the **Command Line** box enter the following text, `xcopy "%DEPLOYROOT%\$OEM$\$1" "%OSDisk%\" /yqe`.
+
+6. Click the **Apply** button to save your changes.
+
+### Step 4: Pinning .website files to the Taskbar
+With the .website files ready to copy to the **Public Links** folder on target computers for all users, the last step is to edit the Unattend.xml answer files to pin those .website files to the taskbar. You will need to complete the following steps for each task sequence during which you want to pin these websites to the taskbar.
+
+ **To pin .website files to the Taskbar**
+
+1. Open the Windows System Image Manager (Windows SIM).
+
+2. On the **OS Info** tab, click **Edit Unattend.xml** to open the Unattend.xml file.
+
+2. In the **Windows Image** pane, under **Components** and then **Microsoft-Windows-Shell-Setup**, right-click **TaskbarLinks**, and then click **Add Setting to Pass 7 oobeSystem**.
+
+3. In the **TaskbarLinks Properties** pane, add the relative path to the target computer’s (not the deployment share’s) .website files that you created earlier. You can add up to six links to the **TaskbarLinks** item. For example, `%PUBLIC%\Users\Public\Public Links\Bing.website` and `%PUBLIC%\Users\Public\Public Links\MSN.website`
+
+4. On the **File** menu, click **Save Answer File**, and then close Windows SIM.
+
+5. To close the task sequence, click **OK**.
+
+## Updating intranet websites for pinning
+The MDT 2013 deployment share and task sequences are now ready to pin websites to the taskbar during deployment. This pinning feature can include intranet sites important in your organization.
+
+You can make your intranet websites act more like applications by extending them to fully support the Windows 8.1 taskbar. This includes creating custom Jump Lists, thumbnail previews, and notifications. For info about extending your intranet websites, see [Pinned Sites Developer Documentation](https://go.microsoft.com/fwlink/p/?LinkId=398484) on MSDN. For more ideas about what to pin, see [Add-ons](https://go.microsoft.com/fwlink/p/?LinkId=398483) in the Internet Explorer Gallery.
+
+## Related topics
+- [Unattended Windows Setup Reference](https://go.microsoft.com/fwlink/p/?LinkId=276788)
+- [Windows System Image Manager Technical Reference](https://go.microsoft.com/fwlink/p/?LinkId=276789)
+- [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?LinkId=331148)
+- [Windows ADK Overview](https://go.microsoft.com/fwlink/p/?LinkId=276669)
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/deprecated-document-modes.md b/browsers/internet-explorer/ie11-deploy-guide/deprecated-document-modes.md
index d892799770..f0f44c2897 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/deprecated-document-modes.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/deprecated-document-modes.md
@@ -1,61 +1,62 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Windows Internet Explorer 8 introduced document modes as a way to move from the proprietary coding of web features to a more standardized type of coding that could run on multiple browsers and devices.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 00cb1f39-2b20-4d37-9436-62dc03a6320b
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Deprecated document modes and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-# Deprecated document modes and Internet Explorer 11
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Windows Internet Explorer 8 introduced document modes as a way to move from the proprietary coding of web features to a more standardized type of coding that could run on multiple browsers and devices. Starting with Windows 10, we’re deprecating document modes.
-
-This means that while Internet Explorer 11 will continue to support document modes, Microsoft Edge won’t. And because of that, it also means that if you want to use Microsoft Edge, you’re going to have to update your legacy webpages and apps to support modern features, browsers, and devices.
-
->**Note**
->For specific details about the technologies and APIs that are no longer supported in Microsoft Edge, see [A break from the past, part 2: Saying goodbye to ActiveX, VBScript, attachEvent](https://go.microsoft.com/fwlink/p/?LinkId=615953).
-
-## What is document mode?
-Each release after Internet Explorer 8 has helped with the transition by introducing additional document modes that emulated previously supported versions, while also introducing support for features defined by industry standards. During this time, numerous websites and apps were updated to the latest and greatest industry standards, while many other sites and apps continued to simply rely on document modes to work properly.
-
-Because our goal with Microsoft Edge is to give users the best site and app viewing experience possible, we’ve decided to stop support for document modes. All websites and apps using legacy features and code will need to be updated to rely on the new modern standards and practices.
-
-If you have legacy sites and apps that can’t be updated to modern standards, you can continue to use IE11 and document modes. We recommend that you use the **IE11 Standards document mode** because it represents the highest support available for modern standards. You should also use the HTML5 document type declaration to turn on the latest supported standards while using IE11:``.
-
-## Document modes and IE11
-The compatibility improvements made in IE11 lets older websites just work in the latest standards mode, by default, without requiring emulation of the previous browser behavior. Because older websites are now just working, we’ve decided that Internet Explorer 10 document mode will be the last new document mode. Instead, developers will need to move to using the IE11 document mode going forward.
-
-## Document mode selection flowchart
-This flowchart shows how IE11 works when document modes are used.
-
-
-[Click this link to enlarge image](img-ie11-docmode-lg.md)
-
-## Known Issues with Internet Explorer 8 document mode in Enterprise Mode
-The default document mode for Enterprise Mode is Internet Explorer 8. While this mode provides a strong emulation of that browser, it isn’t an exact match. For example, Windows Internet Explorer 9 fundamentally changed how document modes work with iframes and document modes can’t undo architectural changes. It’s also a known issue that Windows 10 supports GDI font rendering while using Enterprise Mode, but uses natural metrics once outside of Enterprise Mode.
-
-## Related topics
-- [Enterprise Mode for Internet Explorer 11](enterprise-mode-overview-for-ie11.md)
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Windows Internet Explorer 8 introduced document modes as a way to move from the proprietary coding of web features to a more standardized type of coding that could run on multiple browsers and devices.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 00cb1f39-2b20-4d37-9436-62dc03a6320b
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Deprecated document modes and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+# Deprecated document modes and Internet Explorer 11
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Windows Internet Explorer 8 introduced document modes as a way to move from the proprietary coding of web features to a more standardized type of coding that could run on multiple browsers and devices. Starting with Windows 10, we’re deprecating document modes.
+
+This means that while Internet Explorer 11 will continue to support document modes, Microsoft Edge won’t. And because of that, it also means that if you want to use Microsoft Edge, you’re going to have to update your legacy webpages and apps to support modern features, browsers, and devices.
+
+>**Note**
+>For specific details about the technologies and APIs that are no longer supported in Microsoft Edge, see [A break from the past, part 2: Saying goodbye to ActiveX, VBScript, attachEvent](https://go.microsoft.com/fwlink/p/?LinkId=615953).
+
+## What is document mode?
+Each release after Internet Explorer 8 has helped with the transition by introducing additional document modes that emulated previously supported versions, while also introducing support for features defined by industry standards. During this time, numerous websites and apps were updated to the latest and greatest industry standards, while many other sites and apps continued to simply rely on document modes to work properly.
+
+Because our goal with Microsoft Edge is to give users the best site and app viewing experience possible, we’ve decided to stop support for document modes. All websites and apps using legacy features and code will need to be updated to rely on the new modern standards and practices.
+
+If you have legacy sites and apps that can’t be updated to modern standards, you can continue to use IE11 and document modes. We recommend that you use the **IE11 Standards document mode** because it represents the highest support available for modern standards. You should also use the HTML5 document type declaration to turn on the latest supported standards while using IE11:``.
+
+## Document modes and IE11
+The compatibility improvements made in IE11 lets older websites just work in the latest standards mode, by default, without requiring emulation of the previous browser behavior. Because older websites are now just working, we’ve decided that Internet Explorer 10 document mode will be the last new document mode. Instead, developers will need to move to using the IE11 document mode going forward.
+
+## Document mode selection flowchart
+This flowchart shows how IE11 works when document modes are used.
+
+
+[Click this link to enlarge image](img-ie11-docmode-lg.md)
+
+## Known Issues with Internet Explorer 8 document mode in Enterprise Mode
+The default document mode for Enterprise Mode is Internet Explorer 8. While this mode provides a strong emulation of that browser, it isn’t an exact match. For example, Windows Internet Explorer 9 fundamentally changed how document modes work with iframes and document modes can’t undo architectural changes. It’s also a known issue that Windows 10 supports GDI font rendering while using Enterprise Mode, but uses natural metrics once outside of Enterprise Mode.
+
+## Related topics
+- [Enterprise Mode for Internet Explorer 11](enterprise-mode-overview-for-ie11.md)
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md
index 6f6339d452..8ad5f3e6ad 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md
@@ -1,53 +1,54 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: You can use Internet Explorer 11 and the Enterprise Mode Site List Manager to change whether page rendering should use Enterprise Mode or the default Internet Explorer browser configuration. You can also add, remove, or delete associated comments.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 76aa9a85-6190-4c3a-bc25-0f914de228ea
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-You can use Internet Explorer 11 and the Enterprise Mode Site List Manager to change whether page rendering should use Enterprise Mode or the default Internet Explorer browser configuration. You can also add, remove, or delete associated comments.
-
-If you need to edit a lot of websites, you probably don’t want to do it one at a time. Instead, you can edit your saved XML or TXT file and add the sites back again. For information about how to do this, depending on your operating system and schema version, see [Add multiple sites to the Enterprise Mode site list using a file and Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md).
-
- **To change how your page renders**
-
-1. In the Enterprise Mode Site List Manager, double-click the site you want to change.
-
-2. Change the comment or the compatibility mode option.
-
-3. Click **Save** to validate your changes and to add the updated information to your site list.
-If your change passes validation, it’s added to the global site list. If the update doesn’t pass validation, you’ll get an error message explaining the problem. You’ll then be able to either cancel the update or ignore the validation problem and add it to your list anyway. For more information about fixing validation issues, see [Fix validation problems using the Enterprise Mode Site List Manager](fix-validation-problems-using-the-enterprise-mode-site-list-manager.md).
-
-4. On the **File** menu, click **Save to XML**, and save the updated file.
-You can save the file locally or to a network share. However, you must make sure you deploy it to the location specified in your registry key. For more information about the registry key, see [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md).
-
-## Related topics
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: You can use Internet Explorer 11 and the Enterprise Mode Site List Manager to change whether page rendering should use Enterprise Mode or the default Internet Explorer browser configuration. You can also add, remove, or delete associated comments.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 76aa9a85-6190-4c3a-bc25-0f914de228ea
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+You can use Internet Explorer 11 and the Enterprise Mode Site List Manager to change whether page rendering should use Enterprise Mode or the default Internet Explorer browser configuration. You can also add, remove, or delete associated comments.
+
+If you need to edit a lot of websites, you probably don’t want to do it one at a time. Instead, you can edit your saved XML or TXT file and add the sites back again. For information about how to do this, depending on your operating system and schema version, see [Add multiple sites to the Enterprise Mode site list using a file and Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md).
+
+ **To change how your page renders**
+
+1. In the Enterprise Mode Site List Manager, double-click the site you want to change.
+
+2. Change the comment or the compatibility mode option.
+
+3. Click **Save** to validate your changes and to add the updated information to your site list.
+If your change passes validation, it’s added to the global site list. If the update doesn’t pass validation, you’ll get an error message explaining the problem. You’ll then be able to either cancel the update or ignore the validation problem and add it to your list anyway. For more information about fixing validation issues, see [Fix validation problems using the Enterprise Mode Site List Manager](fix-validation-problems-using-the-enterprise-mode-site-list-manager.md).
+
+4. On the **File** menu, click **Save to XML**, and save the updated file.
+You can save the file locally or to a network share. However, you must make sure you deploy it to the location specified in your registry key. For more information about the registry key, see [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md).
+
+## Related topics
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md b/browsers/internet-explorer/ie11-deploy-guide/enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md
index 4e5e30e18a..2ab127eec5 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md
@@ -1,110 +1,111 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Enable and disable add-ons using administrative templates and group policy
-ms.author: lomayor
-author: lomayor
-ms.prod: ie11
-ms.assetid: c6fe1cd3-0bfc-4d23-8016-c9601f674c0b
-ms.reviewer:
-audience: itpro
manager: dansimp
-title: Enable and disable add-ons using administrative templates and group policy (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 4/12/2018
----
-
-
-# Enable and disable add-ons using administrative templates and group policy
-Add-ons let your employees personalize Internet Explorer. You can manage IE add-ons using Group Policy and Group Policy templates.
-
-There are four types of add-ons:
-
-- **Search Providers.** Type a term and see suggestions provided by your search provider.
-
-- **Accelerators.** Highlight text on a web page and then click the blue **Accelerator** icon to email, map, search, translate, or do many other tasks.
-
-- **Web Slices.** Subscribe to parts of a website to get real-time information on the Favorites bar.
-
-- **Toolbars.** Add features (like stock tickers) to your browser.
-
-## Using the Local Group Policy Editor to manage group policy objects
-You can use the Local Group Policy Editor to change how add-ons work in your organization.
-
- **To manage add-ons**
-
-1. In the Local Group Policy Editor, go to `Computer Configuration\Administrative Templates\Windows Components\Internet Explorer`.
-
-2. Change any or all of these settings to match your company’s policy and requirements.
-
- - Turn off add-on performance notifications
-
- - Automatically activate newly installed add-ons
-
- - Do not allow users to enable or disable add-ons
-
-3. Go into the **Internet Control Panel\\Advance Page** folder, where you can change:
-
- - Do not allow resetting IE settings
-
- - Allow third-party browser extensions
-
-4. Go into the **Security Features\\Add-on Management** folder, where you can change:
-
- - Add-on List
-
- - Deny all add-ons unless specifically allowed in the Add-on List
-
- - Turn off Adobe Flash in IE and prevent applications from using IE technology to instantiate Flash objects
-
-5. Close the Local Group Policy Editor when you’re done.
-
-## Using the CLSID and Administrative Templates to manage group policy objects
-Every add-on has a Class ID (CLSID) that you use to enable and disable specific add-ons, using Group Policy and Administrative Templates.
-
- **To manage add-ons**
-
-1. Get the CLSID for the add-on you want to enable or disable:
-
- 1. Open IE, click **Tools**, and then click **Manage Add-ons**.
-
- 2. Double-click the add-on you want to change.
-
- 3. In the More Information dialog, click **Copy** and then click **Close**.
-
- 4. Open Notepad and paste the information for the add-on.
-
- 5. On the Manage Add-ons windows, click **Close**.
-
- 6. On the Internet Options dialog, click **Close** and then close IE.
-
-2. From the copied information, select and copy just the **Class ID** value.
-
- >[!NOTE]
- >You want to copy the curly brackets as well as the CLSID: **{47833539-D0C5-4125-9FA8-0819E2EAAC93}**.
-
-3. Open the Group Policy Management Editor and go to: Computer Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management.
-
**-OR-**
-Open the Local Group Policy Editor and go to: User Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management.
-
-4. Open the **Add-on List** Group Policy Object, select **Enabled**, and then click **Show**.
The Show Contents dialog appears.
-
-6. In **Value Name**, paste the Class ID for your add-on, for example, **{47833539-D0C5-4125-9FA8-0819E2EAAC93}**.
-
-6. In **Value**, enter one of the following:
-
- - **0**. The add-on is disabled and your employees can’t change it.
-
- - **1**. The add-on is enabled and your employees can’t change it.
-
- - **2**. The add-on is enabled and your employees can change it.
-
-7. Close the Show Contents dialog.
-
-7. In the Group Policy editor, go to: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer.
-
-8. Double-click **Automatically activate/enable newly installed add-ons** and select **Enabled**.
Enabling turns off the message prompting you to Enable or Don't enable the add-on.
-
-7. Click **OK** twice to close the Group Policy editor.
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Enable and disable add-ons using administrative templates and group policy
+ms.author: dansimp
+author: dansimp
+ms.prod: ie11
+ms.assetid: c6fe1cd3-0bfc-4d23-8016-c9601f674c0b
+ms.reviewer:
+audience: itpro
+manager: dansimp
+title: Enable and disable add-ons using administrative templates and group policy (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 4/12/2018
+---
+
+
+# Enable and disable add-ons using administrative templates and group policy
+Add-ons let your employees personalize Internet Explorer. You can manage IE add-ons using Group Policy and Group Policy templates.
+
+There are four types of add-ons:
+
+- **Search Providers.** Type a term and see suggestions provided by your search provider.
+
+- **Accelerators.** Highlight text on a web page and then click the blue **Accelerator** icon to email, map, search, translate, or do many other tasks.
+
+- **Web Slices.** Subscribe to parts of a website to get real-time information on the Favorites bar.
+
+- **Toolbars.** Add features (like stock tickers) to your browser.
+
+## Using the Local Group Policy Editor to manage group policy objects
+You can use the Local Group Policy Editor to change how add-ons work in your organization.
+
+ **To manage add-ons**
+
+1. In the Local Group Policy Editor, go to `Computer Configuration\Administrative Templates\Windows Components\Internet Explorer`.
+
+2. Change any or all of these settings to match your company’s policy and requirements.
+
+ - Turn off add-on performance notifications
+
+ - Automatically activate newly installed add-ons
+
+ - Do not allow users to enable or disable add-ons
+
+3. Go into the **Internet Control Panel\\Advance Page** folder, where you can change:
+
+ - Do not allow resetting IE settings
+
+ - Allow third-party browser extensions
+
+4. Go into the **Security Features\\Add-on Management** folder, where you can change:
+
+ - Add-on List
+
+ - Deny all add-ons unless specifically allowed in the Add-on List
+
+ - Turn off Adobe Flash in IE and prevent applications from using IE technology to instantiate Flash objects
+
+5. Close the Local Group Policy Editor when you’re done.
+
+## Using the CLSID and Administrative Templates to manage group policy objects
+Every add-on has a Class ID (CLSID) that you use to enable and disable specific add-ons, using Group Policy and Administrative Templates.
+
+ **To manage add-ons**
+
+1. Get the CLSID for the add-on you want to enable or disable:
+
+ 1. Open IE, click **Tools**, and then click **Manage Add-ons**.
+
+ 2. Double-click the add-on you want to change.
+
+ 3. In the More Information dialog, click **Copy** and then click **Close**.
+
+ 4. Open Notepad and paste the information for the add-on.
+
+ 5. On the Manage Add-ons windows, click **Close**.
+
+ 6. On the Internet Options dialog, click **Close** and then close IE.
+
+2. From the copied information, select and copy just the **Class ID** value.
+
+ >[!NOTE]
+ >You want to copy the curly brackets as well as the CLSID: **{47833539-D0C5-4125-9FA8-0819E2EAAC93}**.
+
+3. Open the Group Policy Management Editor and go to: Computer Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management.
+
**-OR-**
+Open the Local Group Policy Editor and go to: User Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management.
+
+4. Open the **Add-on List** Group Policy Object, select **Enabled**, and then click **Show**.
The Show Contents dialog appears.
+
+6. In **Value Name**, paste the Class ID for your add-on, for example, **{47833539-D0C5-4125-9FA8-0819E2EAAC93}**.
+
+6. In **Value**, enter one of the following:
+
+ - **0**. The add-on is disabled and your employees can’t change it.
+
+ - **1**. The add-on is enabled and your employees can’t change it.
+
+ - **2**. The add-on is enabled and your employees can change it.
+
+7. Close the Show Contents dialog.
+
+7. In the Group Policy editor, go to: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer.
+
+8. Double-click **Automatically activate/enable newly installed add-ons** and select **Enabled**.
Enabling turns off the message prompting you to Enable or Don't enable the add-on.
+
+7. Click **OK** twice to close the Group Policy editor.
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md
index d1ac1a3190..d0998607dc 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md
@@ -1,30 +1,31 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Enhanced Protected Mode problems with Internet Explorer
-author: lomayor
-ms.prod: ie11
-ms.assetid: 15890ad1-733d-4f7e-a318-10399b389f45
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Enhanced Protected Mode problems with Internet Explorer (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Enhanced Protected Mode problems with Internet Explorer
-Enhanced Protected Mode further restricts Protected Mode to deny potential attackers access to sensitive or personal information. If this feature is turned on, users might start to see errors asking them to turn it off, like **This webpage wants to run "npctrl.dll. If you trust this site, you can disable Enhanced Protected Mode for this site to run the control**. If your users click the **Disable** box, Enhanced Protected Mode is turned off for only the single visit to that specific site. After the user leaves the site, Enhanced Protected Mode is automatically turned back on.
-
-You can use your company’s Group Policy to turn Enhanced Protected Mode on or off for all users. For more information, see the [Group policy objects and Internet Explorer 11 (IE11)](group-policy-objects-and-ie11.md) information in this guide.
-
-For more information about Enhanced Protected Mode, see the [Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=267512) post on IEBlog, and both the [Understanding Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=282662) and the [Enhanced Protected Mode and Local Files](https://go.microsoft.com/fwlink/p/?LinkId=282663) blog posts on IEInternals.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Enhanced Protected Mode problems with Internet Explorer
+author: dansimp
+ms.prod: ie11
+ms.assetid: 15890ad1-733d-4f7e-a318-10399b389f45
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Enhanced Protected Mode problems with Internet Explorer (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Enhanced Protected Mode problems with Internet Explorer
+Enhanced Protected Mode further restricts Protected Mode to deny potential attackers access to sensitive or personal information. If this feature is turned on, users might start to see errors asking them to turn it off, like **This webpage wants to run "npctrl.dll. If you trust this site, you can disable Enhanced Protected Mode for this site to run the control**. If your users click the **Disable** box, Enhanced Protected Mode is turned off for only the single visit to that specific site. After the user leaves the site, Enhanced Protected Mode is automatically turned back on.
+
+You can use your company’s Group Policy to turn Enhanced Protected Mode on or off for all users. For more information, see the [Group policy objects and Internet Explorer 11 (IE11)](group-policy-objects-and-ie11.md) information in this guide.
+
+For more information about Enhanced Protected Mode, see the [Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=267512) post on IEBlog, and both the [Understanding Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=282662) and the [Enhanced Protected Mode and Local Files](https://go.microsoft.com/fwlink/p/?LinkId=282663) blog posts on IEInternals.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md
index 2059dff44a..71104a8786 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-overview-for-ie11.md
@@ -1,55 +1,56 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Use the topics in this section to learn how to set up and use Enterprise Mode, Enterprise Mode Site List Manager, and the Enterprise Mode Site List Portal for your company.
-author: lomayor
-ms.prod: ie11
-ms.assetid: d52ba8ba-b3c7-4314-ba14-0610e1d8456e
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Enterprise Mode for Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Enterprise Mode for Internet Explorer 11
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Use the topics in this section to learn how to set up and use Enterprise Mode and the Enterprise Mode Site List Manager in your company.
-
-## In this section
-
-|Topic |Description |
-|---------------------------------------------------------------|-----------------------------------------------------------------------------------|
-|[Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)|Includes descriptions of the features of Enterprise Mode. |
-|[Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) |Guidance about how to turn on local control of Enterprise Mode and how to use ASP or the GitHub sample to collect data from your local computers. |
-|[Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) |Guidance about how to turn on Enterprise Mode and set up a site list, using Group Policy or the registry. |
-|[Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md) |Guidance about how to write the XML for your site list, including what not to include, how to use trailing slashes, and info about how to target specific sites. |
-|[Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md) |Guidance about how to write the XML for your site list, including what not to include, how to use trailing slashes, and info about how to target specific sites. |
-|[Check for a new Enterprise Mode site list xml file](check-for-new-enterprise-mode-site-list-xml-file.md) |Guidance about how the Enterprise Mode functionality looks for your updated site list. |
-|[Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md) |Guidance about how to turn on local control of Enterprise Mode, using Group Policy or the registry.|
-|[Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) |Guidance about how to use the Enterprise Mode Site List Manager, including how to add and update sites on your site list. |
-|[Use the Enterprise Mode Site List Portal](use-the-enterprise-mode-portal.md) |Guidance about how to set up and use the Enterprise Mode Site List Manager, including how to add and update sites on your site list. |
-|[Using Enterprise Mode](using-enterprise-mode.md) |Guidance about how to turn on either IE7 Enterprise Mode or IE8 Enterprise Mode. |
-|[Fix web compatibility issues using document modes and the Enterprise Mode Site List](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md) |Guidance about how to decide and test whether to use document modes or Enterprise Mode to help fix compatibility issues. |
-|[Remove sites from a local Enterprise Mode site list](remove-sites-from-a-local-enterprise-mode-site-list.md) |Guidance about how to remove websites from a device's local Enterprise Mode site list. |
-|[Remove sites from a local compatibility view list](remove-sites-from-a-local-compatibililty-view-list.md) |Guidance about how to remove websites from a device's local compatibility view list. |
-|[Turn off Enterprise Mode](turn-off-enterprise-mode.md) |Guidance about how to stop using your site list and how to turn off local control, using Group Policy or the registry. |
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Use the topics in this section to learn how to set up and use Enterprise Mode, Enterprise Mode Site List Manager, and the Enterprise Mode Site List Portal for your company.
+author: dansimp
+ms.prod: ie11
+ms.assetid: d52ba8ba-b3c7-4314-ba14-0610e1d8456e
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Enterprise Mode for Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Enterprise Mode for Internet Explorer 11
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Use the topics in this section to learn how to set up and use Enterprise Mode and the Enterprise Mode Site List Manager in your company.
+
+## In this section
+
+|Topic |Description |
+|---------------------------------------------------------------|-----------------------------------------------------------------------------------|
+|[Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)|Includes descriptions of the features of Enterprise Mode. |
+|[Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) |Guidance about how to turn on local control of Enterprise Mode and how to use ASP or the GitHub sample to collect data from your local computers. |
+|[Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md) |Guidance about how to turn on Enterprise Mode and set up a site list, using Group Policy or the registry. |
+|[Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md) |Guidance about how to write the XML for your site list, including what not to include, how to use trailing slashes, and info about how to target specific sites. |
+|[Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md) |Guidance about how to write the XML for your site list, including what not to include, how to use trailing slashes, and info about how to target specific sites. |
+|[Check for a new Enterprise Mode site list xml file](check-for-new-enterprise-mode-site-list-xml-file.md) |Guidance about how the Enterprise Mode functionality looks for your updated site list. |
+|[Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md) |Guidance about how to turn on local control of Enterprise Mode, using Group Policy or the registry.|
+|[Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) |Guidance about how to use the Enterprise Mode Site List Manager, including how to add and update sites on your site list. |
+|[Use the Enterprise Mode Site List Portal](use-the-enterprise-mode-portal.md) |Guidance about how to set up and use the Enterprise Mode Site List Manager, including how to add and update sites on your site list. |
+|[Using Enterprise Mode](using-enterprise-mode.md) |Guidance about how to turn on either IE7 Enterprise Mode or IE8 Enterprise Mode. |
+|[Fix web compatibility issues using document modes and the Enterprise Mode Site List](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md) |Guidance about how to decide and test whether to use document modes or Enterprise Mode to help fix compatibility issues. |
+|[Remove sites from a local Enterprise Mode site list](remove-sites-from-a-local-enterprise-mode-site-list.md) |Guidance about how to remove websites from a device's local Enterprise Mode site list. |
+|[Remove sites from a local compatibility view list](remove-sites-from-a-local-compatibililty-view-list.md) |Guidance about how to remove websites from a device's local compatibility view list. |
+|[Turn off Enterprise Mode](turn-off-enterprise-mode.md) |Guidance about how to stop using your site list and how to turn off local control, using Group Policy or the registry. |
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md
index 292c85b771..ff09fe4405 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md
@@ -1,236 +1,237 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Use the Enterprise Mode Site List Manager to create and update your Enterprise Mode site list for devices running Windows 7 or Windows 8.1 Update.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 17c61547-82e3-48f2-908d-137a71938823
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Enterprise Mode schema v.1 guidance (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Enterprise Mode schema v.1 guidance
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-
-Use the Enterprise Mode Site List Manager (schema v.1) to create and update your Enterprise Mode site list for devices running the v.1 version of the schema, or the Enterprise Mode Site List Manager (schema v.2) to create and update your Enterprise Mode site list for devices running the v.2 version of the schema. We strongly recommend moving to the new schema, v.2. For more info, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md).
-
-If you don't want to use the Enterprise Mode Site List Manager, you also have the option to update your XML schema using Notepad, or any other XML-editing app.
-
-## Enterprise Mode schema v.1 example
-The following is an example of the Enterprise Mode schema v.1. This schema can run on devices running Windows 7 and Windows 8.1.
-
-> [!IMPORTANT]
-> Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both http://contoso.com and https://contoso.com.
-
-```xml
-
-
- www.cpandl.com
- www.woodgrovebank.com
- adatum.com
- contoso.com
- relecloud.com
- /about
-
- fabrikam.com
- /products
-
-
-
- contoso.com
- /travel
-
- fabrikam.com
- /products
-
-
-
-```
-
-### Schema elements
-This table includes the elements used by the Enterprise Mode schema.
-
-
-
-
-
-
-
-<rules> |
-Root node for the schema.
- Example
-
-<rules version="205">
- <emie>
- <domain>contoso.com</domain>
- </emie>
-</rules> |
-Internet Explorer 11 and Microsoft Edge |
-
-
-<emie> |
-The parent node for the Enterprise Mode section of the schema. All <domain> entries will have either IE8 Enterprise Mode or IE7 Enterprise Mode applied.
- Example
-
-<rules version="205">
- <emie>
- <domain>contoso.com</domain>
- </emie>
-</rules>
--or-
-For IPv6 ranges: <rules version="205">
- <emie>
- <domain>[10.122.34.99]:8080</domain>
- </emie>
- </rules>
--or-
-For IPv4 ranges: <rules version="205">
- <emie>
- <domain>10.122.34.99:8080</domain>
- </emie>
- </rules> |
-Internet Explorer 11 and Microsoft Edge |
-
-
-<docMode> |
-The parent node for the document mode section of the section. All <domain> entries will get IE5 - IE11 document modes applied. If there's a <domain> element in the <docMode> section that uses the same value as a <domain> element in the <emie> section, the <emie> element is applied.
- Example
-
-<rules version="205">
- <docMode>
- <domain docMode="7">contoso.com</domain>
- </docMode>
-</rules> |
-Internet Explorer 11 |
-
-
-<domain> |
-A unique entry added for each site you want to put on the Enterprise Mode site list. The first <domain> element will overrule any additional <domain> elements that use the same value for the section. You can use port numbers for this element.
- Example
-
-<emie>
- <domain>contoso.com:8080</domain>
-</emie> |
-Internet Explorer 11 and Microsoft Edge |
-
-
-<path> |
-A unique entry added for each path under a domain you want to put on the Enterprise Mode site list. The <path> element is a child of the <domain> element. Additionally, the first <path> element will overrule any additional <path> elements in the schema section.
- Example
-
-<emie>
- <domain exclude="true">fabrikam.com
- <path exclude="false">/products</path>
- </domain>
-</emie>
-Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does. |
-Internet Explorer 11 and Microsoft Edge |
-
-
-
-### Schema attributes
-This table includes the attributes used by the Enterprise Mode schema.
-
-
-
-
-
-
-
-<version> |
-Specifies the version of the Enterprise Mode Site List. This attribute is supported for the <rules> element. |
-Internet Explorer 11 and Microsoft Edge |
-
-
-<exclude> |
-Specifies the domain or path excluded from applying the behavior and is supported on the <domain> and <path> elements.
- Example
-
-<emie>
- <domain exclude="false">fabrikam.com
- <path exclude="true">/products</path>
- </domain>
-</emie>
-Where https://fabrikam.com uses IE8 Enterprise Mode, but https://fabrikam.com/products does not. |
-Internet Explorer 11 and Microsoft Edge |
-
-
-<docMode> |
-Specifies the document mode to apply. This attribute is only supported on <domain> or <path> elements in the <docMode> section.
- Example
-
-<docMode>
- <domain exclude="false">fabrikam.com
- <path docMode="7">/products</path>
- </domain>
-</docMode> |
-Internet Explorer 11 |
-
-
-
-### Using Enterprise Mode and document mode together
-If you want to use both Enterprise Mode and document mode together, you need to be aware that <emie> entries override <docMode> entries for the same domain.
-
-For example, say you want all of the sites in the contoso.com domain to open using IE8 Enterprise Mode, except test.contoso.com, which needs to open in document mode 11. Because Enterprise Mode takes precedence over document mode, if you want test.contoso.com to open using document mode, you'll need to explicitly add it as an exclusion to the <emie> parent node.
-
-```xml
-
-
- contoso.com
- test.contoso.com
-
-
- test.contoso.com
-
-
-```
-
-### What not to include in your schema
-We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways:
-- Don’t use protocols. For example, `http://`, `https://`, or custom protocols. They break parsing.
-- Don’t use wildcards.
-- Don’t use query strings, ampersands break parsing.
-
-## How to use trailing slashes
-You can use trailing slashes at the path-level, but not at the domain-level:
-- **Domain-level.** Don’t add trailing slashes to a domain, it breaks parsing.
-- **Path-level.** Adding a trailing slash to a path means that the path ends at that point. By not adding a trailing slash, the rule applies to all of the sub-paths.
-
-**Example**
-
-```xml
-contoso.com
- /about/
-
-```
-In this example, `contoso.com/about/careers` will use the default version of Internet Explorer, even though `contoso.com/about/` uses Enterprise Mode.
-
-
-## How to target specific sites
-If you want to target specific sites in your organization.
-
-|Targeted site |Example |Explanation |
-|--------------|--------|------------|
-|You can specify subdomains in the domain tag. |<docMode>
<domain docMode="5">contoso.com</domain>
<domain docMode="9">info.contoso.com</domain>
<docMode>
|- contoso.com uses document mode 5.
- info.contoso.com uses document mode 9.
- test.contoso.com also uses document mode 5.
|
-|You can specify exact URLs by listing the full path. |<emie>
<domain exclude="false">bing.com</domain>
<domain exclude="false" forceCompatView="true">contoso.com</domain>
<emie>
|- bing.com uses IE8 Enterprise Mode.
- contoso.com uses IE7 Enterprise Mode.
|
-|You can nest paths underneath domains. |<emie>
<domain exclude="true">contoso.com
<path exclude="false">/about</path>
<path exclude="true">
/about/business</path>
</domain>
</emie>
|- contoso.com will use the default version of IE.
- contoso.com/about and everything underneath that node will load in Enterprise Mode, except contoso.com/about/business, which will load in the default version of IE.
|
-|You can’t add a path underneath a path. The file will still be parsed, but the sub-path will be ignored. |<emie>
<domain exclude="true">contoso.com
<path>/about
<path exclude="true">/business</path>
</path>
</domain>
</emie>
|- contoso.com will use the default version of IE.
- contoso.com/about and everything underneath that node will load in Enterprise Mode, including contoso.com/about/business because the last rule is ignored.
|
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Use the Enterprise Mode Site List Manager to create and update your Enterprise Mode site list for devices running Windows 7 or Windows 8.1 Update.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 17c61547-82e3-48f2-908d-137a71938823
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Enterprise Mode schema v.1 guidance (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Enterprise Mode schema v.1 guidance
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+
+Use the Enterprise Mode Site List Manager (schema v.1) to create and update your Enterprise Mode site list for devices running the v.1 version of the schema, or the Enterprise Mode Site List Manager (schema v.2) to create and update your Enterprise Mode site list for devices running the v.2 version of the schema. We strongly recommend moving to the new schema, v.2. For more info, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md).
+
+If you don't want to use the Enterprise Mode Site List Manager, you also have the option to update your XML schema using Notepad, or any other XML-editing app.
+
+## Enterprise Mode schema v.1 example
+The following is an example of the Enterprise Mode schema v.1. This schema can run on devices running Windows 7 and Windows 8.1.
+
+> [!IMPORTANT]
+> Make sure that you don't specify a protocol when adding your URLs. Using a URL like `contoso.com` automatically applies to both http://contoso.com and https://contoso.com.
+
+```xml
+
+
+ www.cpandl.com
+ www.woodgrovebank.com
+ adatum.com
+ contoso.com
+ relecloud.com
+ /about
+
+ fabrikam.com
+ /products
+
+
+
+ contoso.com
+ /travel
+
+ fabrikam.com
+ /products
+
+
+
+```
+
+### Schema elements
+This table includes the elements used by the Enterprise Mode schema.
+
+
+
+
+
+
+
+<rules> |
+Root node for the schema.
+ Example
+
+<rules version="205">
+ <emie>
+ <domain>contoso.com</domain>
+ </emie>
+</rules> |
+Internet Explorer 11 and Microsoft Edge |
+
+
+<emie> |
+The parent node for the Enterprise Mode section of the schema. All <domain> entries will have either IE8 Enterprise Mode or IE7 Enterprise Mode applied.
+ Example
+
+<rules version="205">
+ <emie>
+ <domain>contoso.com</domain>
+ </emie>
+</rules>
+-or-
+For IPv6 ranges: <rules version="205">
+ <emie>
+ <domain>[10.122.34.99]:8080</domain>
+ </emie>
+ </rules>
+-or-
+For IPv4 ranges: <rules version="205">
+ <emie>
+ <domain>10.122.34.99:8080</domain>
+ </emie>
+ </rules> |
+Internet Explorer 11 and Microsoft Edge |
+
+
+<docMode> |
+The parent node for the document mode section of the section. All <domain> entries will get IE5 - IE11 document modes applied. If there's a <domain> element in the <docMode> section that uses the same value as a <domain> element in the <emie> section, the <emie> element is applied.
+ Example
+
+<rules version="205">
+ <docMode>
+ <domain docMode="7">contoso.com</domain>
+ </docMode>
+</rules> |
+Internet Explorer 11 |
+
+
+<domain> |
+A unique entry added for each site you want to put on the Enterprise Mode site list. The first <domain> element will overrule any additional <domain> elements that use the same value for the section. You can use port numbers for this element.
+ Example
+
+<emie>
+ <domain>contoso.com:8080</domain>
+</emie> |
+Internet Explorer 11 and Microsoft Edge |
+
+
+<path> |
+A unique entry added for each path under a domain you want to put on the Enterprise Mode site list. The <path> element is a child of the <domain> element. Additionally, the first <path> element will overrule any additional <path> elements in the schema section.
+ Example
+
+<emie>
+ <domain exclude="true">fabrikam.com
+ <path exclude="false">/products</path>
+ </domain>
+</emie>
+Where https://fabrikam.com doesn't use IE8 Enterprise Mode, but https://fabrikam.com/products does. |
+Internet Explorer 11 and Microsoft Edge |
+
+
+
+### Schema attributes
+This table includes the attributes used by the Enterprise Mode schema.
+
+
+
+
+
+
+
+<version> |
+Specifies the version of the Enterprise Mode Site List. This attribute is supported for the <rules> element. |
+Internet Explorer 11 and Microsoft Edge |
+
+
+<exclude> |
+Specifies the domain or path excluded from applying the behavior and is supported on the <domain> and <path> elements.
+ Example
+
+<emie>
+ <domain exclude="false">fabrikam.com
+ <path exclude="true">/products</path>
+ </domain>
+</emie>
+Where https://fabrikam.com uses IE8 Enterprise Mode, but https://fabrikam.com/products does not. |
+Internet Explorer 11 and Microsoft Edge |
+
+
+<docMode> |
+Specifies the document mode to apply. This attribute is only supported on <domain> or <path> elements in the <docMode> section.
+ Example
+
+<docMode>
+ <domain exclude="false">fabrikam.com
+ <path docMode="7">/products</path>
+ </domain>
+</docMode> |
+Internet Explorer 11 |
+
+
+
+### Using Enterprise Mode and document mode together
+If you want to use both Enterprise Mode and document mode together, you need to be aware that <emie> entries override <docMode> entries for the same domain.
+
+For example, say you want all of the sites in the contoso.com domain to open using IE8 Enterprise Mode, except test.contoso.com, which needs to open in document mode 11. Because Enterprise Mode takes precedence over document mode, if you want test.contoso.com to open using document mode, you'll need to explicitly add it as an exclusion to the <emie> parent node.
+
+```xml
+
+
+ contoso.com
+ test.contoso.com
+
+
+ test.contoso.com
+
+
+```
+
+### What not to include in your schema
+We recommend that you not add any of the following items to your schema because they can make your compatibility list behave in unexpected ways:
+- Don’t use protocols. For example, `http://`, `https://`, or custom protocols. They break parsing.
+- Don’t use wildcards.
+- Don’t use query strings, ampersands break parsing.
+
+## How to use trailing slashes
+You can use trailing slashes at the path-level, but not at the domain-level:
+- **Domain-level.** Don’t add trailing slashes to a domain, it breaks parsing.
+- **Path-level.** Adding a trailing slash to a path means that the path ends at that point. By not adding a trailing slash, the rule applies to all of the sub-paths.
+
+**Example**
+
+```xml
+contoso.com
+ /about/
+
+```
+In this example, `contoso.com/about/careers` will use the default version of Internet Explorer, even though `contoso.com/about/` uses Enterprise Mode.
+
+
+## How to target specific sites
+If you want to target specific sites in your organization.
+
+|Targeted site |Example |Explanation |
+|--------------|--------|------------|
+|You can specify subdomains in the domain tag. |<docMode>
<domain docMode="5">contoso.com</domain>
<domain docMode="9">info.contoso.com</domain>
<docMode>
|- contoso.com uses document mode 5.
- info.contoso.com uses document mode 9.
- test.contoso.com also uses document mode 5.
|
+|You can specify exact URLs by listing the full path. |<emie>
<domain exclude="false">bing.com</domain>
<domain exclude="false" forceCompatView="true">contoso.com</domain>
<emie>
|- bing.com uses IE8 Enterprise Mode.
- contoso.com uses IE7 Enterprise Mode.
|
+|You can nest paths underneath domains. |<emie>
<domain exclude="true">contoso.com
<path exclude="false">/about</path>
<path exclude="true">
/about/business</path>
</domain>
</emie>
|- contoso.com will use the default version of IE.
- contoso.com/about and everything underneath that node will load in Enterprise Mode, except contoso.com/about/business, which will load in the default version of IE.
|
+|You can’t add a path underneath a path. The file will still be parsed, but the sub-path will be ignored. |<emie>
<domain exclude="true">contoso.com
<path>/about
<path exclude="true">/business</path>
</path>
</domain>
</emie>
|- contoso.com will use the default version of IE.
- contoso.com/about and everything underneath that node will load in Enterprise Mode, including contoso.com/about/business because the last rule is ignored.
|
diff --git a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md
index 66a056c506..4bcf595aeb 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md
@@ -3,13 +3,13 @@ ms.localizationpriority: medium
ms.mktglfcycl: deploy
ms.pagetype: appcompat
description: Use the Enterprise Mode Site List Manager to create and update your Enterprise Mode site list for devices running Windows 10.
-author: lomayor
+author: dansimp
ms.prod: ie11
ms.assetid: 909ca359-5654-4df9-b9fb-921232fc05f5
ms.reviewer:
audience: itpro
manager: dansimp
-ms.author: lomayor
+ms.author: dansimp
title: Enterprise Mode schema v.2 guidance (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 12/04/2017
diff --git a/browsers/internet-explorer/ie11-deploy-guide/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md
index abb8513201..cf235b25aa 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md
@@ -1,49 +1,50 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: After you create your Enterprise Mode site list in the Enterprise Mode Site List Manager, you can export the contents to an Enterprise Mode (.EMIE) file.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 9ee7c13d-6fca-4446-bc22-d23a0213a95d
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Export your Enterprise Mode site list from the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Export your Enterprise Mode site list from the Enterprise Mode Site List Manager
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-After you create your Enterprise Mode site list in the Enterprise Mode Site List Manager, you can export the contents to an Enterprise Mode (.EMIE) file. This file includes all of your URLs, including your compatibility mode selections and should be stored somewhere safe. If your list gets deleted by mistake you can easily import this file and return everything back to when this file was last saved.
-
-**Important**
-This file is not intended for distribution to your managed devices. Instead, it is only for transferring data and comments from one manager to another. For example, if one administrator leaves and passes the existing data to another administrator. Internet Explorer doesn’t read this file.
-
- **To export your compatibility list**
-
-1. On the **File** menu of the Enterprise Mode Site List Manager, click **Export**.
-
-2. Export the file to your selected location. For example, `C:\Users\\Documents\sites.emie`.
-
-## Related topics
-
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: After you create your Enterprise Mode site list in the Enterprise Mode Site List Manager, you can export the contents to an Enterprise Mode (.EMIE) file.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 9ee7c13d-6fca-4446-bc22-d23a0213a95d
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Export your Enterprise Mode site list from the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Export your Enterprise Mode site list from the Enterprise Mode Site List Manager
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+After you create your Enterprise Mode site list in the Enterprise Mode Site List Manager, you can export the contents to an Enterprise Mode (.EMIE) file. This file includes all of your URLs, including your compatibility mode selections and should be stored somewhere safe. If your list gets deleted by mistake you can easily import this file and return everything back to when this file was last saved.
+
+**Important**
+This file is not intended for distribution to your managed devices. Instead, it is only for transferring data and comments from one manager to another. For example, if one administrator leaves and passes the existing data to another administrator. Internet Explorer doesn’t read this file.
+
+ **To export your compatibility list**
+
+1. On the **File** menu of the Enterprise Mode Site List Manager, click **Export**.
+
+2. Export the file to your selected location. For example, `C:\Users\\Documents\sites.emie`.
+
+## Related topics
+
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md b/browsers/internet-explorer/ie11-deploy-guide/fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md
index a48b0e5732..f1d72eb1a1 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md
@@ -1,109 +1,110 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: The Internet Explorer 11 Enterprise Mode site list lets you specify document modes for specific websites, helping you fix compatibility issues without changing a single line of code on the site.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 4b21bb27-aeac-407f-ae58-ab4c6db2baf6
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Fix web compatibility issues using document modes and the Enterprise Mode site list (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Fix web compatibility issues using document modes and the Enterprise Mode site list
-The Internet Explorer 11 Enterprise Mode site list lets you specify document modes for specific websites, helping you fix compatibility issues without changing a single line of code on the site. This addition to the site list is a continuation of our commitment to help you upgrade and stay up-to-date on the latest version of Internet Explorer, while still preserving your investments in existing apps.
-
-## What does this mean for me?
-Enterprises can have critical apps that are coded explicitly for a specific browser version and that might not be in their direct control, making it very difficult and expensive to update to modern standards or newer browser versions. Because you can decide which URLs should open using specific document modes, this update helps ensure better compatibility, faster upgrades, and reduced testing and fixing costs.
-
-## How does this fix work?
-You can continue to use your legacy and orphaned web apps, by specifying a document mode in the centralized Enterprise Mode site list. Then, when IE11 goes to a site on your list, the browser loads the page in the specified document mode just as it would if it were specified through an X-UA-Compatible meta tag on the site. For more information about document modes and X-UA-compatible headers, see [Defining document compatibility](https://go.microsoft.com/fwlink/p/?LinkId=518412).
-
-**Important**
-Enterprise Mode takes precedence over document modes, so sites that are already included in the Enterprise Mode site list won’t be affected by this update and will continue to load in Enterprise Mode, as usual.
-
-### When do I use document modes versus Enterprise Mode?
-While the `` functionality provides great compatibility for you on Windows Internet Explorer 8 or Windows Internet Explorer 7, the new `` capabilities can help you stay up-to-date regardless of which versions of IE are running in your environment. Because of this, we recommend starting your testing process like this:
-
-- If your enterprise primarily uses Internet Explorer 8 or Internet Explorer 7 start testing using Enterprise Mode.
-
-- If your enterprise primarily uses Windows Internet Explorer 9 or Internet Explorer 10, start testing using the various document modes.
-
-Because you might have multiple versions of IE deployed, you might need to use both Enterprise Mode and document modes to effectively move to IE11.
-
-### Test your sites for document mode compatibility
-To see if this fix might help you, run through this process one step at a time, for each of your problematic sites:
-
-1. Go to a site having compatibility problems, press **F12** to open the **F12 Developer Tools**, and go to the **Emulation** tool.
-
- 
-
-2. Starting with the **11 (Default)** option, test your broken scenario.
-If that doesn’t work, continue down to the next lowest document mode, stopping as soon as you find a document mode that fixes your problems. For more information about the Emulation tool, see [Emulate browsers, screen sizes, and GPS locations](https://go.microsoft.com/fwlink/p/?LinkId=518417).
-
-3. If none of the document modes fix your issue, change the **Browser Profile** to **Enterprise**, pick the mode you want to test with starting with **8** (IE8 Enterprise Mode), and then test your broken scenario.
-
-### Add your site to the Enterprise Mode site list
-After you’ve figured out the document mode that fixes your compatibility problems, you can add the site to your Enterprise Mode site list.
-
-**Note**
-There are two versions of the Enterprise Mode site list schema and the Enterprise Mode Site List Manager, based on your operating system. For more info about the schemas, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md) or [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). For more info about the different site list management tools, see [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md).
-
- **To add your site to the site list**
-
-1. Open the Enterprise Mode Site List Manager, and click **Add**.
-
- 
-
-2. Add the **URL** and pick the document mode from the **Launch in** box. This should be the same document mode you found fixed your problems while testing the site.
-Similar to Enterprise Mode, you can specify a document mode for a particular web path—such as contoso.com/ERP—or at a domain level. In the above, the entire contoso.com domain loads in Enterprise Mode, while microsoft.com is forced to load into IE8 Document Mode and bing.com loads in IE11.
-
-**Note**
-For more information about Enterprise Mode, see [What is Enterprise Mode?](what-is-enterprise-mode.md) For more information about the Enterprise Mode Site List Manager and how to add sites to your site list, see [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md).
-
-
-### Review your Enterprise Mode site list
-Take a look at your Enterprise Mode site list and make sure everything is the way you want it. The next step will be to turn the list on and start to use it in your company. The Enterprise Mode Site List Manager will look something like:
-
-
-
-And the underlying XML code will look something like:
-
-``` xml
-
-
- bing.com/images
- www.msn.com/news
-
-
-
- timecard
- tar
- msdn.microsoft.com
-
-
-```
-
-### Turn on Enterprise Mode and using your site list
-If you haven’t already turned on Enterprise Mode for your company, you’ll need to do that. You can turn on Enterprise Mode using Group Policy or your registry. For specific instructions and details, see [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md).
-
-## Turn off default Compatibility View for your intranet sites
-By default, IE11 uses the **Display intranet sites in Compatibility View** setting. However, we’ve heard your feedback and know that you might want to turn this functionality off so you can continue to upgrade your web apps to more modern standards.
-
-To help you move forward, you can now use the Enterprise Mode site list to specify sites or web paths to use the IE7 document mode, which goes down to IE5 “Quirks” mode if the page doesn’t have an explicit `DOCTYPE` tag. Using this document mode effectively helps you provide the Compatibility View functionality for single sites or a group of sites, which after thorough testing, can help you turn off Compatibility View as the default setting for your intranet sites.
-
-## Related topics
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: The Internet Explorer 11 Enterprise Mode site list lets you specify document modes for specific websites, helping you fix compatibility issues without changing a single line of code on the site.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 4b21bb27-aeac-407f-ae58-ab4c6db2baf6
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Fix web compatibility issues using document modes and the Enterprise Mode site list (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Fix web compatibility issues using document modes and the Enterprise Mode site list
+The Internet Explorer 11 Enterprise Mode site list lets you specify document modes for specific websites, helping you fix compatibility issues without changing a single line of code on the site. This addition to the site list is a continuation of our commitment to help you upgrade and stay up-to-date on the latest version of Internet Explorer, while still preserving your investments in existing apps.
+
+## What does this mean for me?
+Enterprises can have critical apps that are coded explicitly for a specific browser version and that might not be in their direct control, making it very difficult and expensive to update to modern standards or newer browser versions. Because you can decide which URLs should open using specific document modes, this update helps ensure better compatibility, faster upgrades, and reduced testing and fixing costs.
+
+## How does this fix work?
+You can continue to use your legacy and orphaned web apps, by specifying a document mode in the centralized Enterprise Mode site list. Then, when IE11 goes to a site on your list, the browser loads the page in the specified document mode just as it would if it were specified through an X-UA-Compatible meta tag on the site. For more information about document modes and X-UA-compatible headers, see [Defining document compatibility](https://go.microsoft.com/fwlink/p/?LinkId=518412).
+
+**Important**
+Enterprise Mode takes precedence over document modes, so sites that are already included in the Enterprise Mode site list won’t be affected by this update and will continue to load in Enterprise Mode, as usual.
+
+### When do I use document modes versus Enterprise Mode?
+While the `` functionality provides great compatibility for you on Windows Internet Explorer 8 or Windows Internet Explorer 7, the new `` capabilities can help you stay up-to-date regardless of which versions of IE are running in your environment. Because of this, we recommend starting your testing process like this:
+
+- If your enterprise primarily uses Internet Explorer 8 or Internet Explorer 7 start testing using Enterprise Mode.
+
+- If your enterprise primarily uses Windows Internet Explorer 9 or Internet Explorer 10, start testing using the various document modes.
+
+Because you might have multiple versions of IE deployed, you might need to use both Enterprise Mode and document modes to effectively move to IE11.
+
+### Test your sites for document mode compatibility
+To see if this fix might help you, run through this process one step at a time, for each of your problematic sites:
+
+1. Go to a site having compatibility problems, press **F12** to open the **F12 Developer Tools**, and go to the **Emulation** tool.
+
+ 
+
+2. Starting with the **11 (Default)** option, test your broken scenario.
+If that doesn’t work, continue down to the next lowest document mode, stopping as soon as you find a document mode that fixes your problems. For more information about the Emulation tool, see [Emulate browsers, screen sizes, and GPS locations](https://go.microsoft.com/fwlink/p/?LinkId=518417).
+
+3. If none of the document modes fix your issue, change the **Browser Profile** to **Enterprise**, pick the mode you want to test with starting with **8** (IE8 Enterprise Mode), and then test your broken scenario.
+
+### Add your site to the Enterprise Mode site list
+After you’ve figured out the document mode that fixes your compatibility problems, you can add the site to your Enterprise Mode site list.
+
+**Note**
+There are two versions of the Enterprise Mode site list schema and the Enterprise Mode Site List Manager, based on your operating system. For more info about the schemas, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md) or [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md). For more info about the different site list management tools, see [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md).
+
+ **To add your site to the site list**
+
+1. Open the Enterprise Mode Site List Manager, and click **Add**.
+
+ 
+
+2. Add the **URL** and pick the document mode from the **Launch in** box. This should be the same document mode you found fixed your problems while testing the site.
+Similar to Enterprise Mode, you can specify a document mode for a particular web path—such as contoso.com/ERP—or at a domain level. In the above, the entire contoso.com domain loads in Enterprise Mode, while microsoft.com is forced to load into IE8 Document Mode and bing.com loads in IE11.
+
+**Note**
+For more information about Enterprise Mode, see [What is Enterprise Mode?](what-is-enterprise-mode.md) For more information about the Enterprise Mode Site List Manager and how to add sites to your site list, see [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md).
+
+
+### Review your Enterprise Mode site list
+Take a look at your Enterprise Mode site list and make sure everything is the way you want it. The next step will be to turn the list on and start to use it in your company. The Enterprise Mode Site List Manager will look something like:
+
+
+
+And the underlying XML code will look something like:
+
+``` xml
+
+
+ bing.com/images
+ www.msn.com/news
+
+
+
+ timecard
+ tar
+ msdn.microsoft.com
+
+
+```
+
+### Turn on Enterprise Mode and using your site list
+If you haven’t already turned on Enterprise Mode for your company, you’ll need to do that. You can turn on Enterprise Mode using Group Policy or your registry. For specific instructions and details, see [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md).
+
+## Turn off default Compatibility View for your intranet sites
+By default, IE11 uses the **Display intranet sites in Compatibility View** setting. However, we’ve heard your feedback and know that you might want to turn this functionality off so you can continue to upgrade your web apps to more modern standards.
+
+To help you move forward, you can now use the Enterprise Mode site list to specify sites or web paths to use the IE7 document mode, which goes down to IE5 “Quirks” mode if the page doesn’t have an explicit `DOCTYPE` tag. Using this document mode effectively helps you provide the Compatibility View functionality for single sites or a group of sites, which after thorough testing, can help you turn off Compatibility View as the default setting for your intranet sites.
+
+## Related topics
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/fix-validation-problems-using-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/fix-validation-problems-using-the-enterprise-mode-site-list-manager.md
index 852ac4ae6c..c3c7ead8ff 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/fix-validation-problems-using-the-enterprise-mode-site-list-manager.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/fix-validation-problems-using-the-enterprise-mode-site-list-manager.md
@@ -1,48 +1,49 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: When you add multiple sites to your Enterprise Mode site list entries, they’re validated by the Enterprise Mode Site List Manager before they’re entered into your global list.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 9f80e39f-dcf1-4124-8931-131357f31d67
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Fix validation problems using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Fix validation problems using the Enterprise Mode Site List Manager
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-When you add multiple sites to your Enterprise Mode site list entries, they’re validated by the Enterprise Mode Site List Manager before they’re entered into your global list. If a site doesn’t pass validation, you’ll have a couple of options to address it.
-
-There are typically 3 types of errors you’ll see:
-
-- **Validation**. The site caused a validation error. Typically these occur because of typos, malformed URLs, or access-related issues. You can pick the site, click **Add to list** to ignore the problem and accept the site to your site list, or you can click **OK** to keep the site off of your site list.
-
-- **Duplicate**. The site already exists in the global compatibility list with a different compatibility mode. For example, the site was originally rendered in Enterprise Mode, but this update is for Default IE. You can pick the site, click **Add to list** to ignore the problem and accept the change to your site list, or you can click **OK** to keep your original compatibility mode.
-
-- **Redirection**. This is the least common type of validation error. Typically in this situation, a site redirects from an easy-to-remember URL to a longer URL. Like `\\tar` redirects to `\\timecard`. You can add the short URL or you can add both the short and long versions to your list.
-Another possibility is that redirection happens multiple times, with an intermediary site experiencing compatibility issues. For example, an employee types a short URL that then redirects multiple times, finally ending up on a non-intranet site. In this situation, you might want to add the intermediary URLs to your Enterprise Mode site list, in case there’s logic in one of them that has compatibility issues.
-
-## Related topics
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: When you add multiple sites to your Enterprise Mode site list entries, they’re validated by the Enterprise Mode Site List Manager before they’re entered into your global list.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 9f80e39f-dcf1-4124-8931-131357f31d67
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Fix validation problems using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Fix validation problems using the Enterprise Mode Site List Manager
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+When you add multiple sites to your Enterprise Mode site list entries, they’re validated by the Enterprise Mode Site List Manager before they’re entered into your global list. If a site doesn’t pass validation, you’ll have a couple of options to address it.
+
+There are typically 3 types of errors you’ll see:
+
+- **Validation**. The site caused a validation error. Typically these occur because of typos, malformed URLs, or access-related issues. You can pick the site, click **Add to list** to ignore the problem and accept the site to your site list, or you can click **OK** to keep the site off of your site list.
+
+- **Duplicate**. The site already exists in the global compatibility list with a different compatibility mode. For example, the site was originally rendered in Enterprise Mode, but this update is for Default IE. You can pick the site, click **Add to list** to ignore the problem and accept the change to your site list, or you can click **OK** to keep your original compatibility mode.
+
+- **Redirection**. This is the least common type of validation error. Typically in this situation, a site redirects from an easy-to-remember URL to a longer URL. Like `\\tar` redirects to `\\timecard`. You can add the short URL or you can add both the short and long versions to your list.
+Another possibility is that redirection happens multiple times, with an intermediary site experiencing compatibility issues. For example, an employee types a short URL that then redirects multiple times, finally ending up on a non-intranet site. In this situation, you might want to add the intermediary URLs to your Enterprise Mode site list, in case there’s logic in one of them that has compatibility issues.
+
+## Related topics
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-advanced-group-policy-mgmt-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-advanced-group-policy-mgmt-ie11.md
index 7fc2191028..d2fadc609c 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-advanced-group-policy-mgmt-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-advanced-group-policy-mgmt-ie11.md
@@ -1,43 +1,44 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Overview about Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11
-author: lomayor
-ms.prod: ie11
-ms.assetid: 63a7ef4a-6de2-4d08-aaba-0479131e3406
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11
-Advanced Group Policy Management (AGPM) is an add-on license that available for the Microsoft Desktop Optimization Pack (MDOP). This license gives you change control and a role assignment-model that helps optimize Group Policy management and reduce the risk of widespread failures.
-
-From AGPM you can:
-
-- **Edit GPOs outside of your production environment.** Your GPOs are stored in an outside archive for editing, reviewing, and approving. Then, when you deploy, AGPM moves the GPOs to your production environment.
-
-- **Assign roles to your employees.** You can assign 3 roles to your employees or groups, including:
-
- - **Reviewer.** Can view and compare GPOs in the archive. This role can't edit or deploy GPOs.
-
- - **Editor.** Can view, compare, check-in and out, and edit GPOs in the archive. This role can also request GPO deployment.
-
- - **Approver.** Can approve GPO creation and deployment to the production environment.
-
-- **Manage your GPO lifecycle with change control features.** You can use the available version-control, history, and auditing features to help you manage your GPOs while moving through your archive, to your editing process, and finally to your GPO deployment.
-
-**Note**
-For more information about AGPM, and to get the license, see [Advanced Group Policy Management 4.0 Documents](https://www.microsoft.com/download/details.aspx?id=13975).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Overview about Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11
+author: dansimp
+ms.prod: ie11
+ms.assetid: 63a7ef4a-6de2-4d08-aaba-0479131e3406
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11
+Advanced Group Policy Management (AGPM) is an add-on license that available for the Microsoft Desktop Optimization Pack (MDOP). This license gives you change control and a role assignment-model that helps optimize Group Policy management and reduce the risk of widespread failures.
+
+From AGPM you can:
+
+- **Edit GPOs outside of your production environment.** Your GPOs are stored in an outside archive for editing, reviewing, and approving. Then, when you deploy, AGPM moves the GPOs to your production environment.
+
+- **Assign roles to your employees.** You can assign 3 roles to your employees or groups, including:
+
+ - **Reviewer.** Can view and compare GPOs in the archive. This role can't edit or deploy GPOs.
+
+ - **Editor.** Can view, compare, check-in and out, and edit GPOs in the archive. This role can also request GPO deployment.
+
+ - **Approver.** Can approve GPO creation and deployment to the production environment.
+
+- **Manage your GPO lifecycle with change control features.** You can use the available version-control, history, and auditing features to help you manage your GPOs while moving through your archive, to your editing process, and finally to your GPO deployment.
+
+**Note**
+For more information about AGPM, and to get the license, see [Advanced Group Policy Management 4.0 Documents](https://www.microsoft.com/download/details.aspx?id=13975).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11.md
index 3c121b3e5e..df5754f0b6 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11.md
@@ -1,48 +1,49 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Overview about Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11
-author: lomayor
-ms.prod: ie11
-ms.assetid: ae3d227d-3da7-46b8-8a61-c71bfeae0c63
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11
-A Microsoft Management Console (MMC)-based tool that uses scriptable interfaces to manage Group Policy. The 32-bit and 64-bit versions are included with Windows Server R2 with Service Pack 1 (SP1) and Windows Server 2012 R2.
-
-## Why use the GPMC?
-The GPMC lets you:
-
-- Import, export, copy, paste, backup and restore GPOs.
-
-- Search for existing GPOs.
-
-- Create reports, including providing the Resultant Set of Policy (RSoP) data in HTML reports that you can save and print.
-
-- Use simulated RSoP data to prototype your Group Policy before implementing it in the production environment.
-
-- Obtain RSoP data to view your GPO interactions and to troubleshoot your Group Policy deployment.
-
-- Create migration tables to let you import and copy GPOs across domains and across forests. Migration tables are files that map references to users, groups, computers, and Universal Naming Convention (UNC) paths in the source GPO to new values in the destination GPO.
-
-- Create scriptable interfaces to support all of the operations available within the GPMC. You can't use scripts to edit individual policy settings in a GPO.
-
-For more information about the GPMC, see [Group Policy Management Console](https://go.microsoft.com/fwlink/p/?LinkId=214515) on TechNet.
-
-## Searching for Group Policy settings
-To search for Group Policy settings in the Group Policy Management Console (GPMC), use the [Group Policy Search tool](https://go.microsoft.com/fwlink/p/?LinkId=279857). To find the Group Policy settings, click **Windows Components**, and then click **Internet Explorer**.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Overview about Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11
+author: dansimp
+ms.prod: ie11
+ms.assetid: ae3d227d-3da7-46b8-8a61-c71bfeae0c63
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11
+A Microsoft Management Console (MMC)-based tool that uses scriptable interfaces to manage Group Policy. The 32-bit and 64-bit versions are included with Windows Server R2 with Service Pack 1 (SP1) and Windows Server 2012 R2.
+
+## Why use the GPMC?
+The GPMC lets you:
+
+- Import, export, copy, paste, backup and restore GPOs.
+
+- Search for existing GPOs.
+
+- Create reports, including providing the Resultant Set of Policy (RSoP) data in HTML reports that you can save and print.
+
+- Use simulated RSoP data to prototype your Group Policy before implementing it in the production environment.
+
+- Obtain RSoP data to view your GPO interactions and to troubleshoot your Group Policy deployment.
+
+- Create migration tables to let you import and copy GPOs across domains and across forests. Migration tables are files that map references to users, groups, computers, and Universal Naming Convention (UNC) paths in the source GPO to new values in the destination GPO.
+
+- Create scriptable interfaces to support all of the operations available within the GPMC. You can't use scripts to edit individual policy settings in a GPO.
+
+For more information about the GPMC, see [Group Policy Management Console](https://go.microsoft.com/fwlink/p/?LinkId=214515) on TechNet.
+
+## Searching for Group Policy settings
+To search for Group Policy settings in the Group Policy Management Console (GPMC), use the [Group Policy Search tool](https://go.microsoft.com/fwlink/p/?LinkId=279857). To find the Group Policy settings, click **Windows Components**, and then click **Internet Explorer**.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md
index 574b7f8895..d80c5af350 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-ie11.md
@@ -1,48 +1,49 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Use the topics in this section to learn about Group Policy and how to use it to manage Internet Explorer.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 50383d3f-9ac9-4a30-8852-354b6eb9434a
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Group Policy and Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Group Policy and Internet Explorer 11 (IE11)
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Use the topics in this section to learn about Group Policy and how to use it to manage Internet Explorer.
-
-## In this section
-
-|Topic |Description |
-|----------------------------------------------------|-----------------------------------------------------------------|
-|[New group policy settings for Internet Explorer 11](new-group-policy-settings-for-ie11.md) |Info about many of the new group policy settings added for Internet Explorer 11. |
-|[Group Policy management tools](group-policy-objects-and-ie11.md) |Guidance about how to use Microsoft Active Directory Domain Services (AD DS) to manage your Group Policy settings. |
-|[ActiveX installation using group policy](activex-installation-using-group-policy.md) |Info about using the ActiveX Installer Service (AXIS) and Group Policy to manage your ActiveX control deployment. |
-|[Group Policy and compatibility with Internet Explorer 11](group-policy-compatibility-with-ie11.md) |Our Group Policy recommendations for security, performance, and compatibility with previous versions of IE, regardless of which Zone the website is in. |
-|[Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md) |Info about Group Policy preferences, as compared to Group Policy settings. |
-|[Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md) |Info about Administrative Templates, including where to store them and the related Group Policy settings. |
-|[Enable and disable add\-ons using administrative templates and group policy](enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md) |Guidance about how to use your local Group Policy editor or the CLSID and Administrative Templates to manage your Group Policy objects.
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Use the topics in this section to learn about Group Policy and how to use it to manage Internet Explorer.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 50383d3f-9ac9-4a30-8852-354b6eb9434a
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Group Policy and Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Group Policy and Internet Explorer 11 (IE11)
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Use the topics in this section to learn about Group Policy and how to use it to manage Internet Explorer.
+
+## In this section
+
+|Topic |Description |
+|----------------------------------------------------|-----------------------------------------------------------------|
+|[New group policy settings for Internet Explorer 11](new-group-policy-settings-for-ie11.md) |Info about many of the new group policy settings added for Internet Explorer 11. |
+|[Group Policy management tools](group-policy-objects-and-ie11.md) |Guidance about how to use Microsoft Active Directory Domain Services (AD DS) to manage your Group Policy settings. |
+|[ActiveX installation using group policy](activex-installation-using-group-policy.md) |Info about using the ActiveX Installer Service (AXIS) and Group Policy to manage your ActiveX control deployment. |
+|[Group Policy and compatibility with Internet Explorer 11](group-policy-compatibility-with-ie11.md) |Our Group Policy recommendations for security, performance, and compatibility with previous versions of IE, regardless of which Zone the website is in. |
+|[Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md) |Info about Group Policy preferences, as compared to Group Policy settings. |
+|[Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md) |Info about Administrative Templates, including where to store them and the related Group Policy settings. |
+|[Enable and disable add\-ons using administrative templates and group policy](enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md) |Guidance about how to use your local Group Policy editor or the CLSID and Administrative Templates to manage your Group Policy objects.
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-local-group-policy-editor-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-local-group-policy-editor-ie11.md
index 36176c7bde..4ca3868ed5 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-local-group-policy-editor-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-and-local-group-policy-editor-ie11.md
@@ -1,36 +1,37 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Group Policy, the Local Group Policy Editor, and Internet Explorer 11
-author: lomayor
-ms.prod: ie11
-ms.assetid: 6fc30e91-efac-4ba5-9ee2-fa77dcd36467
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Group Policy, the Local Group Policy Editor, and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Group Policy, the Local Group Policy Editor, and Internet Explorer 11
-A Microsoft Management Console (MMC)-based tool that manages both computer and user-related configurations for an individual computer policy. This tool is included with Windows® 7 Service Pack 1 (SP1) and Windows 8.1.
-
-Here's a list of the policy settings you can use, based on the configuration type. For more info, see [Local Group Policy Editor](https://go.microsoft.com/fwlink/p/?LinkId=294912).
-
-|Computer configuration |User configuration |
-|-----------------------|-------------------|
-|Windows settings:- Name Resolution policy
- Scripts (Startup/Shutdown)
- Deployed printers
- Security settings
- Policy-based Quality of Service (QoS)
|Windows settings:- Scripts (Startup/Shutdown)
- Deployed printers
- Security settings
- Policy-based Quality of Service (QoS)
|
-|Administrative templates:- Control Panel
- Network
- Printers
- Server
- System
- Windows components
- All settings
|Administrative templates:- Control Panel
- Desktop
- Network
- Shared folders
- Start menu and taskbar
- System
- Windows components
- All settings
|
-
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Group Policy, the Local Group Policy Editor, and Internet Explorer 11
+author: dansimp
+ms.prod: ie11
+ms.assetid: 6fc30e91-efac-4ba5-9ee2-fa77dcd36467
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Group Policy, the Local Group Policy Editor, and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Group Policy, the Local Group Policy Editor, and Internet Explorer 11
+A Microsoft Management Console (MMC)-based tool that manages both computer and user-related configurations for an individual computer policy. This tool is included with Windows® 7 Service Pack 1 (SP1) and Windows 8.1.
+
+Here's a list of the policy settings you can use, based on the configuration type. For more info, see [Local Group Policy Editor](https://go.microsoft.com/fwlink/p/?LinkId=294912).
+
+|Computer configuration |User configuration |
+|-----------------------|-------------------|
+|Windows settings:- Name Resolution policy
- Scripts (Startup/Shutdown)
- Deployed printers
- Security settings
- Policy-based Quality of Service (QoS)
|Windows settings:- Scripts (Startup/Shutdown)
- Deployed printers
- Security settings
- Policy-based Quality of Service (QoS)
|
+|Administrative templates:- Control Panel
- Network
- Printers
- Server
- System
- Windows components
- All settings
|Administrative templates:- Control Panel
- Desktop
- Network
- Shared folders
- Start menu and taskbar
- System
- Windows components
- All settings
|
+
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11.md
index 5e66dc9f4c..8a5b6d7859 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-compatibility-with-ie11.md
@@ -1,38 +1,39 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Group Policy suggestions for compatibility with Internet Explorer 11
-author: lomayor
-ms.prod: ie11
-ms.assetid: 7482c99f-5d79-4344-9e1c-aea9f0a68e18
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Group Policy and compatibility with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Group Policy and compatibility with Internet Explorer 11
-Internet Explorer 11 has many Group Policy entries that can be configured for keeping your environment managed and safe. This table includes all of our recommendations around security, performance, and compatibility with the previous versions of Internet Explorer, regardless of which Zone the website is in.
-
-|Activity |Location |Setting the policy object |
-|---------------------------------|----------------------------------------------|-------------------------------------------------------------------------|
-|Turn on Compatibility View for all intranet zones |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Turn on IE Standards Mode for local intranet** , and then click **Disabled**. |
-|Turn on Compatibility View for selected websites, using Group Policy |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Use Policy List of Windows Internet Explorer 7 sites** , and then click **Enabled**.Users will be able to add or remove sites manually to their local Compatibility View list, but they won’t be able to remove the sites you specifically added. |
-|Turn on Quirks mode for selected websites, using Group Policy |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Use Policy List of Quirks Mode sites**, and then click **Enabled**. |
-|Ensure your users are using the most up-to-date version of Microsoft’s compatibility list. |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Include updated Web site lists from Microsoft**, and then click **Enabled**. |
-|Restrict users from making security zone configuration changes. |`Administrative Templates\ Windows Components\Internet Explorer\Internet Control Panel` |Double-click **Disable the Security Page**, and then click **Enabled**. |
-|Control which security zone settings are applied to specific websites. |`Administrative Templates\ Windows Components\Internet Explorer\Internet Control Panel\Security Page` |Double-click **Site to Zone Assignment List**, click **Enabled**, and then enter your list of websites and their applicable security zones. |
-|Turn off Data Execution Prevention (DEP). |`Administrative Templates\ Windows Components\Internet Explorer\Security Features` |Double-click **Turn off Data Execution Prevention**, and then click **Enabled**. |
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Group Policy suggestions for compatibility with Internet Explorer 11
+author: dansimp
+ms.prod: ie11
+ms.assetid: 7482c99f-5d79-4344-9e1c-aea9f0a68e18
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Group Policy and compatibility with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Group Policy and compatibility with Internet Explorer 11
+Internet Explorer 11 has many Group Policy entries that can be configured for keeping your environment managed and safe. This table includes all of our recommendations around security, performance, and compatibility with the previous versions of Internet Explorer, regardless of which Zone the website is in.
+
+|Activity |Location |Setting the policy object |
+|---------------------------------|----------------------------------------------|-------------------------------------------------------------------------|
+|Turn on Compatibility View for all intranet zones |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Turn on IE Standards Mode for local intranet** , and then click **Disabled**. |
+|Turn on Compatibility View for selected websites, using Group Policy |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Use Policy List of Windows Internet Explorer 7 sites** , and then click **Enabled**.Users will be able to add or remove sites manually to their local Compatibility View list, but they won’t be able to remove the sites you specifically added. |
+|Turn on Quirks mode for selected websites, using Group Policy |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Use Policy List of Quirks Mode sites**, and then click **Enabled**. |
+|Ensure your users are using the most up-to-date version of Microsoft’s compatibility list. |`Administrative Templates\Windows Components\Internet Explorer\Compatibility View` |Double-click **Include updated Web site lists from Microsoft**, and then click **Enabled**. |
+|Restrict users from making security zone configuration changes. |`Administrative Templates\ Windows Components\Internet Explorer\Internet Control Panel` |Double-click **Disable the Security Page**, and then click **Enabled**. |
+|Control which security zone settings are applied to specific websites. |`Administrative Templates\ Windows Components\Internet Explorer\Internet Control Panel\Security Page` |Double-click **Site to Zone Assignment List**, click **Enabled**, and then enter your list of websites and their applicable security zones. |
+|Turn off Data Execution Prevention (DEP). |`Administrative Templates\ Windows Components\Internet Explorer\Security Features` |Double-click **Turn off Data Execution Prevention**, and then click **Enabled**. |
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md
index 494906c975..403471f4c7 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-objects-and-ie11.md
@@ -1,55 +1,56 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Overview of the available Group Policy management tools
-author: lomayor
-ms.prod: ie11
-ms.assetid: e33bbfeb-6b80-4e71-8bba-1d0369a87312
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Group Policy management tools (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Group Policy management tools
-Group Policy, based on Microsoft Active Directory Domain Services (AD DS), lets you manage your organization's computer and user settings as part of your Group Policy objects (GPOs), which are added and changed in the Group Policy Management Console (GPMC). GPOs can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences. The most effective way to target a specific GPO is to use Windows Management Instrumentation (WMI) filters. Like, creating a WMI filter that applies a GPO only to computers with a specific make and model.
-
-By using Group Policy, you can set up a policy setting once, and then copy that setting onto many computers. For example, you can set up multiple Internet Explorer 11 security settings in a GPO that's linked to a domain, and then apply all of those settings to every computer in the domain.
-
-**Note**
-For more information about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy.
-
-## Managing settings with GPOs
-After deploying IE11 to your organization, you can continue to manage the browser settings by using Active Directory Domain Services (AD DS) together with the following Group Policy-related setting management groups:
-
-- [Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md). Used to manage registry-based policies and options.
-
-- [Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md). Used to set up and manage options that can be changed by the user after installation.
-
-**Note**
-Whenever possible, we recommend that you manage IE11 using Administrative Templates, because these settings are always written to secure policy branches in the registry. In addition, we recommend that you deploy using standard user accounts instead of letting your users log on to their computers as administrators. This helps to prevent your users from making unwanted changes to their systems or overriding Group Policy settings.
-
-
-Users won't be able to use the IE11 user interface or the registry to change any managed settings on their computers. However, they will be able to change many of the preferences associated with the settings you set up using the Internet Explorer Administration Kit 11 (IEAK 11).
-
-## Which GPO tool should I use?
-You can use any of these tools to create, manage, view, and troubleshoot Group Policy objects (GPOs). For information about each, see:
-
-- [Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11](group-policy-and-group-policy-mgmt-console-ie11.md). Provides a single location to manage all GPOs, WMI filters, and Group Policy–related permissions across multiple forests in an organization.
-
-- [Group Policy, the Local Group Policy Editor, and Internet Explorer 11](group-policy-and-local-group-policy-editor-ie11.md). Provides a user interface that lets you edit settings within individual GPOs.
-
-- [Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11](group-policy-and-advanced-group-policy-mgmt-ie11.md). An add-on license for the Microsoft Desktop Optimization Pack (MDOP) that helps to extend Group Policy for Software Assurance customers.
-
-- [Group Policy, Windows Powershell, and Internet Explorer 11](group-policy-windows-powershell-ie11.md). A command-line shell and scripting language that helps automate Windows and application administration on a single computer locally, or across many computers remotely.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Overview of the available Group Policy management tools
+author: dansimp
+ms.prod: ie11
+ms.assetid: e33bbfeb-6b80-4e71-8bba-1d0369a87312
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Group Policy management tools (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Group Policy management tools
+Group Policy, based on Microsoft Active Directory Domain Services (AD DS), lets you manage your organization's computer and user settings as part of your Group Policy objects (GPOs), which are added and changed in the Group Policy Management Console (GPMC). GPOs can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences. The most effective way to target a specific GPO is to use Windows Management Instrumentation (WMI) filters. Like, creating a WMI filter that applies a GPO only to computers with a specific make and model.
+
+By using Group Policy, you can set up a policy setting once, and then copy that setting onto many computers. For example, you can set up multiple Internet Explorer 11 security settings in a GPO that's linked to a domain, and then apply all of those settings to every computer in the domain.
+
+**Note**
+For more information about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy.
+
+## Managing settings with GPOs
+After deploying IE11 to your organization, you can continue to manage the browser settings by using Active Directory Domain Services (AD DS) together with the following Group Policy-related setting management groups:
+
+- [Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md). Used to manage registry-based policies and options.
+
+- [Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md). Used to set up and manage options that can be changed by the user after installation.
+
+**Note**
+Whenever possible, we recommend that you manage IE11 using Administrative Templates, because these settings are always written to secure policy branches in the registry. In addition, we recommend that you deploy using standard user accounts instead of letting your users log on to their computers as administrators. This helps to prevent your users from making unwanted changes to their systems or overriding Group Policy settings.
+
+
+Users won't be able to use the IE11 user interface or the registry to change any managed settings on their computers. However, they will be able to change many of the preferences associated with the settings you set up using the Internet Explorer Administration Kit 11 (IEAK 11).
+
+## Which GPO tool should I use?
+You can use any of these tools to create, manage, view, and troubleshoot Group Policy objects (GPOs). For information about each, see:
+
+- [Group Policy, the Group Policy Management Console (GPMC), and Internet Explorer 11](group-policy-and-group-policy-mgmt-console-ie11.md). Provides a single location to manage all GPOs, WMI filters, and Group Policy–related permissions across multiple forests in an organization.
+
+- [Group Policy, the Local Group Policy Editor, and Internet Explorer 11](group-policy-and-local-group-policy-editor-ie11.md). Provides a user interface that lets you edit settings within individual GPOs.
+
+- [Group Policy, Advanced Group Policy Management (AGPM), and Internet Explorer 11](group-policy-and-advanced-group-policy-mgmt-ie11.md). An add-on license for the Microsoft Desktop Optimization Pack (MDOP) that helps to extend Group Policy for Software Assurance customers.
+
+- [Group Policy, Windows Powershell, and Internet Explorer 11](group-policy-windows-powershell-ie11.md). A command-line shell and scripting language that helps automate Windows and application administration on a single computer locally, or across many computers remotely.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-preferences-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-preferences-and-ie11.md
index 473be60b15..ae5c5f783e 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-preferences-and-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-preferences-and-ie11.md
@@ -1,38 +1,39 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Info about Group Policy preferences versus Group Policy settings
-author: lomayor
-ms.prod: ie11
-ms.assetid: f2264c97-7f09-4f28-bb5c-58ab80dcc6ee
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Group policy preferences and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Group policy preferences and Internet Explorer 11
-Group Policy preferences are less strict than Group Policy settings, based on:
-
-| |Group Policy preferences |Group Policy settings |
-|-----|-------------------------|----------------------|
-|Enforcement |- Not enforced
- Has the user interface turned on
- Can only be refreshed or applied once
|- Enforced
- Has the user interface turned off
- Can be refreshed multiple times
|
-|Flexibility |Lets you create preference items for registry settings, files, and folders. |- Requires app support
- Needs you to create Administrative Templates for new policy settings
- Won't let you create policy settings to manage files and folders
|
-|Local Group Policy |Not available |Available
-|Awareness |Supports apps that aren't Group Policy-aware |Requires apps to be Group Policy-aware |
-|Storage |- Overwrites the original settings
- Removing the preference doesn't restore the original setting
|- Doesn't overwrite the original settings
- Stored in the Policy branches of the registry
- Removing the setting restores the original setting
|
-|Targeting and filtering |- Targeting is specific, with a user interface for each type of targeting item
- Supports targeting at the individual preference item level
|- Filtering is based on Windows Management Instrumentation (WMI), and requires writing WMI queries
- Supports filtering at the Group Policy Object (GPO) level
|
-
-
-For more information about Group Policy preferences, see the [Group Policy Settings Reference for Windows and Windows Server](https://go.microsoft.com/fwlink/p/?LinkId=279876).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Info about Group Policy preferences versus Group Policy settings
+author: dansimp
+ms.prod: ie11
+ms.assetid: f2264c97-7f09-4f28-bb5c-58ab80dcc6ee
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Group policy preferences and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Group policy preferences and Internet Explorer 11
+Group Policy preferences are less strict than Group Policy settings, based on:
+
+| |Group Policy preferences |Group Policy settings |
+|-----|-------------------------|----------------------|
+|Enforcement |- Not enforced
- Has the user interface turned on
- Can only be refreshed or applied once
|- Enforced
- Has the user interface turned off
- Can be refreshed multiple times
|
+|Flexibility |Lets you create preference items for registry settings, files, and folders. |- Requires app support
- Needs you to create Administrative Templates for new policy settings
- Won't let you create policy settings to manage files and folders
|
+|Local Group Policy |Not available |Available
+|Awareness |Supports apps that aren't Group Policy-aware |Requires apps to be Group Policy-aware |
+|Storage |- Overwrites the original settings
- Removing the preference doesn't restore the original setting
|- Doesn't overwrite the original settings
- Stored in the Policy branches of the registry
- Removing the setting restores the original setting
|
+|Targeting and filtering |- Targeting is specific, with a user interface for each type of targeting item
- Supports targeting at the individual preference item level
|- Filtering is based on Windows Management Instrumentation (WMI), and requires writing WMI queries
- Supports filtering at the Group Policy Object (GPO) level
|
+
+
+For more information about Group Policy preferences, see the [Group Policy Settings Reference for Windows and Windows Server](https://go.microsoft.com/fwlink/p/?LinkId=279876).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-problems-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-problems-ie11.md
index 65ae07a3ce..008e2624c0 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-problems-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-problems-ie11.md
@@ -1,29 +1,30 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Links to troubleshooting topics and log files that can help address Group Policy problems with Internet Explorer 11.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 0da0d9a9-200c-46c4-96be-630e82de017b
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Group Policy problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Group Policy problems with Internet Explorer 11
-If you're having problems with Group Policy and Internet Explorer 11, or if you're looking for high-level information about the concepts and techniques used to troubleshoot Group Policy, as well as links to detailed reference topics, procedures, and troubleshooting scenario guides, see [Group Policy Analysis and Troubleshooting Overview](https://go.microsoft.com/fwlink/p/?LinkId=279872).
-
-## Group Policy Object-related Log Files
-You can use the Event Viewer to review Group Policy-related messages in the **Windows Logs**, **System** file. All of the Group Policy-related events are shown with a source of **GroupPolicy**. For more information about the Event Viewer, see [What information appears in event logs? (Event Viewer)](https://go.microsoft.com/fwlink/p/?LinkId=294917).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Links to troubleshooting topics and log files that can help address Group Policy problems with Internet Explorer 11.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 0da0d9a9-200c-46c4-96be-630e82de017b
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Group Policy problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Group Policy problems with Internet Explorer 11
+If you're having problems with Group Policy and Internet Explorer 11, or if you're looking for high-level information about the concepts and techniques used to troubleshoot Group Policy, as well as links to detailed reference topics, procedures, and troubleshooting scenario guides, see [Group Policy Analysis and Troubleshooting Overview](https://go.microsoft.com/fwlink/p/?LinkId=279872).
+
+## Group Policy Object-related Log Files
+You can use the Event Viewer to review Group Policy-related messages in the **Windows Logs**, **System** file. All of the Group Policy-related events are shown with a source of **GroupPolicy**. For more information about the Event Viewer, see [What information appears in event logs? (Event Viewer)](https://go.microsoft.com/fwlink/p/?LinkId=294917).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-shortcut-extensions-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-shortcut-extensions-ie11.md
index 7c53292112..1f0caf9bc3 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-shortcut-extensions-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-shortcut-extensions-ie11.md
@@ -1,49 +1,50 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Instructions about how to create and configure shortcut preference extensions to file system objects, URLs, and shell objects.
-author: lomayor
-ms.prod: ie11
-ms.assetid: c6fbf990-13e4-4be7-9f08-5bdd43179b3b
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Group Policy, Shortcut Extensions, and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Group Policy, Shortcut Extensions, and Internet Explorer 11
-Group Policy includes the Shortcuts preference extension, which lets you configure shortcuts to:
-
-- **File system objects.** Traditional shortcuts that link to apps, files, folders, drives, shares, or computers. For example, linking a shortcut to an app from the **Start** screen.
-
-- **URLs.** Shortcuts to webpages or FTP sites. For example, a link to your intranet site from your employee's **Favorites** folder.
-
-- **Shell objects.** Shortcuts to objects that appear in the shell namespace, such as printers, desktop items, Control Panel items, the Recycle Bin, and so on.
-
-## How do I configure shortcuts?
-You can create and configure shortcuts for any domain-based Group Policy Object (GPO) in the Group Policy Management Console (GPMC).
-
- **To create a new Shortcut preference item**
-
-1. Open GPMC, right-click the Group Policy object that needs the new shortcut extension, and click **Edit**.
-
-2. From **Computer Configuration** or **User Configuration**, go to **Preferences**, and then go to **Windows Settings**.
-
-3. Right-click **Shortcuts**, click **New**, and then choose **Shortcut**.
-
-4. Choose what the shortcut should do, including **Create**, **Delete**, **Replace**, or **Update**.
-
-5. Type the required shortcut settings and your comments into the **Description** box, and click **OK**.
-
-For more information about shortcut extensions, including step-by-step guidance, see [Shortcuts Extension](https://go.microsoft.com/fwlink/p/?LinkId=214525) and [Configure a Shortcut Item](https://go.microsoft.com/fwlink/p/?LinkId=301837).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Instructions about how to create and configure shortcut preference extensions to file system objects, URLs, and shell objects.
+author: dansimp
+ms.prod: ie11
+ms.assetid: c6fbf990-13e4-4be7-9f08-5bdd43179b3b
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Group Policy, Shortcut Extensions, and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Group Policy, Shortcut Extensions, and Internet Explorer 11
+Group Policy includes the Shortcuts preference extension, which lets you configure shortcuts to:
+
+- **File system objects.** Traditional shortcuts that link to apps, files, folders, drives, shares, or computers. For example, linking a shortcut to an app from the **Start** screen.
+
+- **URLs.** Shortcuts to webpages or FTP sites. For example, a link to your intranet site from your employee's **Favorites** folder.
+
+- **Shell objects.** Shortcuts to objects that appear in the shell namespace, such as printers, desktop items, Control Panel items, the Recycle Bin, and so on.
+
+## How do I configure shortcuts?
+You can create and configure shortcuts for any domain-based Group Policy Object (GPO) in the Group Policy Management Console (GPMC).
+
+ **To create a new Shortcut preference item**
+
+1. Open GPMC, right-click the Group Policy object that needs the new shortcut extension, and click **Edit**.
+
+2. From **Computer Configuration** or **User Configuration**, go to **Preferences**, and then go to **Windows Settings**.
+
+3. Right-click **Shortcuts**, click **New**, and then choose **Shortcut**.
+
+4. Choose what the shortcut should do, including **Create**, **Delete**, **Replace**, or **Update**.
+
+5. Type the required shortcut settings and your comments into the **Description** box, and click **OK**.
+
+For more information about shortcut extensions, including step-by-step guidance, see [Shortcuts Extension](https://go.microsoft.com/fwlink/p/?LinkId=214525) and [Configure a Shortcut Item](https://go.microsoft.com/fwlink/p/?LinkId=301837).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/group-policy-windows-powershell-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/group-policy-windows-powershell-ie11.md
index dcea0b00e6..2de349942d 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/group-policy-windows-powershell-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/group-policy-windows-powershell-ie11.md
@@ -1,38 +1,39 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Overview about how Group Policy works with Windows Powershell and Internet Explorer 11
-author: lomayor
-ms.prod: ie11
-ms.assetid: e3607cde-a498-4e04-9daa-b331412967fc
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Group Policy, Windows Powershell, and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Group Policy, Windows Powershell, and Internet Explorer 11
-Your domain-joined Group Policy Objects (GPOs) can use any of Group Policy-related “cmdlets” that run within Windows PowerShell.
-
-Each cmdlet is a single-function command-line tool that can:
-
-- Create, edit, remove, back up, and import GPOs.
-
-- Create, update, and remove Group Policy links.
-
-- Set inheritance flags and permissions on organizational units (OU) and domains.
-
-- Configure registry-based policy settings and registry settings for Group Policy preferences.
-
-For more info about PowerShell and Group Policy management, see [Use Windows PowerShell to Manage Group Policy](https://go.microsoft.com/fwlink/p/?LinkId=276828).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Overview about how Group Policy works with Windows Powershell and Internet Explorer 11
+author: dansimp
+ms.prod: ie11
+ms.assetid: e3607cde-a498-4e04-9daa-b331412967fc
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Group Policy, Windows Powershell, and Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Group Policy, Windows Powershell, and Internet Explorer 11
+Your domain-joined Group Policy Objects (GPOs) can use any of Group Policy-related “cmdlets” that run within Windows PowerShell.
+
+Each cmdlet is a single-function command-line tool that can:
+
+- Create, edit, remove, back up, and import GPOs.
+
+- Create, update, and remove Group Policy links.
+
+- Set inheritance flags and permissions on organizational units (OU) and domains.
+
+- Configure registry-based policy settings and registry settings for Group Policy preferences.
+
+For more info about PowerShell and Group Policy management, see [Use Windows PowerShell to Manage Group Policy](https://go.microsoft.com/fwlink/p/?LinkId=276828).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md b/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md
index 4e3fdb4baa..b4149169e2 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates.md
@@ -1,142 +1,143 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-ms.pagetype: security
-description:
-author: lomayor
-ms.author: lomayor
-ms.manager: elizapo
-ms.prod: ie11
-ms.assetid:
-ms.reviewer:
-audience: itpro
manager: dansimp
-title: Internet Explorer 11 delivery through automatic updates
-ms.sitesec: library
-ms.date: 05/22/2018
----
-
-# Internet Explorer 11 delivery through automatic updates
-Internet Explorer 11 makes browsing the web faster, easier, safer, and more reliable than ever. To help customers become more secure and up-to-date, Microsoft will distribute Internet Explorer 11 through Automatic Updates and the Windows Update and Microsoft Update sites. Internet Explorer 11 will be available for users of the 32-bit and 64-bit versions of Windows 7 Service Pack 1 (SP1), and 64-bit version of Windows Server 2008 R2 SP1. This article provides an overview of the delivery process and options available for IT administrators to control how and when Internet Explorer 11 is deployed to their organization through Automatic Updates.
-
-- [Automatic updates delivery process](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#automatic-updates-delivery-process)
-
-- [Internet Explorer 11 automatic upgrades](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#internet-explorer-11-automatic-upgrades)
-
-- [Options for blocking automatic delivery](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#options-for-blocking-automatic-delivery)
-
-- [Availability of Internet Explorer 11](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#availability-of-internet-explorer-11)
-
-- [Prevent automatic installation of Internet Explorer 11 with WSUS](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#prevent-automatic-installation-of-internet-explorer-11-with-wsus)
-
-## Automatic updates delivery process
-
-Internet Explorer 11 only downloads and installs if it’s available for delivery through Automatic Updates; and Automatic Updates only offer Internet Explorer 11
-to users with local administrator accounts. User’s without local administrator accounts won’t be prompted to install the update and will continue using their
-current version of Internet Explorer.
-
-Internet Explorer 11 replaces Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10. If you decide you don’t want Internet Explorer 11, and you’re running Windows 7 SP1 or Windows Server 2008 R2 with SP1, you can uninstall it from the **View installed updates** section of the **Uninstall an update** page of the Control Panel.
-
->[!Note]
->If a user installs Internet Explorer 11 and then removes it, it won’t be re-offered to that computer through Automatic Updates. Instead, the user will have to manually re-install the app.
-
-## Internet Explorer 11 automatic upgrades
-
-Internet Explorer 11 is offered through Automatic Updates and Windows Update as an Important update. Users running Windows 7 SP1, who have chosen to download and install updates automatically through Windows Update, are automatically upgraded to Internet Explorer 11.
-
-Users who were automatically upgraded to Internet Explorer 11 can decide to uninstall Internet Explorer 11. However, Internet Explorer 11 will still appear as an optional update through Windows Update.
-
-## Options for blocking automatic delivery
-
-If you use Automatic Updates in your company, but want to stop your users from automatically getting Internet Explorer 11, do one of the following:
-
-- **Download and use the Internet Explorer 11 Blocker Toolkit.** Includes a Group Policy template and a script that permanently blocks Internet Explorer 11 from being offered by Windows Update or Microsoft Update as a high-priority update. You can download this kit from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722).
-
- >[!Note]
- >The toolkit won't stop users with local administrator accounts from manually installing Internet Explorer 11. Using this toolkit also prevents your users from receiving automatic upgrades from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11. For more information, see the [Internet Explorer 11 Blocker Toolkit frequently asked questions](../ie11-faq/faq-ie11-blocker-toolkit.md).
-
-- **Use an update management solution to control update deployment.**
- If you already use an update management solution, like [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or the more advanced [System Center 2012 Configuration Manager](https://go.microsoft.com/fwlink/?LinkID=276664), you should use that instead of the Internet Explorer Blocker Toolkit.
-
- >[!Note]
- >If you use WSUS to manage updates, and Update Rollups are configured for automatic installation, Internet Explorer will automatically install throughout your company. This scenario is discussed in detail in the Knowledge Base article [here](https://support.microsoft.com/kb/946202).
-
-Additional information on Internet Explorer 11, including a Readiness Toolkit, technical overview, in-depth feature summary, and Internet Explorer 11 download is available on the [Internet Explorer 11 page of the Microsoft Edge IT Center](https://technet.microsoft.com/microsoft-edge/dn262703.aspx).
-
-## Availability of Internet Explorer 11
-
-Automatic Updates will start to distribute Internet Explorer 11 shortly after the final release of the product and will distribute it through the System Center Configuration Manager, Microsoft Systems Management Server, and WSUS.
-
-## Prevent automatic installation of Internet Explorer 11 with WSUS
-
-Internet Explorer 11 will be released to WSUS as an Update Rollup package. Therefore, if you’ve configured WSUS to “auto-approve” Update Rollup packages, it’ll be automatically approved and installed. To stop Internet Explorer 11 from being automatically approved for installation, you need to:
-
-1. Click **Start**, click **Administrative Tools**, and then click **Microsoft
- Windows Server Update Services 3.0**.
-
-2. Expand *ComputerName*, and then click **Options**.
-
-3. Click **Automatic Approvals**.
-
-4. Click the rule that automatically approves an update that is classified as
- Update Rollup, and then click **Edit.**
-
- >[!Note]
- >If you don’t see a rule like this, you most likely haven’t configured WSUS to automatically approve Update Rollups for installation. In this situation, you don’t have to do anything else.
-
-5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section.
-
- >[!Note]
- >The properties for this rule will resemble the following:- When an update is in Update Rollups
- Approve the update for all computers
-
-6. Clear the **Update Rollup** check box, and then click **OK**.
-
-7. Click **OK** to close the **Automatic Approvals** dialog box.After the new Internet Explorer 11 package is available for download, you should manually synchronize the new package to your WSUS server, so that when you re-enable auto-approval it won’t be automatically installed.
-
-8. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.
-
-9. Expand *ComputerName*, and then click **Synchronizations**.
-
-10. Click **Synchronize Now**.
-
-11. Expand *ComputerName*, expand **Updates**, and then click **All Updates**.
-
-12. Choose **Unapproved** in the **Approval**drop down box.
-
-13. Check to make sure that Microsoft Internet Explorer 11 is listed as an unapproved update.
-
- >[!Note]
- >There may be multiple updates, depending on the imported language and operating system updates.
-
-**Optional**
-
-If you need to reset your Update Rollups packages to auto-approve, do this:
-
-1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.
-
-2. Expand *ComputerName*, and then click **Options**.
-
-3. Click **Automatic Approvals**.
-
-4. Click the rule that automatically approves updates of different classifications, and then click **Edit**.
-
-5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section.
-
-6. Check the **Update Rollups** check box, and then click **OK**.
-
-7. Click **OK** to close the **Automatic Approvals** dialog box.
-
->[!Note]
->Because auto-approval rules are only evaluated when an update is first imported into WSUS, turning this rule back on after the Internet Explorer 11 update has been imported and synchronized to the server won’t cause this update to be auto-approved.
-
-
-## Additional resources
-
-- [Automatic delivery process](what-is-the-internet-explorer-11-blocker-toolkit.md#automatic-delivery-process)
-
-- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722)
-
-- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11)
-
-- [Internet Explorer 11 delivery through automatic updates](https://technet.microsoft.com/microsoft-edge/dn449235)
-
-- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index)
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+ms.pagetype: security
+description:
+author: dansimp
+ms.author: dansimp
+ms.manager: dansimp
+ms.prod: ie11
+ms.assetid:
+ms.reviewer:
+audience: itpro
+manager: dansimp
+title: Internet Explorer 11 delivery through automatic updates
+ms.sitesec: library
+ms.date: 05/22/2018
+---
+
+# Internet Explorer 11 delivery through automatic updates
+Internet Explorer 11 makes browsing the web faster, easier, safer, and more reliable than ever. To help customers become more secure and up-to-date, Microsoft will distribute Internet Explorer 11 through Automatic Updates and the Windows Update and Microsoft Update sites. Internet Explorer 11 will be available for users of the 32-bit and 64-bit versions of Windows 7 Service Pack 1 (SP1), and 64-bit version of Windows Server 2008 R2 SP1. This article provides an overview of the delivery process and options available for IT administrators to control how and when Internet Explorer 11 is deployed to their organization through Automatic Updates.
+
+- [Automatic updates delivery process](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#automatic-updates-delivery-process)
+
+- [Internet Explorer 11 automatic upgrades](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#internet-explorer-11-automatic-upgrades)
+
+- [Options for blocking automatic delivery](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#options-for-blocking-automatic-delivery)
+
+- [Availability of Internet Explorer 11](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#availability-of-internet-explorer-11)
+
+- [Prevent automatic installation of Internet Explorer 11 with WSUS](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/ie11-delivery-through-automatic-updates#prevent-automatic-installation-of-internet-explorer-11-with-wsus)
+
+## Automatic updates delivery process
+
+Internet Explorer 11 only downloads and installs if it’s available for delivery through Automatic Updates; and Automatic Updates only offer Internet Explorer 11
+to users with local administrator accounts. User’s without local administrator accounts won’t be prompted to install the update and will continue using their
+current version of Internet Explorer.
+
+Internet Explorer 11 replaces Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10. If you decide you don’t want Internet Explorer 11, and you’re running Windows 7 SP1 or Windows Server 2008 R2 with SP1, you can uninstall it from the **View installed updates** section of the **Uninstall an update** page of the Control Panel.
+
+>[!Note]
+>If a user installs Internet Explorer 11 and then removes it, it won’t be re-offered to that computer through Automatic Updates. Instead, the user will have to manually re-install the app.
+
+## Internet Explorer 11 automatic upgrades
+
+Internet Explorer 11 is offered through Automatic Updates and Windows Update as an Important update. Users running Windows 7 SP1, who have chosen to download and install updates automatically through Windows Update, are automatically upgraded to Internet Explorer 11.
+
+Users who were automatically upgraded to Internet Explorer 11 can decide to uninstall Internet Explorer 11. However, Internet Explorer 11 will still appear as an optional update through Windows Update.
+
+## Options for blocking automatic delivery
+
+If you use Automatic Updates in your company, but want to stop your users from automatically getting Internet Explorer 11, do one of the following:
+
+- **Download and use the Internet Explorer 11 Blocker Toolkit.** Includes a Group Policy template and a script that permanently blocks Internet Explorer 11 from being offered by Windows Update or Microsoft Update as a high-priority update. You can download this kit from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722).
+
+ >[!Note]
+ >The toolkit won't stop users with local administrator accounts from manually installing Internet Explorer 11. Using this toolkit also prevents your users from receiving automatic upgrades from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11. For more information, see the [Internet Explorer 11 Blocker Toolkit frequently asked questions](../ie11-faq/faq-ie11-blocker-toolkit.md).
+
+- **Use an update management solution to control update deployment.**
+ If you already use an update management solution, like [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or the more advanced [System Center 2012 Configuration Manager](https://go.microsoft.com/fwlink/?LinkID=276664), you should use that instead of the Internet Explorer Blocker Toolkit.
+
+ >[!Note]
+ >If you use WSUS to manage updates, and Update Rollups are configured for automatic installation, Internet Explorer will automatically install throughout your company. This scenario is discussed in detail in the Knowledge Base article [here](https://support.microsoft.com/kb/946202).
+
+Additional information on Internet Explorer 11, including a Readiness Toolkit, technical overview, in-depth feature summary, and Internet Explorer 11 download is available on the [Internet Explorer 11 page of the Microsoft Edge IT Center](https://technet.microsoft.com/microsoft-edge/dn262703.aspx).
+
+## Availability of Internet Explorer 11
+
+Automatic Updates will start to distribute Internet Explorer 11 shortly after the final release of the product and will distribute it through the System Center Configuration Manager, Microsoft Systems Management Server, and WSUS.
+
+## Prevent automatic installation of Internet Explorer 11 with WSUS
+
+Internet Explorer 11 will be released to WSUS as an Update Rollup package. Therefore, if you’ve configured WSUS to “auto-approve” Update Rollup packages, it’ll be automatically approved and installed. To stop Internet Explorer 11 from being automatically approved for installation, you need to:
+
+1. Click **Start**, click **Administrative Tools**, and then click **Microsoft
+ Windows Server Update Services 3.0**.
+
+2. Expand *ComputerName*, and then click **Options**.
+
+3. Click **Automatic Approvals**.
+
+4. Click the rule that automatically approves an update that is classified as
+ Update Rollup, and then click **Edit.**
+
+ >[!Note]
+ >If you don’t see a rule like this, you most likely haven’t configured WSUS to automatically approve Update Rollups for installation. In this situation, you don’t have to do anything else.
+
+5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section.
+
+ >[!Note]
+ >The properties for this rule will resemble the following:
- When an update is in Update Rollups
- Approve the update for all computers
+
+6. Clear the **Update Rollup** check box, and then click **OK**.
+
+7. Click **OK** to close the **Automatic Approvals** dialog box.After the new Internet Explorer 11 package is available for download, you should manually synchronize the new package to your WSUS server, so that when you re-enable auto-approval it won’t be automatically installed.
+
+8. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.
+
+9. Expand *ComputerName*, and then click **Synchronizations**.
+
+10. Click **Synchronize Now**.
+
+11. Expand *ComputerName*, expand **Updates**, and then click **All Updates**.
+
+12. Choose **Unapproved** in the **Approval**drop down box.
+
+13. Check to make sure that Microsoft Internet Explorer 11 is listed as an unapproved update.
+
+ >[!Note]
+ >There may be multiple updates, depending on the imported language and operating system updates.
+
+**Optional**
+
+If you need to reset your Update Rollups packages to auto-approve, do this:
+
+1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.
+
+2. Expand *ComputerName*, and then click **Options**.
+
+3. Click **Automatic Approvals**.
+
+4. Click the rule that automatically approves updates of different classifications, and then click **Edit**.
+
+5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section.
+
+6. Check the **Update Rollups** check box, and then click **OK**.
+
+7. Click **OK** to close the **Automatic Approvals** dialog box.
+
+>[!Note]
+>Because auto-approval rules are only evaluated when an update is first imported into WSUS, turning this rule back on after the Internet Explorer 11 update has been imported and synchronized to the server won’t cause this update to be auto-approved.
+
+
+## Additional resources
+
+- [Automatic delivery process](what-is-the-internet-explorer-11-blocker-toolkit.md#automatic-delivery-process)
+
+- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722)
+
+- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11)
+
+- [Internet Explorer 11 delivery through automatic updates](https://technet.microsoft.com/microsoft-edge/dn449235)
+
+- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index)
diff --git a/browsers/internet-explorer/ie11-deploy-guide/img-ie11-docmode-lg.md b/browsers/internet-explorer/ie11-deploy-guide/img-ie11-docmode-lg.md
index 48331957e3..5097f83564 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/img-ie11-docmode-lg.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/img-ie11-docmode-lg.md
@@ -1,16 +1,17 @@
----
-description: A full-sized view of how document modes are chosen in IE11.
-title: Full-sized flowchart detailing how document modes are chosen in IE11
-author: lomayor
-ms.date: 04/19/2017
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
----
-
-Return to: [Deprecated document modes and Internet Explorer 11](deprecated-document-modes.md)
-
-
-
-
-
+---
+description: A full-sized view of how document modes are chosen in IE11.
+title: Full-sized flowchart detailing how document modes are chosen in IE11
+author: dansimp
+ms.date: 04/19/2017
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+---
+
+Return to: [Deprecated document modes and Internet Explorer 11](deprecated-document-modes.md)
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md
index add9fe0016..5ab9dd5e58 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md
@@ -1,50 +1,51 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: If you need to replace your entire site list because of errors, or simply because it’s out of date, you can import your exported Enterprise Mode site list using the Enterprise Mode Site List Manager.
-author: lomayor
-ms.prod: ie11
-ms.assetid: cacd5d68-700b-4a96-b4c9-ca2c40c1ac5f
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Import your Enterprise Mode site list to the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Import your Enterprise Mode site list to the Enterprise Mode Site List Manager
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-If you need to replace your entire site list because of errors, or simply because it’s out of date, you can import your exported Enterprise Mode site list using the Enterprise Mode Site List Manager.
-
-**Important**
-Importing your file overwrites everything that’s currently in the tool, so make sure it’s what you really mean to do.
-
- **To import your compatibility list**
-
-1. On the **File** menu of the Enterprise Mode Site List Manager, click **Import**.
-
-2. Go to your exported .EMIE file (for example, `C:\users\\documents\sites.emie`), and then click **Open**.
-
-3. Review the alert message about all of your entries being overwritten. If you still want to import the file, click **Yes**.
-
-## Related topics
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: If you need to replace your entire site list because of errors, or simply because it’s out of date, you can import your exported Enterprise Mode site list using the Enterprise Mode Site List Manager.
+author: dansimp
+ms.prod: ie11
+ms.assetid: cacd5d68-700b-4a96-b4c9-ca2c40c1ac5f
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Import your Enterprise Mode site list to the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Import your Enterprise Mode site list to the Enterprise Mode Site List Manager
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+If you need to replace your entire site list because of errors, or simply because it’s out of date, you can import your exported Enterprise Mode site list using the Enterprise Mode Site List Manager.
+
+**Important**
+Importing your file overwrites everything that’s currently in the tool, so make sure it’s what you really mean to do.
+
+ **To import your compatibility list**
+
+1. On the **File** menu of the Enterprise Mode Site List Manager, click **Import**.
+
+2. Go to your exported .EMIE file (for example, `C:\users\\documents\sites.emie`), and then click **Open**.
+
+3. Review the alert message about all of your entries being overwritten. If you still want to import the file, click **Yes**.
+
+## Related topics
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/index.md b/browsers/internet-explorer/ie11-deploy-guide/index.md
index d2bc3fa2d1..74f09e116d 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/index.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/index.md
@@ -1,8 +1,8 @@
---
ms.mktglfcycl: deploy
description: Use this guide to learn about the several options and processes you'll need to consider while you're planning for, deploying, and customizing Internet Explorer 11 for your employee's devices.
-author: lomayor
-ms.author: lomayor
+author: dansimp
+ms.author: dansimp
ms.prod: ie11
ms.assetid: bddc2d97-c38d-45c5-9588-1f5bbff2e9c3
title: Internet Explorer 11 (IE11) - Deployment Guide for IT Pros (Internet Explorer 11 for IT Pros)
diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md
index f5e959c3c4..e9fcf44f0e 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/install-and-deploy-ie11.md
@@ -1,44 +1,45 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the topics in this section to learn how to customize your Internet Explorer installation package, how to choose the right method for installation, and how to deploy IE into your environment.
-author: lomayor
-ms.prod: ie11
-ms.assetid: caca18c1-d5c4-4404-84f8-d02bc562915f
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Install and Deploy Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Install and Deploy Internet Explorer 11 (IE11)
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1 Update
-- Windows 7 with Service Pack 1 (SP1)
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Use the topics in this section to learn how to customize your Internet Explorer installation package, how to choose the right method for installation, and how to deploy IE into your environment. You can also find more info about your virtualization options for legacy apps.
-
-## In this section
-
-|Topic |Description |
-|------|------------|
-|[Customize Internet Explorer 11 installation packages](customize-ie11-install-packages.md) |Guidance about how to use .INF files or the IE Administration Kit 11 (IEAK 11) to create custom packages and about how to create those packages for multiple operating systems. |
-|[Choose how to install Internet Explorer 11 (IE11)](choose-how-to-install-ie11.md) |Guidance for the different ways you can install IE, including using System Center 2012 R2 Configuration Manager, Windows Server Update Services (WSUS), Microsoft Intune, your network, the operating system deployment system, or third-party tools. |
-|[Choose how to deploy Internet Explorer 11 (IE11)](choose-how-to-deploy-ie11.md) |Guidance about how to deploy your custom version of IE using Automatic Version Synchronization (AVS) or using your software distribution tools. |
-|[Virtualization and compatibility with Internet Explorer 11](virtualization-and-compatibility-with-ie11.md) |Info about the Microsoft-supported options for virtualizing web apps. |
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the topics in this section to learn how to customize your Internet Explorer installation package, how to choose the right method for installation, and how to deploy IE into your environment.
+author: dansimp
+ms.prod: ie11
+ms.assetid: caca18c1-d5c4-4404-84f8-d02bc562915f
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Install and Deploy Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Install and Deploy Internet Explorer 11 (IE11)
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1 Update
+- Windows 7 with Service Pack 1 (SP1)
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Use the topics in this section to learn how to customize your Internet Explorer installation package, how to choose the right method for installation, and how to deploy IE into your environment. You can also find more info about your virtualization options for legacy apps.
+
+## In this section
+
+|Topic |Description |
+|------|------------|
+|[Customize Internet Explorer 11 installation packages](customize-ie11-install-packages.md) |Guidance about how to use .INF files or the IE Administration Kit 11 (IEAK 11) to create custom packages and about how to create those packages for multiple operating systems. |
+|[Choose how to install Internet Explorer 11 (IE11)](choose-how-to-install-ie11.md) |Guidance for the different ways you can install IE, including using System Center 2012 R2 Configuration Manager, Windows Server Update Services (WSUS), Microsoft Intune, your network, the operating system deployment system, or third-party tools. |
+|[Choose how to deploy Internet Explorer 11 (IE11)](choose-how-to-deploy-ie11.md) |Guidance about how to deploy your custom version of IE using Automatic Version Synchronization (AVS) or using your software distribution tools. |
+|[Virtualization and compatibility with Internet Explorer 11](virtualization-and-compatibility-with-ie11.md) |Info about the Microsoft-supported options for virtualizing web apps. |
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-microsoft-intune.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-microsoft-intune.md
index 25226f2ad0..7dd92ecc08 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-microsoft-intune.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-microsoft-intune.md
@@ -2,12 +2,12 @@
ms.localizationpriority: medium
ms.mktglfcycl: deploy
description: How to add and deploy the Internet Explorer 11 update using Microsoft Intune.
-author: lomayor
+author: dansimp
ms.prod: ie11
ms.assetid: b2dfc08c-78af-4c22-8867-7be3b92b1616
ms.reviewer:
manager: dansimp
-ms.author: lomayor
+ms.author: dansimp
title: Install Internet Explorer 11 (IE11) using Microsoft Intune (Internet Explorer 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems.md
index 5046293535..5dade69199 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems.md
@@ -1,59 +1,60 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to install the Internet Explorer 11 update using Microsoft Deployment Toolkit (MDT) and your Windows images.
-author: lomayor
-ms.prod: ie11
-ms.assetid: e16f9144-170c-4964-a62d-0d1a16f4cd1f
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images
-
-You can install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images.
-
-You'll need to extract the .cab file for each supported operating system and platform combination and the .msu file for each prerequisite update. Download the IE11 update and prerequisites here:
-
-- [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=279697)
-
-- [Microsoft Update Catalog](https://go.microsoft.com/fwlink/p/?LinkId=214287)
-
-After you install the .msu file updates, you'll need to add them to your MDT deployment. You'll also need to extract the IE11 .cab update file from the IE11 installation package, using the `/x` command-line option. For example, `IE11-Windows6.1-x64-en-us.exe /x:c:\ie11cab`.
-
-## Installing IE11 using Microsoft Deployment Toolkit (MDT)
-
-MDT adds IE11 to your Windows images, regardless whether you are creating or deploying a customized or non-customized image. MDT also lets you perform offline servicing during the System Center 2012 R2 Configuration Manager task sequence, letting you add IE11 before starting Windows. For info, see [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?linkid=331148).
-
- **To add IE11 to a MDT deployment share**
-
-1. Right-click **Packages** from each **Deployment Shares** location, and then click **Import OS Packages**.
-
-2. Go to the **Specify Directory** page, search for your folder with your update files (.cab and .msu) for import, and click **Next**.
-
-3. Go to the **Summary** page and click **Next**.
-MDT starts importing your update files.
**Note**
Ignore any warnings that say, "Skipping invalid CAB file". This shows up because the **Import OS Packages** wizard skips the IE11\_Support.cab file, which isn't an actual update file.
-
-4. After the import finishes, click **Finish**.
-
-### Offline servicing with MDT
-
-You can add the IE11 update while you're performing offline servicing, or slipstreaming, of your Windows images. This method lets you deploy IE11 without needing any additional installation after you've deployed Windows.
-
-These articles have step-by-step details about adding packages to your Windows images:
-
-- For Windows 8.1, see [Add or Remove Packages Offline Using DISM](https://go.microsoft.com/fwlink/p/?LinkId=276791).
-
-- For Windows 7 SP1, see [Add or Remove Packages Offline](https://go.microsoft.com/fwlink/p/?LinkId=214490).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to install the Internet Explorer 11 update using Microsoft Deployment Toolkit (MDT) and your Windows images.
+author: dansimp
+ms.prod: ie11
+ms.assetid: e16f9144-170c-4964-a62d-0d1a16f4cd1f
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images
+
+You can install Internet Explorer 11 (IE11) using Microsoft Deployment Toolkit (MDT) and your Windows images.
+
+You'll need to extract the .cab file for each supported operating system and platform combination and the .msu file for each prerequisite update. Download the IE11 update and prerequisites here:
+
+- [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=279697)
+
+- [Microsoft Update Catalog](https://go.microsoft.com/fwlink/p/?LinkId=214287)
+
+After you install the .msu file updates, you'll need to add them to your MDT deployment. You'll also need to extract the IE11 .cab update file from the IE11 installation package, using the `/x` command-line option. For example, `IE11-Windows6.1-x64-en-us.exe /x:c:\ie11cab`.
+
+## Installing IE11 using Microsoft Deployment Toolkit (MDT)
+
+MDT adds IE11 to your Windows images, regardless whether you are creating or deploying a customized or non-customized image. MDT also lets you perform offline servicing during the System Center 2012 R2 Configuration Manager task sequence, letting you add IE11 before starting Windows. For info, see [Microsoft Deployment Toolkit (MDT)](https://go.microsoft.com/fwlink/p/?linkid=331148).
+
+ **To add IE11 to a MDT deployment share**
+
+1. Right-click **Packages** from each **Deployment Shares** location, and then click **Import OS Packages**.
+
+2. Go to the **Specify Directory** page, search for your folder with your update files (.cab and .msu) for import, and click **Next**.
+
+3. Go to the **Summary** page and click **Next**.
+MDT starts importing your update files.
**Note**
Ignore any warnings that say, "Skipping invalid CAB file". This shows up because the **Import OS Packages** wizard skips the IE11\_Support.cab file, which isn't an actual update file.
+
+4. After the import finishes, click **Finish**.
+
+### Offline servicing with MDT
+
+You can add the IE11 update while you're performing offline servicing, or slipstreaming, of your Windows images. This method lets you deploy IE11 without needing any additional installation after you've deployed Windows.
+
+These articles have step-by-step details about adding packages to your Windows images:
+
+- For Windows 8.1, see [Add or Remove Packages Offline Using DISM](https://go.microsoft.com/fwlink/p/?LinkId=276791).
+
+- For Windows 7 SP1, see [Add or Remove Packages Offline](https://go.microsoft.com/fwlink/p/?LinkId=214490).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-system-center-configuration-manager.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-system-center-configuration-manager.md
index 4d91b89af4..2b40174159 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-system-center-configuration-manager.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-system-center-configuration-manager.md
@@ -1,38 +1,39 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: How to install the Internet Explorer 11 update using System Center 2012 R2 Configuration Manager
-author: lomayor
-ms.prod: ie11
-ms.assetid: 9ede9722-29b3-4cb7-956d-ffa91e7bedbd
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Install Internet Explorer 11 (IE11) using System Center 2012 R2 Configuration Manager (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Install Internet Explorer 11 (IE11) using System Center 2012 R2 Configuration Manager
-You can install Internet Explorer 11 (IE11) by using [System Center R2 2012 Configuration Manager](https://go.microsoft.com/fwlink/p/?linkid=276664). Complete these steps for each operating system and platform combination.
-
- **To install IE11**
-
-1. Download and approve the [System requirements and language support for Internet Explorer 11 (IE11)](system-requirements-and-language-support-for-ie11.md).
-
-2. Create a software distribution package that includes the IE11 installation package.
-
-3. Create a program that includes the command-line needed to run the IE11 installation package. To run the package silently, without restarting and without checking the Internet for updates, use:`ie11_package.exe /quiet /norestart /update-no`.
-
-4. Move the installation package to your distribution points, and then advertise the package.
-
-You can also use System Center Essentials 2010 to deploy IE11 installation packages. For info, see [System Center Essentials 2010](https://go.microsoft.com/fwlink/p/?linkid=395200) and the [System Center Essentials 2010 Operations Guide](https://go.microsoft.com/fwlink/p/?LinkId=214266).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: How to install the Internet Explorer 11 update using System Center 2012 R2 Configuration Manager
+author: dansimp
+ms.prod: ie11
+ms.assetid: 9ede9722-29b3-4cb7-956d-ffa91e7bedbd
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Install Internet Explorer 11 (IE11) using System Center 2012 R2 Configuration Manager (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Install Internet Explorer 11 (IE11) using System Center 2012 R2 Configuration Manager
+You can install Internet Explorer 11 (IE11) by using [System Center R2 2012 Configuration Manager](https://go.microsoft.com/fwlink/p/?linkid=276664). Complete these steps for each operating system and platform combination.
+
+ **To install IE11**
+
+1. Download and approve the [System requirements and language support for Internet Explorer 11 (IE11)](system-requirements-and-language-support-for-ie11.md).
+
+2. Create a software distribution package that includes the IE11 installation package.
+
+3. Create a program that includes the command-line needed to run the IE11 installation package. To run the package silently, without restarting and without checking the Internet for updates, use:`ie11_package.exe /quiet /norestart /update-no`.
+
+4. Move the installation package to your distribution points, and then advertise the package.
+
+You can also use System Center Essentials 2010 to deploy IE11 installation packages. For info, see [System Center Essentials 2010](https://go.microsoft.com/fwlink/p/?linkid=395200) and the [System Center Essentials 2010 Operations Guide](https://go.microsoft.com/fwlink/p/?LinkId=214266).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md
index 2dfe51cdf9..9da3cd91fa 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-the-network.md
@@ -1,42 +1,43 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to install the Internet Explorer 11 update using your network
-author: lomayor
-ms.prod: ie11
-ms.assetid: 85f6429d-947a-4031-8f93-e26110a35828
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Install Internet Explorer 11 (IE11) using your network (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Install Internet Explorer 11 (IE11) using your network
-You can install Internet Explorer 11 (IE11) over your network by putting your custom IE11 installation package in a shared network folder and letting your employees run the Setup program on their own computers. You can create the network folder structure manually, or you can run Internet Explorer Administration Kit 11 (IEAK 11).
-
-**Note**
If you support multiple architectures and operating systems, create a subfolder for each combination. If you support multiple languages, create a subfolder for each localized installation file.
-
- **To manually create the folder structure**
-
-- Copy your custom IE11 installation file into a folder on your network, making sure it's available to your employees.
-
- **To create the folder structure using IEAK 11**
-
-- Run the Internet Explorer Customization Wizard 11 in IEAK 11, using the **Full Installation Package** option.
- The wizard automatically puts your custom installation files in your `\\Flat` folder. Where the `` is the location of your other build files.
-
-**Note**
Use the localized versions of the IE Customization Wizard 11 to create localized IE11 installation packages.
-
-## Related topics
-- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md)
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to install the Internet Explorer 11 update using your network
+author: dansimp
+ms.prod: ie11
+ms.assetid: 85f6429d-947a-4031-8f93-e26110a35828
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Install Internet Explorer 11 (IE11) using your network (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Install Internet Explorer 11 (IE11) using your network
+You can install Internet Explorer 11 (IE11) over your network by putting your custom IE11 installation package in a shared network folder and letting your employees run the Setup program on their own computers. You can create the network folder structure manually, or you can run Internet Explorer Administration Kit 11 (IEAK 11).
+
+**Note**
If you support multiple architectures and operating systems, create a subfolder for each combination. If you support multiple languages, create a subfolder for each localized installation file.
+
+ **To manually create the folder structure**
+
+- Copy your custom IE11 installation file into a folder on your network, making sure it's available to your employees.
+
+ **To create the folder structure using IEAK 11**
+
+- Run the Internet Explorer Customization Wizard 11 in IEAK 11, using the **Full Installation Package** option.
+ The wizard automatically puts your custom installation files in your `\\Flat` folder. Where the `` is the location of your other build files.
+
+**Note**
Use the localized versions of the IE Customization Wizard 11 to create localized IE11 installation packages.
+
+## Related topics
+- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md)
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-third-party-tools.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-third-party-tools.md
index 063f5c2aa2..5d230773e3 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-third-party-tools.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-third-party-tools.md
@@ -1,50 +1,51 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to install the Internet Explorer 11 update using third-party tools and command-line options.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 30190c66-49f7-4ca4-8b57-a47656aa0c7e
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Install Internet Explorer 11 (IE11) using third-party tools (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Install Internet Explorer 11 (IE11) using third-party tools
-You can install Internet Explorer 11 (IE11) using third-party electronic software distribution (ESD) systems and these command-line options:
-
-## Setup Modes
-
-|Command-line options |Description |
-|---------------------|------------------------------------------------------|
-|`/passive` |Installs without customer involvement. |
-|`/quiet` |Installs without customer involvement and without showing the UI. |
-
-## Setup Options
-
-|Command-line options |Description |
-|---------------------|------------------------------------------------------|
-|`/update-no` |Installs without checking for updates.**Important**
If you don't use this option, you'll need an Internet connection to finish your installation. |
-|`/no-default` |Installs without making IE11 the default web browser. |
-|`/closeprograms` |Automatically closes running programs. |
-
-
-## Restart Options
-
-|Command-line options |Description |
-|---------------------|------------------------------------------------------|
-|`/norestart` |Installs without restarting the computer. |
-|`/forcerestart` |Installs and restarts after installation. |
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to install the Internet Explorer 11 update using third-party tools and command-line options.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 30190c66-49f7-4ca4-8b57-a47656aa0c7e
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Install Internet Explorer 11 (IE11) using third-party tools (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Install Internet Explorer 11 (IE11) using third-party tools
+You can install Internet Explorer 11 (IE11) using third-party electronic software distribution (ESD) systems and these command-line options:
+
+## Setup Modes
+
+|Command-line options |Description |
+|---------------------|------------------------------------------------------|
+|`/passive` |Installs without customer involvement. |
+|`/quiet` |Installs without customer involvement and without showing the UI. |
+
+## Setup Options
+
+|Command-line options |Description |
+|---------------------|------------------------------------------------------|
+|`/update-no` |Installs without checking for updates.
**Important**
If you don't use this option, you'll need an Internet connection to finish your installation. |
+|`/no-default` |Installs without making IE11 the default web browser. |
+|`/closeprograms` |Automatically closes running programs. |
+
+
+## Restart Options
+
+|Command-line options |Description |
+|---------------------|------------------------------------------------------|
+|`/norestart` |Installs without restarting the computer. |
+|`/forcerestart` |Installs and restarts after installation. |
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md
index aba6187431..62bfab42b9 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md
@@ -1,52 +1,53 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to install the Internet Explorer 11 update using Windows Server Update Services (WSUS)'
-author: lomayor
-ms.prod: ie11
-ms.assetid: 6cbd6797-c670-4236-8423-e0919478f2ce
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Install Internet Explorer 11 (IE11) using Windows Server Update Services (WSUS) (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Install Internet Explorer 11 (IE11) using Windows Server Update Services (WSUS)
-Windows Server Update Services (WSUS) lets you download a single copy of the Microsoft product update and cache it on your local WSUS servers. You can then configure your computers to get the update from your local servers instead of Windows Update. For more information about WSUS, see [Windows Server Update Services](https://go.microsoft.com/fwlink/p/?LinkID=276790).
-
- **To import from Windows Update to WSUS**
-
-1. Open your WSUS admin site. For example, `https:///WSUSAdmin/`.
- Where `` is the name of your WSUS server.
-
-2. Choose the top server node or the **Updates** node, and then click **Import Updates**.
-
-3. To get the updates, install the Microsoft Update Catalog ActiveX control.
-
-4. Search for Internet Explorer 11 and add its contents to your basket.
-
-5. After you're done browsing, go to your basket and click **Import**.
-
- You can also download the updates without importing them by unchecking the **Import directly into Windows Server Update Services** box.
-
- **To approve Internet Explorer in WSUS for installation**
-
-6. Open your WSUS admin site and check the **Review synchronization settings** box from the **To Do** list.
-
-7. Click **Synchronize now** to sync your WSUS server with Windows Update, and then click **Updates** from the navigation bar.
-
-8. Enter **Internet Explorer 11** into the **Search Contains** box, and then click **Apply**.
-
-9. Choose the right version of IE11 for your operating system, and click **Approve for installation**.
-
-10. Click each computer group you want to set up for the WSUS server, picking the right approval level, and then click **OK**.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to install the Internet Explorer 11 update using Windows Server Update Services (WSUS)'
+author: dansimp
+ms.prod: ie11
+ms.assetid: 6cbd6797-c670-4236-8423-e0919478f2ce
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Install Internet Explorer 11 (IE11) using Windows Server Update Services (WSUS) (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Install Internet Explorer 11 (IE11) using Windows Server Update Services (WSUS)
+Windows Server Update Services (WSUS) lets you download a single copy of the Microsoft product update and cache it on your local WSUS servers. You can then configure your computers to get the update from your local servers instead of Windows Update. For more information about WSUS, see [Windows Server Update Services](https://go.microsoft.com/fwlink/p/?LinkID=276790).
+
+ **To import from Windows Update to WSUS**
+
+1. Open your WSUS admin site. For example, `https:///WSUSAdmin/`.
+ Where `` is the name of your WSUS server.
+
+2. Choose the top server node or the **Updates** node, and then click **Import Updates**.
+
+3. To get the updates, install the Microsoft Update Catalog ActiveX control.
+
+4. Search for Internet Explorer 11 and add its contents to your basket.
+
+5. After you're done browsing, go to your basket and click **Import**.
+
+ You can also download the updates without importing them by unchecking the **Import directly into Windows Server Update Services** box.
+
+ **To approve Internet Explorer in WSUS for installation**
+
+6. Open your WSUS admin site and check the **Review synchronization settings** box from the **To Do** list.
+
+7. Click **Synchronize now** to sync your WSUS server with Windows Update, and then click **Updates** from the navigation bar.
+
+8. Enter **Internet Explorer 11** into the **Search Contains** box, and then click **Apply**.
+
+9. Choose the right version of IE11 for your operating system, and click **Approve for installation**.
+
+10. Click each computer group you want to set up for the WSUS server, picking the right approval level, and then click **OK**.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/install-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/install-problems-with-ie11.md
index 29b3b5ca55..3ebe727aeb 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/install-problems-with-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/install-problems-with-ie11.md
@@ -1,61 +1,62 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to fix potential installation problems with Internet Explorer 11
-author: lomayor
-ms.prod: ie11
-ms.assetid: 3ae77745-86ac-40a9-a37d-eebbf37661a3
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Install problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Install problems with Internet Explorer 11
-Most Internet Explorer 11 installations are straightforward and work the way they should. But it's possible that you might have problems.
-
-If you do, you can:
-
-- Check that you meet the minimum operating system requirements and have the prerequisites installed.
-
-- Check that there are no other updates or restarts waiting.
-
-- Temporarily turn off your antispyware and antivirus software.
-
-- Try another IE11 installer. For example from [Windows Update](https://go.microsoft.com/fwlink/p/?LinkId=302315) or from the [Download Internet Explorer 11](https://go.microsoft.com/fwlink/p/?linkid=327753) website.
-
-- Review the `IE11_main.log` file in the `\Windows` folder. This log file has information about each installation and is appended for each subsequent installation.
-
-- Make sure you use the same download server URLs that you entered during the Setup process.
-
-## Internet Explorer didn't finish installing
-If Internet Explorer doesn't finish installing, it might mean that Windows Update wasn't able to install an associated update, that you have a previous, unsupported version of IE installed, or that there's a problem with your copy of IE. We recommend you try this:
-
- **To fix this issue**
-
-1. Uninstall IE:
-
- 1. In the Control Panel, open the **Programs and Features** box, scroll down to IE11, and then click **Uninstall**.
-
- 2. After the uninstall finishes, restart your computer.
-
-2. Run [Windows Update](https://go.microsoft.com/fwlink/p/?LinkId=302315), clicking **Check for updates**.
-
-3. Check the list for IE11. If it's included in the list of updates for download, exclude it before you update your computer.
-If you get an error during the Windows Update process, see [Fix the problem with Microsoft Windows Update that is not working](https://go.microsoft.com/fwlink/p/?LinkId=302316).
-
-4. Restart your computer, making sure all of your the updates are finished.
-
-5. Try to reinstall IE11 from either Windows Update (if you saw it in Step 3) or from the [Download Internet Explorer 11](https://go.microsoft.com/fwlink/p/?linkid=327753) website.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to fix potential installation problems with Internet Explorer 11
+author: dansimp
+ms.prod: ie11
+ms.assetid: 3ae77745-86ac-40a9-a37d-eebbf37661a3
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Install problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Install problems with Internet Explorer 11
+Most Internet Explorer 11 installations are straightforward and work the way they should. But it's possible that you might have problems.
+
+If you do, you can:
+
+- Check that you meet the minimum operating system requirements and have the prerequisites installed.
+
+- Check that there are no other updates or restarts waiting.
+
+- Temporarily turn off your antispyware and antivirus software.
+
+- Try another IE11 installer. For example from [Windows Update](https://go.microsoft.com/fwlink/p/?LinkId=302315) or from the [Download Internet Explorer 11](https://go.microsoft.com/fwlink/p/?linkid=327753) website.
+
+- Review the `IE11_main.log` file in the `\Windows` folder. This log file has information about each installation and is appended for each subsequent installation.
+
+- Make sure you use the same download server URLs that you entered during the Setup process.
+
+## Internet Explorer didn't finish installing
+If Internet Explorer doesn't finish installing, it might mean that Windows Update wasn't able to install an associated update, that you have a previous, unsupported version of IE installed, or that there's a problem with your copy of IE. We recommend you try this:
+
+ **To fix this issue**
+
+1. Uninstall IE:
+
+ 1. In the Control Panel, open the **Programs and Features** box, scroll down to IE11, and then click **Uninstall**.
+
+ 2. After the uninstall finishes, restart your computer.
+
+2. Run [Windows Update](https://go.microsoft.com/fwlink/p/?LinkId=302315), clicking **Check for updates**.
+
+3. Check the list for IE11. If it's included in the list of updates for download, exclude it before you update your computer.
+If you get an error during the Windows Update process, see [Fix the problem with Microsoft Windows Update that is not working](https://go.microsoft.com/fwlink/p/?LinkId=302316).
+
+4. Restart your computer, making sure all of your the updates are finished.
+
+5. Try to reinstall IE11 from either Windows Update (if you saw it in Step 3) or from the [Download Internet Explorer 11](https://go.microsoft.com/fwlink/p/?linkid=327753) website.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md
index cf102f1c8f..16331ab49c 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/intranet-problems-and-ie11.md
@@ -1,42 +1,43 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to fix intranet search problems with Internet Explorer 11
-author: lomayor
-ms.prod: ie11
-ms.assetid: 3ee71d93-d9d2-48e1-899e-07932c73faa6
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Fix intranet search problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Fix intranet search problems with Internet Explorer 11
-After upgrading to Internet Explorer 11, you might experience search issues while using your intranet site.
-
-## Why is my intranet redirecting me to search results?
-IE11 works differently with search, based on whether your organization is domain-joined.
-
-- **Domain-joined computers.** A single word entry is treated as a search term. However, IE11 also checks for available intranet sites and offers matches through the **Notification bar**. If you select **Yes** from the **Notification bar** to navigate to the intranet site, IE11 associates that word with the site so that the next time you type in the intranet site name, inline auto-complete will resolve to the intranet site address.
-
-- **Non-domain-joined computers.** A single word entry is treated as an intranet site. However, if the term doesn't resolve to a site, IE11 then treats the entry as a search term and opens your default search provider.
-
-To explicitly go to an intranet site, regardless of the environment, users can type either a trailing slash like `contoso/` or the `https://` prefix. Either of these will cause IE11 to treat the entry as an intranet search. You can also change the default behavior so that IE11 treats your single word entry in the address bar as an intranet site, regardless of your environment.
-
- **To enable single-word intranet search**
-
-1. Open Internet Explorer for the desktop, click the **Tools** menu, and then click **Internet Options**.
-
-2. Click **Advanced**, check the **Go to an intranet site for a single word entry in the Address bar** box, and then click **OK**.
-
-If you'd like your entire organization to have single word entries default to an intranet site, you can turn on the **Go to an intranet site for a single word entry in the Address bar** Group Policy. With this policy turned on, a search for `contoso` automatically resolves to `https://contoso`.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to fix intranet search problems with Internet Explorer 11
+author: dansimp
+ms.prod: ie11
+ms.assetid: 3ee71d93-d9d2-48e1-899e-07932c73faa6
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Fix intranet search problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Fix intranet search problems with Internet Explorer 11
+After upgrading to Internet Explorer 11, you might experience search issues while using your intranet site.
+
+## Why is my intranet redirecting me to search results?
+IE11 works differently with search, based on whether your organization is domain-joined.
+
+- **Domain-joined computers.** A single word entry is treated as a search term. However, IE11 also checks for available intranet sites and offers matches through the **Notification bar**. If you select **Yes** from the **Notification bar** to navigate to the intranet site, IE11 associates that word with the site so that the next time you type in the intranet site name, inline auto-complete will resolve to the intranet site address.
+
+- **Non-domain-joined computers.** A single word entry is treated as an intranet site. However, if the term doesn't resolve to a site, IE11 then treats the entry as a search term and opens your default search provider.
+
+To explicitly go to an intranet site, regardless of the environment, users can type either a trailing slash like `contoso/` or the `https://` prefix. Either of these will cause IE11 to treat the entry as an intranet search. You can also change the default behavior so that IE11 treats your single word entry in the address bar as an intranet site, regardless of your environment.
+
+ **To enable single-word intranet search**
+
+1. Open Internet Explorer for the desktop, click the **Tools** menu, and then click **Internet Options**.
+
+2. Click **Advanced**, check the **Go to an intranet site for a single word entry in the Address bar** box, and then click **OK**.
+
+If you'd like your entire organization to have single word entries default to an intranet site, you can turn on the **Go to an intranet site for a single word entry in the Address bar** Group Policy. With this policy turned on, a search for `contoso` automatically resolves to `https://contoso`.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md b/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md
index a464bbc679..2270749c81 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/manage-ie11-overview.md
@@ -1,42 +1,43 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the topics in this section to learn about how to auto detect your settings, auto configure your configuration settings, and auto configure your proxy configuration settings for Internet Explorer.
-author: lomayor
-ms.prod: ie11
-ms.assetid: eb3cce62-fc7b-41e3-97b6-2916b85bcf55
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Manage Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Manage Internet Explorer 11
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Use the topics in this section to learn about how to auto detect your settings, auto configure your configuration settings, and auto configure your proxy configuration settings for Internet Explorer.
-
-## In this section
-
-|Topic |Description |
-|------|------------|
-|[Auto detect settings Internet Explorer 11](auto-detect-settings-for-ie11.md) |Guidance about how to update your automatic detection of DHCP and DNS servers. |
-|[Auto configuration settings for Internet Explorer 11](auto-configuration-settings-for-ie11.md) |Guidance about how to add, update and lock your auto configuration settings. |
-|[Auto proxy configuration settings for Internet Explorer 11](auto-proxy-configuration-settings-for-ie11.md) |Guidance about how to add, update, and lock your auto-proxy settings. |
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the topics in this section to learn about how to auto detect your settings, auto configure your configuration settings, and auto configure your proxy configuration settings for Internet Explorer.
+author: dansimp
+ms.prod: ie11
+ms.assetid: eb3cce62-fc7b-41e3-97b6-2916b85bcf55
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Manage Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Manage Internet Explorer 11
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Use the topics in this section to learn about how to auto detect your settings, auto configure your configuration settings, and auto configure your proxy configuration settings for Internet Explorer.
+
+## In this section
+
+|Topic |Description |
+|------|------------|
+|[Auto detect settings Internet Explorer 11](auto-detect-settings-for-ie11.md) |Guidance about how to update your automatic detection of DHCP and DNS servers. |
+|[Auto configuration settings for Internet Explorer 11](auto-configuration-settings-for-ie11.md) |Guidance about how to add, update and lock your auto configuration settings. |
+|[Auto proxy configuration settings for Internet Explorer 11](auto-proxy-configuration-settings-for-ie11.md) |Guidance about how to add, update, and lock your auto-proxy settings. |
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md
index 6c19898cf3..c0087953b7 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md
@@ -1,98 +1,99 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-description: IEM-configured settings have been deprecated for Internet Explorer 10 and newer. Use this topic to learn where to go to fix the affected settings through Group Policy Preferences, Administrative Templates (.admx), or the IEAK.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 89084e01-4e3f-46a6-b90e-48ee58d6821c
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Missing Internet Explorer Maintenance settings for Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Missing Internet Explorer Maintenance settings for Internet Explorer 11
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-The Internet Explorer Maintenance (IEM) settings have been deprecated in favor of Group Policy Preferences, Administrative Templates (.admx), and the IE Administration Kit 11 (IEAK 11).
-
-Because of this change, your IEM-configured settings will no longer work on computers running Internet Explorer 10 or newer. To fix this, you need to update the affected settings using Group Policy Preferences, Administrative Templates (.admx), or IE Administration Kit 11 (IEAK 11).
-
-Because Group Policy Preferences and IEAK 11 run using asynchronous processes, you should choose to use only one of the tools within each group of settings. For example, using only IEAK 11 in the **Security** settings or Group Policy Preferences within the **Internet Zone** settings. Also, it's important to remember that policy is enforced and can't be changed by the user, while preferences are configured, but can be changed by the user.
-
-For more information about all of the new options and Group Policy, see:
-
-- [Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md)
-
-- [Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md)
-
-- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md)
-
-- [Group Policy Settings Reference for Windows and Windows Server](https://go.microsoft.com/fwlink/p/?LinkId=279876)
-
-- [Group Policy ADMX Syntax Reference Guide](https://go.microsoft.com/fwlink/p/?LinkId=276830)
-
-- [Enable and Disable Settings in a Preference Item](https://go.microsoft.com/fwlink/p/?LinkId=282671)
-
-## IEM replacements
-The IEM settings have replacements you can use in either Group Policy Preferences or IEAK 11.
-
-### Browser user interface replacements
-
-|IEM setting |Description |Replacement tool |
-|------------|------------|-----------------|
-|Browser title |Lets you customize the text that shows up in the title bar of the browser.|On the **Browser User Interface** page of IEAK 11, click **Customize Title Bars**, and then type the text that appears on the title bar of the **Title Bar Text** box.
Your text is appended to the text," Microsoft Internet Explorer provided by". |
-|Browser toolbar customizations (background and buttons) |Lets you customize the buttons on the browser toolbar.
- **Buttons.** Customizes the buttons on the Internet Explorer 11 toolbar.
- **Background.** No longer available.
|On the **Browser User Interface** page of IEAK 11, click **Add**, type your new toolbar caption, action, and icon, and if the button should appear by default, and then click **OK**. You can also edit, remove, or delete an existing toolbar button from this page. |
-|Custom logo and animated bitmaps |Lets you replace the static and animated logos in the upper-right corner of the IE window with customized logos. |This setting isn't available anymore. |
-
-
-### Connection replacements
-
-|IEM setting |Description |Replacement tool |
-|------------|------------|-----------------|
-|Connection settings|Lets you import your connection settings from a previously set up computer. These settings define how your employees interact with the connection settings on the **System Polices and Restrictions** page. You can also remove old dial-up connections settings from your employee's computers.|In the **Internet Settings Group Policy Preferences** dialog box, click the **Connections** tab, and set up your proxy settings.-OR-
On the **Connection Settings** page of IEAK 11, change your connection settings, including importing your current connection settings and deleting existing dial-up connection settings (as needed). |
-|Automatic browser configuration |Lets you update your employee's computer after you've deployed IE11, by specifying a URL to an .ins file, an auto-proxy URL, or both. You can decide when the update occurs, in minutes. Typing zero, or not putting in any number, means that automatic configuration only happens after the browser is started and used to go to a page. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Automatic Configuration** tab, and then add your URL.
On the **Automatic Configuration** page of IEAK 11, modify the configuration settings, including providing the URL to an .ins file or an auto-proxy site. |
-|Proxy settings |Lets you specify your proxy servers. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Connections** tab, click **LAN Settings**, and then choose whether to turn on automatic detection of your configuration settings and if you want to use proxy servers.
-OR-
On the **Proxy Settings** page of IEAK 11, turn on your proxy settings, adding your proxy server addresses and exceptions. |
-|User Agent string |Lets the browser provide identification to visited servers. This string is often used to keep Internet traffic statistics. |This setting isn't available anymore. |
-
-### URLs replacements
-
-|IEM setting |Description |Replacement tool |
-|------------|------------|-----------------|
-|Favorites and links |Lets you use custom URLs for the **Favorites** and **Links** folders. You can also specify the folder order, disable IE Suggested Sites, and import an existing folder structure. |On the **Favorites, Favorites Bar and Feeds** page of IEAK 11, add your custom URLs to the **Favorites**, **Favorites Bar**, or **RSS Feeds** folders, or create new folders.
You can also edit, test, or remove your URLs, sort the list order, or disable IE Suggested Sites. |
-|Important URLs |Lets you add custom **Home** pages that can open different tabs. You can also add a **Support** page that shows up when an employee clicks online Help.|In the **Internet Settings Group Policy Preferences** dialog box, click the **General** tab, and add your custom **Home** page.
On the **Important URLs - Home page and Support** page of IEAK 11, add the custom URLs to your **Home** and **Support** pages.
You can also click to retain the previous home page information when the user upgrades to a newer version of IE. |
-
-### Security Zones and Content Ratings
-
-|IEM setting |Description |Replacement tool |
-|------------|------------|-----------------|
-|Security zones |Lets you change your security settings, by zone |In the **Internet Settings Group Policy Preferences** dialog box, click the **Security** tab, and update your security settings, based on zone.
-OR-
On the **Security and Privacy Settings** page of IEAK 11, choose your **Security Zones and Privacy** setting, changing it, as necessary. |
-|Content ratings |Lets you change your content ratings so your employees can't view sites with risky content. |On the **Security and Privacy Settings** page of IEAK 11, choose your **Content Ratings** setting, changing it, as necessary. |
-|Authenticode settings |Lets you pick your trustworthy software publishers and stop your employees from adding new, untrusted publishers while browsing. |These settings aren't available anymore. |
-
-### Programs
-
-|IEM setting |Description |Replacement tool |
-|------------|------------|-----------------|
-|Programs |Lets you import your default program settings, which specify the programs Windows uses for each Internet service. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Programs** tab, and choose how to open IE11 links.
-OR-
On the **Programs** page of IEAK 11, choose whether to customize or import your program settings. |
-
-#### Advanced IEM settings
-The Advanced IEM settings, including Corporate and Internet settings, were also deprecated. However, they also have replacements you can use in either Group Policy Preferences or IEAK 11.
-
-**Note**
Advanced IEM Settings were shown under **Programs** and only available when running in **Preference** mode.
-
-|IEM setting |Description |Replacement tool |
-|------------|------------|-----------------|
-|Corporate settings |Specifies the location of the file with the settings you use to make IE work best in your organization. |On the Additional Settings page of IEAK 11, expand Corporate Settings, and then customize how your organization handles temporary Internet files, code downloads, menu items, and toolbar buttons. |
-|Internet settings |Specifies the location of the file that includes your default IE settings. |In the Internet Settings Group Policy Preferences dialog box, click the Advanced tab, and then update your Internet-related settings, as required
-OR-
On the Additional Settings page of IEAK 11, expand Internet Settings, and then customize your default values in the Internet Options dialog box. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+description: IEM-configured settings have been deprecated for Internet Explorer 10 and newer. Use this topic to learn where to go to fix the affected settings through Group Policy Preferences, Administrative Templates (.admx), or the IEAK.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 89084e01-4e3f-46a6-b90e-48ee58d6821c
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Missing Internet Explorer Maintenance settings for Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Missing Internet Explorer Maintenance settings for Internet Explorer 11
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+The Internet Explorer Maintenance (IEM) settings have been deprecated in favor of Group Policy Preferences, Administrative Templates (.admx), and the IE Administration Kit 11 (IEAK 11).
+
+Because of this change, your IEM-configured settings will no longer work on computers running Internet Explorer 10 or newer. To fix this, you need to update the affected settings using Group Policy Preferences, Administrative Templates (.admx), or IE Administration Kit 11 (IEAK 11).
+
+Because Group Policy Preferences and IEAK 11 run using asynchronous processes, you should choose to use only one of the tools within each group of settings. For example, using only IEAK 11 in the **Security** settings or Group Policy Preferences within the **Internet Zone** settings. Also, it's important to remember that policy is enforced and can't be changed by the user, while preferences are configured, but can be changed by the user.
+
+For more information about all of the new options and Group Policy, see:
+
+- [Group policy preferences and Internet Explorer 11](group-policy-preferences-and-ie11.md)
+
+- [Administrative templates and Internet Explorer 11](administrative-templates-and-ie11.md)
+
+- [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md)
+
+- [Group Policy Settings Reference for Windows and Windows Server](https://go.microsoft.com/fwlink/p/?LinkId=279876)
+
+- [Group Policy ADMX Syntax Reference Guide](https://go.microsoft.com/fwlink/p/?LinkId=276830)
+
+- [Enable and Disable Settings in a Preference Item](https://go.microsoft.com/fwlink/p/?LinkId=282671)
+
+## IEM replacements
+The IEM settings have replacements you can use in either Group Policy Preferences or IEAK 11.
+
+### Browser user interface replacements
+
+|IEM setting |Description |Replacement tool |
+|------------|------------|-----------------|
+|Browser title |Lets you customize the text that shows up in the title bar of the browser.|On the **Browser User Interface** page of IEAK 11, click **Customize Title Bars**, and then type the text that appears on the title bar of the **Title Bar Text** box.
Your text is appended to the text," Microsoft Internet Explorer provided by". |
+|Browser toolbar customizations (background and buttons) |Lets you customize the buttons on the browser toolbar.
- **Buttons.** Customizes the buttons on the Internet Explorer 11 toolbar.
- **Background.** No longer available.
|On the **Browser User Interface** page of IEAK 11, click **Add**, type your new toolbar caption, action, and icon, and if the button should appear by default, and then click **OK**. You can also edit, remove, or delete an existing toolbar button from this page. |
+|Custom logo and animated bitmaps |Lets you replace the static and animated logos in the upper-right corner of the IE window with customized logos. |This setting isn't available anymore. |
+
+
+### Connection replacements
+
+|IEM setting |Description |Replacement tool |
+|------------|------------|-----------------|
+|Connection settings|Lets you import your connection settings from a previously set up computer. These settings define how your employees interact with the connection settings on the **System Polices and Restrictions** page. You can also remove old dial-up connections settings from your employee's computers.|In the **Internet Settings Group Policy Preferences** dialog box, click the **Connections** tab, and set up your proxy settings.-OR-
On the **Connection Settings** page of IEAK 11, change your connection settings, including importing your current connection settings and deleting existing dial-up connection settings (as needed). |
+|Automatic browser configuration |Lets you update your employee's computer after you've deployed IE11, by specifying a URL to an .ins file, an auto-proxy URL, or both. You can decide when the update occurs, in minutes. Typing zero, or not putting in any number, means that automatic configuration only happens after the browser is started and used to go to a page. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Automatic Configuration** tab, and then add your URL.
On the **Automatic Configuration** page of IEAK 11, modify the configuration settings, including providing the URL to an .ins file or an auto-proxy site. |
+|Proxy settings |Lets you specify your proxy servers. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Connections** tab, click **LAN Settings**, and then choose whether to turn on automatic detection of your configuration settings and if you want to use proxy servers.
-OR-
On the **Proxy Settings** page of IEAK 11, turn on your proxy settings, adding your proxy server addresses and exceptions. |
+|User Agent string |Lets the browser provide identification to visited servers. This string is often used to keep Internet traffic statistics. |This setting isn't available anymore. |
+
+### URLs replacements
+
+|IEM setting |Description |Replacement tool |
+|------------|------------|-----------------|
+|Favorites and links |Lets you use custom URLs for the **Favorites** and **Links** folders. You can also specify the folder order, disable IE Suggested Sites, and import an existing folder structure. |On the **Favorites, Favorites Bar and Feeds** page of IEAK 11, add your custom URLs to the **Favorites**, **Favorites Bar**, or **RSS Feeds** folders, or create new folders.
You can also edit, test, or remove your URLs, sort the list order, or disable IE Suggested Sites. |
+|Important URLs |Lets you add custom **Home** pages that can open different tabs. You can also add a **Support** page that shows up when an employee clicks online Help.|In the **Internet Settings Group Policy Preferences** dialog box, click the **General** tab, and add your custom **Home** page.
On the **Important URLs - Home page and Support** page of IEAK 11, add the custom URLs to your **Home** and **Support** pages.
You can also click to retain the previous home page information when the user upgrades to a newer version of IE. |
+
+### Security Zones and Content Ratings
+
+|IEM setting |Description |Replacement tool |
+|------------|------------|-----------------|
+|Security zones |Lets you change your security settings, by zone |In the **Internet Settings Group Policy Preferences** dialog box, click the **Security** tab, and update your security settings, based on zone.
-OR-
On the **Security and Privacy Settings** page of IEAK 11, choose your **Security Zones and Privacy** setting, changing it, as necessary. |
+|Content ratings |Lets you change your content ratings so your employees can't view sites with risky content. |On the **Security and Privacy Settings** page of IEAK 11, choose your **Content Ratings** setting, changing it, as necessary. |
+|Authenticode settings |Lets you pick your trustworthy software publishers and stop your employees from adding new, untrusted publishers while browsing. |These settings aren't available anymore. |
+
+### Programs
+
+|IEM setting |Description |Replacement tool |
+|------------|------------|-----------------|
+|Programs |Lets you import your default program settings, which specify the programs Windows uses for each Internet service. |In the **Internet Settings Group Policy Preferences** dialog box, click the **Programs** tab, and choose how to open IE11 links.
-OR-
On the **Programs** page of IEAK 11, choose whether to customize or import your program settings. |
+
+#### Advanced IEM settings
+The Advanced IEM settings, including Corporate and Internet settings, were also deprecated. However, they also have replacements you can use in either Group Policy Preferences or IEAK 11.
+
+**Note**
Advanced IEM Settings were shown under **Programs** and only available when running in **Preference** mode.
+
+|IEM setting |Description |Replacement tool |
+|------------|------------|-----------------|
+|Corporate settings |Specifies the location of the file with the settings you use to make IE work best in your organization. |On the Additional Settings page of IEAK 11, expand Corporate Settings, and then customize how your organization handles temporary Internet files, code downloads, menu items, and toolbar buttons. |
+|Internet settings |Specifies the location of the file that includes your default IE settings. |In the Internet Settings Group Policy Preferences dialog box, click the Advanced tab, and then update your Internet-related settings, as required
-OR-
On the Additional Settings page of IEAK 11, expand Internet Settings, and then customize your default values in the Internet Options dialog box. |
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/missing-the-compatibility-view-button.md b/browsers/internet-explorer/ie11-deploy-guide/missing-the-compatibility-view-button.md
index ea68f25a40..fbc40cbf73 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/missing-the-compatibility-view-button.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/missing-the-compatibility-view-button.md
@@ -1,53 +1,54 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-description: Internet Explorer 11 uses the latest standards mode, which simplifies web page compatibility for users by removing the **Compatibility View** button and reducing the number of compatibility options in the F12 developer tools for developers.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 501c96c9-9f03-4913-9f4b-f67bd9edbb61
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Missing the Compatibility View Button (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Missing the Compatibility View Button
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Compatibility View was introduced in Windows Internet Explorer 8 to help existing content continue to work with Windows Internet Explorer 7, while developers updated their content to support modern interoperable web standards. Since then, the Internet Explorer web platform, and the web itself, have changed so that most public web content looks for standards-based features instead of IE 7-compatible behavior.
-
-Thanks to these changes, using Internet Explorer 11 in the latest standards mode is more compatible with the web than ever before. As a result, IE11 simplifies web page compatibility for users by removing the **Compatibility View** button and reducing the number of compatibility options in the F12 developer tools for developers.
-
-## What happened to the Compatibility View button?
-In previous versions of IE, the **Compatibility View** button would attempt to fix a broken standards-based website, by getting the page to appear like it did in Internet Explorer 7. Today however, more standards-based websites are broken by attempting to appear like they did in Internet Explorer 7. So instead of implementing and using Compatibility View, developers are updating their server configuration to add X-UA-Compatible meta tags, which forces the content to the “edge”, making the **Compatibility View** button disappear. In support of these changes, the Compatibility View button has been completely removed for IE11.
-
-## What if I still need Compatibility View?
-There might be extenuating circumstances in your company, which require you to continue to use Compatibility View. In this situation, this process should be viewed strictly as a workaround. You should work with the website vendor to make sure that the affected pages are updated to match the latest web standards. The functionality described here is currently deprecated and will be removed at a time in the future.
-
-**Important**
This functionality is only available in Internet Explorer for the desktop.
-
- **To change your Compatibility View settings**
-
-1. Open Internet Explorer for the desktop, click **Tools**, and then click **Compatibility View settings**.
-
-2. In the **Compatibility View Settings** box, add the problematic website URL, and then click **Add**.
-Compatibility View is turned on for this single website, for this specific computer.
-
-3. Decide if you want your intranet sites displayed using Compatibility View, decide whether to use Microsoft compatibility lists, and then click **Close**.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+description: Internet Explorer 11 uses the latest standards mode, which simplifies web page compatibility for users by removing the **Compatibility View** button and reducing the number of compatibility options in the F12 developer tools for developers.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 501c96c9-9f03-4913-9f4b-f67bd9edbb61
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Missing the Compatibility View Button (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Missing the Compatibility View Button
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Compatibility View was introduced in Windows Internet Explorer 8 to help existing content continue to work with Windows Internet Explorer 7, while developers updated their content to support modern interoperable web standards. Since then, the Internet Explorer web platform, and the web itself, have changed so that most public web content looks for standards-based features instead of IE 7-compatible behavior.
+
+Thanks to these changes, using Internet Explorer 11 in the latest standards mode is more compatible with the web than ever before. As a result, IE11 simplifies web page compatibility for users by removing the **Compatibility View** button and reducing the number of compatibility options in the F12 developer tools for developers.
+
+## What happened to the Compatibility View button?
+In previous versions of IE, the **Compatibility View** button would attempt to fix a broken standards-based website, by getting the page to appear like it did in Internet Explorer 7. Today however, more standards-based websites are broken by attempting to appear like they did in Internet Explorer 7. So instead of implementing and using Compatibility View, developers are updating their server configuration to add X-UA-Compatible meta tags, which forces the content to the “edge”, making the **Compatibility View** button disappear. In support of these changes, the Compatibility View button has been completely removed for IE11.
+
+## What if I still need Compatibility View?
+There might be extenuating circumstances in your company, which require you to continue to use Compatibility View. In this situation, this process should be viewed strictly as a workaround. You should work with the website vendor to make sure that the affected pages are updated to match the latest web standards. The functionality described here is currently deprecated and will be removed at a time in the future.
+
+**Important**
This functionality is only available in Internet Explorer for the desktop.
+
+ **To change your Compatibility View settings**
+
+1. Open Internet Explorer for the desktop, click **Tools**, and then click **Compatibility View settings**.
+
+2. In the **Compatibility View Settings** box, add the problematic website URL, and then click **Add**.
+Compatibility View is turned on for this single website, for this specific computer.
+
+3. Decide if you want your intranet sites displayed using Compatibility View, decide whether to use Microsoft compatibility lists, and then click **Close**.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md
index df476d43ad..3e564954a6 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/net-framework-problems-with-ie11.md
@@ -1,33 +1,34 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-description: How to turn managed browser hosting controls back on in Internet Explorer 11.
-author: lomayor
-ms.prod: ie11
-ms.assetid: b0b7f60f-9099-45ab-84f4-4ac64d7bcb43
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: .NET Framework problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# .NET Framework problems with Internet Explorer 11
-If you’re having problems launching your legacy apps while running Internet Explorer 11, it’s most likely because Internet Explorer no longer starts apps that use managed browser hosting controls, like in .NET Framework 1.1 and 2.0.
-
- **To turn managed browser hosting controls back on**
-
-1. **For x86 systems or for 64-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**.
-
-2. **For 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**.
-
-For more information, see the [Web Applications](https://go.microsoft.com/fwlink/p/?LinkId=308903) section of the Application Compatibility in the .NET Framework 4.5 page.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+description: How to turn managed browser hosting controls back on in Internet Explorer 11.
+author: dansimp
+ms.prod: ie11
+ms.assetid: b0b7f60f-9099-45ab-84f4-4ac64d7bcb43
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: .NET Framework problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# .NET Framework problems with Internet Explorer 11
+If you’re having problems launching your legacy apps while running Internet Explorer 11, it’s most likely because Internet Explorer no longer starts apps that use managed browser hosting controls, like in .NET Framework 1.1 and 2.0.
+
+ **To turn managed browser hosting controls back on**
+
+1. **For x86 systems or for 64-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**.
+
+2. **For 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**.
+
+For more information, see the [Web Applications](https://go.microsoft.com/fwlink/p/?LinkId=308903) section of the Application Compatibility in the .NET Framework 4.5 page.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md
index c1cd3ac8b3..bf70df22fd 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/new-group-policy-settings-for-ie11.md
@@ -1,74 +1,75 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: New group policy settings for Internet Explorer 11
-author: lomayor
-ms.prod: ie11
-ms.assetid: 669cc1a6-e2cb-403f-aa31-c1de52a615d1
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: New group policy settings for Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# New group policy settings for Internet Explorer 11
-Internet Explorer 11 gives you some new Group Policy settings to help you manage your company's web browser configurations, including:
-
-
-| Policy | Category Path | Supported on | Explanation |
-|-----------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| Allow IE to use the HTTP2 network protocol | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE uses the HTTP2 network protocol. HTTP2 works with HTTP requests to optimize the latency of network requests through compression, multiplexing, and prioritization.
If you enable this policy setting, IE uses the HTTP2 network protocol.
If you disable this policy setting, IE won't use the HTTP2 network protocol.
If you don't configure this policy setting, users can turn this behavior on or off, using the **Internet Explorer Advanced Internet Options** settings. The default is on. |
-| Allow IE to use the SPDY/3 network protocol | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether Internet Explorer uses the SPDY/3 network protocol. SPDY/3 works with HTTP requests to optimize the latency of network requests through compression, multiplexing and prioritization.
If you enable this policy setting, Internet Explorer uses the SPDY/3 network protocol.
If you disable this policy setting, Internet Explorer won't use the SPDY/3 network protocol.
If you don't configure this policy setting, users can turn this behavior on or off, on the **Advanced\* tab of the \*\*Internet Options** dialog box. The default is on.
**Note**
We've replaced the SPDY/3 protocol with the HTTP2 protocol in Windows 10. You can configure the HTTP2 protocol by using the **Allow IE to use the HTTP2 network protocol** setting. |
-| Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10 | This policy setting allows IE to provide enhanced suggestions as the user types in the Address bar. To provide enhanced suggestions, the user’s keystrokes are sent to Microsoft through Microsoft services.
If you enable this policy setting, users receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.
If you disable this policy setting, users won’t receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.
If you don’t configure this policy setting, users can change the **Suggestions** setting on the **Settings** charm. |
-| Allow only approved domains to use the TDC ActiveX control |
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
| IE11 in Windows 10 | This policy setting determines whether users can run the Tabular Data Control (TDC) ActiveX control, based on security zone. By default, the TDC ActiveX Control is disabled in the **Internet** and **Restricted Sites** security zones.If you enable this policy setting, users won’t be able to run the TDC ActiveX control from all sites in the specified zone.
If you disable this policy setting, users can run the TDC Active X control from all sites in the specified zone. |
-| Allow SSL3 Fallback | Administrative Templates\Windows Components\Internet Explorer\Security Features | Internet Explorer 11 on Windows 10 | This policy setting allows you to stop websites from falling back to using Secure Socket Layer (SSL) 3.0 or lower, if Transport Layer Security (TLS) 1.0 or higher, fails. This setting doesn’t affect which security protocols are enabled.
If you enable this policy setting and a website fails while using the TLS 1.0 or higher security protocols, Internet Explorer will try to fallback and use SSL 3.0 or lower security protocols.
If you disable or don’t configure this setting, Internet Explorer uses the default system protocols.
**Important:**
By default, SSL 3.0 is disabled. If you choose to enable SSL 3.0, we recommend that you disable or don't configure this setting to help mitigate potential man-in-the-middle attacks. |
-| Allow VBScript to run in Internet Explorer |
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Internet Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Intranet Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Local Machine Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Internet Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Intranet Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Local Machine Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Restricted Sites Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Trusted Sites Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Restricted Sites Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Trusted Sites Zone
| Internet Explorer 11 | This policy setting lets you decide whether VBScript can run on pages in specific Internet Explorer zones.If you enable this policy setting (default), you must also pick one of the following options from the Options box:
- Enable. VBScript runs on pages in specific zones, without any interaction.
- Prompt. Employees are prompted whether to allow VBScript to run in the zone.
- Disable. VBScript is prevented from running in the zone.
If you disable or don’t configure this policy setting, VBScript runs without any interaction in the specified zone. |
-| Always send Do Not Track header | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | At least Internet Explorer 10 | This policy setting allows you to configure how IE sends the Do Not Track (DNT) header.
If you enable this policy setting, IE sends a `DNT:1` header with all HTTP and HTTPS requests. The `DNT:1` header signals to the servers not to track the user.
**In Internet Explorer 9 and 10:**
If you disable this policy setting, IE only sends the Do Not Track header if a Tracking Protection List is enabled or inPrivate Browsing mode is used.
**In at least IE11:**
If you disable this policy setting, IE only sends the Do Not Track header if inPrivate Browsing mode is used.
If you don't configure the policy setting, users can select the **Always send Do Not Track header** option on the **Advanced\* tab of the \*\*Internet Options** dialog box. By selecting this option, IE sends a `DNT:1` header with all HTTP and HTTPS requests; unless the user grants a site-specific exception, in which case IE sends a `DNT:0` header. By default, this option is enabled. |
-| Don't run antimalware programs against ActiveX controls
(Internet, Restricted Zones) |
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Internet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Internet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Restricted Sites Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Restricted Sites Zone
| IE11 on Windows 10 | This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.
If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.
If you don't configure this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using the Internet Explorer's **Security** settings. |
-| Don't run antimalware programs against ActiveX controls
(Intranet, Trusted, Local Machine Zones) |
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
| IE11 on Windows 10 | This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.
If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.
If you don't configure this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using Internet Explorer's **Security** settings. |
-| Hide the button (next to the New Tab button) that opens Microsoft Edge | User Configuration\Administrative Templates\Windows Components/Internet Explorer\Internet Settings\Advanced Settings\Browsing\ | IE11 on Windows 10, version 1703 | This policy setting lets you decide whether employees can see the open Microsoft Edge button, which appears next to the New Tab button.
If you enable this policy setting, the button to open Microsoft Edge from Internet Explorer will be hidden.
If you disable this policy setting, the button to open Microsoft Edge from Internet Explorer appears.
If you don't configure this policy setting, the button to open Microsoft Edge from Internet Explorer can be configured by your employees. |
-| Let users turn on and use Enterprise Mode from the **Tools** menu | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10 | This policy setting lets you decide whether users can turn on Enterprise Mode for websites with compatibility issues. Optionally, this policy also lets you specify where to get reports (through post messages) about the websites for which users turn on Enterprise Mode using the **Tools** menu.
If you enable this policy setting, users can see and use the **Enterprise Mode** option from the **Tools** menu. If you enable this setting, but don’t specify a report location, Enterprise Mode will still be available to your users, but you won’t get any reports.
If you disable or don’t configure this policy setting, the menu option won’t appear and users won’t be able to turn on Enterprise Mode locally. |
-| Limit Site Discovery output by Domain | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to control which domains are included in the discovery function of the Internet Explorer Site Discovery Toolkit.
If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in your specified domains, configured by adding one domain per line to the included text box.
If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all domains.
**Note:**
You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. |
-| Limit Site Discovery output by Zone | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to control which zones are included in the discovery function of the Internet Explorer Site Discovery Toolkit.
If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all specified security zones.
If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all security zones.
To specify which zones can collect data, you must include a binary number that represents your selected zones, based on this order:
- 0 – Restricted Sites zone
- 0 – Internet zone
- 0 – Trusted Sites zone
- 0 – Local Intranet zone
- 0 – Local Machine zone
**Example 1:** Include only the Local Intranet zone (binary representation: 00010), based on:
- 0 – Restricted Sites zone
- 0 – Internet zone
- 0 – Trusted Sites zone
- 1 – Local Intranet zone
- 0 – Local Machine zone
**Example 2:** Include only the Restricted Sites, Trusted Sites, and Local Intranet zones (binary representation: 10110), based on:
- 1 – Restricted Sites zone
- 0 – Internet zone
- 1 – Trusted Sites zone
- 1 – Local Intranet zone
- 1 – Local Machine zone
**Note:**
You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. |
-| Prevent deleting ActiveX Filtering, Tracking Protection and Do Not Track data | Administrative Templates\Windows Components\Internet Explorer\Delete Browsing History | At least Windows Internet Explorer 9 | **In Internet Explorer 9 and Internet Explorer 10:**
This policy setting prevents users from deleting ActiveX Filtering and Tracking Protection data, which includes the list of websites for which the user has chosen to disable ActiveX Filtering or Tracking Protection. In addition, Tracking Protection data is also collected if users turn on the **Personalized Tracking Protection List**, which blocks third-party items while the user is browsing.
**In IE11:**
This policy setting prevents users from deleting ActiveX Filtering, Tracking Protection data, and Do Not Track exceptions, stored in the **Delete Browsing History** dialog box, for visited websites.
If you enable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is preserved when the user clicks **Delete**.
If you disable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is deleted when the user clicks **Delete**.
If you don’t configure this policy setting, users can turn this feature on and off, determining whether to delete ActiveX Filtering, Tracking Protection, and Do Not Track data when clicking **Delete**. |
-| Send all sites not included in the Enterprise Mode Site List to Microsoft Edge | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1607 | This policy setting lets you decide whether to open all sites that aren’t specified to open in IE11 by the Enterprise Mode site list, to open in Microsoft Edge.
If you enable this policy setting, you must also enable the Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list policy setting and you must include at least one site in the Enterprise Mode site list.
If you disable or don't configure this policy setting, all sites will open based on the currently active browser.
**Note:**
If you’ve also enabled the Administrative Templates\Windows Components\Microsoft Edge\Send all intranet sites to Internet Explorer 11 policy setting, then all intranet sites will continue to open in Internet Explorer 11. |
-| Show message when opening sites in Microsoft Edge using Enterprise Mode | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1607 | This policy setting lets you decide whether employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.
If you enable this policy setting, employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.
If you disable or don't configure this policy setting, the default app behavior occurs and no additional page appears. |
-| Turn off automatic download of the ActiveX VersionList | Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management | At least Windows Internet Explorer 8 | This policy setting allows you to decide whether Internet Explorer automatically downloads updated versions of Microsoft's VersionList.XML file. This file tells Internet Explorer whether to stop specific ActiveX controls from loading.
If you enable this policy setting, Internet Explorer stops automatically downloading updated versions of the VersionList.XML file.
If you disable or don’t configure this setting, Internet Explorer continues to download updated versions of the VersionList.XML file.
**Important:**
Stopping this file from updating breaks the out-of-date ActiveX control blocking feature, potentially compromising the security of the device. For more info, see the Out-of-Date ActiveX Control Blocking () topic. |
-| Turn off loading websites and content in the background to optimize performance | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether Internet Explorer preemptively loads websites and content in the background, speeding up performance such that when the user clicks a hyperlink, the background page seamlessly switches into view.If you enable this policy setting, IE doesn't load any websites or content in the background.
If you disable this policy setting, IE preemptively loads websites and content in the background.
If you don’t configure this policy setting, users can turn this behavior on or off, using IE settings. This feature is turned on by default. |
-| Turn off phone number detection | Administrative Templates\Windows Components\Internet Explorer\Internet Settings\Advanced settings\Browsing | IE11 on Windows 10 | This policy setting determines whether phone numbers are recognized and turned into hyperlinks, which can be used to invoke the default phone application on the system.
If you enable this policy setting, phone number detection is turned off. Users won’t be able to modify this setting.
If you disable this policy setting, phone number detection is turned on. Users won’t be able to modify this setting.
If you don't configure this policy setting, users can turn this behavior on or off, using IE settings. The default is on. |
-| Turn off sending URL path as UTF-8 | User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Settings\URL Encoding | At least Windows Internet Explorer 7 | This policy setting determines whether to let IE send the path portion of a URL using the UTF-8 standard. This standard defines characters so they're readable in any language and lets you exchange Internet addresses (URLs) with characters included in any language.
If you enable this policy setting, UTF-8 is not allowed. Users won't be able to change this setting.
If you disable this policy setting, UTF-8 is allowed. Users won't be able to change this setting.
If you don't configure this policy setting, users can turn this behavior on or off. |
-| Turn off sending UTF-8 query strings for URLs | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE uses 8-bit Unicode Transformation Format (UTF-8) to encode query strings in URLs before sending them to servers or to proxy servers.
If you enable this policy setting, you must specify when to use UTF-8 to encode query strings:
- **0.** Never encode query strings.
- **1.** Only encode query strings for URLs that aren't in the Intranet zone.
- **2.** Only encode query strings for URLs that are in the Intranet zone.
- **3.** Always encode query strings.
If you disable or don't configure this policy setting, users can turn this behavior on or off, using IE Advanced Options settings. The default is to encode all query strings in UTF-8. |
-| Turn off the ability to launch report site problems using a menu option | Administrative Templates\Windows Components\Internet Explorer\Browser menus | Internet Explorer 11 | This policy setting allows you to manage whether users can start the **eport Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu.
If you enable this policy setting, users won’t be able to start the **Report Site Problems** dialog box from the Internet Explorer settings or the Tools menu.
If you disable or don’t configure this policy setting, users will be able to start the **Report Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu. |
-| Turn off the flip ahead with page prediction feature | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | At least Internet Explorer 10 on Windows 8 | This policy setting determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website.
If you enable this policy setting, flip ahead with page prediction is turned off and the next webpage isn’t loaded into the background.
If you disable this policy setting, flip ahead with page prediction is turned on and the next webpage is loaded into the background.
If you don’t configure this setting, users can turn this behavior on or off, using the **Settings** charm.
**Note**
Microsoft collects your browsing history to improve how flip ahead with page prediction works. This feature isn’t available for Internet Explorer for the desktop. |
-| Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE11 uses 64-bit processes (for greater security) or 32-bit processes (for greater compatibility) when running in Enhanced Protected Mode on 64-bit versions of Windows.
If you enable this policy setting, IE11 will use 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.
If you disable this policy setting, IE11 will use 32-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.
If you don't configure this policy setting, users can turn this feature on or off using IE settings. This feature is turned off by default.
**Important**
When using 64-bit processes, some ActiveX controls and toolbars might not be available. |
-| Turn on Site Discovery WMI output | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to manage the WMI output functionality of the Internet Explorer Site Discovery Toolkit.
If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an WMI class, which can be aggregated by using a client-management solution, such as System Center Configuration Manager.
If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an WMI class.
**Note:**
Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. |
-| Turn on Site Discovery XML output | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to manage the XML output functionality of the Internet Explorer Site Discovery Toolkit.
If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an XML file, stored in your specified location.
If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an XML file.
**Note:**
Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. |
-| Use the Enterprise Mode IE website list | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1511 | This policy setting lets you specify where to find the list of websites you want opened using Enterprise Mode, instead of Standard mode, because of compatibility issues. Users can’t edit this list.
If you enable this policy setting, Internet Explorer downloads the Enterprise Mode website list from the `HKEY_CURRENT_USER or HKEY_LOCAL_MACHINE`\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode hive, opening all included websites using Enterprise Mode. We recommend storing and downloading your list from a secure web server `(https://)`, to help protect against data tampering.
If you disable or don’t configure this policy setting, Internet Explorer opens all websites using **Standard** mode. |
-
-## Removed Group Policy settings
-IE11 no longer supports these Group Policy settings:
-
-- Turn on Internet Explorer 7 Standards Mode
-
-- Turn off Compatibility View button
-
-- Turn off Quick Tabs functionality
-
-- Turn off the quick pick menu
-
-- Use large icons for command buttons
-
-## Viewing your policy settings
-After you've finished updating and deploying your Group Policy, you can use the Resultant Set of Policy (RSoP) snap-in to view your settings.
-
-**To use the RSoP snap-in**
-
-1. Open and run the Resultant Set of Policy (RSoP) wizard, specifying the information you want to see.
-
-2. Open your wizard results in the Group Policy Management Console (GPMC).
-For complete instructions about how to add, open, and use RSoP, see [Use the RSoP Snap-in](https://go.microsoft.com/fwlink/p/?LinkId=395201)
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: New group policy settings for Internet Explorer 11
+author: dansimp
+ms.prod: ie11
+ms.assetid: 669cc1a6-e2cb-403f-aa31-c1de52a615d1
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: New group policy settings for Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# New group policy settings for Internet Explorer 11
+Internet Explorer 11 gives you some new Group Policy settings to help you manage your company's web browser configurations, including:
+
+
+| Policy | Category Path | Supported on | Explanation |
+|-----------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Allow IE to use the HTTP2 network protocol | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE uses the HTTP2 network protocol. HTTP2 works with HTTP requests to optimize the latency of network requests through compression, multiplexing, and prioritization.
If you enable this policy setting, IE uses the HTTP2 network protocol.
If you disable this policy setting, IE won't use the HTTP2 network protocol.
If you don't configure this policy setting, users can turn this behavior on or off, using the **Internet Explorer Advanced Internet Options** settings. The default is on. |
+| Allow IE to use the SPDY/3 network protocol | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether Internet Explorer uses the SPDY/3 network protocol. SPDY/3 works with HTTP requests to optimize the latency of network requests through compression, multiplexing and prioritization.
If you enable this policy setting, Internet Explorer uses the SPDY/3 network protocol.
If you disable this policy setting, Internet Explorer won't use the SPDY/3 network protocol.
If you don't configure this policy setting, users can turn this behavior on or off, on the **Advanced\* tab of the \*\*Internet Options** dialog box. The default is on.
**Note**
We've replaced the SPDY/3 protocol with the HTTP2 protocol in Windows 10. You can configure the HTTP2 protocol by using the **Allow IE to use the HTTP2 network protocol** setting. |
+| Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10 | This policy setting allows IE to provide enhanced suggestions as the user types in the Address bar. To provide enhanced suggestions, the user’s keystrokes are sent to Microsoft through Microsoft services.
If you enable this policy setting, users receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.
If you disable this policy setting, users won’t receive enhanced suggestions while typing in the Address bar. In addition, users won’t be able to change the **Suggestions** setting on the **Settings** charm.
If you don’t configure this policy setting, users can change the **Suggestions** setting on the **Settings** charm. |
+| Allow only approved domains to use the TDC ActiveX control |
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
| IE11 in Windows 10 | This policy setting determines whether users can run the Tabular Data Control (TDC) ActiveX control, based on security zone. By default, the TDC ActiveX Control is disabled in the **Internet** and **Restricted Sites** security zones.If you enable this policy setting, users won’t be able to run the TDC ActiveX control from all sites in the specified zone.
If you disable this policy setting, users can run the TDC Active X control from all sites in the specified zone. |
+| Allow SSL3 Fallback | Administrative Templates\Windows Components\Internet Explorer\Security Features | Internet Explorer 11 on Windows 10 | This policy setting allows you to stop websites from falling back to using Secure Socket Layer (SSL) 3.0 or lower, if Transport Layer Security (TLS) 1.0 or higher, fails. This setting doesn’t affect which security protocols are enabled.
If you enable this policy setting and a website fails while using the TLS 1.0 or higher security protocols, Internet Explorer will try to fallback and use SSL 3.0 or lower security protocols.
If you disable or don’t configure this setting, Internet Explorer uses the default system protocols.
**Important:**
By default, SSL 3.0 is disabled. If you choose to enable SSL 3.0, we recommend that you disable or don't configure this setting to help mitigate potential man-in-the-middle attacks. |
+| Allow VBScript to run in Internet Explorer |
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Internet Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Intranet Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Local Machine Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Internet Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Intranet Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Local Machine Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Restricted Sites Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Locked-Down Trusted Sites Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Restricted Sites Zone
- Administrative Templates/Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone/Trusted Sites Zone
| Internet Explorer 11 | This policy setting lets you decide whether VBScript can run on pages in specific Internet Explorer zones.If you enable this policy setting (default), you must also pick one of the following options from the Options box:
- Enable. VBScript runs on pages in specific zones, without any interaction.
- Prompt. Employees are prompted whether to allow VBScript to run in the zone.
- Disable. VBScript is prevented from running in the zone.
If you disable or don’t configure this policy setting, VBScript runs without any interaction in the specified zone. |
+| Always send Do Not Track header | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | At least Internet Explorer 10 | This policy setting allows you to configure how IE sends the Do Not Track (DNT) header.
If you enable this policy setting, IE sends a `DNT:1` header with all HTTP and HTTPS requests. The `DNT:1` header signals to the servers not to track the user.
**In Internet Explorer 9 and 10:**
If you disable this policy setting, IE only sends the Do Not Track header if a Tracking Protection List is enabled or inPrivate Browsing mode is used.
**In at least IE11:**
If you disable this policy setting, IE only sends the Do Not Track header if inPrivate Browsing mode is used.
If you don't configure the policy setting, users can select the **Always send Do Not Track header** option on the **Advanced\* tab of the \*\*Internet Options** dialog box. By selecting this option, IE sends a `DNT:1` header with all HTTP and HTTPS requests; unless the user grants a site-specific exception, in which case IE sends a `DNT:0` header. By default, this option is enabled. |
+| Don't run antimalware programs against ActiveX controls
(Internet, Restricted Zones) |
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Internet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Internet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Restricted Sites Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Restricted Sites Zone
| IE11 on Windows 10 | This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.
If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.
If you don't configure this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using the Internet Explorer's **Security** settings. |
+| Don't run antimalware programs against ActiveX controls
(Intranet, Trusted, Local Machine Zones) |
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone
- Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone
| IE11 on Windows 10 | This policy setting determines whether IE runs antimalware programs against ActiveX controls, to check if they're safe to load on pages.If you enable this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control.
If you disable this policy setting, IE always checks with your antimalware program to see if it's safe to create an instance of the ActiveX control.
If you don't configure this policy setting, IE won't check with your antimalware program to see if it's safe to create an instance of the ActiveX control. Users can turn this behavior on or off, using Internet Explorer's **Security** settings. |
+| Hide the button (next to the New Tab button) that opens Microsoft Edge | User Configuration\Administrative Templates\Windows Components/Internet Explorer\Internet Settings\Advanced Settings\Browsing\ | IE11 on Windows 10, version 1703 | This policy setting lets you decide whether employees can see the open Microsoft Edge button, which appears next to the New Tab button.
If you enable this policy setting, the button to open Microsoft Edge from Internet Explorer will be hidden.
If you disable this policy setting, the button to open Microsoft Edge from Internet Explorer appears.
If you don't configure this policy setting, the button to open Microsoft Edge from Internet Explorer can be configured by your employees. |
+| Let users turn on and use Enterprise Mode from the **Tools** menu | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10 | This policy setting lets you decide whether users can turn on Enterprise Mode for websites with compatibility issues. Optionally, this policy also lets you specify where to get reports (through post messages) about the websites for which users turn on Enterprise Mode using the **Tools** menu.
If you enable this policy setting, users can see and use the **Enterprise Mode** option from the **Tools** menu. If you enable this setting, but don’t specify a report location, Enterprise Mode will still be available to your users, but you won’t get any reports.
If you disable or don’t configure this policy setting, the menu option won’t appear and users won’t be able to turn on Enterprise Mode locally. |
+| Limit Site Discovery output by Domain | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to control which domains are included in the discovery function of the Internet Explorer Site Discovery Toolkit.
If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in your specified domains, configured by adding one domain per line to the included text box.
If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all domains.
**Note:**
You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. |
+| Limit Site Discovery output by Zone | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to control which zones are included in the discovery function of the Internet Explorer Site Discovery Toolkit.
If you enable this policy setting, the Internet Explorer Site Discovery Toolkit collects data from all specified security zones.
If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit collects data from all sites in all security zones.
To specify which zones can collect data, you must include a binary number that represents your selected zones, based on this order:
- 0 – Restricted Sites zone
- 0 – Internet zone
- 0 – Trusted Sites zone
- 0 – Local Intranet zone
- 0 – Local Machine zone
**Example 1:** Include only the Local Intranet zone (binary representation: 00010), based on:
- 0 – Restricted Sites zone
- 0 – Internet zone
- 0 – Trusted Sites zone
- 1 – Local Intranet zone
- 0 – Local Machine zone
**Example 2:** Include only the Restricted Sites, Trusted Sites, and Local Intranet zones (binary representation: 10110), based on:
- 1 – Restricted Sites zone
- 0 – Internet zone
- 1 – Trusted Sites zone
- 1 – Local Intranet zone
- 1 – Local Machine zone
**Note:**
You can use this setting in conjunction with the other settings that control the Internet Explorer Site Discovery Toolkit. |
+| Prevent deleting ActiveX Filtering, Tracking Protection and Do Not Track data | Administrative Templates\Windows Components\Internet Explorer\Delete Browsing History | At least Windows Internet Explorer 9 | **In Internet Explorer 9 and Internet Explorer 10:**
This policy setting prevents users from deleting ActiveX Filtering and Tracking Protection data, which includes the list of websites for which the user has chosen to disable ActiveX Filtering or Tracking Protection. In addition, Tracking Protection data is also collected if users turn on the **Personalized Tracking Protection List**, which blocks third-party items while the user is browsing.
**In IE11:**
This policy setting prevents users from deleting ActiveX Filtering, Tracking Protection data, and Do Not Track exceptions, stored in the **Delete Browsing History** dialog box, for visited websites.
If you enable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is preserved when the user clicks **Delete**.
If you disable this policy setting, ActiveX Filtering, Tracking Protection and Do Not Track data is deleted when the user clicks **Delete**.
If you don’t configure this policy setting, users can turn this feature on and off, determining whether to delete ActiveX Filtering, Tracking Protection, and Do Not Track data when clicking **Delete**. |
+| Send all sites not included in the Enterprise Mode Site List to Microsoft Edge | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1607 | This policy setting lets you decide whether to open all sites that aren’t specified to open in IE11 by the Enterprise Mode site list, to open in Microsoft Edge.
If you enable this policy setting, you must also enable the Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list policy setting and you must include at least one site in the Enterprise Mode site list.
If you disable or don't configure this policy setting, all sites will open based on the currently active browser.
**Note:**
If you’ve also enabled the Administrative Templates\Windows Components\Microsoft Edge\Send all intranet sites to Internet Explorer 11 policy setting, then all intranet sites will continue to open in Internet Explorer 11. |
+| Show message when opening sites in Microsoft Edge using Enterprise Mode | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1607 | This policy setting lets you decide whether employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.
If you enable this policy setting, employees see an additional page in Internet Explorer 11, stating that a site has been opened using Microsoft Edge with Enterprise Mode.
If you disable or don't configure this policy setting, the default app behavior occurs and no additional page appears. |
+| Turn off automatic download of the ActiveX VersionList | Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management | At least Windows Internet Explorer 8 | This policy setting allows you to decide whether Internet Explorer automatically downloads updated versions of Microsoft's VersionList.XML file. This file tells Internet Explorer whether to stop specific ActiveX controls from loading.
If you enable this policy setting, Internet Explorer stops automatically downloading updated versions of the VersionList.XML file.
If you disable or don’t configure this setting, Internet Explorer continues to download updated versions of the VersionList.XML file.
**Important:**
Stopping this file from updating breaks the out-of-date ActiveX control blocking feature, potentially compromising the security of the device. For more info, see the Out-of-Date ActiveX Control Blocking () topic. |
+| Turn off loading websites and content in the background to optimize performance | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether Internet Explorer preemptively loads websites and content in the background, speeding up performance such that when the user clicks a hyperlink, the background page seamlessly switches into view.If you enable this policy setting, IE doesn't load any websites or content in the background.
If you disable this policy setting, IE preemptively loads websites and content in the background.
If you don’t configure this policy setting, users can turn this behavior on or off, using IE settings. This feature is turned on by default. |
+| Turn off phone number detection | Administrative Templates\Windows Components\Internet Explorer\Internet Settings\Advanced settings\Browsing | IE11 on Windows 10 | This policy setting determines whether phone numbers are recognized and turned into hyperlinks, which can be used to invoke the default phone application on the system.
If you enable this policy setting, phone number detection is turned off. Users won’t be able to modify this setting.
If you disable this policy setting, phone number detection is turned on. Users won’t be able to modify this setting.
If you don't configure this policy setting, users can turn this behavior on or off, using IE settings. The default is on. |
+| Turn off sending URL path as UTF-8 | User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Settings\URL Encoding | At least Windows Internet Explorer 7 | This policy setting determines whether to let IE send the path portion of a URL using the UTF-8 standard. This standard defines characters so they're readable in any language and lets you exchange Internet addresses (URLs) with characters included in any language.
If you enable this policy setting, UTF-8 is not allowed. Users won't be able to change this setting.
If you disable this policy setting, UTF-8 is allowed. Users won't be able to change this setting.
If you don't configure this policy setting, users can turn this behavior on or off. |
+| Turn off sending UTF-8 query strings for URLs | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE uses 8-bit Unicode Transformation Format (UTF-8) to encode query strings in URLs before sending them to servers or to proxy servers.
If you enable this policy setting, you must specify when to use UTF-8 to encode query strings:
- **0.** Never encode query strings.
- **1.** Only encode query strings for URLs that aren't in the Intranet zone.
- **2.** Only encode query strings for URLs that are in the Intranet zone.
- **3.** Always encode query strings.
If you disable or don't configure this policy setting, users can turn this behavior on or off, using IE Advanced Options settings. The default is to encode all query strings in UTF-8. |
+| Turn off the ability to launch report site problems using a menu option | Administrative Templates\Windows Components\Internet Explorer\Browser menus | Internet Explorer 11 | This policy setting allows you to manage whether users can start the **eport Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu.
If you enable this policy setting, users won’t be able to start the **Report Site Problems** dialog box from the Internet Explorer settings or the Tools menu.
If you disable or don’t configure this policy setting, users will be able to start the **Report Site Problems** dialog box from the **Internet Explorer** settings area or from the **Tools** menu. |
+| Turn off the flip ahead with page prediction feature | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | At least Internet Explorer 10 on Windows 8 | This policy setting determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website.
If you enable this policy setting, flip ahead with page prediction is turned off and the next webpage isn’t loaded into the background.
If you disable this policy setting, flip ahead with page prediction is turned on and the next webpage is loaded into the background.
If you don’t configure this setting, users can turn this behavior on or off, using the **Settings** charm.
**Note**
Microsoft collects your browsing history to improve how flip ahead with page prediction works. This feature isn’t available for Internet Explorer for the desktop. |
+| Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows | Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Advanced Page | IE11 on Windows 10 | This policy setting determines whether IE11 uses 64-bit processes (for greater security) or 32-bit processes (for greater compatibility) when running in Enhanced Protected Mode on 64-bit versions of Windows.
If you enable this policy setting, IE11 will use 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.
If you disable this policy setting, IE11 will use 32-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows.
If you don't configure this policy setting, users can turn this feature on or off using IE settings. This feature is turned off by default.
**Important**
When using 64-bit processes, some ActiveX controls and toolbars might not be available. |
+| Turn on Site Discovery WMI output | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to manage the WMI output functionality of the Internet Explorer Site Discovery Toolkit.
If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an WMI class, which can be aggregated by using a client-management solution, such as System Center Configuration Manager.
If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an WMI class.
**Note:**
Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. |
+| Turn on Site Discovery XML output | Administrative Templates\Windows Components\Internet Explorer | At least Internet Explorer 8 | This policy setting allows you to manage the XML output functionality of the Internet Explorer Site Discovery Toolkit.
If you enable this policy setting, the Internet Explorer Site Discovery Toolkit will log its collected data to an XML file, stored in your specified location.
If you disable or don’t configure this setting, the Internet Explorer Site Discovery Toolkit won’t log its collected data to an XML file.
**Note:**
Enabling or disabling this setting won’t impact any other output methods available to the Internet Explorer Site Discovery Toolkit. |
+| Use the Enterprise Mode IE website list | Administrative Templates\Windows Components\Internet Explorer | IE11 on Windows 10, version 1511 | This policy setting lets you specify where to find the list of websites you want opened using Enterprise Mode, instead of Standard mode, because of compatibility issues. Users can’t edit this list.
If you enable this policy setting, Internet Explorer downloads the Enterprise Mode website list from the `HKEY_CURRENT_USER or HKEY_LOCAL_MACHINE`\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode hive, opening all included websites using Enterprise Mode. We recommend storing and downloading your list from a secure web server `(https://)`, to help protect against data tampering.
If you disable or don’t configure this policy setting, Internet Explorer opens all websites using **Standard** mode. |
+
+## Removed Group Policy settings
+IE11 no longer supports these Group Policy settings:
+
+- Turn on Internet Explorer 7 Standards Mode
+
+- Turn off Compatibility View button
+
+- Turn off Quick Tabs functionality
+
+- Turn off the quick pick menu
+
+- Use large icons for command buttons
+
+## Viewing your policy settings
+After you've finished updating and deploying your Group Policy, you can use the Resultant Set of Policy (RSoP) snap-in to view your settings.
+
+**To use the RSoP snap-in**
+
+1. Open and run the Resultant Set of Policy (RSoP) wizard, specifying the information you want to see.
+
+2. Open your wizard results in the Group Policy Management Console (GPMC).
+For complete instructions about how to add, open, and use RSoP, see [Use the RSoP Snap-in](https://go.microsoft.com/fwlink/p/?LinkId=395201)
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md b/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md
index 32665259c3..5591606f32 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking.md
@@ -1,205 +1,206 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Use out-of-date ActiveX control blocking to help you know when IE prevents a webpage from loading outdated ActiveX controls and to update the outdated control, so that it’s safer to use.
-author: lomayor
-ms.author: lomayor
-ms.prod: ie11
-ms.assetid: e61866bb-1ff1-4a8d-96f2-61d3534e8199
-ms.reviewer:
-audience: itpro
manager: dansimp
-title: Out-of-date ActiveX control blocking (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 05/10/2018
----
-
-
-# Out-of-date ActiveX control blocking
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-- Windows Vista SP2
-
-ActiveX controls are small apps that let websites provide content, like videos, games, and let you interact with content like toolbars. Unfortunately, because many ActiveX controls aren’t automatically updated, they can become outdated as new versions are released. It’s very important that you keep your ActiveX controls up-to-date because malicious software (or malware) can target security flaws in outdated controls, damaging your computer by collecting info from it, installing unwanted software, or by letting someone else control it remotely. To help avoid this situation, Internet Explorer includes a new security feature, called *out-of-date ActiveX control blocking*.
-
-Out-of-date ActiveX control blocking lets you:
-
-- Know when IE prevents a webpage from loading common, but outdated ActiveX controls.
-
-- Interact with other parts of the webpage that aren’t affected by the outdated control.
-
-- Update the outdated control, so that it’s up-to-date and safer to use.
-
-The out-of-date ActiveX control blocking feature works with all [Security Zones](https://go.microsoft.com/fwlink/p/?LinkId=403863), except the Local Intranet Zone and the Trusted Sites Zone.
-
-It also works with these operating system and IE combinations:
-
-|Windows operating system |IE version |
-|----------------------------------------|---------------------------------|
-|Windows 10 |All supported versions of IE.
Microsoft Edge doesn't support ActiveX controls. |
-|Windows 8.1 and Windows 8.1 Update |All supported versions of IE |
-|Windows 7 SP1 |All supported versions of IE |
-|Windows Server 2012 |All supported versions of IE |
-|Windows Server 2008 R2 SP1 |All supported versions of IE |
-|Windows Server 2008 SP2 |Windows Internet Explorer 9 only |
-|Windows Vista SP2 |Windows Internet Explorer 9 only |
-
-For more info about this new feature, see the [Internet Explorer begins blocking out-of-date ActiveX controls](https://go.microsoft.com/fwlink/p/?LinkId=507691) blog. To see the complete list of out-of-date Active controls blocked by this feature, see [Blocked out-of-date ActiveX controls](blocked-out-of-date-activex-controls.md).
-
-
-## What does the out-of-date ActiveX control blocking notification look like?
-When IE blocks an outdated ActiveX control, you’ll see a notification bar similar to this, depending on your version of IE:
-
-**Internet Explorer 9 through Internet Explorer 11**
-
-
-
-**Windows Internet Explorer 8**
-
-
-
-Out-of-date ActiveX control blocking also gives you a security warning that tells you if a webpage tries to launch specific outdated apps, outside of IE:
-
-
-
-
-## How do I fix an outdated ActiveX control or app?
-From the notification about the outdated ActiveX control, you can go to the control’s website to download its latest version.
-
- **To get the updated ActiveX control**
-
-1. From the notification bar, tap or click **Update**.
-IE opens the ActiveX control’s website.
-
-2. Download the latest version of the control.
-
-**Security Note:**
If you don’t fully trust a site, you shouldn’t allow it to load an outdated ActiveX control. However, although we don’t recommend it, you can view the missing webpage content by tapping or clicking **Run this time**. This option runs the ActiveX control without updating or fixing the problem. The next time you visit a webpage running the same outdated ActiveX control, you’ll get the notification again.
-
- **To get the updated app**
-
-1. From the security warning, tap or click **Update** link.
-IE opens the app’s website.
-
-2. Download the latest version of the app.
-
-**Security Note:**
If you don’t fully trust a site, you shouldn’t allow it to launch an outdated app. However, although we don’t recommend it, you can let the webpage launch the app by tapping or clicking **Allow**. This option opens the app without updating or fixing the problem. The next time you visit a webpage running the same outdated app, you’ll get the notification again.
-
-## How does IE decide which ActiveX controls to block?
-IE uses Microsoft’s versionlist.xml or versionlistWin7.xml file to determine whether an ActiveX control should be stopped from loading. These files are updated with newly-discovered out-of-date ActiveX controls, which IE automatically downloads to your local copy of the file.
-
-You can see your copy of the file here `%LOCALAPPDATA%\Microsoft\Internet Explorer\VersionManager\versionlist.xml` or you can view Microsoft’s version, based on your operating system and version of IE, here:
-- [Internet Explorer 11 on Windows 7 SP1 or Windows Server 2008 R2](https://go.microsoft.com/fwlink/p/?LinkId=798230)
-- [All other configurations](https://go.microsoft.com/fwlink/p/?LinkId=403864)
-
-**Security Note:**
Although we strongly recommend against it, if you don’t want your computer to automatically download the updated version list from Microsoft, run the following command from a command prompt:
-
-```
-reg add "HKCU\Software\Microsoft\Internet Explorer\VersionManager" /v DownloadVersionList /t REG_DWORD /d 0 /f
-```
-Turning off this automatic download breaks the out-of-date ActiveX control blocking feature by not letting the version list update with newly outdated controls, potentially compromising the security of your computer. Use this configuration option at your own risk.
-
-## Out-of-date ActiveX control blocking on managed devices
-Out-of-date ActiveX control blocking includes four new Group Policy settings that you can use to manage your web browser configuration, based on your domain controller. You can download the administrative templates, including the new settings, from the [Administrative templates (.admx) for Windows 10](https://go.microsoft.com/fwlink/p/?LinkId=746579) page or the [Administrative Templates (.admx) for Windows 8.1 and Windows Server 2012 R2](https://go.microsoft.com/fwlink/p/?LinkId=746580) page, depending on your operating system.
-
-### Group Policy settings
-Here’s a list of the new Group Policy info, including the settings, location, requirements, and Help text strings. All of these settings can be set in either the Computer Configuration or User Configuration scope, but Computer Configuration takes precedence over User Configuration.
-
-**Important**
-Out-of-date ActiveX control blocking is turned off in the Local Intranet Zone and the Trusted Sites Zone; therefore, intranet websites and line-of-business apps will continue to use out-of-date ActiveX controls without disruption.
-
-|Setting |Category path |Supported on |Help text |
-|--------|--------------|-------------|----------|
-|Turn on ActiveX control logging in IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting determines whether IE saves log information for ActiveX controls.
If you enable this setting, IE logs ActiveX control information (including the source URI that loaded the control and whether it was blocked) to a local file.
If you disable or don't configure this setting, IE won't log ActiveX control information.
Note that you can turn this setting on or off regardless of the **Turn off blocking of outdated ActiveX controls for IE** or **Turn off blocking of outdated ActiveX controls for IE on specific domains** settings. |
-|Remove the **Run this time** button for outdated ActiveX controls in IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management`|Internet Explorer 8 through IE11 |This setting allows you stop users from seeing the **Run this time** button and from running specific outdated ActiveX controls in IE.
If you enable this setting, users won't see the **Run this time** button on the warning message that appears when IE blocks an outdated ActiveX control.
If you disable or don't configure this setting, users will see the **Run this time** button on the warning message that appears when IE blocks an outdated ActiveX control. Clicking this button lets the user run the outdated ActiveX control once. |
-|Turn off blocking of outdated ActiveX controls for IE on specific domains |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting allows you to manage a list of domains on which IE will stop blocking outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone.
If you enable this setting, you can enter a custom list of domains for which outdated ActiveX controls won't be blocked in IE. Each domain entry must be formatted like one of the following:
- **"domainname.TLD".** For example, if you want to include `*.contoso.com/*`, use "contoso.com".
- **"hostname".** For example, if you want to include `https://example`, use "example".
- **"file:///path/filename.htm"**. For example, use `file:///C:/Users/contoso/Desktop/index.htm`.
If you disable or don't configure this setting, the list is deleted and IE continues to block specific outdated ActiveX controls on all domains in the Internet Zone. |
-|Turn off blocking of outdated ActiveX controls for IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting determines whether IE blocks specific outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone.
If you enable this setting, IE stops blocking outdated ActiveX controls.
If you disable or don't configure this setting, IE continues to block specific outdated ActiveX controls. |
-|Remove the **Update** button in the out-of-date ActiveX control blocking notification for IE |This functionality is only available through the registry |Internet Explorer 8 through IE11 |This setting determines whether the out-of-date ActiveX control blocking notification shows the **Update** button. This button points users to update specific out-of-date ActiveX controls in IE. |
-
-
-If you don't want to use Group Policy, you can also turn these settings on or off using the registry. You can update the registry manually.
-
-|Setting |Registry setting |
-|-------------------------|----------------------------------------------------------------|
-|Turn on ActiveX control logging in IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v AuditModeEnabled /t REG_DWORD /d 1 /f`
Where:
- **0 or not configured.** Logs ActiveX control information (including the source URI that loaded the control and whether it was blocked) to a local file.
- **1.** Logs ActiveX control information.
|
-|Remove **Run this time** button for outdated ActiveX controls in IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v RunThisTimeEnabled /t REG_DWORD /d 0 /f`Where:
- **0.** Removes the **Run this time** button.
- **1 or not configured.** Leaves the **Run this time** button.
|
-|Turn off blocking of outdated ActiveX controls for IE on specific domains |reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext\Domain" /v contoso.com /t REG_SZ /f
Where:
- **contoso.com.** A single domain on which outdated ActiveX controls won't be blocked in IE. Use a new `reg add` command for each domain you wish to add to the **Allow** list.
|
-|Turn off blocking of outdated ActiveX controls for IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v VersionCheckEnabled /t REG_DWORD /d 0 /f`Where:
- **0.** Stops blocking outdated ActiveX controls.
- **1 or not configured.** Continues to block specific outdated ActiveX controls.
|
-|Remove the **Update** button in the out-of-date ActiveX control blocking notification for IE |`reg add "HKCU\Software\Microsoft\Internet Explorer\VersionManager" /v UpdateEnabled /t REG_DWORD /d 0 /f`Where:
- **0.** Removes the **Update** button
- **1 or not configured.** Leaves the **Update** button.
-
-## Inventory your ActiveX controls
-You can inventory the ActiveX controls being used in your company, by turning on the **Turn on ActiveX control logging in IE** setting:
-
-- **Windows 10:** Through a comma-separated values (.csv) file or through a local Windows Management Instrumentation (WMI) class.
-
-- **All other versions of Microsoft Windows:** Through a .csv file only.
-
-
-### Inventory your ActiveX controls by using a .CSV file
-If you decide to inventory the ActiveX controls being used in your company by turning on the **Turn on ActiveX control logging in IE** setting, IE logs the ActiveX control information to the `%LOCALAPPDATA%\Microsoft\Internet Explorer\AuditMode\VersionAuditLog.csv` file.
-
-Here’s a detailed example and description of what’s included in the VersionAuditLog.csv file.
-
-|Source URI |File path |Product version |File version |Allowed/Blocked |Reason |EPM-compatible |
-|-----------|----------|----------------|-------------|----------------|-------|---------------|
-|`https://contoso.com/test1.html` |C:\Windows\System32\Macromed\Flash\Flash.ocx |14.0.0.125 |14.0.0.125 |Allowed |Not in blocklist |EPM-compatible |
-|`https://contoso.com/test2.html` |C:\Program Files\Java\jre6\bin\jp2iexp.dll |6.0.410.2 |6.0.410.2 |Blocked |Out of date |Not EPM-compatible |
-
-**Where:**
-- **Source URI.** The URL of the page that loaded the ActiveX control.
-
-- **File path.** The location of the binary that implements the ActiveX control.
-
-- **Product version.** The product version of the binary that implements the ActiveX control.
-
-- **File version.** The file version of the binary that implements the ActiveX control.
-
-- **Allowed/Blocked** Whether IE blocked the ActiveX control.
-
-- **Enhanced Protected Mode (EPM)-compatible.** Whether the loaded ActiveX control is compatible with [Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=403865).**Note**
Enhanced Protected Mode isn’t supported on Internet Explorer 9 or earlier versions of IE. Therefore, if you’re using Internet Explorer 8 or Internet Explorer 9, all ActiveX controls will always be marked as not EPM-compatible.
-
-- **Reason.** The ActiveX control can be blocked or allowed for any of these reasons:
-
-|Reason |Corresponds to |Description |
-|-------------------------|---------------|-------------------------------------------------|
-|Version not in blocklist |Allowed |The version of the loaded ActiveX control is explicitly allowed by the IE version list. |
-|Trusted domain |Allowed |The ActiveX control was loaded on a domain listed in the **Turn off blocking of outdated ActiveX controls for IE on specific domains** setting. |
-|File doesn’t exist |Allowed |The loaded ActiveX control is missing required binaries to run correctly. |
-|Out-of-date |Blocked |The loaded ActiveX control is explicitly blocked by the IE version list because it is out-of-date. |
-|Not in blocklist |Allowed |The loaded ActiveX control isn’t in the IE version list. |
-|Managed by policy |Allowed |The loaded ActiveX control is managed by a Group Policy setting that isn’t listed here, and will be managed in accordance with that Group Policy setting. |
-|Trusted Site Zone or intranet |Allowed |The ActiveX control was loaded in the Trusted Sites Zone or the Local Intranet Zone. |
-|Hardblocked |Blocked |The loaded ActiveX control is blocked in IE because it contains known security vulnerabilities. |
-|Unknown |Allowed or blocked |None of the above apply. |
-
-### Inventory your ActiveX controls by using a local WMI class
-For Windows 10 you also have the option to log your inventory info to a local WMI class. Info logged to this class includes all of info you get from the .csv file, plus the CLSID of the loaded ActiveX control or the name of any apps started from an ActiveX control.
-
-#### Before you begin
-Before you can use WMI to inventory your ActiveX controls, you need to [download the configuration package (.zip file)](https://go.microsoft.com/fwlink/p/?LinkId=616971), which includes:
-
-- **ConfigureWMILogging.ps1**. A Windows PowerShell script.
-
-- **ActiveXWMILogging.mof**. A managed object file.
-
-Before running the PowerShell script, you must copy both the .ps1 and .mof file to the same directory location, on the client computer.
-
- **To configure IE to use WMI logging**
-
-1. Open your Group Policy editor and turn on the `Administrative Templates\Windows Components\Internet Explorer\Turn on ActiveX control logging in IE` setting.
-
-2. On the client device, start PowerShell in elevated mode (using admin privileges) and run `ConfigureWMILogging.ps1` by by-passing the PowerShell execution policy, using this command:
- ```
- powershell –ExecutionPolicy Bypass .\ConfigureWMILogging.ps1
- ```
- For more info, see [about_Execution_Policies](https://go.microsoft.com/fwlink/p/?linkid=517460).
-
-3. **Optional:** Set up your domain firewall for WMI data. For more info, see [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md).
-
-The inventory info appears in the WMI class, `IEAXControlBlockingAuditInfo`, located in the WMI namespace, *root\\cimv2\\IETelemetry*. To collect the inventory info from your client computers, we recommend using System Center 2012 R2 Configuration Manager or any agent that can access the WMI data. For more info, see [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md).
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Use out-of-date ActiveX control blocking to help you know when IE prevents a webpage from loading outdated ActiveX controls and to update the outdated control, so that it’s safer to use.
+author: dansimp
+ms.author: dansimp
+ms.prod: ie11
+ms.assetid: e61866bb-1ff1-4a8d-96f2-61d3534e8199
+ms.reviewer:
+audience: itpro
+manager: dansimp
+title: Out-of-date ActiveX control blocking (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 05/10/2018
+---
+
+
+# Out-of-date ActiveX control blocking
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+- Windows Vista SP2
+
+ActiveX controls are small apps that let websites provide content, like videos, games, and let you interact with content like toolbars. Unfortunately, because many ActiveX controls aren’t automatically updated, they can become outdated as new versions are released. It’s very important that you keep your ActiveX controls up-to-date because malicious software (or malware) can target security flaws in outdated controls, damaging your computer by collecting info from it, installing unwanted software, or by letting someone else control it remotely. To help avoid this situation, Internet Explorer includes a new security feature, called *out-of-date ActiveX control blocking*.
+
+Out-of-date ActiveX control blocking lets you:
+
+- Know when IE prevents a webpage from loading common, but outdated ActiveX controls.
+
+- Interact with other parts of the webpage that aren’t affected by the outdated control.
+
+- Update the outdated control, so that it’s up-to-date and safer to use.
+
+The out-of-date ActiveX control blocking feature works with all [Security Zones](https://go.microsoft.com/fwlink/p/?LinkId=403863), except the Local Intranet Zone and the Trusted Sites Zone.
+
+It also works with these operating system and IE combinations:
+
+|Windows operating system |IE version |
+|----------------------------------------|---------------------------------|
+|Windows 10 |All supported versions of IE.
Microsoft Edge doesn't support ActiveX controls. |
+|Windows 8.1 and Windows 8.1 Update |All supported versions of IE |
+|Windows 7 SP1 |All supported versions of IE |
+|Windows Server 2012 |All supported versions of IE |
+|Windows Server 2008 R2 SP1 |All supported versions of IE |
+|Windows Server 2008 SP2 |Windows Internet Explorer 9 only |
+|Windows Vista SP2 |Windows Internet Explorer 9 only |
+
+For more info about this new feature, see the [Internet Explorer begins blocking out-of-date ActiveX controls](https://go.microsoft.com/fwlink/p/?LinkId=507691) blog. To see the complete list of out-of-date Active controls blocked by this feature, see [Blocked out-of-date ActiveX controls](blocked-out-of-date-activex-controls.md).
+
+
+## What does the out-of-date ActiveX control blocking notification look like?
+When IE blocks an outdated ActiveX control, you’ll see a notification bar similar to this, depending on your version of IE:
+
+**Internet Explorer 9 through Internet Explorer 11**
+
+
+
+**Windows Internet Explorer 8**
+
+
+
+Out-of-date ActiveX control blocking also gives you a security warning that tells you if a webpage tries to launch specific outdated apps, outside of IE:
+
+
+
+
+## How do I fix an outdated ActiveX control or app?
+From the notification about the outdated ActiveX control, you can go to the control’s website to download its latest version.
+
+ **To get the updated ActiveX control**
+
+1. From the notification bar, tap or click **Update**.
+IE opens the ActiveX control’s website.
+
+2. Download the latest version of the control.
+
+**Security Note:**
If you don’t fully trust a site, you shouldn’t allow it to load an outdated ActiveX control. However, although we don’t recommend it, you can view the missing webpage content by tapping or clicking **Run this time**. This option runs the ActiveX control without updating or fixing the problem. The next time you visit a webpage running the same outdated ActiveX control, you’ll get the notification again.
+
+ **To get the updated app**
+
+1. From the security warning, tap or click **Update** link.
+IE opens the app’s website.
+
+2. Download the latest version of the app.
+
+**Security Note:**
If you don’t fully trust a site, you shouldn’t allow it to launch an outdated app. However, although we don’t recommend it, you can let the webpage launch the app by tapping or clicking **Allow**. This option opens the app without updating or fixing the problem. The next time you visit a webpage running the same outdated app, you’ll get the notification again.
+
+## How does IE decide which ActiveX controls to block?
+IE uses Microsoft’s versionlist.xml or versionlistWin7.xml file to determine whether an ActiveX control should be stopped from loading. These files are updated with newly-discovered out-of-date ActiveX controls, which IE automatically downloads to your local copy of the file.
+
+You can see your copy of the file here `%LOCALAPPDATA%\Microsoft\Internet Explorer\VersionManager\versionlist.xml` or you can view Microsoft’s version, based on your operating system and version of IE, here:
+- [Internet Explorer 11 on Windows 7 SP1 or Windows Server 2008 R2](https://go.microsoft.com/fwlink/p/?LinkId=798230)
+- [All other configurations](https://go.microsoft.com/fwlink/p/?LinkId=403864)
+
+**Security Note:**
Although we strongly recommend against it, if you don’t want your computer to automatically download the updated version list from Microsoft, run the following command from a command prompt:
+
+```
+reg add "HKCU\Software\Microsoft\Internet Explorer\VersionManager" /v DownloadVersionList /t REG_DWORD /d 0 /f
+```
+Turning off this automatic download breaks the out-of-date ActiveX control blocking feature by not letting the version list update with newly outdated controls, potentially compromising the security of your computer. Use this configuration option at your own risk.
+
+## Out-of-date ActiveX control blocking on managed devices
+Out-of-date ActiveX control blocking includes four new Group Policy settings that you can use to manage your web browser configuration, based on your domain controller. You can download the administrative templates, including the new settings, from the [Administrative templates (.admx) for Windows 10](https://go.microsoft.com/fwlink/p/?LinkId=746579) page or the [Administrative Templates (.admx) for Windows 8.1 and Windows Server 2012 R2](https://go.microsoft.com/fwlink/p/?LinkId=746580) page, depending on your operating system.
+
+### Group Policy settings
+Here’s a list of the new Group Policy info, including the settings, location, requirements, and Help text strings. All of these settings can be set in either the Computer Configuration or User Configuration scope, but Computer Configuration takes precedence over User Configuration.
+
+**Important**
+Out-of-date ActiveX control blocking is turned off in the Local Intranet Zone and the Trusted Sites Zone; therefore, intranet websites and line-of-business apps will continue to use out-of-date ActiveX controls without disruption.
+
+|Setting |Category path |Supported on |Help text |
+|--------|--------------|-------------|----------|
+|Turn on ActiveX control logging in IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting determines whether IE saves log information for ActiveX controls.
If you enable this setting, IE logs ActiveX control information (including the source URI that loaded the control and whether it was blocked) to a local file.
If you disable or don't configure this setting, IE won't log ActiveX control information.
Note that you can turn this setting on or off regardless of the **Turn off blocking of outdated ActiveX controls for IE** or **Turn off blocking of outdated ActiveX controls for IE on specific domains** settings. |
+|Remove the **Run this time** button for outdated ActiveX controls in IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management`|Internet Explorer 8 through IE11 |This setting allows you stop users from seeing the **Run this time** button and from running specific outdated ActiveX controls in IE.
If you enable this setting, users won't see the **Run this time** button on the warning message that appears when IE blocks an outdated ActiveX control.
If you disable or don't configure this setting, users will see the **Run this time** button on the warning message that appears when IE blocks an outdated ActiveX control. Clicking this button lets the user run the outdated ActiveX control once. |
+|Turn off blocking of outdated ActiveX controls for IE on specific domains |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting allows you to manage a list of domains on which IE will stop blocking outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone.
If you enable this setting, you can enter a custom list of domains for which outdated ActiveX controls won't be blocked in IE. Each domain entry must be formatted like one of the following:
- **"domainname.TLD".** For example, if you want to include `*.contoso.com/*`, use "contoso.com".
- **"hostname".** For example, if you want to include `https://example`, use "example".
- **"file:///path/filename.htm"**. For example, use `file:///C:/Users/contoso/Desktop/index.htm`.
If you disable or don't configure this setting, the list is deleted and IE continues to block specific outdated ActiveX controls on all domains in the Internet Zone. |
+|Turn off blocking of outdated ActiveX controls for IE |`Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management` |Internet Explorer 8 through IE11 |This setting determines whether IE blocks specific outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone.
If you enable this setting, IE stops blocking outdated ActiveX controls.
If you disable or don't configure this setting, IE continues to block specific outdated ActiveX controls. |
+|Remove the **Update** button in the out-of-date ActiveX control blocking notification for IE |This functionality is only available through the registry |Internet Explorer 8 through IE11 |This setting determines whether the out-of-date ActiveX control blocking notification shows the **Update** button. This button points users to update specific out-of-date ActiveX controls in IE. |
+
+
+If you don't want to use Group Policy, you can also turn these settings on or off using the registry. You can update the registry manually.
+
+|Setting |Registry setting |
+|-------------------------|----------------------------------------------------------------|
+|Turn on ActiveX control logging in IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v AuditModeEnabled /t REG_DWORD /d 1 /f`
Where:
- **0 or not configured.** Logs ActiveX control information (including the source URI that loaded the control and whether it was blocked) to a local file.
- **1.** Logs ActiveX control information.
|
+|Remove **Run this time** button for outdated ActiveX controls in IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v RunThisTimeEnabled /t REG_DWORD /d 0 /f`Where:
- **0.** Removes the **Run this time** button.
- **1 or not configured.** Leaves the **Run this time** button.
|
+|Turn off blocking of outdated ActiveX controls for IE on specific domains |reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext\Domain" /v contoso.com /t REG_SZ /f
Where:
- **contoso.com.** A single domain on which outdated ActiveX controls won't be blocked in IE. Use a new `reg add` command for each domain you wish to add to the **Allow** list.
|
+|Turn off blocking of outdated ActiveX controls for IE |`reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Ext" /v VersionCheckEnabled /t REG_DWORD /d 0 /f`Where:
- **0.** Stops blocking outdated ActiveX controls.
- **1 or not configured.** Continues to block specific outdated ActiveX controls.
|
+|Remove the **Update** button in the out-of-date ActiveX control blocking notification for IE |`reg add "HKCU\Software\Microsoft\Internet Explorer\VersionManager" /v UpdateEnabled /t REG_DWORD /d 0 /f`Where:
- **0.** Removes the **Update** button
- **1 or not configured.** Leaves the **Update** button.
+
+## Inventory your ActiveX controls
+You can inventory the ActiveX controls being used in your company, by turning on the **Turn on ActiveX control logging in IE** setting:
+
+- **Windows 10:** Through a comma-separated values (.csv) file or through a local Windows Management Instrumentation (WMI) class.
+
+- **All other versions of Microsoft Windows:** Through a .csv file only.
+
+
+### Inventory your ActiveX controls by using a .CSV file
+If you decide to inventory the ActiveX controls being used in your company by turning on the **Turn on ActiveX control logging in IE** setting, IE logs the ActiveX control information to the `%LOCALAPPDATA%\Microsoft\Internet Explorer\AuditMode\VersionAuditLog.csv` file.
+
+Here’s a detailed example and description of what’s included in the VersionAuditLog.csv file.
+
+|Source URI |File path |Product version |File version |Allowed/Blocked |Reason |EPM-compatible |
+|-----------|----------|----------------|-------------|----------------|-------|---------------|
+|`https://contoso.com/test1.html` |C:\Windows\System32\Macromed\Flash\Flash.ocx |14.0.0.125 |14.0.0.125 |Allowed |Not in blocklist |EPM-compatible |
+|`https://contoso.com/test2.html` |C:\Program Files\Java\jre6\bin\jp2iexp.dll |6.0.410.2 |6.0.410.2 |Blocked |Out of date |Not EPM-compatible |
+
+**Where:**
+- **Source URI.** The URL of the page that loaded the ActiveX control.
+
+- **File path.** The location of the binary that implements the ActiveX control.
+
+- **Product version.** The product version of the binary that implements the ActiveX control.
+
+- **File version.** The file version of the binary that implements the ActiveX control.
+
+- **Allowed/Blocked** Whether IE blocked the ActiveX control.
+
+- **Enhanced Protected Mode (EPM)-compatible.** Whether the loaded ActiveX control is compatible with [Enhanced Protected Mode](https://go.microsoft.com/fwlink/p/?LinkId=403865).**Note**
Enhanced Protected Mode isn’t supported on Internet Explorer 9 or earlier versions of IE. Therefore, if you’re using Internet Explorer 8 or Internet Explorer 9, all ActiveX controls will always be marked as not EPM-compatible.
+
+- **Reason.** The ActiveX control can be blocked or allowed for any of these reasons:
+
+|Reason |Corresponds to |Description |
+|-------------------------|---------------|-------------------------------------------------|
+|Version not in blocklist |Allowed |The version of the loaded ActiveX control is explicitly allowed by the IE version list. |
+|Trusted domain |Allowed |The ActiveX control was loaded on a domain listed in the **Turn off blocking of outdated ActiveX controls for IE on specific domains** setting. |
+|File doesn’t exist |Allowed |The loaded ActiveX control is missing required binaries to run correctly. |
+|Out-of-date |Blocked |The loaded ActiveX control is explicitly blocked by the IE version list because it is out-of-date. |
+|Not in blocklist |Allowed |The loaded ActiveX control isn’t in the IE version list. |
+|Managed by policy |Allowed |The loaded ActiveX control is managed by a Group Policy setting that isn’t listed here, and will be managed in accordance with that Group Policy setting. |
+|Trusted Site Zone or intranet |Allowed |The ActiveX control was loaded in the Trusted Sites Zone or the Local Intranet Zone. |
+|Hardblocked |Blocked |The loaded ActiveX control is blocked in IE because it contains known security vulnerabilities. |
+|Unknown |Allowed or blocked |None of the above apply. |
+
+### Inventory your ActiveX controls by using a local WMI class
+For Windows 10 you also have the option to log your inventory info to a local WMI class. Info logged to this class includes all of info you get from the .csv file, plus the CLSID of the loaded ActiveX control or the name of any apps started from an ActiveX control.
+
+#### Before you begin
+Before you can use WMI to inventory your ActiveX controls, you need to [download the configuration package (.zip file)](https://go.microsoft.com/fwlink/p/?LinkId=616971), which includes:
+
+- **ConfigureWMILogging.ps1**. A Windows PowerShell script.
+
+- **ActiveXWMILogging.mof**. A managed object file.
+
+Before running the PowerShell script, you must copy both the .ps1 and .mof file to the same directory location, on the client computer.
+
+ **To configure IE to use WMI logging**
+
+1. Open your Group Policy editor and turn on the `Administrative Templates\Windows Components\Internet Explorer\Turn on ActiveX control logging in IE` setting.
+
+2. On the client device, start PowerShell in elevated mode (using admin privileges) and run `ConfigureWMILogging.ps1` by by-passing the PowerShell execution policy, using this command:
+ ```
+ powershell –ExecutionPolicy Bypass .\ConfigureWMILogging.ps1
+ ```
+ For more info, see [about_Execution_Policies](https://go.microsoft.com/fwlink/p/?linkid=517460).
+
+3. **Optional:** Set up your domain firewall for WMI data. For more info, see [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md).
+
+The inventory info appears in the WMI class, `IEAXControlBlockingAuditInfo`, located in the WMI namespace, *root\\cimv2\\IETelemetry*. To collect the inventory info from your client computers, we recommend using System Center 2012 R2 Configuration Manager or any agent that can access the WMI data. For more info, see [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md).
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md
index 7b0af11274..80a59c9305 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/problems-after-installing-ie11.md
@@ -1,73 +1,74 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-description: Possible solutions to the problems you might encounter after installing IE11, such as crashing or seeming slow, getting into an unusable state, or problems with adaptive streaming and DRM playback.
-author: lomayor
-ms.prod: ie11
-ms.assetid: c4b75ad3-9c4a-4dd2-9fed-69f776f542e6
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Problems after installing Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 10/16/2017
----
-
-
-# Problems after installing Internet Explorer 11
-After you install Internet Explorer 11 in your organization, you might run into the following issues. By following these suggestions, you should be able to fix them.
-
-## Internet Explorer is in an unusable state
-If IE11 gets into an unusable state on an employee's computer, you can use the **Reset Internet Explorer Settings (RIES)** feature to restore the default settings for many of the browser features, including:
-
-- Search scopes
-
-- Appearance settings
-
-- Toolbars
-
-- ActiveX® controls (resets to the opt-in state, unless they're pre-approved)
-
-- Branding settings created with IEAK 11
-
-RIES does not:
-
-- Clear the Favorites list, RSS feeds, or Web slices.
-
-- Reset connection or proxy settings.
-
-- Affect the applied Administrative Template Group Policy settings.
-
-RIES turns off all custom toolbars, browser extensions, and customizations installed with IE11. If you change your mind, you can turn each of the customizations back on through the **Manage Add-ons** dialog box. For more information about resetting IE settings, see [How to Reset Internet Explorer Settings](https://go.microsoft.com/fwlink/p/?LinkId=214528).
-
-## IE is crashing or seems slow
-If you notice that CPU usage is running higher than normal, or that IE is frequently crashing or slowing down, you should check your browser add-ons and video card. By default, IE11 uses graphics processing unit (GPU) rendering mode. However, some outdated video cards and video drivers don't support GPU hardware acceleration. If IE11 determines that your current video card or video driver doesn't support GPU hardware acceleration, it'll use Software Rendering mode.
-
- **To check your browser add-ons**
-
-1. Start IE11 in **No Add-ons mode** by running the **Run** command from the **Start** menu, and then typing `iexplore.exe -extoff` into the box.
-
-2. Check if IE still crashes.
- If the browser doesn't crash, open Internet Explorer for the desktop, click the **Tools** menu, and click **Manage Add-ons**.
-
-3. Click **Toolbars and Extensions**, click each toolbar or extension, clicking **Disable** to turn off all of the browser extensions and toolbars.
-
-4. Restart IE11. Go back to the **Manage Add-Ons** window and turn on each item, one-by-one.
- After you turn each item back on, see if IE crashes or slows down. Doing it this way will help you identify the add-on that's causing IE to crash. After you've figured out which add-on was causing the problem, turn it off until you have an update from the manufacturer.
-
- **To check for Software Rendering mode**
-
-5. Open Internet Explorer for the desktop, click the **Tools** menu, and then click **Internet Options**.
-
-6. On the **Advanced** tab, go to the **Accelerated graphics** section, and then turn on Software Rendering mode by choosing the **Use software rendering instead of GPU rendering** box.
- If the **Use software rendering instead of GPU rendering** option is greyed out, it means that your current video card or video driver doesn't support GPU hardware acceleration. For more information, see [Windows 10 Support](https://go.microsoft.com/fwlink/?LinkId=746588).
-
-## Adaptive streaming and DRM playback don’t work with Windows Server 2012 R2
-IE11 in Windows Server 2012 R2 doesn’t include media features like adaptive streaming or Digital Rights Management (DRM) playback. To add these features, you’ll need to download and install the Media Feature Pack from the [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=320789), as well as an app that uses PlayReady DRM from the Microsoft Store, such as the Xbox Music app or Xbox Video app. The app must be installed to specifically turn on DRM features, while all other media features are installed with the Media Feature Pack.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+description: Possible solutions to the problems you might encounter after installing IE11, such as crashing or seeming slow, getting into an unusable state, or problems with adaptive streaming and DRM playback.
+author: dansimp
+ms.prod: ie11
+ms.assetid: c4b75ad3-9c4a-4dd2-9fed-69f776f542e6
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Problems after installing Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 10/16/2017
+---
+
+
+# Problems after installing Internet Explorer 11
+After you install Internet Explorer 11 in your organization, you might run into the following issues. By following these suggestions, you should be able to fix them.
+
+## Internet Explorer is in an unusable state
+If IE11 gets into an unusable state on an employee's computer, you can use the **Reset Internet Explorer Settings (RIES)** feature to restore the default settings for many of the browser features, including:
+
+- Search scopes
+
+- Appearance settings
+
+- Toolbars
+
+- ActiveX® controls (resets to the opt-in state, unless they're pre-approved)
+
+- Branding settings created with IEAK 11
+
+RIES does not:
+
+- Clear the Favorites list, RSS feeds, or Web slices.
+
+- Reset connection or proxy settings.
+
+- Affect the applied Administrative Template Group Policy settings.
+
+RIES turns off all custom toolbars, browser extensions, and customizations installed with IE11. If you change your mind, you can turn each of the customizations back on through the **Manage Add-ons** dialog box. For more information about resetting IE settings, see [How to Reset Internet Explorer Settings](https://go.microsoft.com/fwlink/p/?LinkId=214528).
+
+## IE is crashing or seems slow
+If you notice that CPU usage is running higher than normal, or that IE is frequently crashing or slowing down, you should check your browser add-ons and video card. By default, IE11 uses graphics processing unit (GPU) rendering mode. However, some outdated video cards and video drivers don't support GPU hardware acceleration. If IE11 determines that your current video card or video driver doesn't support GPU hardware acceleration, it'll use Software Rendering mode.
+
+ **To check your browser add-ons**
+
+1. Start IE11 in **No Add-ons mode** by running the **Run** command from the **Start** menu, and then typing `iexplore.exe -extoff` into the box.
+
+2. Check if IE still crashes.
+ If the browser doesn't crash, open Internet Explorer for the desktop, click the **Tools** menu, and click **Manage Add-ons**.
+
+3. Click **Toolbars and Extensions**, click each toolbar or extension, clicking **Disable** to turn off all of the browser extensions and toolbars.
+
+4. Restart IE11. Go back to the **Manage Add-Ons** window and turn on each item, one-by-one.
+ After you turn each item back on, see if IE crashes or slows down. Doing it this way will help you identify the add-on that's causing IE to crash. After you've figured out which add-on was causing the problem, turn it off until you have an update from the manufacturer.
+
+ **To check for Software Rendering mode**
+
+5. Open Internet Explorer for the desktop, click the **Tools** menu, and then click **Internet Options**.
+
+6. On the **Advanced** tab, go to the **Accelerated graphics** section, and then turn on Software Rendering mode by choosing the **Use software rendering instead of GPU rendering** box.
+ If the **Use software rendering instead of GPU rendering** option is greyed out, it means that your current video card or video driver doesn't support GPU hardware acceleration. For more information, see [Windows 10 Support](https://go.microsoft.com/fwlink/?LinkId=746588).
+
+## Adaptive streaming and DRM playback don’t work with Windows Server 2012 R2
+IE11 in Windows Server 2012 R2 doesn’t include media features like adaptive streaming or Digital Rights Management (DRM) playback. To add these features, you’ll need to download and install the Media Feature Pack from the [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?LinkId=320789), as well as an app that uses PlayReady DRM from the Microsoft Store, such as the Xbox Music app or Xbox Video app. The app must be installed to specifically turn on DRM features, while all other media features are installed with the Media Feature Pack.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
index f77ef953c0..df8a2b1707 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
@@ -1,48 +1,49 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Instructions about how to clear all of the sites from your global Enterprise Mode site list.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 90f38a6c-e0e2-4c93-9a9e-c425eca99e97
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Remove all sites from your Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Remove all sites from your Enterprise Mode site list using the Enterprise Mode Site List Manager
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-You can clear all of the sites from your global Enterprise Mode site list.
-
-**Important**
-This is a permanent removal and erases everything. However, if you determine it was a mistake, and you saved an XML copy of your list, you can add the file again by following the steps in the [Add multiple sites to the Enterprise Mode site list using a file and Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md), depending on your operating system.
-
- **To clear your compatibility list**
-
-1. On the **File** menu of the Enterprise Mode Site List Manager, click **Clear list**.
-
-2. Click **Yes** in the warning message.
Your sites are all cleared from your list.
-
-## Related topics
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Instructions about how to clear all of the sites from your global Enterprise Mode site list.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 90f38a6c-e0e2-4c93-9a9e-c425eca99e97
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Remove all sites from your Enterprise Mode site list using the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Remove all sites from your Enterprise Mode site list using the Enterprise Mode Site List Manager
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+You can clear all of the sites from your global Enterprise Mode site list.
+
+**Important**
+This is a permanent removal and erases everything. However, if you determine it was a mistake, and you saved an XML copy of your list, you can add the file again by following the steps in the [Add multiple sites to the Enterprise Mode site list using a file and Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md), depending on your operating system.
+
+ **To clear your compatibility list**
+
+1. On the **File** menu of the Enterprise Mode Site List Manager, click **Clear list**.
+
+2. Click **Yes** in the warning message.
Your sites are all cleared from your list.
+
+## Related topics
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-compatibililty-view-list.md b/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-compatibililty-view-list.md
index b682c46207..4995a12e9a 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-compatibililty-view-list.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-compatibililty-view-list.md
@@ -1,42 +1,43 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Instructions about how to remove sites from a local compatibility view list.
-author: lomayor
-ms.prod: ie11
-ms.assetid: f6ecaa75-ebcb-4f8d-8721-4cd6e73c0ac9
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Remove sites from a local compatibility view list (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Remove sites from a local compatibility view list
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Remove websites that were added to a local compatibility view list by mistake or because they no longer have compatibility problems.
-
- **To remove sites from a local compatibility view list**
-
-1. Open Internet Explorer 11, click **Tools**, and then click **Compatibility View Settings**.
-
-2. Pick the site to remove, and then click **Remove**.
-Sites can only be removed one at a time. If one is removed by mistake, it can be added back using this same box and the **Add** section.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Instructions about how to remove sites from a local compatibility view list.
+author: dansimp
+ms.prod: ie11
+ms.assetid: f6ecaa75-ebcb-4f8d-8721-4cd6e73c0ac9
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Remove sites from a local compatibility view list (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Remove sites from a local compatibility view list
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Remove websites that were added to a local compatibility view list by mistake or because they no longer have compatibility problems.
+
+ **To remove sites from a local compatibility view list**
+
+1. Open Internet Explorer 11, click **Tools**, and then click **Compatibility View Settings**.
+
+2. Pick the site to remove, and then click **Remove**.
+Sites can only be removed one at a time. If one is removed by mistake, it can be added back using this same box and the **Add** section.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-enterprise-mode-site-list.md b/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-enterprise-mode-site-list.md
index 6cfccfd925..c9b859509b 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-enterprise-mode-site-list.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/remove-sites-from-a-local-enterprise-mode-site-list.md
@@ -1,58 +1,59 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Instructions about how to remove sites from a local Enterprise Mode site list.
-author: lomayor
-ms.prod: ie11
-ms.assetid: c7d6dd0b-e264-42bb-8c9d-ac2f837018d2
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Remove sites from a local Enterprise Mode site list (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Remove sites from a local Enterprise Mode site list
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Remove websites that were added to a local Enterprise Mode site list by mistake or because the sites no longer have compatibility problems.
-
-**Note**
The changes described in this topic only impact sites added to a local Enterprise Mode site list and not the list of sites deployed to all employees by an administrator. Employees can't delete sites added to the list by an administrator.
-
- **To remove single sites from a local Enterprise Mode site list**
-
-1. Open Internet Explorer 11 and go to the site you want to remove.
-
-2. Click **Tools**, and then click **Enterprise Mode**.
-The checkmark disappears from next to Enterprise Mode and the site is removed from the list.
-
-**Note**
If the site is removed by mistake, it can be added back by clicking **Enterprise Mode** again.
-
- **To remove all sites from a local Enterprise Mode site list**
-
-1. Open IE11, click **Tools**, and then click **Internet options**.
-
-2. Click the **Delete** button from the **Browsing history** area.
-
-3. Click the box next to **Cookies and website data**, and then click **Delete**.
-
-**Note**
This removes all of the sites from a local Enterprise Mode site list.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Instructions about how to remove sites from a local Enterprise Mode site list.
+author: dansimp
+ms.prod: ie11
+ms.assetid: c7d6dd0b-e264-42bb-8c9d-ac2f837018d2
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Remove sites from a local Enterprise Mode site list (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Remove sites from a local Enterprise Mode site list
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Remove websites that were added to a local Enterprise Mode site list by mistake or because the sites no longer have compatibility problems.
+
+**Note**
The changes described in this topic only impact sites added to a local Enterprise Mode site list and not the list of sites deployed to all employees by an administrator. Employees can't delete sites added to the list by an administrator.
+
+ **To remove single sites from a local Enterprise Mode site list**
+
+1. Open Internet Explorer 11 and go to the site you want to remove.
+
+2. Click **Tools**, and then click **Enterprise Mode**.
+The checkmark disappears from next to Enterprise Mode and the site is removed from the list.
+
+**Note**
If the site is removed by mistake, it can be added back by clicking **Enterprise Mode** again.
+
+ **To remove all sites from a local Enterprise Mode site list**
+
+1. Open IE11, click **Tools**, and then click **Internet options**.
+
+2. Click the **Delete** button from the **Browsing history** area.
+
+3. Click the box next to **Cookies and website data**, and then click **Delete**.
+
+**Note**
This removes all of the sites from a local Enterprise Mode site list.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md
index 48ead2d656..28b18117e1 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md
@@ -1,46 +1,47 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: You can save your current Enterprise Mode compatibility site list as an XML file, for distribution and use by your managed systems.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 254a986b-494f-4316-92c1-b089ee8b3e0a
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Save your site list to XML in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Save your site list to XML in the Enterprise Mode Site List Manager
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-You can save your current Enterprise Mode compatibility site list as an XML file, for distribution and use by your managed systems.
-
- **To save your list as XML**
-
-1. On the **File** menu of the Enterprise Mode Site List Manager, click **Save to XML**.
-
-2. Save the file to the location you specified in your Enterprise Mode registry key, set up when you turned on Enterprise Mode for use in your company. For information about the Enterprise Mode registry key, see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md).
-The first time a user starts Internet Explorer 11 on a managed device; Internet Explorer will look for a new version of the site list at the specified location. If the browser finds an updated site list, IE downloads the new XML site list and uses it.
-
-## Related topics
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: You can save your current Enterprise Mode compatibility site list as an XML file, for distribution and use by your managed systems.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 254a986b-494f-4316-92c1-b089ee8b3e0a
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Save your site list to XML in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Save your site list to XML in the Enterprise Mode Site List Manager
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+You can save your current Enterprise Mode compatibility site list as an XML file, for distribution and use by your managed systems.
+
+ **To save your list as XML**
+
+1. On the **File** menu of the Enterprise Mode Site List Manager, click **Save to XML**.
+
+2. Save the file to the location you specified in your Enterprise Mode registry key, set up when you turned on Enterprise Mode for use in your company. For information about the Enterprise Mode registry key, see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md).
+The first time a user starts Internet Explorer 11 on a managed device; Internet Explorer will look for a new version of the site list at the specified location. If the browser finds an updated site list, IE downloads the new XML site list and uses it.
+
+## Related topics
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/schedule-production-change-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/schedule-production-change-enterprise-mode-portal.md
index b2a83dc360..4565b9f0c1 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/schedule-production-change-enterprise-mode-portal.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/schedule-production-change-enterprise-mode-portal.md
@@ -1,53 +1,54 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Details about how Administrators can schedule approved change requests for production in the Enterprise Mode Site List Portal.
-author: lomayor
-ms.prod: ie11
-title: Schedule approved change requests for production using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
----
-
-# Schedule approved change requests for production using the Enterprise Mode Site List Portal
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-After a change request is approved, the original Requester can schedule the change for the production environment. The change can be immediate or set for a future time.
-
-**To schedule an immediate change**
-1. The Requester logs onto the Enterprise Mode Site List Portal and clicks **In Progress** from the left pane.
-
-2. The Requester clicks the **Approved** status for the change request.
-
- The **Schedule changes** page appears.
-
-3. The Requester clicks **Now**, and then clicks **Save**.
-
- The update is scheduled to immediately update the production environment, and an email is sent to the Requester. After the update finishes, the Requester is asked to verify the changes.
-
-
-**To schedule the change for a different day or time**
-1. The Requester logs onto the Enterprise Mode Site List Portal and clicks **In Progress** from the left pane.
-
-2. The Requester clicks the **Approved** status for the change request.
-
- The **Schedule changes** page appears.
-
-3. The Requester clicks **Schedule**, sets the **Preferred day**, **Preferred start time**, and the **Preferred end time**, and then clicks **Save**.
-
- The update is scheduled to update the production environment on that day and time and an email is sent to the Requester. After the update finishes, the Requester will be asked to verify the changes.
-
-
-## Next steps
-After the update to the production environment completes, the Requester must again test the change. If the testing succeeds, the Requester can sign off on the change request. If the testing fails, the Requester can contact the Administrator group for more help. For the production environment testing steps, see the [Verify the change request update in the production environment using the Enterprise Mode Site List Portal](verify-changes-production-enterprise-mode-portal.md) topic.
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Details about how Administrators can schedule approved change requests for production in the Enterprise Mode Site List Portal.
+author: dansimp
+ms.prod: ie11
+title: Schedule approved change requests for production using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+ms.reviewer:
+audience: itprom
+manager: dansimp
+ms.author: dansimp
+---
+
+# Schedule approved change requests for production using the Enterprise Mode Site List Portal
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+After a change request is approved, the original Requester can schedule the change for the production environment. The change can be immediate or set for a future time.
+
+**To schedule an immediate change**
+1. The Requester logs onto the Enterprise Mode Site List Portal and clicks **In Progress** from the left pane.
+
+2. The Requester clicks the **Approved** status for the change request.
+
+ The **Schedule changes** page appears.
+
+3. The Requester clicks **Now**, and then clicks **Save**.
+
+ The update is scheduled to immediately update the production environment, and an email is sent to the Requester. After the update finishes, the Requester is asked to verify the changes.
+
+
+**To schedule the change for a different day or time**
+1. The Requester logs onto the Enterprise Mode Site List Portal and clicks **In Progress** from the left pane.
+
+2. The Requester clicks the **Approved** status for the change request.
+
+ The **Schedule changes** page appears.
+
+3. The Requester clicks **Schedule**, sets the **Preferred day**, **Preferred start time**, and the **Preferred end time**, and then clicks **Save**.
+
+ The update is scheduled to update the production environment on that day and time and an email is sent to the Requester. After the update finishes, the Requester will be asked to verify the changes.
+
+
+## Next steps
+After the update to the production environment completes, the Requester must again test the change. If the testing succeeds, the Requester can sign off on the change request. If the testing fails, the Requester can contact the Administrator group for more help. For the production environment testing steps, see the [Verify the change request update in the production environment using the Enterprise Mode Site List Portal](verify-changes-production-enterprise-mode-portal.md) topic.
diff --git a/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
index 985b416947..bc468576ed 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
@@ -1,44 +1,45 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Search to see if a specific site already appears in your global Enterprise Mode site list.
-author: lomayor
-ms.prod: ie11
-ms.assetid: e399aeaf-6c3b-4cad-93c9-813df6ad47f9
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Search your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Search your Enterprise Mode site list in the Enterprise Mode Site List Manager
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-You can search to see if a specific site already appears in your global Enterprise Mode site list so you don’t try to add it again.
-
- **To search your compatibility list**
-
-- From the Enterprise Mode Site List Manager, type part of the URL into the **Search** box.
- The search query searches all of the text. For example, entering *“micro”* will return results like, www.microsoft.com, microsoft.com, and microsoft.com/images. Wildcard characters aren’t supported.
-
-## Related topics
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Search to see if a specific site already appears in your global Enterprise Mode site list.
+author: dansimp
+ms.prod: ie11
+ms.assetid: e399aeaf-6c3b-4cad-93c9-813df6ad47f9
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Search your Enterprise Mode site list in the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Search your Enterprise Mode site list in the Enterprise Mode Site List Manager
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+You can search to see if a specific site already appears in your global Enterprise Mode site list so you don’t try to add it again.
+
+ **To search your compatibility list**
+
+- From the Enterprise Mode Site List Manager, type part of the URL into the **Search** box.
+ The search query searches all of the text. For example, entering *“micro”* will return results like, www.microsoft.com, microsoft.com, and microsoft.com/images. Wildcard characters aren’t supported.
+
+## Related topics
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md b/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
index 829f920161..b6c1af8258 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
@@ -1,38 +1,39 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Use the Group Policy setting, Set a default associations configuration file, to set the default browser for your company devices running Windows 10.
-author: lomayor
-ms.prod: ie11
-ms.assetid: f486c9db-0dc9-4cd6-8a0b-8cb872b1d361
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Set the default browser using Group Policy (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Set the default browser using Group Policy
-You can use the Group Policy setting, **Set a default associations configuration file**, to set the default browser for your company devices running Windows 10.
-
- **To set the default browser as Internet Explorer 11**
-
-1. Open your Group Policy editor and go to the **Computer Configuration\Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.
-Turning this setting on also requires you to create and store a default associations configuration file, locally or on a network share. For more information about creating this file, see [Export or Import Default Application Associations]( https://go.microsoft.com/fwlink/p/?LinkId=618268).
-
- 
-
-2. Click **Enabled**, and then in the **Options** area, type the location to your default associations configuration file.
-If this setting is turned on and your employee's device is domain-joined, this file is processed and default associations are applied at logon. If this setting isn't configured or is turned off, or if your employee's device isn't domain-joined, no default associations are applied at logon.
-
-Your employees can change this setting by changing the Internet Explorer default value from the **Set Default Programs** area of the Control Panel.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Use the Group Policy setting, Set a default associations configuration file, to set the default browser for your company devices running Windows 10.
+author: dansimp
+ms.prod: ie11
+ms.assetid: f486c9db-0dc9-4cd6-8a0b-8cb872b1d361
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Set the default browser using Group Policy (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Set the default browser using Group Policy
+You can use the Group Policy setting, **Set a default associations configuration file**, to set the default browser for your company devices running Windows 10.
+
+ **To set the default browser as Internet Explorer 11**
+
+1. Open your Group Policy editor and go to the **Computer Configuration\Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.
+Turning this setting on also requires you to create and store a default associations configuration file, locally or on a network share. For more information about creating this file, see [Export or Import Default Application Associations]( https://go.microsoft.com/fwlink/p/?LinkId=618268).
+
+ 
+
+2. Click **Enabled**, and then in the **Options** area, type the location to your default associations configuration file.
+If this setting is turned on and your employee's device is domain-joined, this file is processed and default associations are applied at logon. If this setting isn't configured or is turned off, or if your employee's device isn't domain-joined, no default associations are applied at logon.
+
+Your employees can change this setting by changing the Internet Explorer default value from the **Set Default Programs** area of the Control Panel.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md
index ea77e11d87..fd55a40ebd 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md
@@ -1,160 +1,161 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Set up and turn on Enterprise Mode logging and data collection in your organization.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 2e98a280-f677-422f-ba2e-f670362afcde
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Set up Enterprise Mode logging and data collection (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Set up Enterprise Mode logging and data collection
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Using Group Policy, you can turn on Enterprise Mode for Internet Explorer and then you can turn on local user control using the **Let users turn on and use Enterprise Mode from the Tools menu** setting, located in the `Administrative Templates\Windows Components\Internet Explorer` category path. After you turn this setting on, your users can turn on Enterprise Mode locally, from the IE **Tools** menu.
-
-
-
-The **Let users turn on and use Enterprise Mode from the Tools menu** setting also lets you decide where to send the user reports (as a URL). We recommend creating a custom HTTP port 81 to let your incoming user information go to a dedicated site. A dedicated site is important so you can quickly pick out the Enterprise Mode traffic from your other website traffic.
-
-
-
-Getting these reports lets you find out about sites that aren’t working right, so you can add them to your Enterprise Mode site list, without having to locate them all yourself. For more information about creating and using a site list, see the [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or the [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) topic, based on your operating system.
-
-## Using ASP to collect your data
-When you turn logging on, you need a valid URL that points to a server that can be listened to for updates to a user’s registry key. This means you need to set up an endpoint server for the incoming POST messages, which are sent every time the user turns Enterprise Mode on or off from the **Tools** menu.
-
- **To set up an endpoint server**
-
-1. Configure an IIS server to work with your Enterprise Mode data collection process. If you’re unsure how to set up IIS, see the [IIS installation webpage](https://go.microsoft.com/fwlink/p/?LinkId=507609).
-
-2. Open Internet Information Services (IIS) and turn on the ASP components from the **Add Roles and Features Wizard**, **Server Roles** page.
- This lets you create an ASP form that accepts the incoming POST messages.
-
-3. Open the Internet Information Services (IIS) Manager, click **Bindings**, highlight **Port 81**, click **Edit**, and then change the website information to point to Port 81 so it matches your custom-created port.
-
- 
-
-4. Open the **Logging** feature, pick **W3C** for the format, and click **Select Fields** to open the **W3C Logging Fields** box.
-
- 
-
-5. Change the WC3 logging fields to include only the **Date**, **Client IP**, **User Name**, and **URI Query** standard fields, and then click **OK**.
- Using only these fields keeps the log file simple, giving you the date, client IP address, and the website URI information for any site changed by your users.
-
-6. Apply these changes to your default website and close the IIS Manager.
-
-7. Put your EmIE.asp file into the root of the web server, using this command:
-
- ```
- <% @ LANGUAGE=javascript %>
- <%
- Response.AppendToLog(" ;" + Request.Form("URL") + " ;" + Request.Form("EnterpriseMode"));
- %>
- ```
- This code logs your POST fields to your IIS log file, where you can review all of the collected data.
-
-
-### IIS log file information
-This is what your log files will look like after you set everything up and at least one of your users has turned on Enterprise Mode locally from the **Tools** menu. You can see the URL of the problematic website and client IP address of the user that turned on Enterprise Mode.
-
-
-
-
-## Using the GitHub sample to collect your data
-Microsoft has created the [EMIE-Data-Collection_Sample](https://go.microsoft.com/fwlink/p/?LinkId=507401) that shows how to collect your Enterprise Mode reports. This sample only shows how to collect data, it doesn’t show how to aggregate the data into your Enterprise Mode site list.
-This sample starts with you turning on Enterprise Mode and logging (either through Group Policy, or by manually setting the EnterpriseMode registry key) so that your users can use Enterprise Mode locally. For the steps to do this, go to [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md).
-
-**Note**
If you decide to manually change the registry key, you can change the **Enable** setting to `[deployment url]/api/records/`, which automatically sends your reports to this page.
-
-### Setting up, collecting, and viewing reports
-For logging, you’re going to need a valid URL that points to a server that can be listened to for updates to a user’s registry key. This means you need to set up an endpoint server for the incoming POST messages, which are sent every time the user turns Enterprise Mode on or off from the **Tools** menu. These POST messages go into your database, aggregating the report data by URL, giving you the total number of reports where users turned on Enterprise Mode, the total number of reports where users turned off Enterprise Mode, and the date of the last report.
-
- **To set up the sample**
-
-1. Set up a server to collect your Enterprise Mode information from your users.
-
-2. Go to the Internet Explorer/[EMIE-Data_Collection_Sample](https://go.microsoft.com/fwlink/p/?LinkId=507401) page on GitHub and tap or click the **Download ZIP** button to download the complete project.
-
-3. Open Microsoft Visual Studio 2013 with Update 2, and then open the PhoneHomeSample.sln file.
-
-4. On the **Build** menu, tap or click **Build Solution**.
- The required packages are automatically downloaded and included in the solution.
-
- **To set up your endpoint server**
-
-5. Right-click on the name, PhoneHomeSample, and click **Publish**.
-
- 
-
-6. In the **Publish Web** wizard, pick the publishing target and options that work for your organization.
-
- **Important**
- Make sure you have a database associated with your publishing target. Otherwise, your reports won’t be collected and you’ll have problems deploying the website.
-
- 
-
- After you finish the publishing process, you need to test to make sure the app deployed successfully.
-
- **To test, deploy, and use the app**
-
-7. Open a registry editor on the computer where you deployed the app, go to the `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode` key, and change the **Enable** string to:
-
- ``` "Enable"="https:///api/records/"
- ```
- Where `` points to your deployment URL.
-
-8. After you’re sure your deployment works, you can deploy it to your users using one of the following:
-
- - Turn on the **Let users turn on and use Enterprise Mode from the Tools menu** Group Policy setting, putting your `` information into the **Options** box.
-
- - Deploy the registry key in Step 3 using System Center or other management software.
-
-9. Get your users to visit websites, turning Enterprise Mode on or off locally, as necessary.
-
- **To view the report results**
-
-- Go to `https:///List` to see the report results.
-If you’re already on the webpage, you’ll need to refresh the page to see the results.
-
- 
-
-
-### Troubleshooting publishing errors
-If you have errors while you’re publishing your project, you should try to update your packages.
-
- **To update your packages**
-
-1. From the **Tools** menu of Microsoft Visual Studio, click **NuGet Package Manager**, and click **Manage NuGet Packages for Solution**.
-
- 
-
-2. Click **Updates** on the left side of the tool, and click the **Update All** button.
-You may need to do some additional package cleanup to remove older package versions.
-
-## Related topics
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [What is Enterprise Mode?](what-is-enterprise-mode.md)
-- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Set up and turn on Enterprise Mode logging and data collection in your organization.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 2e98a280-f677-422f-ba2e-f670362afcde
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Set up Enterprise Mode logging and data collection (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Set up Enterprise Mode logging and data collection
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Using Group Policy, you can turn on Enterprise Mode for Internet Explorer and then you can turn on local user control using the **Let users turn on and use Enterprise Mode from the Tools menu** setting, located in the `Administrative Templates\Windows Components\Internet Explorer` category path. After you turn this setting on, your users can turn on Enterprise Mode locally, from the IE **Tools** menu.
+
+
+
+The **Let users turn on and use Enterprise Mode from the Tools menu** setting also lets you decide where to send the user reports (as a URL). We recommend creating a custom HTTP port 81 to let your incoming user information go to a dedicated site. A dedicated site is important so you can quickly pick out the Enterprise Mode traffic from your other website traffic.
+
+
+
+Getting these reports lets you find out about sites that aren’t working right, so you can add them to your Enterprise Mode site list, without having to locate them all yourself. For more information about creating and using a site list, see the [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) or the [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) topic, based on your operating system.
+
+## Using ASP to collect your data
+When you turn logging on, you need a valid URL that points to a server that can be listened to for updates to a user’s registry key. This means you need to set up an endpoint server for the incoming POST messages, which are sent every time the user turns Enterprise Mode on or off from the **Tools** menu.
+
+ **To set up an endpoint server**
+
+1. Configure an IIS server to work with your Enterprise Mode data collection process. If you’re unsure how to set up IIS, see the [IIS installation webpage](https://go.microsoft.com/fwlink/p/?LinkId=507609).
+
+2. Open Internet Information Services (IIS) and turn on the ASP components from the **Add Roles and Features Wizard**, **Server Roles** page.
+ This lets you create an ASP form that accepts the incoming POST messages.
+
+3. Open the Internet Information Services (IIS) Manager, click **Bindings**, highlight **Port 81**, click **Edit**, and then change the website information to point to Port 81 so it matches your custom-created port.
+
+ 
+
+4. Open the **Logging** feature, pick **W3C** for the format, and click **Select Fields** to open the **W3C Logging Fields** box.
+
+ 
+
+5. Change the WC3 logging fields to include only the **Date**, **Client IP**, **User Name**, and **URI Query** standard fields, and then click **OK**.
+ Using only these fields keeps the log file simple, giving you the date, client IP address, and the website URI information for any site changed by your users.
+
+6. Apply these changes to your default website and close the IIS Manager.
+
+7. Put your EmIE.asp file into the root of the web server, using this command:
+
+ ```
+ <% @ LANGUAGE=javascript %>
+ <%
+ Response.AppendToLog(" ;" + Request.Form("URL") + " ;" + Request.Form("EnterpriseMode"));
+ %>
+ ```
+ This code logs your POST fields to your IIS log file, where you can review all of the collected data.
+
+
+### IIS log file information
+This is what your log files will look like after you set everything up and at least one of your users has turned on Enterprise Mode locally from the **Tools** menu. You can see the URL of the problematic website and client IP address of the user that turned on Enterprise Mode.
+
+
+
+
+## Using the GitHub sample to collect your data
+Microsoft has created the [EMIE-Data-Collection_Sample](https://go.microsoft.com/fwlink/p/?LinkId=507401) that shows how to collect your Enterprise Mode reports. This sample only shows how to collect data, it doesn’t show how to aggregate the data into your Enterprise Mode site list.
+This sample starts with you turning on Enterprise Mode and logging (either through Group Policy, or by manually setting the EnterpriseMode registry key) so that your users can use Enterprise Mode locally. For the steps to do this, go to [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md).
+
+**Note**
If you decide to manually change the registry key, you can change the **Enable** setting to `[deployment url]/api/records/`, which automatically sends your reports to this page.
+
+### Setting up, collecting, and viewing reports
+For logging, you’re going to need a valid URL that points to a server that can be listened to for updates to a user’s registry key. This means you need to set up an endpoint server for the incoming POST messages, which are sent every time the user turns Enterprise Mode on or off from the **Tools** menu. These POST messages go into your database, aggregating the report data by URL, giving you the total number of reports where users turned on Enterprise Mode, the total number of reports where users turned off Enterprise Mode, and the date of the last report.
+
+ **To set up the sample**
+
+1. Set up a server to collect your Enterprise Mode information from your users.
+
+2. Go to the Internet Explorer/[EMIE-Data_Collection_Sample](https://go.microsoft.com/fwlink/p/?LinkId=507401) page on GitHub and tap or click the **Download ZIP** button to download the complete project.
+
+3. Open Microsoft Visual Studio 2013 with Update 2, and then open the PhoneHomeSample.sln file.
+
+4. On the **Build** menu, tap or click **Build Solution**.
+ The required packages are automatically downloaded and included in the solution.
+
+ **To set up your endpoint server**
+
+5. Right-click on the name, PhoneHomeSample, and click **Publish**.
+
+ 
+
+6. In the **Publish Web** wizard, pick the publishing target and options that work for your organization.
+
+ **Important**
+ Make sure you have a database associated with your publishing target. Otherwise, your reports won’t be collected and you’ll have problems deploying the website.
+
+ 
+
+ After you finish the publishing process, you need to test to make sure the app deployed successfully.
+
+ **To test, deploy, and use the app**
+
+7. Open a registry editor on the computer where you deployed the app, go to the `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode` key, and change the **Enable** string to:
+
+ ``` "Enable"="https:///api/records/"
+ ```
+ Where `` points to your deployment URL.
+
+8. After you’re sure your deployment works, you can deploy it to your users using one of the following:
+
+ - Turn on the **Let users turn on and use Enterprise Mode from the Tools menu** Group Policy setting, putting your `` information into the **Options** box.
+
+ - Deploy the registry key in Step 3 using System Center or other management software.
+
+9. Get your users to visit websites, turning Enterprise Mode on or off locally, as necessary.
+
+ **To view the report results**
+
+- Go to `https:///List` to see the report results.
+If you’re already on the webpage, you’ll need to refresh the page to see the results.
+
+ 
+
+
+### Troubleshooting publishing errors
+If you have errors while you’re publishing your project, you should try to update your packages.
+
+ **To update your packages**
+
+1. From the **Tools** menu of Microsoft Visual Studio, click **NuGet Package Manager**, and click **Manage NuGet Packages for Solution**.
+
+ 
+
+2. Click **Updates** on the left side of the tool, and click the **Update All** button.
+You may need to do some additional package cleanup to remove older package versions.
+
+## Related topics
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [What is Enterprise Mode?](what-is-enterprise-mode.md)
+- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md
index 469464c98f..e63d79527c 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/set-up-enterprise-mode-portal.md
@@ -1,227 +1,228 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Details about how to set up the Enterprise Mode Site List Portal for your organization.
-author: lomayor
-ms.prod: ie11
-title: Set up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
----
-
-# Set up the Enterprise Mode Site List Portal
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-The Enterprise Mode Site List Portal is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management. Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later.
-
-Before you can begin using the Enterprise Mode Site List Portal, you must set up your environment.
-
-## Step 1 - Copy the deployment folder to the web server
-You must download the deployment folder (**EMIEWebPortal/**), which includes all of the source code for the website, from the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) site to your web server.
-
-**To download the source code**
-1. Download the deployment folder from the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) source code to your web server.
-
-2. Install the Node.js® package manager, [npm](https://www.npmjs.com/).
-
- >[!Note]
- >You need to install the npm package manager to replace all the third-party libraries we removed to make the Enterprise Mode Site List Portal open-source.
-
-3. Open File Explorer and then open the **EMIEWebPortal/** folder.
-
-4. Press and hold **Shift**, right-click the window, then click **Open PowerShell window here**.
-
-5. Type _npm i_ into the command prompt, then press **Enter**.
-
- Installs the npm package manager and bulk adds all the third-party libraries back into your codebase.
-
-6. Go back up a directory, open the solution file **EMIEWebPortal.sln** in Visual Studio, open **Web.config** from **EMIEWebPortal/** folder, and replace MSIT-LOB-COMPAT with your server name hosting your database, replace LOBMerged with your database name, and build the entire solution.
-
- >[!Note]
- >Step 3 of this topic provides the steps to create your database.
-
-7. Copy the contents of the **EMIEWebPortal/** folder to a dedicated folder on your file system. For example, _D:\EMIEWebApp_. In a later step, you'll designate this folder as your website in the IIS Manager.
-
-## Step 2 - Create the Application Pool and website, by using IIS
-Create a new Application Pool and the website, by using the IIS Manager.
-
-**To create a new Application Pool**
-1. In IIS Manager, expand your local computer in the **Connections** pane, right-click **Application Pools**, then click **Add Application Pool**.
-
- The **Add Application Pool** box appears.
-
-2. In the **Add Application Pool** box, enter the following info:
-
- - **Name.** Type the name of your new application pool. For example, _EMIEWebAppPool_.
-
- - **.NET CLR version.** Pick the version of .NET CLR used by your application pool from the drop-down box. It must be version 4.0 or higher.
-
- - **Managed pipeline mode.** Pick **Integrated** from the drop-down box. IIS uses the integrated IIS and ASP.NET request-processing pipeline for managed content.
-
-3. Click **OK**.
-
-4. Select your new application pool from the **Application Pool** pane, click **Advanced Settings** from the **Edit Application Pool** area of the **Actions** pane.
-
- The **Advanced Settings** box appears.
-
-5. Make sure your **Identity** value is **ApplicationPoolIdentity**, click **OK**, and then close the box.
-
-6. Open File Explorer and go to your deployment directory, created in Step 1. For example, _D:\EMIEWebApp_.
-
-7. Right-click on the directory, click **Properties**, and then click the **Security** tab.
-
-8. Add your new application pool to the list (for example, _IIS AppPool\EMIEWebAppPool_) with **Full control access**, making sure the location searches the local computer.
-
-9. Add **Everyone** to the list with **Read & execute access**.
-
-**To create the website**
-1. In IIS Manager, expand your local computer in the **Connections** pane, right-click **Sites**, then click **Add Website**.
-
- The **Add Website** box appears.
-
-2. In the **Add Website** box, type the name of your website into the **Site name** box. For example, _EMIEWebApp_, and then click **Select**.
-
- The **Select Application Pool** box appears.
-
-4. Pick the name of the application pool created earlier in this step, and then click **OK**. For example, _EMIEWebAppPool_.
-
-5. In the **Physical path** box, browse to your folder that contains your deployment directory. For example, _D:\EMIEWebApp_.
-
-6. Set up your **Binding**, including your **Binding Type**, **IP address**, and **Port**, as appropriate for your organization.
-
-7. Clear the **Start Website immediately** check box, and then click **OK**.
-
-8. In IIS Manager, expand your local computer, and then double-click your new website. For example, _EMIEWebApp_.
-
- The **<website_name> Home** pane appears.
-
-9. Double-click the **Authentication** icon, right-click on **Windows Authentication**, and then click **Enable**.
-
- >[!Note]
- >You must also make sure that **Anonymous Authentication** is marked as **Enabled**.
-
-## Step 3 - Create and prep your database
-Create a SQL Server database and run our custom query to create the Enterprise Mode Site List tables.
-
-**To create and prep your database**
-1. Start SQL Server Management Studio.
-
-2. Open **Object Explorer** and then connect to an instance of the SQL Server Database Engine.
-
-3. Expand the instance, right-click on **Databases**, and then click **New Database**.
-
-4. Type a database name. For example, _EMIEDatabase_.
-
-5. Leave all default values for the database files, and then click **OK**.
-
-6. Open the **DatabaseScripts/Create DB Tables/1_CreateEMIETables.sql** query file, located in the deployment directory.
-
-7. Replace the database name placeholder with the database name you created earlier. For example, _EMIEDatabase_.
-
-8. Run the query.
-
-## Step 4 - Map your Application Pool to a SQL Server role
-Map your ApplicationPoolIdentity to your database, adding the db_owner role.
-
-**To map your ApplicationPoolIdentity to a SQL Server role**
-1. Start SQL Server Management Studio and connect to your database.
-
-2. Expand the database instance and then open the server-level **Security** folder.
-
- > [!IMPORTANT]
- > Make sure you open the **Security** folder at the server level and not for the database.
-
-3. Right-click **Logins**, and then click **New Login**.
-
- The **Login-New** dialog box appears.
-
-4. Type the following into the **Login name** box, based on your server instance type:
-
- - **Local SQL Server instance.** If you have a local SQL Server instance, where IIS and SQL Server are on the same server, type the name of your Application Pool. For example, _IIS AppPool\EMIEWebAppPool_.
-
- - **Remote SQL Server instance.** If you have a remote SQL Server instance, where IIS and SQL Server are on different servers, type `Domain\ServerName$`.
-
- > [!IMPORTANT]
- > Don't click **Search** in the **Login name** box. Login name searches will resolve to a ServerName\AppPool Name account and SQL Server Management Studio won't be able to resolve the account's virtual Security ID (SID).
-
-5. Click **User Mapping** from the **Select a page** pane, click the checkbox for your database (for example, _EMIEDatabase_) from the **Users mapped to this login** pane, and then click **db_owner** from the list of available roles in the **Database role membership** pane.
-
-6. Click **OK**.
-
-## Step 5 - Restart the Application Pool and website
-Using the IIS Manager, you must restart both your Application Pool and your website.
-
-**To restart your Application Pool and website**
-1. In IIS Manager, expand your local computer in the **Connections** pane, select your website, then click **Restart** from the **Manage Website** pane.
-
-2. In the **Connections** pane, select your Application Pool, and then click **Recycle** from the **Application Pool Tasks** pane.
-
-## Step 6 - Registering as an administrator
-After you've created your database and website, you'll need to register yourself (or another employee) as an administrator for the Enterprise Mode Site List Portal.
-
-**To register as an administrator**
-1. Open Microsoft Edge and type your website URL into the Address bar. For example, https://emieportal:8085.
-
-2. Click **Register now**.
-
-3. Type your name or alias into the **Email** box, making sure it matches the info in the drop-down box.
-
-4. Click **Administrator** from the **Role** box, and then click **Save**.
-
-5. Append your website URL with `/#/EMIEAdminConsole` in the Address bar to go to your administrator console. For example, https://emieportal:8085/#/EMIEAdminConsole.
-
- A dialog box appears, prompting you for the system user name and password. The default user name is EMIEAdmin and the default password is Admin123. We strongly recommend that you change the password by using the **Change password** link as soon as you're done with your first visit.
-
-6. Select your name from the available list, and then click **Activate**.
-
-7. Go to the Enterprise Mode Site List Portal Home page and sign in.
-
-## Step 7 - Configure the SMTP server and port for email notification
-After you've set up the portal, you need to configure your SMTP server and port for email notifications from the system.
-
-**To set up your SMTP server and port for emails**
-1. Open Visual Studio, and then open the web.config file from your deployment directory.
-
-2. Update the SMTP server and port info with your info, using this format:
-
- ```
-
-
- ```
-3. Open the **Settings** page in the Enterprise Mode Site List Portal, and then update the email account and password info.
-
-## Step 8 - Register the scheduler service
-Register the EMIEScheduler tool and service for production site list changes.
-
-**To register the scheduler service**
-
-1. Open File Explorer and go to EMIEWebPortal.SchedulerService\EMIEWebPortal.SchedulerService in your deployment directory, and then copy the **App_Data**, **bin**, and **Logs** folders to a separate folder. For example, C:\EMIEService\.
-
- >[!Important]
- >If you can't find the **bin** and **Logs** folders, you probably haven't built the Visual Studio solution. Building the solution creates the folders and files.
-
-2. In Visual Studio start the Developer Command Prompt as an administrator, and then change the directory to the location of the InstallUtil.exe file. For example, _C:\Windows\Microsoft.NET\Framework\v4.0.30319_.
-
-3. Run the command, `InstallUtil ""`. For example, _InstallUtil "C:\EMIEService\bin\Debug\EMIEWebPortal.SchedulerService.exe"._
-
- You'll be asked for your user name and password for the service.
-
-4. Open the **Run** command, type `Services.msc`, and then start the EMIEScheduler service.
-
-## Related topics
-- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)
-
-- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)
-
-- [Use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md)
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Details about how to set up the Enterprise Mode Site List Portal for your organization.
+author: dansimp
+ms.prod: ie11
+title: Set up the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+---
+
+# Set up the Enterprise Mode Site List Portal
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+The Enterprise Mode Site List Portal is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management. Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later.
+
+Before you can begin using the Enterprise Mode Site List Portal, you must set up your environment.
+
+## Step 1 - Copy the deployment folder to the web server
+You must download the deployment folder (**EMIEWebPortal/**), which includes all of the source code for the website, from the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) site to your web server.
+
+**To download the source code**
+1. Download the deployment folder from the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) source code to your web server.
+
+2. Install the Node.js® package manager, [npm](https://www.npmjs.com/).
+
+ >[!Note]
+ >You need to install the npm package manager to replace all the third-party libraries we removed to make the Enterprise Mode Site List Portal open-source.
+
+3. Open File Explorer and then open the **EMIEWebPortal/** folder.
+
+4. Press and hold **Shift**, right-click the window, then click **Open PowerShell window here**.
+
+5. Type _npm i_ into the command prompt, then press **Enter**.
+
+ Installs the npm package manager and bulk adds all the third-party libraries back into your codebase.
+
+6. Go back up a directory, open the solution file **EMIEWebPortal.sln** in Visual Studio, open **Web.config** from **EMIEWebPortal/** folder, and replace MSIT-LOB-COMPAT with your server name hosting your database, replace LOBMerged with your database name, and build the entire solution.
+
+ >[!Note]
+ >Step 3 of this topic provides the steps to create your database.
+
+7. Copy the contents of the **EMIEWebPortal/** folder to a dedicated folder on your file system. For example, _D:\EMIEWebApp_. In a later step, you'll designate this folder as your website in the IIS Manager.
+
+## Step 2 - Create the Application Pool and website, by using IIS
+Create a new Application Pool and the website, by using the IIS Manager.
+
+**To create a new Application Pool**
+1. In IIS Manager, expand your local computer in the **Connections** pane, right-click **Application Pools**, then click **Add Application Pool**.
+
+ The **Add Application Pool** box appears.
+
+2. In the **Add Application Pool** box, enter the following info:
+
+ - **Name.** Type the name of your new application pool. For example, _EMIEWebAppPool_.
+
+ - **.NET CLR version.** Pick the version of .NET CLR used by your application pool from the drop-down box. It must be version 4.0 or higher.
+
+ - **Managed pipeline mode.** Pick **Integrated** from the drop-down box. IIS uses the integrated IIS and ASP.NET request-processing pipeline for managed content.
+
+3. Click **OK**.
+
+4. Select your new application pool from the **Application Pool** pane, click **Advanced Settings** from the **Edit Application Pool** area of the **Actions** pane.
+
+ The **Advanced Settings** box appears.
+
+5. Make sure your **Identity** value is **ApplicationPoolIdentity**, click **OK**, and then close the box.
+
+6. Open File Explorer and go to your deployment directory, created in Step 1. For example, _D:\EMIEWebApp_.
+
+7. Right-click on the directory, click **Properties**, and then click the **Security** tab.
+
+8. Add your new application pool to the list (for example, _IIS AppPool\EMIEWebAppPool_) with **Full control access**, making sure the location searches the local computer.
+
+9. Add **Everyone** to the list with **Read & execute access**.
+
+**To create the website**
+1. In IIS Manager, expand your local computer in the **Connections** pane, right-click **Sites**, then click **Add Website**.
+
+ The **Add Website** box appears.
+
+2. In the **Add Website** box, type the name of your website into the **Site name** box. For example, _EMIEWebApp_, and then click **Select**.
+
+ The **Select Application Pool** box appears.
+
+4. Pick the name of the application pool created earlier in this step, and then click **OK**. For example, _EMIEWebAppPool_.
+
+5. In the **Physical path** box, browse to your folder that contains your deployment directory. For example, _D:\EMIEWebApp_.
+
+6. Set up your **Binding**, including your **Binding Type**, **IP address**, and **Port**, as appropriate for your organization.
+
+7. Clear the **Start Website immediately** check box, and then click **OK**.
+
+8. In IIS Manager, expand your local computer, and then double-click your new website. For example, _EMIEWebApp_.
+
+ The **<website_name> Home** pane appears.
+
+9. Double-click the **Authentication** icon, right-click on **Windows Authentication**, and then click **Enable**.
+
+ >[!Note]
+ >You must also make sure that **Anonymous Authentication** is marked as **Enabled**.
+
+## Step 3 - Create and prep your database
+Create a SQL Server database and run our custom query to create the Enterprise Mode Site List tables.
+
+**To create and prep your database**
+1. Start SQL Server Management Studio.
+
+2. Open **Object Explorer** and then connect to an instance of the SQL Server Database Engine.
+
+3. Expand the instance, right-click on **Databases**, and then click **New Database**.
+
+4. Type a database name. For example, _EMIEDatabase_.
+
+5. Leave all default values for the database files, and then click **OK**.
+
+6. Open the **DatabaseScripts/Create DB Tables/1_CreateEMIETables.sql** query file, located in the deployment directory.
+
+7. Replace the database name placeholder with the database name you created earlier. For example, _EMIEDatabase_.
+
+8. Run the query.
+
+## Step 4 - Map your Application Pool to a SQL Server role
+Map your ApplicationPoolIdentity to your database, adding the db_owner role.
+
+**To map your ApplicationPoolIdentity to a SQL Server role**
+1. Start SQL Server Management Studio and connect to your database.
+
+2. Expand the database instance and then open the server-level **Security** folder.
+
+ > [!IMPORTANT]
+ > Make sure you open the **Security** folder at the server level and not for the database.
+
+3. Right-click **Logins**, and then click **New Login**.
+
+ The **Login-New** dialog box appears.
+
+4. Type the following into the **Login name** box, based on your server instance type:
+
+ - **Local SQL Server instance.** If you have a local SQL Server instance, where IIS and SQL Server are on the same server, type the name of your Application Pool. For example, _IIS AppPool\EMIEWebAppPool_.
+
+ - **Remote SQL Server instance.** If you have a remote SQL Server instance, where IIS and SQL Server are on different servers, type `Domain\ServerName$`.
+
+ > [!IMPORTANT]
+ > Don't click **Search** in the **Login name** box. Login name searches will resolve to a ServerName\AppPool Name account and SQL Server Management Studio won't be able to resolve the account's virtual Security ID (SID).
+
+5. Click **User Mapping** from the **Select a page** pane, click the checkbox for your database (for example, _EMIEDatabase_) from the **Users mapped to this login** pane, and then click **db_owner** from the list of available roles in the **Database role membership** pane.
+
+6. Click **OK**.
+
+## Step 5 - Restart the Application Pool and website
+Using the IIS Manager, you must restart both your Application Pool and your website.
+
+**To restart your Application Pool and website**
+1. In IIS Manager, expand your local computer in the **Connections** pane, select your website, then click **Restart** from the **Manage Website** pane.
+
+2. In the **Connections** pane, select your Application Pool, and then click **Recycle** from the **Application Pool Tasks** pane.
+
+## Step 6 - Registering as an administrator
+After you've created your database and website, you'll need to register yourself (or another employee) as an administrator for the Enterprise Mode Site List Portal.
+
+**To register as an administrator**
+1. Open Microsoft Edge and type your website URL into the Address bar. For example, https://emieportal:8085.
+
+2. Click **Register now**.
+
+3. Type your name or alias into the **Email** box, making sure it matches the info in the drop-down box.
+
+4. Click **Administrator** from the **Role** box, and then click **Save**.
+
+5. Append your website URL with `/#/EMIEAdminConsole` in the Address bar to go to your administrator console. For example, https://emieportal:8085/#/EMIEAdminConsole.
+
+ A dialog box appears, prompting you for the system user name and password. The default user name is EMIEAdmin and the default password is Admin123. We strongly recommend that you change the password by using the **Change password** link as soon as you're done with your first visit.
+
+6. Select your name from the available list, and then click **Activate**.
+
+7. Go to the Enterprise Mode Site List Portal Home page and sign in.
+
+## Step 7 - Configure the SMTP server and port for email notification
+After you've set up the portal, you need to configure your SMTP server and port for email notifications from the system.
+
+**To set up your SMTP server and port for emails**
+1. Open Visual Studio, and then open the web.config file from your deployment directory.
+
+2. Update the SMTP server and port info with your info, using this format:
+
+ ```
+
+
+ ```
+3. Open the **Settings** page in the Enterprise Mode Site List Portal, and then update the email account and password info.
+
+## Step 8 - Register the scheduler service
+Register the EMIEScheduler tool and service for production site list changes.
+
+**To register the scheduler service**
+
+1. Open File Explorer and go to EMIEWebPortal.SchedulerService\EMIEWebPortal.SchedulerService in your deployment directory, and then copy the **App_Data**, **bin**, and **Logs** folders to a separate folder. For example, C:\EMIEService\.
+
+ >[!Important]
+ >If you can't find the **bin** and **Logs** folders, you probably haven't built the Visual Studio solution. Building the solution creates the folders and files.
+
+2. In Visual Studio start the Developer Command Prompt as an administrator, and then change the directory to the location of the InstallUtil.exe file. For example, _C:\Windows\Microsoft.NET\Framework\v4.0.30319_.
+
+3. Run the command, `InstallUtil ""`. For example, _InstallUtil "C:\EMIEService\bin\Debug\EMIEWebPortal.SchedulerService.exe"._
+
+ You'll be asked for your user name and password for the service.
+
+4. Open the **Run** command, type `Services.msc`, and then start the EMIEScheduler service.
+
+## Related topics
+- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)
+
+- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)
+
+- [Use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md)
diff --git a/browsers/internet-explorer/ie11-deploy-guide/setup-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/setup-problems-with-ie11.md
index 2e0ad0a745..7dd3e837c0 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/setup-problems-with-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/setup-problems-with-ie11.md
@@ -1,66 +1,67 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-ms.pagetype: appcompat
-description: Reviewing log files to learn more about potential setup problems with Internet Explorer 11.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 2cd79988-17d1-4317-bee9-b3ae2dd110a0
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Setup problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Setup problems with Internet Explorer 11
-Installing Internet Explorer creates the following log files, which are stored in the Windows installation folder (typically, the C:\\Windows folder):
-
-- `IE11_main.log`
-
-- `IE11_NR_Setup.log`
-
-- `IE11_uninst.log`
-
-- `cbs*.log`
-
-- `WU_ IE11_LangPacks.log`
-
-These log files continuously record the entire process from the moment the IE setup program starts running until the last .cab file is downloaded, including error codes. The possible error codes are:
-
-|Error code |Description |
-|-----------|-------------------------------------------|
-|0 |Success |
-|1460 |Timeout |
-|3010 |Success, reboot required |
-|40001 |USER_ERROR_CANNOT_OPEN_LOG_FILE |
-|40003 |USER_ERROR_CANNOT_INITIALIZE_APPLICATION |
-|40004 |USER_ERROR_OLD_OS_VERSION |
-|40005 |USER_ERROR_WRONG_PLATFORM |
-|40006 |USER_ERROR_BAD_SPVERSION |
-|40007 |USER_ERROR_MISSING_REQUIRED_PREREQUISITE |
-|40008 |USER_ERROR_IE_GREATERVERSION_INSTALLED |
-|40010 |USER_ERROR_BAD_LANGUAGE |
-|40012 |USER_ERROR_CRYPTO_VALIDATION_FAILED |
-|40013 |USER_ERROR_ALREADY_INSTALLED |
-|40015 |USER_ERROR_WRONG_OS |
-|40016 |USER_ERROR_EXTRACTION_FAILED |
-|40019 |USER_ERROR_WINDOWS_PRERELEASE_NOT_SUPPORTED |
-|40021 |USER_ERROR_UNSUPPORTED_VIDEO_HARDWARE |
-|40022 |USER_ERROR_UNSUPPORTED_VIDEO_DRIVER |
-|40023 |USER_ERROR_PREREQUISITE_INSTALL_FAILED |
-|40024 |USER_ERROR_NEUTRAL_CAB_DOWNLOAD_FAILED |
-|40025 |USER_ERROR_NEUTRAL_CAB_INSTALL_FAILED |
-|41001 |USER_ERROR_UNKNOWN |
-|50005 |USER_SUCCESS_USER_CANCELLED |
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+ms.pagetype: appcompat
+description: Reviewing log files to learn more about potential setup problems with Internet Explorer 11.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 2cd79988-17d1-4317-bee9-b3ae2dd110a0
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Setup problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Setup problems with Internet Explorer 11
+Installing Internet Explorer creates the following log files, which are stored in the Windows installation folder (typically, the C:\\Windows folder):
+
+- `IE11_main.log`
+
+- `IE11_NR_Setup.log`
+
+- `IE11_uninst.log`
+
+- `cbs*.log`
+
+- `WU_ IE11_LangPacks.log`
+
+These log files continuously record the entire process from the moment the IE setup program starts running until the last .cab file is downloaded, including error codes. The possible error codes are:
+
+|Error code |Description |
+|-----------|-------------------------------------------|
+|0 |Success |
+|1460 |Timeout |
+|3010 |Success, reboot required |
+|40001 |USER_ERROR_CANNOT_OPEN_LOG_FILE |
+|40003 |USER_ERROR_CANNOT_INITIALIZE_APPLICATION |
+|40004 |USER_ERROR_OLD_OS_VERSION |
+|40005 |USER_ERROR_WRONG_PLATFORM |
+|40006 |USER_ERROR_BAD_SPVERSION |
+|40007 |USER_ERROR_MISSING_REQUIRED_PREREQUISITE |
+|40008 |USER_ERROR_IE_GREATERVERSION_INSTALLED |
+|40010 |USER_ERROR_BAD_LANGUAGE |
+|40012 |USER_ERROR_CRYPTO_VALIDATION_FAILED |
+|40013 |USER_ERROR_ALREADY_INSTALLED |
+|40015 |USER_ERROR_WRONG_OS |
+|40016 |USER_ERROR_EXTRACTION_FAILED |
+|40019 |USER_ERROR_WINDOWS_PRERELEASE_NOT_SUPPORTED |
+|40021 |USER_ERROR_UNSUPPORTED_VIDEO_HARDWARE |
+|40022 |USER_ERROR_UNSUPPORTED_VIDEO_DRIVER |
+|40023 |USER_ERROR_PREREQUISITE_INSTALL_FAILED |
+|40024 |USER_ERROR_NEUTRAL_CAB_DOWNLOAD_FAILED |
+|40025 |USER_ERROR_NEUTRAL_CAB_INSTALL_FAILED |
+|41001 |USER_ERROR_UNKNOWN |
+|50005 |USER_SUCCESS_USER_CANCELLED |
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md
index 66bf4edda5..a8953ad3f4 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md
@@ -1,61 +1,62 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Lists the minimum system requirements and supported languages for Internet Explorer 11.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 27185e3d-c486-4e4a-9c51-5cb317c0006d
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: System requirements and language support for Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# System requirements and language support for Internet Explorer 11 (IE11)
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1 Update
-- Windows 7 with Service Pack 1 (SP1)
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Internet Explorer 11 is available for a number of systems and languages. This topic provides info about the minimum system requirements and language support.
-
-## Minimum system requirements for IE11
-IE11 is pre-installed on Windows 8.1, Windows 10, and Windows Server 2012 R2 and is listed here for reference. For more info about IE11 on Windows 10, see [Browser: Microsoft Edge and Internet Explorer 11](https://technet.microsoft.com/library/mt156988.aspx).
-
-**Important**
-IE11 isn't supported on Windows 8 or Windows Server 2012.
-
-Some of the components in this table might also need additional system resources. Check the component's documentation for more information.
-
-
-| Item | Minimum requirements |
-|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| Computer/processor | 1 gigahertz (GHz) 32-bit (x86) or 64-bit (x64) |
-| Operating system | - Windows 10 (32-bit or 64-bit)
- Windows 8.1 Update (32-bit or 64-bit)
- Windows 7 with SP1 (32-bit or 64-bit)
- Windows Server 2012 R2
- Windows Server 2008 R2 with SP1 (64-bit only)
|
-| Memory | - Windows 10 (32-bit)-1 GB
- Windows 10 (64-bit)-2 GB
- Windows 8.1 Update (32-bit)-1 GB
- Windows 8.1 Update (64-bit)-2 GB
- Windows 7 with SP1 (32-bit or 64-bit)-512 MB
- Windows Server 2012 R2-512 MB
- Windows Server 2008 R2 with SP1 (64-bit only)-512 MB
|
-| Hard drive space | - Windows 10 (32-bit)-16 GB
- Windows 10 (64-bit)-20 GB
- Windows 8.1 Update (32-bit)-16 GB
- Windows 8.1 Update (64-bit)-20 GB
- Windows 7 with SP1 (32-bit)-70 MB
- Windows 7 with SP1 (64-bit)-120 MB
- Windows Server 2012 R2-32 GB
- Windows Server 2008 R2 with SP1 (64-bit only)-200 MB
|
-| Drive | CD-ROM drive (if installing from a CD-ROM) |
-| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors |
-| Peripherals | Internet connection and a compatible pointing device |
-
-## Support for .NET Framework
-You might experience start up issues where IE11 fails to launch an application that uses managed browser hosting controls with your legacy apps. This is because, starting with Internet Explorer 10, the browser started blocking legacy apps from using the .NET Framework 1.1 and 2.0. To fix this problem, see [.NET Framework problems with Internet Explorer 11](net-framework-problems-with-ie11.md).
-
-## Support for multiple languages
-IE11 is available in 108 languages for Windows 8.1 and Windows 10 and in 97 languages for Windows 7 with SP1. For the list of languages and download links, see [Available language packs based on operating system](https://go.microsoft.com/fwlink/p/?LinkId=281818).
-
-Computers running localized versions of Windows should run the same version of IE11. For example, if your employees use the Spanish edition of Windows, you should deploy the Spanish version of IE11. On the other hand, if your employees use multiple localized versions of Windows, like Spanish, French, and Catalan, you should install IE11 in one of the languages, and then install language packs for the others.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Lists the minimum system requirements and supported languages for Internet Explorer 11.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 27185e3d-c486-4e4a-9c51-5cb317c0006d
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: System requirements and language support for Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# System requirements and language support for Internet Explorer 11 (IE11)
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1 Update
+- Windows 7 with Service Pack 1 (SP1)
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Internet Explorer 11 is available for a number of systems and languages. This topic provides info about the minimum system requirements and language support.
+
+## Minimum system requirements for IE11
+IE11 is pre-installed on Windows 8.1, Windows 10, and Windows Server 2012 R2 and is listed here for reference. For more info about IE11 on Windows 10, see [Browser: Microsoft Edge and Internet Explorer 11](https://technet.microsoft.com/library/mt156988.aspx).
+
+**Important**
+IE11 isn't supported on Windows 8 or Windows Server 2012.
+
+Some of the components in this table might also need additional system resources. Check the component's documentation for more information.
+
+
+| Item | Minimum requirements |
+|--------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Computer/processor | 1 gigahertz (GHz) 32-bit (x86) or 64-bit (x64) |
+| Operating system | - Windows 10 (32-bit or 64-bit)
- Windows 8.1 Update (32-bit or 64-bit)
- Windows 7 with SP1 (32-bit or 64-bit)
- Windows Server 2012 R2
- Windows Server 2008 R2 with SP1 (64-bit only)
|
+| Memory | - Windows 10 (32-bit)-1 GB
- Windows 10 (64-bit)-2 GB
- Windows 8.1 Update (32-bit)-1 GB
- Windows 8.1 Update (64-bit)-2 GB
- Windows 7 with SP1 (32-bit or 64-bit)-512 MB
- Windows Server 2012 R2-512 MB
- Windows Server 2008 R2 with SP1 (64-bit only)-512 MB
|
+| Hard drive space | - Windows 10 (32-bit)-16 GB
- Windows 10 (64-bit)-20 GB
- Windows 8.1 Update (32-bit)-16 GB
- Windows 8.1 Update (64-bit)-20 GB
- Windows 7 with SP1 (32-bit)-70 MB
- Windows 7 with SP1 (64-bit)-120 MB
- Windows Server 2012 R2-32 GB
- Windows Server 2008 R2 with SP1 (64-bit only)-200 MB
|
+| Drive | CD-ROM drive (if installing from a CD-ROM) |
+| Display | Super VGA (800 x 600) or higher-resolution monitor with 256 colors |
+| Peripherals | Internet connection and a compatible pointing device |
+
+## Support for .NET Framework
+You might experience start up issues where IE11 fails to launch an application that uses managed browser hosting controls with your legacy apps. This is because, starting with Internet Explorer 10, the browser started blocking legacy apps from using the .NET Framework 1.1 and 2.0. To fix this problem, see [.NET Framework problems with Internet Explorer 11](net-framework-problems-with-ie11.md).
+
+## Support for multiple languages
+IE11 is available in 108 languages for Windows 8.1 and Windows 10 and in 97 languages for Windows 7 with SP1. For the list of languages and download links, see [Available language packs based on operating system](https://go.microsoft.com/fwlink/p/?LinkId=281818).
+
+Computers running localized versions of Windows should run the same version of IE11. For example, if your employees use the Spanish edition of Windows, you should deploy the Spanish version of IE11. On the other hand, if your employees use multiple localized versions of Windows, like Spanish, French, and Catalan, you should install IE11 in one of the languages, and then install language packs for the others.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility.md b/browsers/internet-explorer/ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility.md
index a4ca6348ac..c5a68132d8 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility.md
@@ -1,135 +1,136 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Find out how to achieve better backward compatibility for your legacy web applications with the Enterprise Mode Site List.
-author: lomayor
-ms.author: lomayor
-ms.prod: ie11
-ms.assetid:
-ms.reviewer:
-audience: itpro
manager: dansimp
-title: Tips and tricks to manage Internet Explorer compatibility
-ms.sitesec: library
-ms.date: 05/10/2018
----
-
-# Tips and tricks to manage Internet Explorer compatibility
-
-Find out how to achieve better backward compatibility for your legacy web applications with the Enterprise Mode Site List.
-
-Jump to:
-- [Tips for IT professionals](#tips-for-it-professionals)
-- [Tips for web developers](#tips-for-web-developers)
-
-[Enterprise Mode for Internet Explorer 11](enterprise-mode-overview-for-ie11.md) can be very effective in providing backward compatibility for older web apps. The Enterprise Mode Site List includes the ability to put any web app in any document mode, include IE8 and IE7 Enterprise Modes, without changing a single line of code on the website.
-
-
-
-Sites in the \ section can be rendered in any document mode, as shown in blue above. Some sites designed for older versions of Internet Explorer may require better backward compatibility, and these can leverage the \ section of the Enterprise Mode Site List. IE8 Enterprise Mode provides higher-fidelity emulation for Internet Explorer 8 by using, among other improvements, the original Internet Explorer 8 user agent string. IE7 Enterprise Mode further improves emulation by adding Compatibility View.
-
-Compatibility View, first introduced with Internet Explorer 8, is basically a switch. If a webpage has no DOCTYPE, that page will be rendered in Internet Explorer 5 mode. If there is a DOCTYPE, the page will be rendered in Internet Explorer 7 mode. You can effectively get Compatibility View by specifying Internet Explorer 7 in the \ section, as this falls back to Internet Explorer 5 automatically if there's no DOCTYPE, or you can use IE7 Enterprise Mode for even better emulation.
-
-## Tips for IT professionals
-
-### Inventory your sites
-
-Upgrading to a new browser can be a time-consuming and potentially costly venture. To help reduce these costs, you can download the [Enterprise Site Discovery Toolkit](https://www.microsoft.com/download/details.aspx?id=44570), which can help you prioritize which sites you should be testing based on their usage in your enterprise. For example, if the data shows that no one is visiting a particular legacy web app, you may not need to test or fix it. The toolkit is supported on Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. The toolkit also gives you information about which document mode a page runs in your current browser so you can better understand how to fix that site if it breaks in a newer version of the browser.
-
-Once you know which sites to test and fix, the following remediation methods may help fix your compatibility issues in Internet Explorer 11 and Windows 10.
-
-### If you're on Internet Explorer 8 and upgrading to Internet Explorer 11:
-
-Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 8 documents modes, as well as IE8 Enterprise Mode and IE7 Enterprise Mode.
-
-- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 8 mode. This is because "edge" in Internet Explorer 8 meant Internet Explorer 8 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode.
-
-- Sites without a DOCTYPE in zones other than Intranet will default to QME (or "interoperable quirks") rather than Internet Explorer 5 Quirks and may need to be set to Internet Explorer 5 mode.
-
-- Some sites may need to be added to both Enterprise Mode and Compatibility View to work. You can do this by adding the site to IE7 Enterprise Mode.
-
-### If you're on Internet Explorer 9 and upgrading to Internet Explorer 11:
-
-Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 9 document modes.
-
-- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 9 mode. This is because "edge" in Internet Explorer 9 meant Internet Explorer 9 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode.
-
-- Sites without a DOCTYPE in zones other than Intranet will default to Interoperable Quirks rather than Internet Explorer 5 Quirks and may need to be set to Internet Explorer 5 mode.
-
-- If your sites worked in Internet Explorer 9, you won't need IE8 Enterprise Mode or IE7 Enterprise Mode.
-
-### If you're on Internet Explorer 10 and upgrading to Internet Explorer 11:
-
-Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 10 modes.
-
-- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 10 mode. This is because "edge" in Internet Explorer 10 meant Internet Explorer 10 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode.
-
-- If your sites worked in Internet Explorer 10, you won't need IE8 Enterprise Mode or IE7 Enterprise Mode.
-
-### If you're on Internet Explorer 11 and upgrading to Windows 10:
-
-You're all set! You shouldn’t need to make any changes.
-
-## Tips for web developers
-
-If your website worked in an older version of Internet Explorer, but no longer works in Internet Explorer 11, you may need to update the site. Here are the set of steps you should take to find the appropriate remediation strategy.
-
-### Try document modes
-
-To see if the site works in the Internet Explorer 5, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, or Internet Explorer 11 document modes:
-
-- Open the site in Internet Explorer 11, load the F12 tools by pressing the **F12** key or by selecting **F12 Developer Tools** from the **Tools** menu, and select the **Emulation** tab.
-
- 
-
-- Run the site in each document mode until you find the mode in which the site works.
-
- >[!NOTE]
- >You will need to make sure the User agent string dropdown matches the same browser version as the Document mode dropdown. For example, if you were testing to see if the site works in Internet Explorer 10, you should update the Document mode dropdown to 10 and the User agent string dropdown to Internet Explorer 10.
-
-- If you find a mode in which your site works, you will need to add the site domain, sub-domain, or URL to the Enterprise Mode Site List for the document mode in which the site works, or ask the IT administrator to do so. You can add the *x-ua-compatible* meta tag or HTTP header as well.
-
-### Try IE8 Enterprise Mode
-
-If a document mode didn't fix your site, try IE8 Enterprise Mode, which benefits sites written for Internet Explorer 5, Internet Explorer 7, and Internet Explorer 8 document modes.
-
-- Enable the **Let users turn on and use Enterprise Mode from the Tools menu** policy locally on your machine. To do this:
-
- - Search for and run **gpedit.msc**
-
- - Navigate to **Computer Configuration** \> **Administrative Template** \> **Windows Components** \> **Internet Explorer**.
-
- - Enable the **Let users turn on and use Enterprise Mode from the Tools menu** Group Policy setting.
-
- After making this change, run **gpupdate.exe /force** to make sure the setting is applied locally. You should also make sure to disable this setting once you're done testing. Alternately, you can use a regkey; see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md) for more information.
-
-- Restart Internet Explorer 11 and open the site you're testing, then go to **Emulation** tab in the **F12 Developer Tools** and select **Enterprise** from the **Browser profile** dropdown. If the site works, inform the IT administrator that the site needs to be added to the IE8 Enterprise Mode section.
-
-### Try IE7 Enterprise Mode
-
-If IE8 Enterprise Mode doesn't work, IE7 Enterprise Mode will give you the Compatibility View behavior that shipped with Internet Explorer 8 with Enterprise Mode. To try this approach:
-
-- Go to the **Tools** menu, select **Compatibility View Settings**, and add the site to the list.
-
-- Go to **Emulation** tab in the **F12 Developer Tools** and select **Enterprise** from the **Browser profile** dropdown.
-
-If the site works, inform the IT administrator that the site needs to be added to the IE7 Enterprise Mode section.\
-
->[!NOTE]
->Adding the same Web path to the Enterprise Mode and sections of the Enterprise Mode Site List will not work, but we will address this in a future update.
-
-### Update the site for modern web standards
-
-We recommend that enterprise customers focus their new development on established, modern web standards for better performance and interoperability across devices, and avoid developing sites in older Internet Explorer document modes. We often hear that, due to fact that the Intranet zone defaults to Compatibility View, web developers inadvertently create new sites in the Internet Explorer 7 or Internet Explorer 5 modes in the Intranet zone, depending on whether or not they used a DOCTYPE. As you move your web apps to modern standards, you can enable the **Turn on Internet Explorer Standards Mode for local intranet** Group Policy setting and add those sites that need Internet Explorer 5 or Internet Explorer 7 modes to the Site List. Of course, it is always a good idea to test the app to ensure that these settings work for your environment.
-
-## Related resources
-
-- [Document modes](https://msdn.microsoft.com/library/dn384051(v=vs.85).aspx)
-- [What is Enterprise Mode?](what-is-enterprise-mode.md)
-- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md)
-- [Enterprise Site Discovery Toolkit](https://www.microsoft.com/download/details.aspx?id=44570)
-- [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md)
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md)
-- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md)
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Find out how to achieve better backward compatibility for your legacy web applications with the Enterprise Mode Site List.
+author: dansimp
+ms.author: dansimp
+ms.prod: ie11
+ms.assetid:
+ms.reviewer:
+audience: itpro
+manager: dansimp
+title: Tips and tricks to manage Internet Explorer compatibility
+ms.sitesec: library
+ms.date: 05/10/2018
+---
+
+# Tips and tricks to manage Internet Explorer compatibility
+
+Find out how to achieve better backward compatibility for your legacy web applications with the Enterprise Mode Site List.
+
+Jump to:
+- [Tips for IT professionals](#tips-for-it-professionals)
+- [Tips for web developers](#tips-for-web-developers)
+
+[Enterprise Mode for Internet Explorer 11](enterprise-mode-overview-for-ie11.md) can be very effective in providing backward compatibility for older web apps. The Enterprise Mode Site List includes the ability to put any web app in any document mode, include IE8 and IE7 Enterprise Modes, without changing a single line of code on the website.
+
+
+
+Sites in the \ section can be rendered in any document mode, as shown in blue above. Some sites designed for older versions of Internet Explorer may require better backward compatibility, and these can leverage the \ section of the Enterprise Mode Site List. IE8 Enterprise Mode provides higher-fidelity emulation for Internet Explorer 8 by using, among other improvements, the original Internet Explorer 8 user agent string. IE7 Enterprise Mode further improves emulation by adding Compatibility View.
+
+Compatibility View, first introduced with Internet Explorer 8, is basically a switch. If a webpage has no DOCTYPE, that page will be rendered in Internet Explorer 5 mode. If there is a DOCTYPE, the page will be rendered in Internet Explorer 7 mode. You can effectively get Compatibility View by specifying Internet Explorer 7 in the \ section, as this falls back to Internet Explorer 5 automatically if there's no DOCTYPE, or you can use IE7 Enterprise Mode for even better emulation.
+
+## Tips for IT professionals
+
+### Inventory your sites
+
+Upgrading to a new browser can be a time-consuming and potentially costly venture. To help reduce these costs, you can download the [Enterprise Site Discovery Toolkit](https://www.microsoft.com/download/details.aspx?id=44570), which can help you prioritize which sites you should be testing based on their usage in your enterprise. For example, if the data shows that no one is visiting a particular legacy web app, you may not need to test or fix it. The toolkit is supported on Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. The toolkit also gives you information about which document mode a page runs in your current browser so you can better understand how to fix that site if it breaks in a newer version of the browser.
+
+Once you know which sites to test and fix, the following remediation methods may help fix your compatibility issues in Internet Explorer 11 and Windows 10.
+
+### If you're on Internet Explorer 8 and upgrading to Internet Explorer 11:
+
+Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 8 documents modes, as well as IE8 Enterprise Mode and IE7 Enterprise Mode.
+
+- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 8 mode. This is because "edge" in Internet Explorer 8 meant Internet Explorer 8 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode.
+
+- Sites without a DOCTYPE in zones other than Intranet will default to QME (or "interoperable quirks") rather than Internet Explorer 5 Quirks and may need to be set to Internet Explorer 5 mode.
+
+- Some sites may need to be added to both Enterprise Mode and Compatibility View to work. You can do this by adding the site to IE7 Enterprise Mode.
+
+### If you're on Internet Explorer 9 and upgrading to Internet Explorer 11:
+
+Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 9 document modes.
+
+- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 9 mode. This is because "edge" in Internet Explorer 9 meant Internet Explorer 9 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode.
+
+- Sites without a DOCTYPE in zones other than Intranet will default to Interoperable Quirks rather than Internet Explorer 5 Quirks and may need to be set to Internet Explorer 5 mode.
+
+- If your sites worked in Internet Explorer 9, you won't need IE8 Enterprise Mode or IE7 Enterprise Mode.
+
+### If you're on Internet Explorer 10 and upgrading to Internet Explorer 11:
+
+Use the Enterprise Mode Site List to add sites to the Internet Explorer 5, Internet Explorer 7, and Internet Explorer 10 modes.
+
+- Sites with the *x-ua-compatible* meta tag or HTTP header set to "IE=edge" may break in Internet Explorer 11 and need to be set to Internet Explorer 10 mode. This is because "edge" in Internet Explorer 10 meant Internet Explorer 10 mode, but "edge" in Internet Explorer 11 means Internet Explorer 11 mode.
+
+- If your sites worked in Internet Explorer 10, you won't need IE8 Enterprise Mode or IE7 Enterprise Mode.
+
+### If you're on Internet Explorer 11 and upgrading to Windows 10:
+
+You're all set! You shouldn’t need to make any changes.
+
+## Tips for web developers
+
+If your website worked in an older version of Internet Explorer, but no longer works in Internet Explorer 11, you may need to update the site. Here are the set of steps you should take to find the appropriate remediation strategy.
+
+### Try document modes
+
+To see if the site works in the Internet Explorer 5, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, or Internet Explorer 11 document modes:
+
+- Open the site in Internet Explorer 11, load the F12 tools by pressing the **F12** key or by selecting **F12 Developer Tools** from the **Tools** menu, and select the **Emulation** tab.
+
+ 
+
+- Run the site in each document mode until you find the mode in which the site works.
+
+ >[!NOTE]
+ >You will need to make sure the User agent string dropdown matches the same browser version as the Document mode dropdown. For example, if you were testing to see if the site works in Internet Explorer 10, you should update the Document mode dropdown to 10 and the User agent string dropdown to Internet Explorer 10.
+
+- If you find a mode in which your site works, you will need to add the site domain, sub-domain, or URL to the Enterprise Mode Site List for the document mode in which the site works, or ask the IT administrator to do so. You can add the *x-ua-compatible* meta tag or HTTP header as well.
+
+### Try IE8 Enterprise Mode
+
+If a document mode didn't fix your site, try IE8 Enterprise Mode, which benefits sites written for Internet Explorer 5, Internet Explorer 7, and Internet Explorer 8 document modes.
+
+- Enable the **Let users turn on and use Enterprise Mode from the Tools menu** policy locally on your machine. To do this:
+
+ - Search for and run **gpedit.msc**
+
+ - Navigate to **Computer Configuration** \> **Administrative Template** \> **Windows Components** \> **Internet Explorer**.
+
+ - Enable the **Let users turn on and use Enterprise Mode from the Tools menu** Group Policy setting.
+
+ After making this change, run **gpupdate.exe /force** to make sure the setting is applied locally. You should also make sure to disable this setting once you're done testing. Alternately, you can use a regkey; see [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md) for more information.
+
+- Restart Internet Explorer 11 and open the site you're testing, then go to **Emulation** tab in the **F12 Developer Tools** and select **Enterprise** from the **Browser profile** dropdown. If the site works, inform the IT administrator that the site needs to be added to the IE8 Enterprise Mode section.
+
+### Try IE7 Enterprise Mode
+
+If IE8 Enterprise Mode doesn't work, IE7 Enterprise Mode will give you the Compatibility View behavior that shipped with Internet Explorer 8 with Enterprise Mode. To try this approach:
+
+- Go to the **Tools** menu, select **Compatibility View Settings**, and add the site to the list.
+
+- Go to **Emulation** tab in the **F12 Developer Tools** and select **Enterprise** from the **Browser profile** dropdown.
+
+If the site works, inform the IT administrator that the site needs to be added to the IE7 Enterprise Mode section.\
+
+>[!NOTE]
+>Adding the same Web path to the Enterprise Mode and sections of the Enterprise Mode Site List will not work, but we will address this in a future update.
+
+### Update the site for modern web standards
+
+We recommend that enterprise customers focus their new development on established, modern web standards for better performance and interoperability across devices, and avoid developing sites in older Internet Explorer document modes. We often hear that, due to fact that the Intranet zone defaults to Compatibility View, web developers inadvertently create new sites in the Internet Explorer 7 or Internet Explorer 5 modes in the Intranet zone, depending on whether or not they used a DOCTYPE. As you move your web apps to modern standards, you can enable the **Turn on Internet Explorer Standards Mode for local intranet** Group Policy setting and add those sites that need Internet Explorer 5 or Internet Explorer 7 modes to the Site List. Of course, it is always a good idea to test the app to ensure that these settings work for your environment.
+
+## Related resources
+
+- [Document modes](https://msdn.microsoft.com/library/dn384051(v=vs.85).aspx)
+- [What is Enterprise Mode?](what-is-enterprise-mode.md)
+- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md)
+- [Enterprise Site Discovery Toolkit](https://www.microsoft.com/download/details.aspx?id=44570)
+- [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md)
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md)
+- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md)
diff --git a/browsers/internet-explorer/ie11-deploy-guide/troubleshoot-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/troubleshoot-ie11.md
index 55e4491ac7..39d999c947 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/troubleshoot-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/troubleshoot-ie11.md
@@ -1,52 +1,53 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-description: Use the topics in this section to learn how to troubleshoot several of the more common problems experienced with Internet Explorer.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 0361c1a6-3faa-42b2-a588-92439eebeeab
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Troubleshoot Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Troubleshoot Internet Explorer 11 (IE11)
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Use the topics in this section to learn how to troubleshoot several of the more common problems experienced with Internet Explorer.
-
-## In this section
-
-|Topic |Description |
-|-------|--------------|
-|[Setup problems with Internet Explorer 11](setup-problems-with-ie11.md) |Guidance about how to find and understand the error log files created when setup runs. |
-|[Install problems with Internet Explorer 11](install-problems-with-ie11.md) |Guidance about how to address potential problems when IE doesn’t finish installing. |
-|[Problems after installing Internet Explorer 11](problems-after-installing-ie11.md) |Guidance about how to troubleshoot and help fix instability problems, where IE crashes or seems slow or where Digital Rights Management (DRM) playback doesn’t work. |
-|[Auto configuration and auto proxy problems with Internet Explorer 11](auto-configuration-and-auto-proxy-problems-with-ie11.md) |Guidance about how to troubleshoot and help fix problems where branding changes aren’t distributed or where you’re experiencing proxy server setup problems. |
-|[User interface problems with Internet Explorer 11](user-interface-problems-with-ie11.md) |Guidance about changes to the IE Customization Wizard, security zones, Favorites, Command, and Status bars, and the search box. |
-|[Group Policy problems with Internet Explorer 11](group-policy-problems-ie11.md) |Guidance about how to find the Group Policy Object-related log files for troubleshooting. |
-|[.NET Framework problems with Internet Explorer 11](net-framework-problems-with-ie11.md) |Guidance about how to turn managed browser hosting controls back on. |
-|[Enhanced Protected Mode problems with Internet Explorer](enhanced-protected-mode-problems-with-ie11.md) |Guidance about how to turn off Enhanced Protected Mode to address compatibility issues. |
-|[Fix font rendering problems by turning off natural metrics](turn-off-natural-metrics.md) |Guidance about how to turn off natural metrics to address font rendering problems. |
-|[Intranet problems with Internet Explorer 11](intranet-problems-and-ie11.md) |Guidance about how to turn on single-word intranet searches in the address bar. |
-|[Browser cache changes and roaming profiles](browser-cache-changes-and-roaming-profiles.md) |Guidance about changes we’ve made to the browser cache to improve the performance, flexibility, reliability, and scalability and how to get the best results while using a roaming profile. |
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+description: Use the topics in this section to learn how to troubleshoot several of the more common problems experienced with Internet Explorer.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 0361c1a6-3faa-42b2-a588-92439eebeeab
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Troubleshoot Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Troubleshoot Internet Explorer 11 (IE11)
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Use the topics in this section to learn how to troubleshoot several of the more common problems experienced with Internet Explorer.
+
+## In this section
+
+|Topic |Description |
+|-------|--------------|
+|[Setup problems with Internet Explorer 11](setup-problems-with-ie11.md) |Guidance about how to find and understand the error log files created when setup runs. |
+|[Install problems with Internet Explorer 11](install-problems-with-ie11.md) |Guidance about how to address potential problems when IE doesn’t finish installing. |
+|[Problems after installing Internet Explorer 11](problems-after-installing-ie11.md) |Guidance about how to troubleshoot and help fix instability problems, where IE crashes or seems slow or where Digital Rights Management (DRM) playback doesn’t work. |
+|[Auto configuration and auto proxy problems with Internet Explorer 11](auto-configuration-and-auto-proxy-problems-with-ie11.md) |Guidance about how to troubleshoot and help fix problems where branding changes aren’t distributed or where you’re experiencing proxy server setup problems. |
+|[User interface problems with Internet Explorer 11](user-interface-problems-with-ie11.md) |Guidance about changes to the IE Customization Wizard, security zones, Favorites, Command, and Status bars, and the search box. |
+|[Group Policy problems with Internet Explorer 11](group-policy-problems-ie11.md) |Guidance about how to find the Group Policy Object-related log files for troubleshooting. |
+|[.NET Framework problems with Internet Explorer 11](net-framework-problems-with-ie11.md) |Guidance about how to turn managed browser hosting controls back on. |
+|[Enhanced Protected Mode problems with Internet Explorer](enhanced-protected-mode-problems-with-ie11.md) |Guidance about how to turn off Enhanced Protected Mode to address compatibility issues. |
+|[Fix font rendering problems by turning off natural metrics](turn-off-natural-metrics.md) |Guidance about how to turn off natural metrics to address font rendering problems. |
+|[Intranet problems with Internet Explorer 11](intranet-problems-and-ie11.md) |Guidance about how to turn on single-word intranet searches in the address bar. |
+|[Browser cache changes and roaming profiles](browser-cache-changes-and-roaming-profiles.md) |Guidance about changes we’ve made to the browser cache to improve the performance, flexibility, reliability, and scalability and how to get the best results while using a roaming profile. |
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md
index d193f26c68..1df0d6b95e 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/turn-off-enterprise-mode.md
@@ -1,80 +1,81 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: How to turn Enterprise Mode off temporarily while testing websites and how to turn it off completely if you no longer want to to use it.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 5027c163-71e0-49b8-9dc0-f0a7310c7ae3
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Turn off Enterprise Mode (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Turn off Enterprise Mode
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-It’s important that you test the sites you’re adding, or considering removing, from your Enterprise Mode site list. To make this testing easier, you can turn off the site list or the entire Enterprise Mode functionality. For example, you might have an intranet site on your list that you’ve upgraded to be compatible with the new web standards . If you test the site while the site list is active, Internet Explorer 11 will automatically switch to Enterprise Mode. By turning off the site list, you can see what the page actually looks like and decide whether to remove it from your site list.
-
-In addition, if you no longer want your users to be able to turn Enterprise Mode on locally, you can remove Enterprise Mode from the local **Tools** menu.
-
-**Important**
-Turning off both of these features turns off Enterprise Mode for your company. Turning off Enterprise Mode also causes any websites included in your employee’s manual site lists to not appear in Enterprise Mode.
-
- **To turn off the site list using Group Policy**
-
-1. Open your Group Policy editor, like Group Policy Management Console (GPMC).
-
-2. Go to the **Use the Enterprise Mode IE website list** setting, and then click **Disabled**.
- Enterprise Mode will no longer look for the site list, effectively turning off Enterprise Mode. However, if you previously turned on local control for your employees, Enterprise Mode will still be available from the **Tools** menu. You need to turn that part of the functionality off separately.
-
- **To turn off local control using Group Policy**
-
-3. Open your Group Policy editor, like Group Policy Management Console (GPMC).
-
-4. Go to the **Let users turn on and use Enterprise Mode from the Tools menu** setting, and then click **Disable**.
-
-5. Enterprise Mode no longer shows up on the **Tools** menu for your employees. However, if you are still using an Enterprise Mode site list, all of the globally listed sites will still appear in Enterprise Mode. If you want to turn off all of Enterprise Mode, you will need to also turn off the site list functionality.
-
- **To turn off the site list using the registry**
-
-6. Open a registry editor, such as regedit.exe.
-
-7. Go to `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **SiteList** value.
- You can also use HKEY_LOCAL_MACHINE, depending whether you want to turn off the Enterprise Mode site list for users or for computers.
-
-8. Close all and restart all instances of Internet Explorer.
- IE11 stops looking at the site list for rendering instructions. However, Enterprise Mode is still available to your users locally (if it was turned on).
-
- **To turn off local control using the registry**
-
-9. Open a registry editor, such as regedit.exe.
-
-10. Go `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **Enable** value.
- You can also use HKEY_CURRENT_USER, depending whether you want to turn off Enterprise Mode for users or for computers.
-
-11. Close and restart all instances of IE.
- Enterprise Mode is no longer a user option on the **Tools** menu in IE11. However, IE11 still looks at the site list (if it was turned on).
-
-## Related topics
-- [What is Enterprise Mode?](what-is-enterprise-mode.md)
-- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md)
-- [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md)
-- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: How to turn Enterprise Mode off temporarily while testing websites and how to turn it off completely if you no longer want to to use it.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 5027c163-71e0-49b8-9dc0-f0a7310c7ae3
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Turn off Enterprise Mode (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Turn off Enterprise Mode
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+It’s important that you test the sites you’re adding, or considering removing, from your Enterprise Mode site list. To make this testing easier, you can turn off the site list or the entire Enterprise Mode functionality. For example, you might have an intranet site on your list that you’ve upgraded to be compatible with the new web standards . If you test the site while the site list is active, Internet Explorer 11 will automatically switch to Enterprise Mode. By turning off the site list, you can see what the page actually looks like and decide whether to remove it from your site list.
+
+In addition, if you no longer want your users to be able to turn Enterprise Mode on locally, you can remove Enterprise Mode from the local **Tools** menu.
+
+**Important**
+Turning off both of these features turns off Enterprise Mode for your company. Turning off Enterprise Mode also causes any websites included in your employee’s manual site lists to not appear in Enterprise Mode.
+
+ **To turn off the site list using Group Policy**
+
+1. Open your Group Policy editor, like Group Policy Management Console (GPMC).
+
+2. Go to the **Use the Enterprise Mode IE website list** setting, and then click **Disabled**.
+ Enterprise Mode will no longer look for the site list, effectively turning off Enterprise Mode. However, if you previously turned on local control for your employees, Enterprise Mode will still be available from the **Tools** menu. You need to turn that part of the functionality off separately.
+
+ **To turn off local control using Group Policy**
+
+3. Open your Group Policy editor, like Group Policy Management Console (GPMC).
+
+4. Go to the **Let users turn on and use Enterprise Mode from the Tools menu** setting, and then click **Disable**.
+
+5. Enterprise Mode no longer shows up on the **Tools** menu for your employees. However, if you are still using an Enterprise Mode site list, all of the globally listed sites will still appear in Enterprise Mode. If you want to turn off all of Enterprise Mode, you will need to also turn off the site list functionality.
+
+ **To turn off the site list using the registry**
+
+6. Open a registry editor, such as regedit.exe.
+
+7. Go to `HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **SiteList** value.
+ You can also use HKEY_LOCAL_MACHINE, depending whether you want to turn off the Enterprise Mode site list for users or for computers.
+
+8. Close all and restart all instances of Internet Explorer.
+ IE11 stops looking at the site list for rendering instructions. However, Enterprise Mode is still available to your users locally (if it was turned on).
+
+ **To turn off local control using the registry**
+
+9. Open a registry editor, such as regedit.exe.
+
+10. Go `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`, and then delete the **Enable** value.
+ You can also use HKEY_CURRENT_USER, depending whether you want to turn off Enterprise Mode for users or for computers.
+
+11. Close and restart all instances of IE.
+ Enterprise Mode is no longer a user option on the **Tools** menu in IE11. However, IE11 still looks at the site list (if it was turned on).
+
+## Related topics
+- [What is Enterprise Mode?](what-is-enterprise-mode.md)
+- [Turn on Enterprise Mode and use a site list](turn-on-enterprise-mode-and-use-a-site-list.md)
+- [Turn on local control and logging for Enterprise Mode](turn-on-local-control-and-logging-for-enterprise-mode.md)
+- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md b/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md
index 890640ae36..90442b3bbc 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/turn-off-natural-metrics.md
@@ -1,37 +1,38 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-description: Turn off natural metrics for Internet Explorer 11
-author: lomayor
-ms.prod: ie11
-ms.assetid: e31a27d7-662e-4106-a3d2-c6b0531961d5
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Fix font rendering problems by turning off natural metrics (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Fix font rendering problems by turning off natural metrics
-By default, Internet Explorer 11 uses “natural metrics”. Natural metrics use inter-pixel spacing that creates more accurately rendered and readable text, avoiding many common font rendering problems with Windows Internet Explorer 9 or older sites.
-
-However, you might find that many intranet sites need you to use Windows Graphics Device Interface (GDI) metrics. To avoid potential compatibility issues, you must turn off natural metrics for those sites.
-
- **To turn off natural metrics**
-
-- Add the following HTTP header to each site: `X-UA-TextLayoutMetrics: gdi`
-
-
-OR-
-
-- Add the following <meta> tag to each site: ``
-
-Turning off natural metrics automatically turns on GDI metrics.
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+description: Turn off natural metrics for Internet Explorer 11
+author: dansimp
+ms.prod: ie11
+ms.assetid: e31a27d7-662e-4106-a3d2-c6b0531961d5
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Fix font rendering problems by turning off natural metrics (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Fix font rendering problems by turning off natural metrics
+By default, Internet Explorer 11 uses “natural metrics”. Natural metrics use inter-pixel spacing that creates more accurately rendered and readable text, avoiding many common font rendering problems with Windows Internet Explorer 9 or older sites.
+
+However, you might find that many intranet sites need you to use Windows Graphics Device Interface (GDI) metrics. To avoid potential compatibility issues, you must turn off natural metrics for those sites.
+
+ **To turn off natural metrics**
+
+- Add the following HTTP header to each site: `X-UA-TextLayoutMetrics: gdi`
+
+
-OR-
+
+- Add the following <meta> tag to each site: ``
+
+Turning off natural metrics automatically turns on GDI metrics.
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md b/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md
index 1a6823e2db..29c8de2486 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md
@@ -1,75 +1,71 @@
----
-title: Turn on Enterprise Mode and use a site list (Internet Explorer 11 for IT Pros)
-description: How to turn on Enterprise Mode and specify a site list.
-ms.assetid: 800e9c5a-57a6-4d61-a38a-4cb972d833e1
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.prod: ie11
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-ms.sitesec: library
-author: lomayor
-ms.author: lomayor
-ms.date: 08/14/2017
-ms.localizationpriority: medium
-
-
-
-
-
----
-
-
-# Turn on Enterprise Mode and use a site list
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Before you can use a site list with Enterprise Mode, you need to turn the functionality on and set up the system for centralized control. By allowing centralized control, you can create one global list of websites that render using Enterprise Mode. Approximately 65 seconds after Internet Explorer 11 starts, it looks for a properly formatted site list. If a new site list if found, with a different version number than the active list, IE11 loads and uses the newer version. After the initial check, IE11 won’t look for an updated list again until you restart the browser.
-
->[!NOTE]
->We recommend that you store and download your website list from a secure web server (https://), to help protect against data tampering. After the list is downloaded, it's stored locally on your employees' computers so if the centralized file location is unavailable, they can still use Enterprise Mode.
-
- **To turn on Enterprise Mode using Group Policy**
-
-1. Open your Group Policy editor and go to the `Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list` setting.
- Turning this setting on also requires you to create and store a site list. For more information about creating your site list, see the [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) topics.
-
- 
-
-2. Click **Enabled**, and then in the **Options** area, type the location to your site list.
-
- **To turn on Enterprise Mode using the registry**
-
-3. **For only the local user:** Open a registry editor, like regedit.exe and go to `HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`.
-
-OR-
- For all users on the device: Open a registry editor, like regedit.exe and go to HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode
.
-
-4. Edit the `SiteList` registry key to point to where you want to keep your Enterprise Mode site list file. For example:
-
- 
-
- - **HTTPS location**: `"SiteList"="https://localhost:8080/sites.xml"`
-
- - **Local network:** `"SiteList"="\\network\shares\sites.xml"`
-
- - **Local file:** `"SiteList"="file:///c:\\Users\\\\Documents\\testList.xml"`
-
- All of your managed devices must have access to this location if you want them to be able to access and use Enterprise Mode and your site list. For information about how to create and use an Enterprise Mode site list, see [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md).
-
-## Related topics
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md)
-- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md)
-
-
-
-
-
-
+---
+title: Turn on Enterprise Mode and use a site list (Internet Explorer 11 for IT Pros)
+description: How to turn on Enterprise Mode and specify a site list.
+ms.assetid: 800e9c5a-57a6-4d61-a38a-4cb972d833e1
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.prod: ie11
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+ms.sitesec: library
+author: dansimp
+ms.author: dansimp
+ms.date: 08/14/2017
+ms.localizationpriority: medium
+---
+
+
+# Turn on Enterprise Mode and use a site list
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Before you can use a site list with Enterprise Mode, you need to turn the functionality on and set up the system for centralized control. By allowing centralized control, you can create one global list of websites that render using Enterprise Mode. Approximately 65 seconds after Internet Explorer 11 starts, it looks for a properly formatted site list. If a new site list if found, with a different version number than the active list, IE11 loads and uses the newer version. After the initial check, IE11 won’t look for an updated list again until you restart the browser.
+
+>[!NOTE]
+>We recommend that you store and download your website list from a secure web server (https://), to help protect against data tampering. After the list is downloaded, it's stored locally on your employees' computers so if the centralized file location is unavailable, they can still use Enterprise Mode.
+
+ **To turn on Enterprise Mode using Group Policy**
+
+1. Open your Group Policy editor and go to the `Administrative Templates\Windows Components\Internet Explorer\Use the Enterprise Mode IE website list` setting.
+ Turning this setting on also requires you to create and store a site list. For more information about creating your site list, see the [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) topics.
+
+ 
+
+2. Click **Enabled**, and then in the **Options** area, type the location to your site list.
+
+ **To turn on Enterprise Mode using the registry**
+
+3. **For only the local user:** Open a registry editor, like regedit.exe and go to `HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`.
+
-OR-
+ For all users on the device: Open a registry editor, like regedit.exe and go to HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode
.
+
+4. Edit the `SiteList` registry key to point to where you want to keep your Enterprise Mode site list file. For example:
+
+ 
+
+ - **HTTPS location**: `"SiteList"="https://localhost:8080/sites.xml"`
+
+ - **Local network:** `"SiteList"="\\network\shares\sites.xml"`
+
+ - **Local file:** `"SiteList"="file:///c:\\Users\\\\Documents\\testList.xml"`
+
+ All of your managed devices must have access to this location if you want them to be able to access and use Enterprise Mode and your site list. For information about how to create and use an Enterprise Mode site list, see [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md).
+
+## Related topics
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md)
+- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md
index 2f52fdfba2..1324c12963 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md
@@ -1,64 +1,65 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Turn on local user control and logging for Enterprise Mode.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 6622ecce-24b1-497e-894a-e1fd5a8a66d1
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Turn on local control and logging for Enterprise Mode (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Turn on local control and logging for Enterprise Mode
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-You can turn on local control of Enterprise Mode so that your users can turn Enterprise Mode on from the **Tools** menu. Turning on this feature also adds the **Enterprise** browser profile to the **Emulation** tab of the F12 developer tools.
-
-Besides turning on this feature, you also have the option to provide a URL for Enterprise Mode logging. If you turn logging on, Internet Explorer initiates a simple POST back to the supplied address, including the URL and a specification that **EnterpriseMode** was turned on or off through the **Tools** menu.
-
- **To turn on local control of Enterprise Mode using Group Policy**
-
-1. Open your Group Policy editor and go to the **Administrative Templates\\Windows Components\\Internet Explorer\\Let users turn on and use Enterprise Mode from the Tools menu** setting.
-
- 
-
-2. Click **Enabled**, and then in the **Options** area, type the location for where to receive reports about when your employees use this functionality to turn Enterprise Mode on or off from the **Tools** menu.
-
- **To turn on local control of Enterprise Mode using the registry**
-
-3. Open a registry editor, like regedit.exe and go to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`.
-
-4. In the right pane, right-click and click **New**, click **String Value**, and then name the new value **Enable**.
-
-5. Right-click the **Enable** key, click **Modify**, and then type a **Value data** to point to a server that you can listen to for updates.
-
- 
-
-Your **Value data** location can be any of the following types:
-
-- **URL location (like, https://www.emieposturl.com/api/records or https://localhost:13000)**. IE sends a POST message to the URL every time a change is made to Enterprise Mode from the **Tools** menu.**Important**
- The `https://www.emieposturl.com/api/records` example will only work if you’ve downloaded the sample discussed in the [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) topic. If you don’t have the sample, you won’t have the web API.
-- **Local network location (like, https://emieposturl/)**. IE sends a POST message to your specified local network location every time a change is made to Enterprise Mode from the **Tools** menu.
-- **Empty string**. If you leave the **Value data** box blank; your employees will be able to turn Enterprise Mode on and off from the **Tools** menu, but you won’t collect any logging data.
-
-For information about how to collect the data provided when your employees turn Enterprise Mode on or off from the **Tools** menu, see [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Turn on local user control and logging for Enterprise Mode.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 6622ecce-24b1-497e-894a-e1fd5a8a66d1
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Turn on local control and logging for Enterprise Mode (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Turn on local control and logging for Enterprise Mode
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+You can turn on local control of Enterprise Mode so that your users can turn Enterprise Mode on from the **Tools** menu. Turning on this feature also adds the **Enterprise** browser profile to the **Emulation** tab of the F12 developer tools.
+
+Besides turning on this feature, you also have the option to provide a URL for Enterprise Mode logging. If you turn logging on, Internet Explorer initiates a simple POST back to the supplied address, including the URL and a specification that **EnterpriseMode** was turned on or off through the **Tools** menu.
+
+ **To turn on local control of Enterprise Mode using Group Policy**
+
+1. Open your Group Policy editor and go to the **Administrative Templates\\Windows Components\\Internet Explorer\\Let users turn on and use Enterprise Mode from the Tools menu** setting.
+
+ 
+
+2. Click **Enabled**, and then in the **Options** area, type the location for where to receive reports about when your employees use this functionality to turn Enterprise Mode on or off from the **Tools** menu.
+
+ **To turn on local control of Enterprise Mode using the registry**
+
+3. Open a registry editor, like regedit.exe and go to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\EnterpriseMode`.
+
+4. In the right pane, right-click and click **New**, click **String Value**, and then name the new value **Enable**.
+
+5. Right-click the **Enable** key, click **Modify**, and then type a **Value data** to point to a server that you can listen to for updates.
+
+ 
+
+Your **Value data** location can be any of the following types:
+
+- **URL location (like, https://www.emieposturl.com/api/records or https://localhost:13000)**. IE sends a POST message to the URL every time a change is made to Enterprise Mode from the **Tools** menu.
**Important**
+ The `https://www.emieposturl.com/api/records` example will only work if you’ve downloaded the sample discussed in the [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md) topic. If you don’t have the sample, you won’t have the web API.
+- **Local network location (like, https://emieposturl/)**. IE sends a POST message to your specified local network location every time a change is made to Enterprise Mode from the **Tools** menu.
+- **Empty string**. If you leave the **Value data** box blank; your employees will be able to turn Enterprise Mode on and off from the **Tools** menu, but you won’t collect any logging data.
+
+For information about how to collect the data provided when your employees turn Enterprise Mode on or off from the **Tools** menu, see [Set up Enterprise Mode logging and data collection](set-up-enterprise-mode-logging-and-data-collection.md).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/updated-features-and-tools-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/updated-features-and-tools-with-ie11.md
index a4121ee693..446375289c 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/updated-features-and-tools-with-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/updated-features-and-tools-with-ie11.md
@@ -1,50 +1,51 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: High-level info about some of the new and updated features for Internet Explorer 11.
-author: lomayor
-ms.prod: ie11
-ms.assetid: f53c6f04-7c60-40e7-9fc5-312220f08156
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: List of updated features and tools - Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# List of updated features and tools - Internet Explorer 11 (IE11)
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1 Update
-- Windows 7 with Service Pack 1 (SP1)
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Internet Explorer 11 includes several new features and tools. This topic includes high-level info about the each of them.
-
-## Updated features and tools
-- **Updated web standards.** WebGL, Canvas 2D L2 extensions, fullscreen API, encrypted media extensions, media source extensions, CSS flexible box layout module, mutation observers, like DOM4 and 5.3.
-
-- **Enhanced Protected Mode.** Extends Protected Mode to further restrict the ability of an attacker to access sensitive or personal information in personal and corporate environments. This feature is turned off by default. For more info, see [Enhanced Protected Mode problems with Internet Explorer](enhanced-protected-mode-problems-with-ie11.md).
-
-- **Enterprise Mode.** Enterprise Mode, a compatibility mode that runs on IE11 on Windows 8.1 Update and Windows 7 devices, lets websites render using a modified browser configuration that’s designed to emulate Windows Internet Explorer 8, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. For more info, see [What is Enterprise Mode?](what-is-enterprise-mode.md)
-
-- **Out-of-date ActiveX control blocking**. Helps to keep your ActiveX controls up-to-date, because malicious software (or malware) can target security flaws in outdated controls, damaging your computer by collecting info from it, installing unwanted software, or by letting someone else control it remotely. For more info, see [Out-of-date ActiveX control blocking](out-of-date-activex-control-blocking.md).
-
-- **Do Not Track (DNT) exceptions.** IE11 lets websites ask whether to track users as they browse a website. If the user approves the request, IE records an exception to the "Do Not Track" rule and sends headers to the website that allow tracking. By respecting these headers and requesting exceptions to the default privacy settings, website owners can develop a trusted relationship with their users about privacy. For more info, see [Internet Explorer 11 - FAQ for IT Pros](../ie11-faq/faq-for-it-pros-ie11.md).
-
-- **IE Administration Kit (IEAK).** Lets you create custom, branded versions of IE11. For more info and to download the tool, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md).
-
-- **Unattend Settings.** Lets you update the Unattend.xml file, to customize the home page, favorites, search providers, feeds, Accelerators, Web Slices, and settings for top result searches. For more info, see the [Unattend Settings: Microsoft-Windows-IE-InternetExplorer](https://go.microsoft.com/fwlink/p/?LinkId=263709).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: High-level info about some of the new and updated features for Internet Explorer 11.
+author: dansimp
+ms.prod: ie11
+ms.assetid: f53c6f04-7c60-40e7-9fc5-312220f08156
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: List of updated features and tools - Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# List of updated features and tools - Internet Explorer 11 (IE11)
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1 Update
+- Windows 7 with Service Pack 1 (SP1)
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Internet Explorer 11 includes several new features and tools. This topic includes high-level info about the each of them.
+
+## Updated features and tools
+- **Updated web standards.** WebGL, Canvas 2D L2 extensions, fullscreen API, encrypted media extensions, media source extensions, CSS flexible box layout module, mutation observers, like DOM4 and 5.3.
+
+- **Enhanced Protected Mode.** Extends Protected Mode to further restrict the ability of an attacker to access sensitive or personal information in personal and corporate environments. This feature is turned off by default. For more info, see [Enhanced Protected Mode problems with Internet Explorer](enhanced-protected-mode-problems-with-ie11.md).
+
+- **Enterprise Mode.** Enterprise Mode, a compatibility mode that runs on IE11 on Windows 8.1 Update and Windows 7 devices, lets websites render using a modified browser configuration that’s designed to emulate Windows Internet Explorer 8, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer. For more info, see [What is Enterprise Mode?](what-is-enterprise-mode.md)
+
+- **Out-of-date ActiveX control blocking**. Helps to keep your ActiveX controls up-to-date, because malicious software (or malware) can target security flaws in outdated controls, damaging your computer by collecting info from it, installing unwanted software, or by letting someone else control it remotely. For more info, see [Out-of-date ActiveX control blocking](out-of-date-activex-control-blocking.md).
+
+- **Do Not Track (DNT) exceptions.** IE11 lets websites ask whether to track users as they browse a website. If the user approves the request, IE records an exception to the "Do Not Track" rule and sends headers to the website that allow tracking. By respecting these headers and requesting exceptions to the default privacy settings, website owners can develop a trusted relationship with their users about privacy. For more info, see [Internet Explorer 11 - FAQ for IT Pros](../ie11-faq/faq-for-it-pros-ie11.md).
+
+- **IE Administration Kit (IEAK).** Lets you create custom, branded versions of IE11. For more info and to download the tool, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md).
+
+- **Unattend Settings.** Lets you update the Unattend.xml file, to customize the home page, favorites, search providers, feeds, Accelerators, Web Slices, and settings for top result searches. For more info, see the [Unattend Settings: Microsoft-Windows-IE-InternetExplorer](https://go.microsoft.com/fwlink/p/?LinkId=263709).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md
index ad67aa915b..c26e39ddcc 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-portal.md
@@ -1,84 +1,85 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Use the topics in this section to learn about how to use the Enterprise Mode Site List Portal.
-ms.prod: ie11
-title: Use the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-author: lomayor
----
-
-# Use the Enterprise Mode Site List Portal
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer.
-
-The Enterprise Mode Site List Portal is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management. Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later.
-
-You can use IE11 and the Enterprise Mode Site List Portal to manage your Enterprise Mode Site List, hosted by the app, with multiple users.
-
-## Minimum system requirements for portal and test machines
-Some of the components in this table might also need additional system resources. Check the component's documentation for more information.
-
-|Item |Description |
-|-----|------------|
-|Operating system |Windows 7 or later |
-|Memory |16 GB RAM |
-|Hard drive space |At least 8 GB of free space, formatted using the NTFS file system for better security |
-|Active Directory (AD) |Devices must be domain-joined |
-|SQL Server |Microsoft SQL Server Enterprise Edition 2012 or later |
-|Visual Studio |Visual Studio 2015 or later |
-|Node.js® package manager |npm Developer version or higher |
-|Additional server infrastructure |Internet Information Service (IIS) 6.0 or later |
-
-## Role assignments and available actions
-Admins can assign roles to employees for the Enterprise Mode Site List Portal, allowing the employees to perform specific actions, as described in this table.
-
-|Role assignment |Available actions |
-|----------------|------------------|
-|Requester |
- Create a change request
- Validate changes in the pre-production environment
- Rollback pre-production and production changes in case of failure
- Send approval requests
- View own requests
- Sign off and close own requests
|
-|Approver
(includes the App Manager and Group Head roles) |- All of the Requester actions, plus:
- Approve requests
|
-|Administrator |- All of the Requester and Approver actions, plus:
- Add employees to the portal
- Assign employee roles
- Approve registrations to the portal
- Configure portal settings (for example, determine the freeze schedule, determine the pre-production and production XML paths, and determine the attachment upload location)
- Use the standalone Enterprise Mode Site List Manager page
- View reports
|
-
-## Enterprise Mode Site List Portal workflow by employee role
-The following workflow describes how to use the Enterprise Mode Site List Portal.
-
-1. [The Requester submits a change request for an app](create-change-request-enterprise-mode-portal.md)
-
-2. [The Requester tests the change request info, verifying its accuracy](verify-changes-preprod-enterprise-mode-portal.md)
-
-3. [The Approver(s) group accepts the change request](approve-change-request-enterprise-mode-portal.md)
-
-4. [The Requester schedules the change for the production environment](schedule-production-change-enterprise-mode-portal.md)
-
-5. [The change is verified against the production site list and signed off](verify-changes-production-enterprise-mode-portal.md)
-
-
-## Related topics
-- [Set up the Enterprise Mode Site List Portal](set-up-enterprise-mode-portal.md)
-
-- [Workflow-based processes for employees using the Enterprise Mode Site List Portal](workflow-processes-enterprise-mode-portal.md)
-
-- [How to use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md)
-
-- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)
-
-- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Use the topics in this section to learn about how to use the Enterprise Mode Site List Portal.
+ms.prod: ie11
+title: Use the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+ms.reviewer: dansimp
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+author: dansimp
+---
+
+# Use the Enterprise Mode Site List Portal
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer.
+
+The Enterprise Mode Site List Portal is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management. Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later.
+
+You can use IE11 and the Enterprise Mode Site List Portal to manage your Enterprise Mode Site List, hosted by the app, with multiple users.
+
+## Minimum system requirements for portal and test machines
+Some of the components in this table might also need additional system resources. Check the component's documentation for more information.
+
+|Item |Description |
+|-----|------------|
+|Operating system |Windows 7 or later |
+|Memory |16 GB RAM |
+|Hard drive space |At least 8 GB of free space, formatted using the NTFS file system for better security |
+|Active Directory (AD) |Devices must be domain-joined |
+|SQL Server |Microsoft SQL Server Enterprise Edition 2012 or later |
+|Visual Studio |Visual Studio 2015 or later |
+|Node.js® package manager |npm Developer version or higher |
+|Additional server infrastructure |Internet Information Service (IIS) 6.0 or later |
+
+## Role assignments and available actions
+Admins can assign roles to employees for the Enterprise Mode Site List Portal, allowing the employees to perform specific actions, as described in this table.
+
+|Role assignment |Available actions |
+|----------------|------------------|
+|Requester |- Create a change request
- Validate changes in the pre-production environment
- Rollback pre-production and production changes in case of failure
- Send approval requests
- View own requests
- Sign off and close own requests
|
+|Approver
(includes the App Manager and Group Head roles) |- All of the Requester actions, plus:
- Approve requests
|
+|Administrator |- All of the Requester and Approver actions, plus:
- Add employees to the portal
- Assign employee roles
- Approve registrations to the portal
- Configure portal settings (for example, determine the freeze schedule, determine the pre-production and production XML paths, and determine the attachment upload location)
- Use the standalone Enterprise Mode Site List Manager page
- View reports
|
+
+## Enterprise Mode Site List Portal workflow by employee role
+The following workflow describes how to use the Enterprise Mode Site List Portal.
+
+1. [The Requester submits a change request for an app](create-change-request-enterprise-mode-portal.md)
+
+2. [The Requester tests the change request info, verifying its accuracy](verify-changes-preprod-enterprise-mode-portal.md)
+
+3. [The Approver(s) group accepts the change request](approve-change-request-enterprise-mode-portal.md)
+
+4. [The Requester schedules the change for the production environment](schedule-production-change-enterprise-mode-portal.md)
+
+5. [The change is verified against the production site list and signed off](verify-changes-production-enterprise-mode-portal.md)
+
+
+## Related topics
+- [Set up the Enterprise Mode Site List Portal](set-up-enterprise-mode-portal.md)
+
+- [Workflow-based processes for employees using the Enterprise Mode Site List Portal](workflow-processes-enterprise-mode-portal.md)
+
+- [How to use the Enterprise Mode Site List Manager tool or page](use-the-enterprise-mode-site-list-manager.md)
+
+- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)
+
+- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md b/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md
index 34f58b78f4..58ffc300ce 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md
@@ -1,70 +1,71 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Use the topics in this section to learn about how to use the Enterprise Mode Site List Manager.
-author: lomayor
-ms.prod: ie11
-ms.assetid: f4dbed4c-08ff-40b1-ab3f-60d3b6e8ec9b
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 12/04/2017
----
-
-
-# Use the Enterprise Mode Site List Manager
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer.
-
-You can use IE11 and the Enterprise Mode Site List Manager to add individual website domains and domain paths and to specify whether the site renders using Enterprise Mode or the default mode.
-
-## Enterprise Mode Site List Manager versions
-There are currently two versions of the Enterprise Site List Manager, both based on your schema and operating system. Download the [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) or the [Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) tool, based on your operating system.
-
-|Schema version |Operating system |Enterprise Site List Manager version |
-|-----------------|---------------|------------------------------------|
-|Enterprise Mode schema, version 2 (v.2) |Windows 10
-OR-
Windows 8.1
-OR-
Windows 7|Uses the Enterprise Mode Site List Manager (schema v.2) and the v.2 version of the schema. If you import a v.1 version schema into the Enterprise Mode Site List Manager (schema v.2), the XML is saved into the v.2 version of the schema.
For more info about the v.2 version of the schema, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md).|
-|Enterprise Mode schema, version 1 (v.1) |Windows 10
-OR-
Windows 8.1
-OR-
Windows 7|Uses the Enterprise Mode Site List Manager (schema v.1) and the v.1 version of the schema.
For more info about the v.1 version of the schema, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md)|
-
-## Using the Enterprise Mode Site List Manager
-The following topics give you more information about the things that you can do with the Enterprise Mode Site List Manager.
-
-|Topic |Description |
-|------|------------|
-|[Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md) |How to add websites to your site list using the Enterprise Mode Site List Manager (schema v.2). |
-|[Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md) |How to add websites to your site list using the Enterprise Mode Site List Manager (schema v.1). |
-|[Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) |How to add several websites to your site list at the same time, using a text or XML file and the Enterprise Mode Site List Manager (schema v.2). |
-|[Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) |How to add several websites to your site list at the same time, using a text or XML file and the WEnterprise Mode Site List Manager (schema v.1). |
-|[Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager](edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md) |How to edit the compatibility mode for specific websites.This topic applies to both versions of the Enterprise Mode Site List Manager. |
-|[Fix validation problems using the Enterprise Mode Site List Manager](fix-validation-problems-using-the-enterprise-mode-site-list-manager.md) |How to fix common site list validation errors.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
-|[Search your Enterprise Mode site list in the Enterprise Mode Site List Manager](search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to look to see if a site is already in your global Enterprise Mode site list.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
-|[Save your site list to XML in the Enterprise Mode Site List Manager](save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md) |How to save a site list as XML, so you can deploy and use it with your managed systems.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
-|[Export your Enterprise Mode site list from the Enterprise Mode Site List Manager](export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md) |How to export your site list so you can transfer your data and contents to someone else.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
-|[Import your Enterprise Mode site list to the Enterprise Mode Site List Manager](import-into-the-enterprise-mode-site-list-manager.md) |How to import your site list to replace a corrupted or out-of-date list.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
-|[Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager](delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to delete a website from your site list.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
-|[Remove all sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager](remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to delete all of the websites in a site list.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
-
-## Related topics
-
-
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md)
-- [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Use the topics in this section to learn about how to use the Enterprise Mode Site List Manager.
+author: dansimp
+ms.prod: ie11
+ms.assetid: f4dbed4c-08ff-40b1-ab3f-60d3b6e8ec9b
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Enterprise Mode Site List Manager (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 12/04/2017
+---
+
+
+# Use the Enterprise Mode Site List Manager
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Enterprise Mode is a compatibility mode that runs on Internet Explorer 11, letting websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 8 or Windows Internet Explorer 7, avoiding the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer.
+
+You can use IE11 and the Enterprise Mode Site List Manager to add individual website domains and domain paths and to specify whether the site renders using Enterprise Mode or the default mode.
+
+## Enterprise Mode Site List Manager versions
+There are currently two versions of the Enterprise Site List Manager, both based on your schema and operating system. Download the [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) or the [Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378) tool, based on your operating system.
+
+|Schema version |Operating system |Enterprise Site List Manager version |
+|-----------------|---------------|------------------------------------|
+|Enterprise Mode schema, version 2 (v.2) |Windows 10
-OR-
Windows 8.1
-OR-
Windows 7|Uses the Enterprise Mode Site List Manager (schema v.2) and the v.2 version of the schema. If you import a v.1 version schema into the Enterprise Mode Site List Manager (schema v.2), the XML is saved into the v.2 version of the schema.
For more info about the v.2 version of the schema, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md).|
+|Enterprise Mode schema, version 1 (v.1) |Windows 10
-OR-
Windows 8.1
-OR-
Windows 7|Uses the Enterprise Mode Site List Manager (schema v.1) and the v.1 version of the schema.
For more info about the v.1 version of the schema, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md)|
+
+## Using the Enterprise Mode Site List Manager
+The following topics give you more information about the things that you can do with the Enterprise Mode Site List Manager.
+
+|Topic |Description |
+|------|------------|
+|[Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md) |How to add websites to your site list using the Enterprise Mode Site List Manager (schema v.2). |
+|[Add sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md) |How to add websites to your site list using the Enterprise Mode Site List Manager (schema v.1). |
+|[Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md) |How to add several websites to your site list at the same time, using a text or XML file and the Enterprise Mode Site List Manager (schema v.2). |
+|[Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md) |How to add several websites to your site list at the same time, using a text or XML file and the WEnterprise Mode Site List Manager (schema v.1). |
+|[Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager](edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md) |How to edit the compatibility mode for specific websites.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
+|[Fix validation problems using the Enterprise Mode Site List Manager](fix-validation-problems-using-the-enterprise-mode-site-list-manager.md) |How to fix common site list validation errors.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
+|[Search your Enterprise Mode site list in the Enterprise Mode Site List Manager](search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to look to see if a site is already in your global Enterprise Mode site list.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
+|[Save your site list to XML in the Enterprise Mode Site List Manager](save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md) |How to save a site list as XML, so you can deploy and use it with your managed systems.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
+|[Export your Enterprise Mode site list from the Enterprise Mode Site List Manager](export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md) |How to export your site list so you can transfer your data and contents to someone else.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
+|[Import your Enterprise Mode site list to the Enterprise Mode Site List Manager](import-into-the-enterprise-mode-site-list-manager.md) |How to import your site list to replace a corrupted or out-of-date list.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
+|[Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager](delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to delete a website from your site list.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
+|[Remove all sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager](remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md) |How to delete all of the websites in a site list.
This topic applies to both versions of the Enterprise Mode Site List Manager. |
+
+## Related topics
+
+
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md)
+- [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md
index 992abebb63..3a1f3b4596 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/user-interface-problems-with-ie11.md
@@ -1,58 +1,59 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-description: Info about where features went in the IEAK11, where the Favorites, Command, and Status bars went, and where the search bar went.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 7324faff-ccb6-4e14-ad91-af12dbca575e
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: User interface problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# User interface problems with Internet Explorer 11
-Some of the features in both Internet Explorer 11 and IEAK 11 have moved around. Here are some of the more common changes.
-
-## Where did features go in the Internet Explorer Customization Wizard 11?
-Various installation or set up choices can prevent you from seeing certain pages in the Internet Explorer Customization Wizard 11. If, after going through the entire Wizard you still haven't found the screen you were looking for, try:
-
-- Making sure you picked the right version of IEAK 11 during installation. Most administrators should pick the **Internal** version, which has more screens and options available.
-
-- Making sure you picked all of the features you wanted from the **Feature Selection** page of the IE Customization Wizard 11. If you don't pick a feature, the associated page won't appear.
-
-## Where are the security zone settings?
-You can see your security zone settings by opening Internet Explorer for the desktop, clicking **Internet Options** from the **Tools** menu, and then clicking **Security**.
-
-## Where did the Favorites, Command, and Status bars go?
-For IE11, the UI has been changed to provide just the controls needed to support essential functionality, hiding anything considered non-essential, such as the **Favorites Bar**, **Command Bar**, **Menu Bar**, and **Status Bar**. This is intended to help focus users on the content of the page, rather than the browser itself. However, if you want these bars to appear, you can turn them back on using Group Policy settings.
-
- **To turn the toolbars back on**
-
-- Right click in the IE toolbar heading and choose to turn on the **Command bar**, **Favorites bar**, and **Status bar** from the menu.
-
-OR-
- In IE, press ALT+V to show the View menu, press T to enter the Toolbars menu, and then press:
-
- - **C** to turn on the **Command Bar**
-
- - **F** to turn on the **Favorites Bar**
-
- - **S** to turn on the **Status Bar**
-
-## Where did the search box go?
-IE11 uses the **One Box** feature, which lets users type search terms directly into the **Address bar**. Any text entered into the **Address bar** that doesn't appear to be a URL is automatically sent to the currently selected search provider.
-
->[!NOTE]
->Depending on how you've set up your intranet search, the text entry might resolve to an intranet site. For more information about this, see [Intranet problems with Internet Explorer 11](intranet-problems-and-ie11.md).
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+description: Info about where features went in the IEAK11, where the Favorites, Command, and Status bars went, and where the search bar went.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 7324faff-ccb6-4e14-ad91-af12dbca575e
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: User interface problems with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# User interface problems with Internet Explorer 11
+Some of the features in both Internet Explorer 11 and IEAK 11 have moved around. Here are some of the more common changes.
+
+## Where did features go in the Internet Explorer Customization Wizard 11?
+Various installation or set up choices can prevent you from seeing certain pages in the Internet Explorer Customization Wizard 11. If, after going through the entire Wizard you still haven't found the screen you were looking for, try:
+
+- Making sure you picked the right version of IEAK 11 during installation. Most administrators should pick the **Internal** version, which has more screens and options available.
+
+- Making sure you picked all of the features you wanted from the **Feature Selection** page of the IE Customization Wizard 11. If you don't pick a feature, the associated page won't appear.
+
+## Where are the security zone settings?
+You can see your security zone settings by opening Internet Explorer for the desktop, clicking **Internet Options** from the **Tools** menu, and then clicking **Security**.
+
+## Where did the Favorites, Command, and Status bars go?
+For IE11, the UI has been changed to provide just the controls needed to support essential functionality, hiding anything considered non-essential, such as the **Favorites Bar**, **Command Bar**, **Menu Bar**, and **Status Bar**. This is intended to help focus users on the content of the page, rather than the browser itself. However, if you want these bars to appear, you can turn them back on using Group Policy settings.
+
+ **To turn the toolbars back on**
+
+- Right click in the IE toolbar heading and choose to turn on the **Command bar**, **Favorites bar**, and **Status bar** from the menu.
+
-OR-
+ In IE, press ALT+V to show the View menu, press T to enter the Toolbars menu, and then press:
+
+ - **C** to turn on the **Command Bar**
+
+ - **F** to turn on the **Favorites Bar**
+
+ - **S** to turn on the **Status Bar**
+
+## Where did the search box go?
+IE11 uses the **One Box** feature, which lets users type search terms directly into the **Address bar**. Any text entered into the **Address bar** that doesn't appear to be a URL is automatically sent to the currently selected search provider.
+
+>[!NOTE]
+>Depending on how you've set up your intranet search, the text entry might resolve to an intranet site. For more information about this, see [Intranet problems with Internet Explorer 11](intranet-problems-and-ie11.md).
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/using-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/using-enterprise-mode.md
index 2368c10f34..6bff79cc82 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/using-enterprise-mode.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/using-enterprise-mode.md
@@ -1,60 +1,61 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: security
-description: Use this section to learn about how to turn on and use IE7 Enterprise Mode or IE8 Enterprise Mode.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 238ead3d-8920-429a-ac23-02f089c4384a
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Using IE7 Enterprise Mode or IE8 Enterprise Mode (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Using IE7 Enterprise Mode or IE8 Enterprise Mode
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Enterprise Mode gives you a way for your legacy websites and apps to run using emulated versions of Windows Internet Explorer 7 or Windows Internet Explorer 8, while your new sites and apps run using Internet Explorer 11, including modern standards and features.
-
-Although it’s called IE7 Enterprise Mode, it actually turns on Enterprise Mode along with Internet Explorer 7 or Microsoft Internet Explorer 5 Compatibility View. Compatibility View chooses which document mode to use based on whether there’s a `DOCTYPE` tag in your code:
-
-- **DOCTYPE tag found.** Webpages render using the Internet Explorer 7 document mode.
-- **No DOCTYPE tag found.** Webpages render using the Internet Explorer 5 document mode.
-
-**Important**
-Because we’ve added the IE7 Enterprise Mode option, we’ve had to rename the original functionality of Enterprise Mode to be IE8 Enterprise Mode. We’ve also replaced Edge Mode with IE11 Document Mode, so you can explicitly use IE11 on Windows 10.
-
-## Turning on and using IE7 Enterprise Mode or IE8 Enterprise Mode
-For instructions about how to add IE7 Enterprise Mode or IE8 Enterprise Mode to your webpages and apps, see:
-
-- [Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md)
-
-- [Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md)
-
-- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md)
-
-- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md)
-
-For instructions and more info about how to fix your compatibility issues using Enterprise Mode, see [Fix web compatibility issues using document modes and the Enterprise Mode site list](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md).
-
-## Related topics
-- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
-- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
-- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: security
+description: Use this section to learn about how to turn on and use IE7 Enterprise Mode or IE8 Enterprise Mode.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 238ead3d-8920-429a-ac23-02f089c4384a
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Using IE7 Enterprise Mode or IE8 Enterprise Mode (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Using IE7 Enterprise Mode or IE8 Enterprise Mode
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Enterprise Mode gives you a way for your legacy websites and apps to run using emulated versions of Windows Internet Explorer 7 or Windows Internet Explorer 8, while your new sites and apps run using Internet Explorer 11, including modern standards and features.
+
+Although it’s called IE7 Enterprise Mode, it actually turns on Enterprise Mode along with Internet Explorer 7 or Microsoft Internet Explorer 5 Compatibility View. Compatibility View chooses which document mode to use based on whether there’s a `DOCTYPE` tag in your code:
+
+- **DOCTYPE tag found.** Webpages render using the Internet Explorer 7 document mode.
+- **No DOCTYPE tag found.** Webpages render using the Internet Explorer 5 document mode.
+
+**Important**
+Because we’ve added the IE7 Enterprise Mode option, we’ve had to rename the original functionality of Enterprise Mode to be IE8 Enterprise Mode. We’ve also replaced Edge Mode with IE11 Document Mode, so you can explicitly use IE11 on Windows 10.
+
+## Turning on and using IE7 Enterprise Mode or IE8 Enterprise Mode
+For instructions about how to add IE7 Enterprise Mode or IE8 Enterprise Mode to your webpages and apps, see:
+
+- [Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md)
+
+- [Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md)
+
+- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md)
+
+- [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md)
+
+For instructions and more info about how to fix your compatibility issues using Enterprise Mode, see [Fix web compatibility issues using document modes and the Enterprise Mode site list](fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md).
+
+## Related topics
+- [Download the Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853)
+- [Download the Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378)
+- [Use the Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/using-ieak11-to-create-install-packages.md b/browsers/internet-explorer/ie11-deploy-guide/using-ieak11-to-create-install-packages.md
index d744070926..710c69e3cb 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/using-ieak11-to-create-install-packages.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/using-ieak11-to-create-install-packages.md
@@ -1,66 +1,67 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use IEAK 11 while planning, customizing, and building the custom installation package.
-author: lomayor
-ms.prod: ie11
-ms.assetid: af93742f-f955-44ab-bfa2-7bf0c99045d3
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Using Internet Explorer Administration Kit 11 (IEAK 11) to create packages (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Using Internet Explorer Administration Kit 11 (IEAK 11) to create packages
-Internet Explorer Administration Kit 11 (IEAK 11) helps you set up, deploy, and maintain Internet Explorer 11.
-
-**Note**
IEAK 11 works in network environments, with or without Microsoft Active Directory.
-
-
-
-## Plan, Customize, and Build with the IEAK 11
-Consider these activities while planning, customizing, and building the custom installation package.
-
-### Plan
-Before you begin, you should:
-
-- **Check the operating system requirements.** Check that the requirements for the computer you're building your installation package from, and the computers you're installing IE11 to, all meet the system requirements for IEAK 11 and IE11. For Internet Explorer requirements, see [System requirements and language support for Internet Explorer 11 (IE11)](system-requirements-and-language-support-for-ie11.md). For IEAK 11 requirements, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md).
-
-- **Decide on your distribution method.** Decide how to distribute your custom installation package: Windows Update, System Center System Center 2012 R2 Configuration Manager, or your network.
-
-- **Gather URLs and branding and custom graphics.** Collect the URLs for your company's own **Home**, **Search**, and **Support** pages, plus any custom branding and graphic files for the browser toolbar button and the **Favorites** list icons.
-
-- **Identify trusted network servers.** Decide which servers your employees should use to install the custom IE package. These servers need to be listed as trusted sites.
-
-- **Set up automatic detection and configuration settings.** Decide whether to automatically customize IE11 the first time it's started.
-
-- **Identify custom components for uninstallation.** Decide whether to include any custom uninstallation programs. Uninstallation programs let your employees remove your custom components through **Uninstall or change a program** in the Control Panel.
-
-- **Identify ActiveX controls.** Decide if you'll use ActiveX controls in your company. If you already use ActiveX, you should get an inventory of your active controls.
-
-### Customize and build
-After installing IE11 and the IEAK 11, you should:
-
-- **Prepare your build computer.** Create your build environment on the computer you're using to build the custom package.
-
-- **Create your branding and custom graphics.** If you don't have any, create custom branding and graphic files for the browser toolbar button and icons in your **Favorites** list.
-
-- **Specify your servers as trusted sites.** Identify your installation servers as trusted sites, in the **Trusted sites zone** of the **Internet Options** box.
-
-- **Turn on automatic detection and configuration settings (Optional).** Set up your network so that IE is automatically customized the first time it's started.
-
-- **Set up custom components for uninstallation.** Create the custom .inf file you'll use to register your custom uninstallation programs.
-
-- **Set up ActiveX controls.** Add any new ActiveX controls to the Axaa.adm file, using a text editor.
-
-- **Create a custom browser package.** Create your custom installation package, using IE Customization Wizard 11. For more information about using the wizard, see [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](../ie11-ieak/ieak11-wizard-custom-options.md).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use IEAK 11 while planning, customizing, and building the custom installation package.
+author: dansimp
+ms.prod: ie11
+ms.assetid: af93742f-f955-44ab-bfa2-7bf0c99045d3
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Using Internet Explorer Administration Kit 11 (IEAK 11) to create packages (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Using Internet Explorer Administration Kit 11 (IEAK 11) to create packages
+Internet Explorer Administration Kit 11 (IEAK 11) helps you set up, deploy, and maintain Internet Explorer 11.
+
+**Note**
IEAK 11 works in network environments, with or without Microsoft Active Directory.
+
+
+
+## Plan, Customize, and Build with the IEAK 11
+Consider these activities while planning, customizing, and building the custom installation package.
+
+### Plan
+Before you begin, you should:
+
+- **Check the operating system requirements.** Check that the requirements for the computer you're building your installation package from, and the computers you're installing IE11 to, all meet the system requirements for IEAK 11 and IE11. For Internet Explorer requirements, see [System requirements and language support for Internet Explorer 11 (IE11)](system-requirements-and-language-support-for-ie11.md). For IEAK 11 requirements, see [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](../ie11-ieak/index.md).
+
+- **Decide on your distribution method.** Decide how to distribute your custom installation package: Windows Update, System Center System Center 2012 R2 Configuration Manager, or your network.
+
+- **Gather URLs and branding and custom graphics.** Collect the URLs for your company's own **Home**, **Search**, and **Support** pages, plus any custom branding and graphic files for the browser toolbar button and the **Favorites** list icons.
+
+- **Identify trusted network servers.** Decide which servers your employees should use to install the custom IE package. These servers need to be listed as trusted sites.
+
+- **Set up automatic detection and configuration settings.** Decide whether to automatically customize IE11 the first time it's started.
+
+- **Identify custom components for uninstallation.** Decide whether to include any custom uninstallation programs. Uninstallation programs let your employees remove your custom components through **Uninstall or change a program** in the Control Panel.
+
+- **Identify ActiveX controls.** Decide if you'll use ActiveX controls in your company. If you already use ActiveX, you should get an inventory of your active controls.
+
+### Customize and build
+After installing IE11 and the IEAK 11, you should:
+
+- **Prepare your build computer.** Create your build environment on the computer you're using to build the custom package.
+
+- **Create your branding and custom graphics.** If you don't have any, create custom branding and graphic files for the browser toolbar button and icons in your **Favorites** list.
+
+- **Specify your servers as trusted sites.** Identify your installation servers as trusted sites, in the **Trusted sites zone** of the **Internet Options** box.
+
+- **Turn on automatic detection and configuration settings (Optional).** Set up your network so that IE is automatically customized the first time it's started.
+
+- **Set up custom components for uninstallation.** Create the custom .inf file you'll use to register your custom uninstallation programs.
+
+- **Set up ActiveX controls.** Add any new ActiveX controls to the Axaa.adm file, using a text editor.
+
+- **Create a custom browser package.** Create your custom installation package, using IE Customization Wizard 11. For more information about using the wizard, see [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](../ie11-ieak/ieak11-wizard-custom-options.md).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md b/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md
index a49bf820ae..1f7b62dfa5 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/using-inf-files-to-create-install-packages.md
@@ -1,45 +1,46 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use Setup Information (.inf) files to create installation packages.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 04fa2ba8-8d84-4af6-ab99-77e4f1961b0e
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Using Setup Information (.inf) files to create packages (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Using Setup Information (.inf) files to create install packages
-IEAK 11 uses Setup information (.inf) files to provide uninstallation instructions. Uninstallation instructions let your employees remove components, like files, registry entries, or shortcuts, through the **Uninstall or change a program** box. For details about .inf files, see [INF File Sections and Directives](https://go.microsoft.com/fwlink/p/?LinkId=327959).
-
- **To add uninstallation instructions to the .inf files**
-
-- Open the Registry Editor (regedit.exe) and add these registry keys:
- ```
- HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"DisplayName",,"description"
- HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"UninstallString",,"command-line"
- ```
- Where **"description"** is the name that shows up in the **Uninstall or change a program** box and **"command-line"** is the command that runs after the component is picked.
-
Note
- Make sure your script removes the uninstallation registry key, too. Otherwise, the component name will continue to show up in the Uninstall or change a program.
-
-## Limitations
-.Inf files have limitations:
-
-- You can't delete directories.
-
-- You can't use **RenFiles** to move a file to a different location, it only lets you rename a file in its existing location. For detailed information, see [INF RenFiles Directive](https://go.microsoft.com/fwlink/p/?LinkId=298508).
-
-- You can't use **CopyFiles** to copy a file to another place on your hard drive, it can only copy files from the source disk to the destination directory. For information, see [INF CopyFiles Directive](https://go.microsoft.com/fwlink/p/?LinkId=298510).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use Setup Information (.inf) files to create installation packages.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 04fa2ba8-8d84-4af6-ab99-77e4f1961b0e
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Using Setup Information (.inf) files to create packages (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Using Setup Information (.inf) files to create install packages
+IEAK 11 uses Setup information (.inf) files to provide uninstallation instructions. Uninstallation instructions let your employees remove components, like files, registry entries, or shortcuts, through the **Uninstall or change a program** box. For details about .inf files, see [INF File Sections and Directives](https://go.microsoft.com/fwlink/p/?LinkId=327959).
+
+ **To add uninstallation instructions to the .inf files**
+
+- Open the Registry Editor (regedit.exe) and add these registry keys:
+ ```
+ HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"DisplayName",,"description"
+ HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"UninstallString",,"command-line"
+ ```
+ Where **"description"** is the name that shows up in the **Uninstall or change a program** box and **"command-line"** is the command that runs after the component is picked.
+
Note
+ Make sure your script removes the uninstallation registry key, too. Otherwise, the component name will continue to show up in the Uninstall or change a program.
+
+## Limitations
+.Inf files have limitations:
+
+- You can't delete directories.
+
+- You can't use **RenFiles** to move a file to a different location, it only lets you rename a file in its existing location. For detailed information, see [INF RenFiles Directive](https://go.microsoft.com/fwlink/p/?LinkId=298508).
+
+- You can't use **CopyFiles** to copy a file to another place on your hard drive, it can only copy files from the source disk to the destination directory. For information, see [INF CopyFiles Directive](https://go.microsoft.com/fwlink/p/?LinkId=298510).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/verify-changes-preprod-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/verify-changes-preprod-enterprise-mode-portal.md
index 5c7c0a3d23..8a161b2ffb 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/verify-changes-preprod-enterprise-mode-portal.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/verify-changes-preprod-enterprise-mode-portal.md
@@ -1,70 +1,71 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Details about how to make sure your change request info is accurate within the pre-production environment of the Enterprise Mode Site List Portal.
-author: lomayor
-ms.prod: ie11
-title: Verify your changes using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
----
-
-# Verify your changes using the Enterprise Mode Site List Portal
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
->[!Important]
->This step requires that each Requester have access to a test machine with Administrator rights, letting him or her get to the pre-production environment to make sure that the requested change is correct.
-
-The Requester successfully submits a change request to the Enterprise Mode Site List Portal and then gets an email, including:
-
-- **EMIE_RegKey**. A batch file that when run, sets the registry key to point to the local pre-production Enterprise Mode Site List.
-
-- **Test steps**. The suggested steps about how to test the change request details to make sure they're accurate in the pre-production environment.
-
-- **EMIE_Reset**. A batch file that when run, reverts the changes made to the pre-production registry.
-
-## Verify and send the change request to Approvers
-The Requester tests the changes and then goes back into the Enterprise Mode Site List Portal, **Pre-production verification** page to verify whether the testing was successful.
-
-**To verify changes and send to the Approver(s)**
-1. On the **Pre-production verification** page, the Requester clicks **Successful** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the change request and testing results.
-
-2. The Requester reviews the pre-defined Approver(s), and then clicks **Send for approval**.
-
- The Requester, the Approver group, and the Administrator group all get an email, stating that the change request is waiting for approval.
-
-
-**To rollback your pre-production changes**
-1. On the **Pre-production verification** page, the Requester clicks **Failed** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the change request and testing results.
-
-2. Add a description about the issue into the **Issue description** box, and then click **Send failure details**.
-
- The change request and issue info are sent to the Administrators.
-
-3. The Requester clicks **Roll back** to roll back the changes in the pre-production environment.
-
- After the Requester rolls back the changes, the request can be updated and re-submitted.
-
-
-## View rolled back change requests
-The original Requester and the Administrator(s) group can view the rolled back change requests.
-
-**To view the rolled back change request**
-
-- In the Enterprise Mode Site List Portal, click **Rolled back** from the left pane.
-
- All rolled back change requests appear, with role assignment determining which ones are visible.
-
-## Next steps
-If the change request is certified as successful, the Requester must next send it to the Approvers for approval. For the Approver-related steps, see the [Approve a change request using the Enterprise Mode Site List Portal](approve-change-request-enterprise-mode-portal.md) topic.
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Details about how to make sure your change request info is accurate within the pre-production environment of the Enterprise Mode Site List Portal.
+author: dansimp
+ms.prod: ie11
+title: Verify your changes using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+---
+
+# Verify your changes using the Enterprise Mode Site List Portal
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+>[!Important]
+>This step requires that each Requester have access to a test machine with Administrator rights, letting him or her get to the pre-production environment to make sure that the requested change is correct.
+
+The Requester successfully submits a change request to the Enterprise Mode Site List Portal and then gets an email, including:
+
+- **EMIE_RegKey**. A batch file that when run, sets the registry key to point to the local pre-production Enterprise Mode Site List.
+
+- **Test steps**. The suggested steps about how to test the change request details to make sure they're accurate in the pre-production environment.
+
+- **EMIE_Reset**. A batch file that when run, reverts the changes made to the pre-production registry.
+
+## Verify and send the change request to Approvers
+The Requester tests the changes and then goes back into the Enterprise Mode Site List Portal, **Pre-production verification** page to verify whether the testing was successful.
+
+**To verify changes and send to the Approver(s)**
+1. On the **Pre-production verification** page, the Requester clicks **Successful** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the change request and testing results.
+
+2. The Requester reviews the pre-defined Approver(s), and then clicks **Send for approval**.
+
+ The Requester, the Approver group, and the Administrator group all get an email, stating that the change request is waiting for approval.
+
+
+**To rollback your pre-production changes**
+1. On the **Pre-production verification** page, the Requester clicks **Failed** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the change request and testing results.
+
+2. Add a description about the issue into the **Issue description** box, and then click **Send failure details**.
+
+ The change request and issue info are sent to the Administrators.
+
+3. The Requester clicks **Roll back** to roll back the changes in the pre-production environment.
+
+ After the Requester rolls back the changes, the request can be updated and re-submitted.
+
+
+## View rolled back change requests
+The original Requester and the Administrator(s) group can view the rolled back change requests.
+
+**To view the rolled back change request**
+
+- In the Enterprise Mode Site List Portal, click **Rolled back** from the left pane.
+
+ All rolled back change requests appear, with role assignment determining which ones are visible.
+
+## Next steps
+If the change request is certified as successful, the Requester must next send it to the Approvers for approval. For the Approver-related steps, see the [Approve a change request using the Enterprise Mode Site List Portal](approve-change-request-enterprise-mode-portal.md) topic.
diff --git a/browsers/internet-explorer/ie11-deploy-guide/verify-changes-production-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/verify-changes-production-enterprise-mode-portal.md
index 5678e10583..42db6c85c5 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/verify-changes-production-enterprise-mode-portal.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/verify-changes-production-enterprise-mode-portal.md
@@ -1,45 +1,46 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Details about how the Requester makes sure that the change request update is accurate within the production environment using the Enterprise Mode Site List Portal.
-author: lomayor
-ms.prod: ie11
-title: Verify the change request update in the production environment using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
----
-
-# Verify the change request update in the production environment using the Enterprise Mode Site List Portal
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-## Verify and sign off on the update in the production environment
-The Requester tests the changes in the production environment and then goes back into the Enterprise Mode Site List Portal, **Production verification** page to verify whether the testing was successful.
-
-**To verify the changes and sign off**
-- On the **Production verification** page, the Requester clicks **Successful**, optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the testing results, optionally includes a description of the change, and then clicks **Sign off**.
-
- The Requester, Approver group, and Administrator group all get an email, stating that the change request has been signed off.
-
-
-**To rollback production changes**
-1. On the **Production verification** page, the Requester clicks **Failed** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the testing results.
-
-2. Add a description about the issue into the **Change description** box, and then click **Send failure details**.
-
- The info is sent to the Administrators.
-
-3. The Requester clicks **Roll back** to roll back the changes in the production environment.
-
- After the Requester rolls back the changes, the request is automatically handled in the production and pre-production environment site lists.
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Details about how the Requester makes sure that the change request update is accurate within the production environment using the Enterprise Mode Site List Portal.
+author: dansimp
+ms.prod: ie11
+title: Verify the change request update in the production environment using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+---
+
+# Verify the change request update in the production environment using the Enterprise Mode Site List Portal
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+## Verify and sign off on the update in the production environment
+The Requester tests the changes in the production environment and then goes back into the Enterprise Mode Site List Portal, **Production verification** page to verify whether the testing was successful.
+
+**To verify the changes and sign off**
+- On the **Production verification** page, the Requester clicks **Successful**, optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the testing results, optionally includes a description of the change, and then clicks **Sign off**.
+
+ The Requester, Approver group, and Administrator group all get an email, stating that the change request has been signed off.
+
+
+**To rollback production changes**
+1. On the **Production verification** page, the Requester clicks **Failed** and optionally includes any attachments (only .jpeg, .png, .jpg and .txt files are allowed) to support the testing results.
+
+2. Add a description about the issue into the **Change description** box, and then click **Send failure details**.
+
+ The info is sent to the Administrators.
+
+3. The Requester clicks **Roll back** to roll back the changes in the production environment.
+
+ After the Requester rolls back the changes, the request is automatically handled in the production and pre-production environment site lists.
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/view-apps-enterprise-mode-site-list.md b/browsers/internet-explorer/ie11-deploy-guide/view-apps-enterprise-mode-site-list.md
index 3c60851368..2be252275c 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/view-apps-enterprise-mode-site-list.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/view-apps-enterprise-mode-site-list.md
@@ -1,41 +1,42 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Details about how to view the active Enterprise Mode Site List from the Enterprise Mode Site List Portal.
-author: lomayor
-ms.prod: ie11
-title: View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
----
-
-# View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Any employee with access to the Enterprise Mode Site List Portal can view the apps included in the current Enterprise Mode Site List.
-
-**To view the active Enterprise Mode Site List**
-1. Open the Enterprise Mode Site List Portal and click the **Production sites list** icon in the upper-right area of the page.
-
- The **Production sites list** page appears, with each app showing its URL, the compatibility mode to use, and the assigned browser to open the site.
-
-2. Click any URL to view the actual site, using the compatibility mode and opening in the correct browser.
-
-
-**To export the active Enterprise Mode Site List**
-1. On the **Production sites list** page, click **Export**.
-
-2. Save the ProductionSiteList.xlsx file.
-
- The Excel file includes all apps in the current Enterprise Mode Site List, including URL, compatibility mode, and assigned browser.
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Details about how to view the active Enterprise Mode Site List from the Enterprise Mode Site List Portal.
+author: dansimp
+ms.prod: ie11
+title: View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+---
+
+# View the apps included in the active Enterprise Mode Site List from the Enterprise Mode Site List Portal
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Any employee with access to the Enterprise Mode Site List Portal can view the apps included in the current Enterprise Mode Site List.
+
+**To view the active Enterprise Mode Site List**
+1. Open the Enterprise Mode Site List Portal and click the **Production sites list** icon in the upper-right area of the page.
+
+ The **Production sites list** page appears, with each app showing its URL, the compatibility mode to use, and the assigned browser to open the site.
+
+2. Click any URL to view the actual site, using the compatibility mode and opening in the correct browser.
+
+
+**To export the active Enterprise Mode Site List**
+1. On the **Production sites list** page, click **Export**.
+
+2. Save the ProductionSiteList.xlsx file.
+
+ The Excel file includes all apps in the current Enterprise Mode Site List, including URL, compatibility mode, and assigned browser.
diff --git a/browsers/internet-explorer/ie11-deploy-guide/view-enterprise-mode-reports-for-portal.md b/browsers/internet-explorer/ie11-deploy-guide/view-enterprise-mode-reports-for-portal.md
index 30db2d2faa..20ad5ac557 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/view-enterprise-mode-reports-for-portal.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/view-enterprise-mode-reports-for-portal.md
@@ -1,53 +1,54 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Details about how an Administrator can view the available Enterprise Mode reports from the Enterprise Mode Site List Portal.
-author: lomayor
-ms.prod: ie11
-title: View the available Enterprise Mode reports from the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
----
-
-# View the available Enterprise Mode reports from the Enterprise Mode Site List Portal
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Administrators can view the Microsoft-provided Enterprise Mode reports from the Enterprise Mode Site List Portal.
-
-**To view the reports**
-1. Open the Enterprise Mode Site List Portal and click the **Enterprise Mode reports** icon in the upper-right area of the page.
-
- The **Enterprise Mode reports** page appears, with each app showing its URL, the compatibility mode to use, and the assigned browser to open the site.
-
-2. Use the calendars to provide the **From date** and **To date**, determining the span of time the report covers.
-
-3. Click **Apply**.
-
- The reports all change to reflect the appropriate timeframe and group, including:
-
- - **Total number of websites in the site list.** A box at the top of the reports page that tells you the total number of websites included in the Enterprise Mode Sit List.
-
- - **All websites by docmode.** Shows how many change requests exist, based on the different doc modes included in the **App best viewed in** field.
-
- - **All websites by browser.** Shows how many apps require which browser, including **IE11**, **MSEdge**, or **None**.
-
- - **All requests by status.** Shows how many change requests exist, based on each status.
-
- - **All requests by change type.** Shows how many change requests exist, based on the **Requested change** field.
-
- - **Request status by group.** Shows how many change requests exist, based on both group and status.
-
- - **Reasons for request.** Shows how many change request reasons exist, based on the **Reason for request** field.
-
- - **Requested changes by app name.** Shows what specific apps were **Added to site list**, **Deleted from site list**, or **Updated from site list**.
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Details about how an Administrator can view the available Enterprise Mode reports from the Enterprise Mode Site List Portal.
+author: dansimp
+ms.prod: ie11
+title: View the available Enterprise Mode reports from the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+---
+
+# View the available Enterprise Mode reports from the Enterprise Mode Site List Portal
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Administrators can view the Microsoft-provided Enterprise Mode reports from the Enterprise Mode Site List Portal.
+
+**To view the reports**
+1. Open the Enterprise Mode Site List Portal and click the **Enterprise Mode reports** icon in the upper-right area of the page.
+
+ The **Enterprise Mode reports** page appears, with each app showing its URL, the compatibility mode to use, and the assigned browser to open the site.
+
+2. Use the calendars to provide the **From date** and **To date**, determining the span of time the report covers.
+
+3. Click **Apply**.
+
+ The reports all change to reflect the appropriate timeframe and group, including:
+
+ - **Total number of websites in the site list.** A box at the top of the reports page that tells you the total number of websites included in the Enterprise Mode Sit List.
+
+ - **All websites by docmode.** Shows how many change requests exist, based on the different doc modes included in the **App best viewed in** field.
+
+ - **All websites by browser.** Shows how many apps require which browser, including **IE11**, **MSEdge**, or **None**.
+
+ - **All requests by status.** Shows how many change requests exist, based on each status.
+
+ - **All requests by change type.** Shows how many change requests exist, based on the **Requested change** field.
+
+ - **Request status by group.** Shows how many change requests exist, based on both group and status.
+
+ - **Reasons for request.** Shows how many change request reasons exist, based on the **Reason for request** field.
+
+ - **Requested changes by app name.** Shows what specific apps were **Added to site list**, **Deleted from site list**, or **Updated from site list**.
diff --git a/browsers/internet-explorer/ie11-deploy-guide/virtualization-and-compatibility-with-ie11.md b/browsers/internet-explorer/ie11-deploy-guide/virtualization-and-compatibility-with-ie11.md
index e83c91bf67..e5de6fffdd 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/virtualization-and-compatibility-with-ie11.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/virtualization-and-compatibility-with-ie11.md
@@ -1,36 +1,37 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: virtualization
-description: Virtualization and compatibility with Internet Explorer 11
-author: lomayor
-ms.prod: ie11
-ms.assetid: b0388c04-2584-4b6d-a7a8-4e0476773a80
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Virtualization and compatibility with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Virtualization and compatibility with Internet Explorer 11
-If your company is considering upgrading to the latest version of Internet Explorer, but is hesitant because of a large number of web apps that need to be tested and moved, we recommend that you consider virtualization. Virtualization lets you set up a virtual environment where you can run earlier versions of IE.
-
-**Important**
-We strongly suggest that while you're using virtualization, you also update your web apps so they run natively in the newer version of IE. For more information about how to update your code, see the [Internet Explorer 11 Compatibility Cookbook (Windows)](https://go.microsoft.com/fwlink/p/?LinkId=279707) to learn about the developer features that have been changed or deprecated since Internet Explorer 10.
-
-The Microsoft-supported options for virtualizing web apps are:
-
-- **Microsoft Enterprise Desktop Virtualization (MED-V).** Uses Microsoft Virtual PC to provide an enterprise solution for desktop virtualization. With MED-V, you can easily create, deliver, and manage corporate Virtual PC images on any Windows®-based desktop. For more information, see [MED-V](https://go.microsoft.com/fwlink/p/?LinkId=271653).
-
-- **Client Hyper-V.** Uses the same virtualization technology previously available in Windows Server, but now installed for Windows 8.1. For more information, see [Client Hyper-V](https://go.microsoft.com/fwlink/p/?LinkId=271654).
-For more information about virtualization options, see [Microsoft Desktop Virtualization](https://go.microsoft.com/fwlink/p/?LinkId=271662).
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: virtualization
+description: Virtualization and compatibility with Internet Explorer 11
+author: dansimp
+ms.prod: ie11
+ms.assetid: b0388c04-2584-4b6d-a7a8-4e0476773a80
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Virtualization and compatibility with Internet Explorer 11 (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Virtualization and compatibility with Internet Explorer 11
+If your company is considering upgrading to the latest version of Internet Explorer, but is hesitant because of a large number of web apps that need to be tested and moved, we recommend that you consider virtualization. Virtualization lets you set up a virtual environment where you can run earlier versions of IE.
+
+**Important**
+We strongly suggest that while you're using virtualization, you also update your web apps so they run natively in the newer version of IE. For more information about how to update your code, see the [Internet Explorer 11 Compatibility Cookbook (Windows)](https://go.microsoft.com/fwlink/p/?LinkId=279707) to learn about the developer features that have been changed or deprecated since Internet Explorer 10.
+
+The Microsoft-supported options for virtualizing web apps are:
+
+- **Microsoft Enterprise Desktop Virtualization (MED-V).** Uses Microsoft Virtual PC to provide an enterprise solution for desktop virtualization. With MED-V, you can easily create, deliver, and manage corporate Virtual PC images on any Windows®-based desktop. For more information, see [MED-V](https://go.microsoft.com/fwlink/p/?LinkId=271653).
+
+- **Client Hyper-V.** Uses the same virtualization technology previously available in Windows Server, but now installed for Windows 8.1. For more information, see [Client Hyper-V](https://go.microsoft.com/fwlink/p/?LinkId=271654).
+For more information about virtualization options, see [Microsoft Desktop Virtualization](https://go.microsoft.com/fwlink/p/?LinkId=271662).
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md b/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md
index 0f89abe875..269b2bec06 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode.md
@@ -1,168 +1,169 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Info about the features included in Enterprise Mode with Internet Explorer 11.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 3c77e9f3-eb21-46d9-b5aa-f9b2341cfefa
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Enterprise Mode and the Enterprise Mode Site List (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 10/25/2018
----
-
-
-# Enterprise Mode and the Enterprise Mode Site List
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Internet Explorer and Microsoft Edge can work together to support your legacy web apps, while still defaulting to the higher bar for security and modern experiences enabled by Microsoft Edge. Working with multiple browsers can be difficult, particularly if you have a substantial number of internal sites. To help manage this dual-browser experience, we are introducing a new web tool specifically targeted towards larger organizations: the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal).
-
-## Available dual-browser experiences
-If you have specific websites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the websites automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work correctly with Microsoft Edge, you can set all intranet sites to open using IE11 automatically.
-
-Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11.
-
->[!TIP]
-> If you are running an earlier version of Internet Explorer, we recommend upgrading to IE11, so that any legacy apps continue to work correctly.
-
-For Windows 10 and Windows 10 Mobile, Microsoft Edge is the default browser experience. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List.
-
-
-## What is Enterprise Mode?
-Enterprise Mode, a compatibility mode that runs on Internet Explorer 11 on Windows 10, Windows 8.1, and Windows 7 devices, lets websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 7 or Windows Internet Explorer 8. Running in this mode helps to avoid many of the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer.
-
-Many customers identify web app compatibility as a significant cost to upgrading because web apps need to be tested and upgraded before adopting a new browser. The improved compatibility provided by Enterprise Mode can help give customers confidence to upgrade to IE11, letting customers benefit from modern web standards, increased performance, improved security, and better reliability.
-
-### Enterprise Mode features
-Enterprise Mode includes the following features:
-
-- **Improved web app and website compatibility.** Through improved emulation, Enterprise Mode lets many legacy web apps run unmodified on IE11, supporting several site patterns that aren’t currently supported by existing document modes.
-
-- **Tool-based management for website lists.** Use the Enterprise Mode Site List Manager to add website domains and domain paths and to specify whether a site renders using Enterprise Mode.
-Download the [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) or the [Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378), based on your operating system and schema.
-
-- **Centralized control.** You can specify the websites or web apps to interpret using Enterprise Mode, through an XML file on a website or stored locally. Domains and paths within those domains can be treated differently, allowing granular control. Use Group Policy to let users turn Enterprise Mode on or off from the Tools menu and to decide whether the Enterprise browser profile appears on the Emulation tab of the F12 developer tools.
-
- >[!Important]
- >All centrally-made decisions override any locally-made choices.
-
-- **Integrated browsing.** When Enterprise Mode is set up, users can browse the web normally, letting the browser change modes automatically to accommodate Enterprise Mode sites.
-
-- **Data gathering.** You can configure Enterprise Mode to collect local override data, posting back to a named server. This lets you "crowd source" compatibility testing from key users; gathering their findings to add to your central site list.
-
-## Enterprise Mode and the Enterprise Mode Site List XML file
-The Enterprise Mode Site List is an XML document that specifies a list of sites, their compat mode, and their intended browser. Using [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853), you can automatically start a webpage using a specific browser. In the case of IE11, the webpage can also be launched in a specific compat mode, so it always renders correctly. Your employees can easily view this site list by typing _about:compat_ in either Microsoft Edge or IE11.
-
-Starting with Windows 10, version 1511 (also known as the Anniversary Update), you can also [restrict IE11 to only the legacy web apps that need it](https://blogs.windows.com/msedgedev/2016/05/19/edge14-ie11-better-together/), automatically sending sites not included in the Enterprise Mode Site List to Microsoft Edge.
-
-### Site list xml file
-This is a view of the [raw EMIE v2 schema.xml file](https://gist.github.com/kypflug/9e9961de771d2fcbd86b#file-emie-v2-schema-xml). There are equivalent Enterprise Mode Site List policies for both [Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility) and [Internet Explorer 11](turn-on-enterprise-mode-and-use-a-site-list.md). The Microsoft Edge list is used to determine which sites should open in IE11; while the IE11 list is used to determine the compat mode for a site, and which sites should open in Microsoft Edge. We recommend using one list for both browsers, where each policy points to the same XML file location.
-
-```xml
-
-
-
- EnterpriseSiteListManager
- 10586
- 20150728.135021
-
-
-
- IE8Enterprise
- IE11
-
-
- default
- IE11
-
-
- IE7Enterprise
- IE11
-
-
-
-
- IE8Enterprise"
- IE11
-
-
- IE7
- IE11
-
-
- IE7
- IE11
-
-
-
-```
-
-## Enterprise Mode Site List Manager and the Enterprise Mode Site List Portal tools
-You can build and manage your Enterprise Mode Site List is by using any generic text editor. However, we’ve also provided a couple tools that can make that process even easier.
-
-### Enterprise Mode Site List Manager
-This tool helps you create error-free XML documents with simple n+1 versioning and URL verification. We recommend using this tool if your site list is relatively small. For more info about this tool, see the Use the [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) topics.
-
-There are 2 versions of this tool, both supported on Windows 7, Windows 8.1, and Windows 10:
-
-- [Enterprise Mode Site List Manager (schema v.1)](https://www.microsoft.com/download/details.aspx?id=42501). This is an older version of the schema that you must use if you want to create and update your Enterprise Mode Site List for devices running the v.1 version of the schema.
-
- We strongly recommend moving to the new schema, v.2. For more info, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md).
-
-- [Enterprise Mode Site List Manager (schema v.2)](https://www.microsoft.com/download/details.aspx?id=49974). The updated version of the schema, including new functionality. You can use this version of the schema to create and update your Enterprise Mode Site List for devices running the v.2 version of the schema.
-
- If you open a v.1 version of your Enterprise Mode Site List using this version, it will update the schema to v.2, automatically. For more info, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md).
-
-If your list is too large to add individual sites, or if you have more than one person managing the site list, we recommend using the Enterprise Site List Portal.
-
-### Enterprise Mode Site List Portal
-The [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management.
-
-In addition to all the functionality of the Enterprise Mode Site List Manager tool, the Enterprise Mode Site List Portal helps you:
-
-- Manage site lists from any device supporting Windows 7 or greater.
-
-- Submit change requests.
-
-- Operate offline through an on-premise solution.
-
-- Provide role-based governance.
-
-- Test configuration settings before releasing to a live environment.
-
-Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later.
-
-Because the tool is open-source, the source code is readily available for examination and experimentation. We encourage you to [fork the code, submit pull requests, and send us your feedback](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)! For more info about the Enterprise Mode Site List Portal, see the [Use the Enterprise Mode Site List Portal](use-the-enterprise-mode-portal.md) topics.
-
-## Related topics
-
-- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)
-
-- [Technical guidance, tools, and resources on Enterprise browsing](https://technet.microsoft.com/ie)
-
-- [Enterprise Mode Site List Manager (schema v.1)](https://www.microsoft.com/download/details.aspx?id=42501)
-
-- [Enterprise Mode Site List Manager (schema v.2)](https://www.microsoft.com/download/details.aspx?id=49974)
-
-- [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
-
-- [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md)
-
-- [Web Application Compatibility Lab Kit](https://technet.microsoft.com/microsoft-edge/mt612809.aspx)
-
-- [Microsoft Services Support](https://www.microsoft.com/microsoftservices/support.aspx)
-
-- [Find a Microsoft partner on Pinpoint](https://partnercenter.microsoft.com/pcv/search)
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Info about the features included in Enterprise Mode with Internet Explorer 11.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 3c77e9f3-eb21-46d9-b5aa-f9b2341cfefa
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Enterprise Mode and the Enterprise Mode Site List (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 10/25/2018
+---
+
+
+# Enterprise Mode and the Enterprise Mode Site List
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Internet Explorer and Microsoft Edge can work together to support your legacy web apps, while still defaulting to the higher bar for security and modern experiences enabled by Microsoft Edge. Working with multiple browsers can be difficult, particularly if you have a substantial number of internal sites. To help manage this dual-browser experience, we are introducing a new web tool specifically targeted towards larger organizations: the [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal).
+
+## Available dual-browser experiences
+If you have specific websites and apps that you know have compatibility problems with Microsoft Edge, you can use the Enterprise Mode site list so that the websites automatically open using Internet Explorer 11. Additionally, if you know that your intranet sites aren't going to work correctly with Microsoft Edge, you can set all intranet sites to open using IE11 automatically.
+
+Using Enterprise Mode means that you can continue to use Microsoft Edge as your default browser, while also ensuring that your apps continue working on IE11.
+
+>[!TIP]
+> If you are running an earlier version of Internet Explorer, we recommend upgrading to IE11, so that any legacy apps continue to work correctly.
+
+For Windows 10 and Windows 10 Mobile, Microsoft Edge is the default browser experience. However, Microsoft Edge lets you continue to use IE11 for sites that are on your corporate intranet or included on your Enterprise Mode Site List.
+
+
+## What is Enterprise Mode?
+Enterprise Mode, a compatibility mode that runs on Internet Explorer 11 on Windows 10, Windows 8.1, and Windows 7 devices, lets websites render using a modified browser configuration that’s designed to emulate either Windows Internet Explorer 7 or Windows Internet Explorer 8. Running in this mode helps to avoid many of the common compatibility problems associated with web apps written and tested on older versions of Internet Explorer.
+
+Many customers identify web app compatibility as a significant cost to upgrading because web apps need to be tested and upgraded before adopting a new browser. The improved compatibility provided by Enterprise Mode can help give customers confidence to upgrade to IE11, letting customers benefit from modern web standards, increased performance, improved security, and better reliability.
+
+### Enterprise Mode features
+Enterprise Mode includes the following features:
+
+- **Improved web app and website compatibility.** Through improved emulation, Enterprise Mode lets many legacy web apps run unmodified on IE11, supporting several site patterns that aren’t currently supported by existing document modes.
+
+- **Tool-based management for website lists.** Use the Enterprise Mode Site List Manager to add website domains and domain paths and to specify whether a site renders using Enterprise Mode.
+Download the [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853) or the [Enterprise Mode Site List Manager (schema v.1)](https://go.microsoft.com/fwlink/p/?LinkID=394378), based on your operating system and schema.
+
+- **Centralized control.** You can specify the websites or web apps to interpret using Enterprise Mode, through an XML file on a website or stored locally. Domains and paths within those domains can be treated differently, allowing granular control. Use Group Policy to let users turn Enterprise Mode on or off from the Tools menu and to decide whether the Enterprise browser profile appears on the Emulation tab of the F12 developer tools.
+
+ >[!Important]
+ >All centrally-made decisions override any locally-made choices.
+
+- **Integrated browsing.** When Enterprise Mode is set up, users can browse the web normally, letting the browser change modes automatically to accommodate Enterprise Mode sites.
+
+- **Data gathering.** You can configure Enterprise Mode to collect local override data, posting back to a named server. This lets you "crowd source" compatibility testing from key users; gathering their findings to add to your central site list.
+
+## Enterprise Mode and the Enterprise Mode Site List XML file
+The Enterprise Mode Site List is an XML document that specifies a list of sites, their compat mode, and their intended browser. Using [Enterprise Mode Site List Manager (schema v.2)](https://go.microsoft.com/fwlink/p/?LinkId=716853), you can automatically start a webpage using a specific browser. In the case of IE11, the webpage can also be launched in a specific compat mode, so it always renders correctly. Your employees can easily view this site list by typing _about:compat_ in either Microsoft Edge or IE11.
+
+Starting with Windows 10, version 1511 (also known as the Anniversary Update), you can also [restrict IE11 to only the legacy web apps that need it](https://blogs.windows.com/msedgedev/2016/05/19/edge14-ie11-better-together/), automatically sending sites not included in the Enterprise Mode Site List to Microsoft Edge.
+
+### Site list xml file
+This is a view of the [raw EMIE v2 schema.xml file](https://gist.github.com/kypflug/9e9961de771d2fcbd86b#file-emie-v2-schema-xml). There are equivalent Enterprise Mode Site List policies for both [Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/emie-to-improve-compatibility) and [Internet Explorer 11](turn-on-enterprise-mode-and-use-a-site-list.md). The Microsoft Edge list is used to determine which sites should open in IE11; while the IE11 list is used to determine the compat mode for a site, and which sites should open in Microsoft Edge. We recommend using one list for both browsers, where each policy points to the same XML file location.
+
+```xml
+
+
+
+ EnterpriseSiteListManager
+ 10586
+ 20150728.135021
+
+
+
+ IE8Enterprise
+ IE11
+
+
+ default
+ IE11
+
+
+ IE7Enterprise
+ IE11
+
+
+
+
+ IE8Enterprise"
+ IE11
+
+
+ IE7
+ IE11
+
+
+ IE7
+ IE11
+
+
+
+```
+
+## Enterprise Mode Site List Manager and the Enterprise Mode Site List Portal tools
+You can build and manage your Enterprise Mode Site List is by using any generic text editor. However, we’ve also provided a couple tools that can make that process even easier.
+
+### Enterprise Mode Site List Manager
+This tool helps you create error-free XML documents with simple n+1 versioning and URL verification. We recommend using this tool if your site list is relatively small. For more info about this tool, see the Use the [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md) topics.
+
+There are 2 versions of this tool, both supported on Windows 7, Windows 8.1, and Windows 10:
+
+- [Enterprise Mode Site List Manager (schema v.1)](https://www.microsoft.com/download/details.aspx?id=42501). This is an older version of the schema that you must use if you want to create and update your Enterprise Mode Site List for devices running the v.1 version of the schema.
+
+ We strongly recommend moving to the new schema, v.2. For more info, see [Enterprise Mode schema v.2 guidance](enterprise-mode-schema-version-2-guidance.md).
+
+- [Enterprise Mode Site List Manager (schema v.2)](https://www.microsoft.com/download/details.aspx?id=49974). The updated version of the schema, including new functionality. You can use this version of the schema to create and update your Enterprise Mode Site List for devices running the v.2 version of the schema.
+
+ If you open a v.1 version of your Enterprise Mode Site List using this version, it will update the schema to v.2, automatically. For more info, see [Enterprise Mode schema v.1 guidance](enterprise-mode-schema-version-1-guidance.md).
+
+If your list is too large to add individual sites, or if you have more than one person managing the site list, we recommend using the Enterprise Site List Portal.
+
+### Enterprise Mode Site List Portal
+The [Enterprise Mode Site List Portal](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal) is an open-source web tool on GitHub that allows you to manage your Enterprise Mode Site List, hosted by the app, with multiple users. The portal is designed to use IIS and a SQL Server backend, leveraging Active Directory (AD) for employee management.
+
+In addition to all the functionality of the Enterprise Mode Site List Manager tool, the Enterprise Mode Site List Portal helps you:
+
+- Manage site lists from any device supporting Windows 7 or greater.
+
+- Submit change requests.
+
+- Operate offline through an on-premise solution.
+
+- Provide role-based governance.
+
+- Test configuration settings before releasing to a live environment.
+
+Updates to your site list are made by submitting new change requests, which are then approved by a designated group of people, put into a pre-production environment for testing, and then deployed immediately, or scheduled for deployment later.
+
+Because the tool is open-source, the source code is readily available for examination and experimentation. We encourage you to [fork the code, submit pull requests, and send us your feedback](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)! For more info about the Enterprise Mode Site List Portal, see the [Use the Enterprise Mode Site List Portal](use-the-enterprise-mode-portal.md) topics.
+
+## Related topics
+
+- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)
+
+- [Technical guidance, tools, and resources on Enterprise browsing](https://technet.microsoft.com/ie)
+
+- [Enterprise Mode Site List Manager (schema v.1)](https://www.microsoft.com/download/details.aspx?id=42501)
+
+- [Enterprise Mode Site List Manager (schema v.2)](https://www.microsoft.com/download/details.aspx?id=49974)
+
+- [Enterprise Mode Site List Manager](use-the-enterprise-mode-site-list-manager.md)
+
+- [Collect data using Enterprise Site Discovery](collect-data-using-enterprise-site-discovery.md)
+
+- [Web Application Compatibility Lab Kit](https://technet.microsoft.com/microsoft-edge/mt612809.aspx)
+
+- [Microsoft Services Support](https://www.microsoft.com/microsoftservices/support.aspx)
+
+- [Find a Microsoft partner on Pinpoint](https://partnercenter.microsoft.com/pcv/search)
diff --git a/browsers/internet-explorer/ie11-deploy-guide/what-is-the-internet-explorer-11-blocker-toolkit.md b/browsers/internet-explorer/ie11-deploy-guide/what-is-the-internet-explorer-11-blocker-toolkit.md
index 2343973365..98f659748d 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/what-is-the-internet-explorer-11-blocker-toolkit.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/what-is-the-internet-explorer-11-blocker-toolkit.md
@@ -1,152 +1,153 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-ms.pagetype: security
-description: How to download and use the Internet Explorer 11 Blocker Toolkit to turn off the automatic delivery of IE11 through the Automatic Updates feature of Windows Update.
-author: lomayor
-ms.author: lomayor
-ms.manager: elizapo
-ms.prod: ie11
-ms.assetid: fafeaaee-171c-4450-99f7-5cc7f8d7ba91
-ms.reviewer:
-audience: itpro
manager: dansimp
-title: What is the Internet Explorer 11 Blocker Toolkit? (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 05/10/2018
----
-
-
-# What is the Internet Explorer 11 Blocker Toolkit?
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-The Internet Explorer 11 Blocker Toolkit lets you turn off the automatic delivery of IE11 through the **Automatic Updates** feature of Windows Update.
-
->[!IMPORTANT]
->The IE11 Blocker Toolkit does not stop users from manually installing IE11 from the [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?linkid=327753). Also, even if you have installed previous versions of the toolkit before, like for Internet Explorer 10, you still need to install this version to prevent the installation of IE11.
-
-## Install the toolkit
-
-1. Download the IE11 Blocker Toolkit from [Toolkit to Disable Automatic Delivery of Internet Explorer 11](https://go.microsoft.com/fwlink/p/?LinkId=327745).
-
-2. Accept the license agreement and store the included four files on your local computer.
-
-3. Start an elevated Command Prompt by going to **Start**>**All Programs**>**Accessories**> right-clicking on **Command Prompt**, and then choosing **Run as Administrator**.
-
-4. In the Command Prompt, change to the location where you put the 4 files.
-
-5. In the Command Prompt, type `ie11_blocker.cmd /B` and press Enter.
-Wait for the message, **Blocking deployment of IE11 on the local machine. The operation completed successfully.**
-
-6. Close the Command Prompt.
-
-For answers to frequently asked questions, see [Internet Explorer 11 Blocker Toolkit: Frequently Asked Questions](https://go.microsoft.com/fwlink/p/?LinkId=314063).
-
-## Automatic updates
-Internet Explorer 11 makes browsing the web faster, easier, safer, and more reliable than ever. To help customers become more secure and up-to-date, Microsoft will distribute Internet Explorer 11 through Automatic Updates and the Windows Update and Microsoft Update sites. Internet Explorer 11 will be available for users of the 32-bit and 64-bit versions of Windows 7 Service Pack 1 (SP1), and 64-bit version of Windows Server 2008 R2 SP1. This article provides an overview of the delivery process and options available for IT administrators to control how and when Internet Explorer 11 is deployed to their organization through Automatic Updates.
-
-### Automatic delivery process
-Internet Explorer 11 only downloads and installs if it’s available for delivery through Automatic Updates; and Automatic Updates only offer Internet Explorer 11 to users with local administrator accounts. User’s without local administrator accounts won’t be prompted to install the update and will continue using their current version of Internet Explorer.
-
-Internet Explorer 11 replaces Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10. If you decide you don’t want Internet Explorer 11, and you’re running Windows 7 SP1 or Windows Server 2008 R2 with SP1, you can uninstall it from the **View installed updates** section of the **Uninstall an update** page of the Control Panel.
-
-### Internet Explorer 11 automatic upgrades
-
-Internet Explorer 11 is offered through Automatic Updates and Windows Update as an Important update. Users running Windows 7 SP1, who have chosen to download and install updates automatically through Windows Update, are automatically upgraded to Internet Explorer 11.
-
-Users who were automatically upgraded to Internet Explorer 11 can decide to uninstall Internet Explorer 11. However, Internet Explorer 11 will still appear as an optional update through Windows Update.
-
-### Options for blocking automatic delivery
-
-If you use Automatic Updates in your company, but want to stop your users from automatically getting Internet Explorer 11, do one of the following:
-
-- **Download and use the Internet Explorer 11 Blocker Toolkit.** Includes a Group Policy template and a script that permanently blocks Internet Explorer 11 from being offered by Windows Update or Microsoft Update as a high-priority update. You can download this kit from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722).
-
- >[!NOTE]
- >The toolkit won't stop users with local administrator accounts from manually installing Internet Explorer 11. Using this toolkit also prevents your users from receiving automatic upgrades from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11. For more information, see the [Internet Explorer 11 Blocker Toolkit frequently asked questions](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11).
-
-- **Use an update management solution to control update deployment.** If you already use an update management solution, like [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or the more advanced [System Center 2012 Configuration Manager](https://go.microsoft.com/fwlink/?LinkID=276664), you should use that instead of the Internet Explorer Blocker Toolkit.
-
->[!NOTE]
->If you use WSUS to manage updates, and Update Rollups are configured for automatic installation, Internet Explorer will automatically install throughout your company.
-
-
-### Prevent automatic installation of Internet Explorer 11 with WSUS
-
-Internet Explorer 11 will be released to WSUS as an Update Rollup package. Therefore, if you’ve configured WSUS to “auto-approve” Update Rollup packages, it’ll be automatically approved and installed. To stop Internet Explorer 11 from being automatically approved for installation, you need to:
-
-1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.
-
-2. Expand *ComputerName*, and then click **Options**.
-
-3. Click **Automatic Approvals**.
-
-4. Click the rule that automatically approves an update that is classified as Update Rollup, and then click **Edit.**
-
- >[!NOTE]
- >If you don’t see a rule like this, you most likely haven’t configured WSUS to automatically approve Update Rollups for installation. In this situation, you don’t have to do anything else.
-
-5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section.
-
- >[!NOTE]
- >The properties for this rule will resemble the following:
- When an update is in Update Rollups
- Approve the update for all computers
-
-6. Clear the **Update Rollup** check box, and then click **OK**.
-
-7. Click **OK** to close the **Automatic Approvals** dialog box.
-
-After the new Internet Explorer 11 package is available for download, you should manually synchronize the new package to your WSUS server, so that when you re-enable auto-approval it won’t be automatically installed.
-
-1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.
-
-2. Expand *ComputerName*, and then click **Synchronizations**.
-
-3. Click **Synchronize Now**.
-
-4. Expand *ComputerName*, expand **Updates**, and then click **All Updates**.
-
-5. Choose **Unapproved** in the **Approval**drop down box.
-
-6. Check to make sure that Microsoft Internet Explorer 11 is listed as an unapproved update.
-
->[!NOTE]
->There may be multiple updates, depending on the imported language and operating system updates.
-
-### Optional - Reset update rollups packages to auto-approve
-
-1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.
-
-2. Expand *ComputerName*, and then click **Options**.
-
-3. Click **Automatic Approvals**.
-
-4. Click the rule that automatically approves updates of different classifications, and then click **Edit**.
-
-5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section.
-
-6. Check the **Update Rollups** check box, and then click **OK**.
-
-7. Click **OK** to close the **Automatic Approvals** dialog box.
-
->[!NOTE]
->Because auto-approval rules are only evaluated when an update is first imported into WSUS, turning this rule back on after the Internet Explorer 11 update has been imported and synchronized to the server won’t cause this update to be auto-approved.
-
-
-
-## Additional resources
-
-- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722)
-
-- [Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions](../ie11-faq/faq-ie11-blocker-toolkit.md)
-
-- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11)
-
-- [Internet Explorer 11 delivery through automatic updates](ie11-delivery-through-automatic-updates.md)
-
-- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index)
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+ms.pagetype: security
+description: How to download and use the Internet Explorer 11 Blocker Toolkit to turn off the automatic delivery of IE11 through the Automatic Updates feature of Windows Update.
+author: dansimp
+ms.author: dansimp
+ms.manager: elizapo
+ms.prod: ie11
+ms.assetid: fafeaaee-171c-4450-99f7-5cc7f8d7ba91
+ms.reviewer:
+audience: itpro
+manager: dansimp
+title: What is the Internet Explorer 11 Blocker Toolkit? (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 05/10/2018
+---
+
+
+# What is the Internet Explorer 11 Blocker Toolkit?
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+The Internet Explorer 11 Blocker Toolkit lets you turn off the automatic delivery of IE11 through the **Automatic Updates** feature of Windows Update.
+
+>[!IMPORTANT]
+>The IE11 Blocker Toolkit does not stop users from manually installing IE11 from the [Microsoft Download Center](https://go.microsoft.com/fwlink/p/?linkid=327753). Also, even if you have installed previous versions of the toolkit before, like for Internet Explorer 10, you still need to install this version to prevent the installation of IE11.
+
+## Install the toolkit
+
+1. Download the IE11 Blocker Toolkit from [Toolkit to Disable Automatic Delivery of Internet Explorer 11](https://go.microsoft.com/fwlink/p/?LinkId=327745).
+
+2. Accept the license agreement and store the included four files on your local computer.
+
+3. Start an elevated Command Prompt by going to **Start**>**All Programs**>**Accessories**> right-clicking on **Command Prompt**, and then choosing **Run as Administrator**.
+
+4. In the Command Prompt, change to the location where you put the 4 files.
+
+5. In the Command Prompt, type `ie11_blocker.cmd /B` and press Enter.
+Wait for the message, **Blocking deployment of IE11 on the local machine. The operation completed successfully.**
+
+6. Close the Command Prompt.
+
+For answers to frequently asked questions, see [Internet Explorer 11 Blocker Toolkit: Frequently Asked Questions](https://go.microsoft.com/fwlink/p/?LinkId=314063).
+
+## Automatic updates
+Internet Explorer 11 makes browsing the web faster, easier, safer, and more reliable than ever. To help customers become more secure and up-to-date, Microsoft will distribute Internet Explorer 11 through Automatic Updates and the Windows Update and Microsoft Update sites. Internet Explorer 11 will be available for users of the 32-bit and 64-bit versions of Windows 7 Service Pack 1 (SP1), and 64-bit version of Windows Server 2008 R2 SP1. This article provides an overview of the delivery process and options available for IT administrators to control how and when Internet Explorer 11 is deployed to their organization through Automatic Updates.
+
+### Automatic delivery process
+Internet Explorer 11 only downloads and installs if it’s available for delivery through Automatic Updates; and Automatic Updates only offer Internet Explorer 11 to users with local administrator accounts. User’s without local administrator accounts won’t be prompted to install the update and will continue using their current version of Internet Explorer.
+
+Internet Explorer 11 replaces Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10. If you decide you don’t want Internet Explorer 11, and you’re running Windows 7 SP1 or Windows Server 2008 R2 with SP1, you can uninstall it from the **View installed updates** section of the **Uninstall an update** page of the Control Panel.
+
+### Internet Explorer 11 automatic upgrades
+
+Internet Explorer 11 is offered through Automatic Updates and Windows Update as an Important update. Users running Windows 7 SP1, who have chosen to download and install updates automatically through Windows Update, are automatically upgraded to Internet Explorer 11.
+
+Users who were automatically upgraded to Internet Explorer 11 can decide to uninstall Internet Explorer 11. However, Internet Explorer 11 will still appear as an optional update through Windows Update.
+
+### Options for blocking automatic delivery
+
+If you use Automatic Updates in your company, but want to stop your users from automatically getting Internet Explorer 11, do one of the following:
+
+- **Download and use the Internet Explorer 11 Blocker Toolkit.** Includes a Group Policy template and a script that permanently blocks Internet Explorer 11 from being offered by Windows Update or Microsoft Update as a high-priority update. You can download this kit from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722).
+
+ >[!NOTE]
+ >The toolkit won't stop users with local administrator accounts from manually installing Internet Explorer 11. Using this toolkit also prevents your users from receiving automatic upgrades from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11. For more information, see the [Internet Explorer 11 Blocker Toolkit frequently asked questions](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11).
+
+- **Use an update management solution to control update deployment.** If you already use an update management solution, like [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or the more advanced [System Center 2012 Configuration Manager](https://go.microsoft.com/fwlink/?LinkID=276664), you should use that instead of the Internet Explorer Blocker Toolkit.
+
+>[!NOTE]
+>If you use WSUS to manage updates, and Update Rollups are configured for automatic installation, Internet Explorer will automatically install throughout your company.
+
+
+### Prevent automatic installation of Internet Explorer 11 with WSUS
+
+Internet Explorer 11 will be released to WSUS as an Update Rollup package. Therefore, if you’ve configured WSUS to “auto-approve” Update Rollup packages, it’ll be automatically approved and installed. To stop Internet Explorer 11 from being automatically approved for installation, you need to:
+
+1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.
+
+2. Expand *ComputerName*, and then click **Options**.
+
+3. Click **Automatic Approvals**.
+
+4. Click the rule that automatically approves an update that is classified as Update Rollup, and then click **Edit.**
+
+ >[!NOTE]
+ >If you don’t see a rule like this, you most likely haven’t configured WSUS to automatically approve Update Rollups for installation. In this situation, you don’t have to do anything else.
+
+5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section.
+
+ >[!NOTE]
+ >The properties for this rule will resemble the following:
- When an update is in Update Rollups
- Approve the update for all computers
+
+6. Clear the **Update Rollup** check box, and then click **OK**.
+
+7. Click **OK** to close the **Automatic Approvals** dialog box.
+
+After the new Internet Explorer 11 package is available for download, you should manually synchronize the new package to your WSUS server, so that when you re-enable auto-approval it won’t be automatically installed.
+
+1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.
+
+2. Expand *ComputerName*, and then click **Synchronizations**.
+
+3. Click **Synchronize Now**.
+
+4. Expand *ComputerName*, expand **Updates**, and then click **All Updates**.
+
+5. Choose **Unapproved** in the **Approval**drop down box.
+
+6. Check to make sure that Microsoft Internet Explorer 11 is listed as an unapproved update.
+
+>[!NOTE]
+>There may be multiple updates, depending on the imported language and operating system updates.
+
+### Optional - Reset update rollups packages to auto-approve
+
+1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.
+
+2. Expand *ComputerName*, and then click **Options**.
+
+3. Click **Automatic Approvals**.
+
+4. Click the rule that automatically approves updates of different classifications, and then click **Edit**.
+
+5. Click the **Update Rollups** property under the **Step 2: Edit the properties (click an underlined value)** section.
+
+6. Check the **Update Rollups** check box, and then click **OK**.
+
+7. Click **OK** to close the **Automatic Approvals** dialog box.
+
+>[!NOTE]
+>Because auto-approval rules are only evaluated when an update is first imported into WSUS, turning this rule back on after the Internet Explorer 11 update has been imported and synchronized to the server won’t cause this update to be auto-approved.
+
+
+
+## Additional resources
+
+- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722)
+
+- [Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions](../ie11-faq/faq-ie11-blocker-toolkit.md)
+
+- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11)
+
+- [Internet Explorer 11 delivery through automatic updates](ie11-delivery-through-automatic-updates.md)
+
+- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index)
diff --git a/browsers/internet-explorer/ie11-deploy-guide/workflow-processes-enterprise-mode-portal.md b/browsers/internet-explorer/ie11-deploy-guide/workflow-processes-enterprise-mode-portal.md
index e9ee67796d..de71b3a8ff 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/workflow-processes-enterprise-mode-portal.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/workflow-processes-enterprise-mode-portal.md
@@ -1,46 +1,47 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: Use the topics in this section to learn how to perform all of the workflow-related processes in the Enterprise Mode Site List Portal.
-author: lomayor
-ms.prod: ie11
-title: Workflow-based processes for employees using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
----
-
-
-# Workflow-based processes for employees using the Enterprise Mode Site List Portal
-
-**Applies to:**
-
-- Windows 10
-- Windows 8.1
-- Windows 7
-- Windows Server 2012 R2
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-Use the topics in this section to learn how to perform the available Enterprise Mode Site List Portal processes, based on workflow.
-
-## In this section
-|Topic |Description |
-|---------------------------------------------------------------|-----------------------------------------------------------------------------------|
-|[Create a change request using the Enterprise Mode Site List Portal](create-change-request-enterprise-mode-portal.md)|Details about how the Requester creates a change request in the Enterprise Mode Site List Portal.|
-|[Verify your changes using the Enterprise Mode Site List Portal](verify-changes-preprod-enterprise-mode-portal.md)|Details about how the Requester tests a change request in the pre-production environment of the Enterprise Mode Site List Portal.|
-|[Approve a change request using the Enterprise Mode Site List Portal](approve-change-request-enterprise-mode-portal.md)|Details about how the Approver(s) approve a change request in the Enterprise Mode Site List Portal.|
-|[Schedule approved change requests for production using the Enterprise Mode Site List Portal](schedule-production-change-enterprise-mode-portal.md)|Details about how the Requester schedules the approved change request update in the Enterprise Mode Site List Portal.|
-|[Verify the change request update in the production environment using the Enterprise Mode Site List Portal](verify-changes-production-enterprise-mode-portal.md)|Details about how the Requester tests an update in the production environment of the Enterprise Mode Site List Portal.|
-|[View the apps currently on the Enterprise Mode Site List](view-apps-enterprise-mode-site-list.md)|Details about how anyone with access to the portal can review the apps already on the active Enterprise Mode Site List.|
-|[View the available Enterprise Mode reports from the Enterprise Mode Site List Portal](view-enterprise-mode-reports-for-portal.md) |Details about how the Administrator can view the view the Microsoft-provided Enterprise Mode reports from the Enterprise Mode Site List Portal. |
-
-
-## Related topics
-- [Set up the Enterprise Mode Site List Portal](set-up-enterprise-mode-portal.md)
-
-- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)
-
-- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: Use the topics in this section to learn how to perform all of the workflow-related processes in the Enterprise Mode Site List Portal.
+author: dansimp
+ms.prod: ie11
+title: Workflow-based processes for employees using the Enterprise Mode Site List Portal (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+---
+
+
+# Workflow-based processes for employees using the Enterprise Mode Site List Portal
+
+**Applies to:**
+
+- Windows 10
+- Windows 8.1
+- Windows 7
+- Windows Server 2012 R2
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+Use the topics in this section to learn how to perform the available Enterprise Mode Site List Portal processes, based on workflow.
+
+## In this section
+|Topic |Description |
+|---------------------------------------------------------------|-----------------------------------------------------------------------------------|
+|[Create a change request using the Enterprise Mode Site List Portal](create-change-request-enterprise-mode-portal.md)|Details about how the Requester creates a change request in the Enterprise Mode Site List Portal.|
+|[Verify your changes using the Enterprise Mode Site List Portal](verify-changes-preprod-enterprise-mode-portal.md)|Details about how the Requester tests a change request in the pre-production environment of the Enterprise Mode Site List Portal.|
+|[Approve a change request using the Enterprise Mode Site List Portal](approve-change-request-enterprise-mode-portal.md)|Details about how the Approver(s) approve a change request in the Enterprise Mode Site List Portal.|
+|[Schedule approved change requests for production using the Enterprise Mode Site List Portal](schedule-production-change-enterprise-mode-portal.md)|Details about how the Requester schedules the approved change request update in the Enterprise Mode Site List Portal.|
+|[Verify the change request update in the production environment using the Enterprise Mode Site List Portal](verify-changes-production-enterprise-mode-portal.md)|Details about how the Requester tests an update in the production environment of the Enterprise Mode Site List Portal.|
+|[View the apps currently on the Enterprise Mode Site List](view-apps-enterprise-mode-site-list.md)|Details about how anyone with access to the portal can review the apps already on the active Enterprise Mode Site List.|
+|[View the available Enterprise Mode reports from the Enterprise Mode Site List Portal](view-enterprise-mode-reports-for-portal.md) |Details about how the Administrator can view the view the Microsoft-provided Enterprise Mode reports from the Enterprise Mode Site List Portal. |
+
+
+## Related topics
+- [Set up the Enterprise Mode Site List Portal](set-up-enterprise-mode-portal.md)
+
+- [Enterprise Mode Site List Portal source code](https://github.com/MicrosoftEdge/enterprise-mode-site-list-portal)
+
+- [Enterprise Mode and the Enterprise Mode Site List](what-is-enterprise-mode.md)
diff --git a/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md b/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md
index 9230c868d0..8917b1de22 100644
--- a/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md
+++ b/browsers/internet-explorer/ie11-faq/faq-for-it-pros-ie11.md
@@ -1,203 +1,204 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: explore
-description: Frequently asked questions about Internet Explorer 11 for IT Pros
-author: lomayor
-ms.prod: ie11
-ms.assetid: 140e7d33-584a-44da-8c68-6c1d568e1de3
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Internet Explorer 11 - FAQ for IT Pros (Internet Explorer 11 for IT Pros)
-ms.sitesec: library
-ms.date: 10/16/2017
----
-
-
-# Internet Explorer 11 - FAQ for IT Pros
-Answering frequently asked questions about Internet Explorer 11 (IE11) features, operating system support, integration with the Windows operating system, Group Policy, and general configuration.
-
-## Frequently Asked Questions
-
-**Q: What operating system does IE11 run on?**
-
-- Windows 10
-
-- Windows 8.1
-
-- Windows Server 2012 R2
-
-- Windows 7 with Service Pack 1 (SP1)
-
-- Windows Server 2008 R2 with Service Pack 1 (SP1)
-
-
-**Q: How do I install IE11 on Windows 10, Windows 8.1, or Windows Server 2012 R2?**
-IE11 is preinstalled with Windows 8.1 and Windows Server 2012 R2. No additional action is required.
-
-**Q: How do I install IE11 on Windows 7 with SP1 or Windows Server 2008 R2 with SP1?**
-You can install IE11 on computers running either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. To download IE11, see the IE11 [home page](https://go.microsoft.com/fwlink/p/?LinkId=290956).
-
-**Q: How does IE11 integrate with Windows 8.1?**
-IE11 is the default handler for the HTTP and HTTPS protocols and the default browser for Windows 8.1. There are two experiences in Windows 8.1: Internet Explorer and Internet Explorer for the desktop. IE is the default browser for touch-first, immersive experiences. Internet Explorer for the desktop provides a more traditional window and tab management experience. The underlying platform of IE11 is fully interoperable across both IE and the familiar Internet Explorer for the desktop, letting developers write the same markup for both experiences.
-
-**Q: What are the new or improved security features?**
-IE11 offers improvements to Enhanced Protected Mode, password manager, and other security features. IE11 also turns on Transport Layer Security (TLS) 1.2 by default.
-
-**Q: How is Microsoft supporting modern web standards, such as WebGL?**
-Microsoft is committed to providing an interoperable web by supporting modern web standards. Doing this lets developers use the same markup across web browsers, helping to reduce development and support costs.
-Supported web standards include:
-
-- Web Graphics Library (WebGL)
-
-- Canvas 2D L2 extensions, including image smoothing using the nearest neighbor, dashed lines, and fill rules
-
-- Fullscreen API
-
-- Encrypted media extensions
-
-- Media source extensions
-
-- CSS flexible box layout module
-
-- And mutation observers like DOM4 and 5.3
-
-For more information about specific changes and additions, see the [IE11 guide for developers](https://go.microsoft.com/fwlink/p/?LinkId=313188).
-
-**Q: What test tools exist to test for potential application compatibility issues?**
-The Compat Inspector tool supports Windows Internet Explorer 9 through IE11. For more information, see [Compat Inspector User Guide](https://go.microsoft.com/fwlink/p/?LinkId=313189). In addition, you can use the new [F12 Developer Tools](https://go.microsoft.com/fwlink/p/?LinkId=313190) that are included with IE11, or the [modern.ie](https://go.microsoft.com/fwlink/p/?linkid=308902) website for Microsoft Edge.
-
-**Q: Why am I having problems launching my legacy apps with Internet Explorer 11**?
-It’s most likely because IE no longer starts apps that use managed browser hosting controls, like in the .NET Framework 1.1 and 2.0. You can get IE11 to use managed browser hosting controls again, by:
-
-- **For x86 systems or for 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**.
-
-- **For x64 systems or for 64-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\.NETFramework` registry key and change the **EnableIEHosting** value to **1**.
-
-For more information, see the [Web Applications](https://go.microsoft.com/fwlink/p/?LinkId=308903) section of the Application Compatibility in the .NET Framework 4.5 page.
-
-**Q: Is there a compatibility list for IE?**
-Yes. You can review the XML-based [compatibility version list](https://go.microsoft.com/fwlink/p/?LinkId=403864).
-
-**Q: What is Enterprise Mode?**
-Enterprise Mode is a compatibility mode designed for Enterprises. This mode lets websites render using a modified browser configuration that’s designed to avoid the common compatibility problems associated with web apps written and tested on older versions of IE, like Windows Internet Explorer 7 or Windows Internet Explorer 8.
-For more information, see [Turn on Enterprise Mode and use a site list](../ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md).
-
-**Q: What is the Enterprise Mode Site List Manager tool?**
-Enterprise Mode Site List Manager tool gives you a way to add websites to your Enterprise Mode site list, without having to manually code XML.
-For more information, see all of the topics in [Use the Enterprise Mode Site List Manager](../ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md).
-
-**Q: Are browser plug-ins supported in IE11?**
-The immersive version of IE11 provides an add-on–free experience, so browser plugins won't load and dependent content won't be displayed. This doesn't apply to Internet Explorer for the desktop. For more information, see [Browsing Without Plug-ins](https://go.microsoft.com/fwlink/p/?LinkId=242587). However, Internet Explorer for the desktop and IE11 on Windows 7 with SP1 do support browser plugins, including ActiveX controls such as Adobe Flash and Microsoft Silverlight.
-
-**Q: Is Adobe Flash supported on IE11?**
-Adobe Flash is included as a platform feature and is available out of the box for Windows 8.1, running on both IE and Internet Explorer for the desktop. Users can turn this feature on or off using the **Manage Add-ons** dialog box, while administrators can turn this feature on or off using the Group Policy setting, **Turn off Adobe Flash in IE and prevent applications from using IE technology to instantiate Flash objects**.
-**Important**
-The preinstalled version of Adobe Flash isn't supported on IE11 running on either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. However, you can still download and install the separate Adobe Flash plug-in.
-
-**Q: Can I replace IE11 on Windows 8.1 with an earlier version?**
-No. Windows 8.1 doesn't support any of the previous versions of IE.
-
-**Q: Are there any new Group Policy settings in IE11?**
-IE11 includes all of the previous Group Policy settings you've used to manage and control web browser configuration since Internet Explorer 9. It also includes the following new Group Policy settings, supporting new features:
-
-- Turn off Page Prediction
-
-- Turn on the swiping motion for Internet Explorer for the desktop
-
-- Allow Microsoft services to provide more relevant and personalized search results
-
-- Turn off phone number detection
-
-- Allow IE to use the SPDY/3 network protocol
-
-- Let users turn on and use Enterprise Mode from the **Tools** menu
-
-- Use the Enterprise Mode IE website list
-
-For more information, see [New group policy settings for IE11](../ie11-deploy-guide/new-group-policy-settings-for-ie11.md).
-
-
-**Q: Where can I get more information about IE11 for IT pros?**
-Visit the [Springboard Series for Microsoft Browsers](https://go.microsoft.com/fwlink/p/?LinkId=313191) webpage on TechNet.
-
-
-
-**Q: Can I customize settings for IE on Windows 8.1?**
-Settings can be customized in the following ways:
-
-- IE11 **Settings** charm.
-
-- IE11-related Group Policy settings.
-
-- IEAK 11 for settings shared by both IE and Internet Explorer for the desktop.
-
-**Q: Can I make Internet Explorer for the desktop my default browsing experience?**
-Group Policy settings can be set to open either IE or Internet Explorer for the desktop as the default browser experience. Individual users can configure their own settings in the **Programs** tab of **Internet Options**. The following table shows the settings and results:
-
-|Setting |Result |
-|--------|-------|
-|Let IE decide |Links open in the same type of experience from where they're launched. For example, clicking a link from a Microsoft Store app, opens IE. However, clicking a link from a desktop app, opens Internet Explorer for the desktop. |
-|Always in IE11 |Links always open in IE. |
-|Always in Internet Explorer for the desktop |Links always open in Internet Explorer for the desktop. |
-
-
-**Q. Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?**
-Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard.
-
-IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. Select a language below and download IEAK 11 from the download center:
-
-| | | |
-|---------|---------|---------|
-|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) |
-|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Chinese(Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) |
-|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) |
-|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) |
-|[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) |
-|[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) |
-|[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) |
-|[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) |
-
-
-
-
-**Q. What are the different modes available for the Internet Explorer Customization Wizard?**
-The IEAK Customization Wizard displays pages based on your licensing mode selection, either **Internal** or **External**. For more information on IEAK Customization Wizard modes, see [Determine the licensing version and features to use in IEAK 11](../ie11-ieak/licensing-version-and-features-ieak11.md).
-
-The following table displays which pages are available in IEAK 11, based on the licensing mode:
-
-| **Wizard Pages** | **External** | **Internal** |
-|-------------------------------------------|--------------|--------------|
-| Welcome to the IEAK | Yes | Yes |
-| File Locations | Yes | Yes |
-| Platform Selection | Yes | Yes |
-| Language Selection | Yes | Yes |
-| Package Type Selection | Yes | Yes |
-| Feature Selection | Yes | Yes |
-| Automatic Version Synchronization | Yes | Yes |
-| Custom Components | Yes | Yes |
-| Corporate Install | No | Yes |
-| User Experience | No | Yes |
-| Browser User Interface | Yes | Yes |
-| Search Providers | Yes | Yes |
-| Important URLs - Home page and Support | Yes | Yes |
-| Accelerators | Yes | Yes |
-| Favorites, Favorites Bar, and Feeds | Yes | Yes |
-| Browsing Options | No | Yes |
-| First Run Wizard and Welcome Page Options | Yes | Yes |
-| Compatibility View | Yes | Yes |
-| Connection Manager | Yes | Yes |
-| Connection Settings | Yes | Yes |
-| Automatic Configuration | No | Yes |
-| Proxy Settings | Yes | Yes |
-| Security and Privacy Settings | No | Yes |
-| Add a Root Certificate | Yes | No |
-| Programs | Yes | Yes |
-| Additional Settings | No | Yes |
-| Wizard Complete | Yes | Yes |
-
-
-## Related topics
-- [Microsoft Edge - Deployment Guide for IT Pros](https://go.microsoft.com/fwlink/p/?LinkId=760643)
-- [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md)
-- [Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](../ie11-ieak/index.md)
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: explore
+description: Frequently asked questions about Internet Explorer 11 for IT Pros
+author: dansimp
+ms.prod: ie11
+ms.assetid: 140e7d33-584a-44da-8c68-6c1d568e1de3
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Internet Explorer 11 - FAQ for IT Pros (Internet Explorer 11 for IT Pros)
+ms.sitesec: library
+ms.date: 10/16/2017
+---
+
+
+# Internet Explorer 11 - FAQ for IT Pros
+Answering frequently asked questions about Internet Explorer 11 (IE11) features, operating system support, integration with the Windows operating system, Group Policy, and general configuration.
+
+## Frequently Asked Questions
+
+**Q: What operating system does IE11 run on?**
+
+- Windows 10
+
+- Windows 8.1
+
+- Windows Server 2012 R2
+
+- Windows 7 with Service Pack 1 (SP1)
+
+- Windows Server 2008 R2 with Service Pack 1 (SP1)
+
+
+**Q: How do I install IE11 on Windows 10, Windows 8.1, or Windows Server 2012 R2?**
+IE11 is preinstalled with Windows 8.1 and Windows Server 2012 R2. No additional action is required.
+
+**Q: How do I install IE11 on Windows 7 with SP1 or Windows Server 2008 R2 with SP1?**
+You can install IE11 on computers running either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. To download IE11, see the IE11 [home page](https://go.microsoft.com/fwlink/p/?LinkId=290956).
+
+**Q: How does IE11 integrate with Windows 8.1?**
+IE11 is the default handler for the HTTP and HTTPS protocols and the default browser for Windows 8.1. There are two experiences in Windows 8.1: Internet Explorer and Internet Explorer for the desktop. IE is the default browser for touch-first, immersive experiences. Internet Explorer for the desktop provides a more traditional window and tab management experience. The underlying platform of IE11 is fully interoperable across both IE and the familiar Internet Explorer for the desktop, letting developers write the same markup for both experiences.
+
+**Q: What are the new or improved security features?**
+IE11 offers improvements to Enhanced Protected Mode, password manager, and other security features. IE11 also turns on Transport Layer Security (TLS) 1.2 by default.
+
+**Q: How is Microsoft supporting modern web standards, such as WebGL?**
+Microsoft is committed to providing an interoperable web by supporting modern web standards. Doing this lets developers use the same markup across web browsers, helping to reduce development and support costs.
+Supported web standards include:
+
+- Web Graphics Library (WebGL)
+
+- Canvas 2D L2 extensions, including image smoothing using the nearest neighbor, dashed lines, and fill rules
+
+- Fullscreen API
+
+- Encrypted media extensions
+
+- Media source extensions
+
+- CSS flexible box layout module
+
+- And mutation observers like DOM4 and 5.3
+
+For more information about specific changes and additions, see the [IE11 guide for developers](https://go.microsoft.com/fwlink/p/?LinkId=313188).
+
+**Q: What test tools exist to test for potential application compatibility issues?**
+The Compat Inspector tool supports Windows Internet Explorer 9 through IE11. For more information, see [Compat Inspector User Guide](https://go.microsoft.com/fwlink/p/?LinkId=313189). In addition, you can use the new [F12 Developer Tools](https://go.microsoft.com/fwlink/p/?LinkId=313190) that are included with IE11, or the [modern.ie](https://go.microsoft.com/fwlink/p/?linkid=308902) website for Microsoft Edge.
+
+**Q: Why am I having problems launching my legacy apps with Internet Explorer 11**?
+It’s most likely because IE no longer starts apps that use managed browser hosting controls, like in the .NET Framework 1.1 and 2.0. You can get IE11 to use managed browser hosting controls again, by:
+
+- **For x86 systems or for 32-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\MICROSOFT\.NETFramework` registry key and change the **EnableIEHosting** value to **1**.
+
+- **For x64 systems or for 64-bit processes on x64 systems:** Go to the `HKLM\SOFTWARE\Wow6432Node\.NETFramework` registry key and change the **EnableIEHosting** value to **1**.
+
+For more information, see the [Web Applications](https://go.microsoft.com/fwlink/p/?LinkId=308903) section of the Application Compatibility in the .NET Framework 4.5 page.
+
+**Q: Is there a compatibility list for IE?**
+Yes. You can review the XML-based [compatibility version list](https://go.microsoft.com/fwlink/p/?LinkId=403864).
+
+**Q: What is Enterprise Mode?**
+Enterprise Mode is a compatibility mode designed for Enterprises. This mode lets websites render using a modified browser configuration that’s designed to avoid the common compatibility problems associated with web apps written and tested on older versions of IE, like Windows Internet Explorer 7 or Windows Internet Explorer 8.
+For more information, see [Turn on Enterprise Mode and use a site list](../ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md).
+
+**Q: What is the Enterprise Mode Site List Manager tool?**
+Enterprise Mode Site List Manager tool gives you a way to add websites to your Enterprise Mode site list, without having to manually code XML.
+For more information, see all of the topics in [Use the Enterprise Mode Site List Manager](../ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md).
+
+**Q: Are browser plug-ins supported in IE11?**
+The immersive version of IE11 provides an add-on–free experience, so browser plugins won't load and dependent content won't be displayed. This doesn't apply to Internet Explorer for the desktop. For more information, see [Browsing Without Plug-ins](https://go.microsoft.com/fwlink/p/?LinkId=242587). However, Internet Explorer for the desktop and IE11 on Windows 7 with SP1 do support browser plugins, including ActiveX controls such as Adobe Flash and Microsoft Silverlight.
+
+**Q: Is Adobe Flash supported on IE11?**
+Adobe Flash is included as a platform feature and is available out of the box for Windows 8.1, running on both IE and Internet Explorer for the desktop. Users can turn this feature on or off using the **Manage Add-ons** dialog box, while administrators can turn this feature on or off using the Group Policy setting, **Turn off Adobe Flash in IE and prevent applications from using IE technology to instantiate Flash objects**.
+**Important**
+The preinstalled version of Adobe Flash isn't supported on IE11 running on either Windows 7 with SP1 or Windows Server 2008 R2 with SP1. However, you can still download and install the separate Adobe Flash plug-in.
+
+**Q: Can I replace IE11 on Windows 8.1 with an earlier version?**
+No. Windows 8.1 doesn't support any of the previous versions of IE.
+
+**Q: Are there any new Group Policy settings in IE11?**
+IE11 includes all of the previous Group Policy settings you've used to manage and control web browser configuration since Internet Explorer 9. It also includes the following new Group Policy settings, supporting new features:
+
+- Turn off Page Prediction
+
+- Turn on the swiping motion for Internet Explorer for the desktop
+
+- Allow Microsoft services to provide more relevant and personalized search results
+
+- Turn off phone number detection
+
+- Allow IE to use the SPDY/3 network protocol
+
+- Let users turn on and use Enterprise Mode from the **Tools** menu
+
+- Use the Enterprise Mode IE website list
+
+For more information, see [New group policy settings for IE11](../ie11-deploy-guide/new-group-policy-settings-for-ie11.md).
+
+
+**Q: Where can I get more information about IE11 for IT pros?**
+Visit the [Springboard Series for Microsoft Browsers](https://go.microsoft.com/fwlink/p/?LinkId=313191) webpage on TechNet.
+
+
+
+**Q: Can I customize settings for IE on Windows 8.1?**
+Settings can be customized in the following ways:
+
+- IE11 **Settings** charm.
+
+- IE11-related Group Policy settings.
+
+- IEAK 11 for settings shared by both IE and Internet Explorer for the desktop.
+
+**Q: Can I make Internet Explorer for the desktop my default browsing experience?**
+Group Policy settings can be set to open either IE or Internet Explorer for the desktop as the default browser experience. Individual users can configure their own settings in the **Programs** tab of **Internet Options**. The following table shows the settings and results:
+
+|Setting |Result |
+|--------|-------|
+|Let IE decide |Links open in the same type of experience from where they're launched. For example, clicking a link from a Microsoft Store app, opens IE. However, clicking a link from a desktop app, opens Internet Explorer for the desktop. |
+|Always in IE11 |Links always open in IE. |
+|Always in Internet Explorer for the desktop |Links always open in Internet Explorer for the desktop. |
+
+
+**Q. Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?**
+Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard.
+
+IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. Select a language below and download IEAK 11 from the download center:
+
+| | | |
+|---------|---------|---------|
+|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) |
+|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Chinese(Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) |
+|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) |
+|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) |
+|[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) |
+|[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) |
+|[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) |
+|[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) |
+
+
+
+
+**Q. What are the different modes available for the Internet Explorer Customization Wizard?**
+The IEAK Customization Wizard displays pages based on your licensing mode selection, either **Internal** or **External**. For more information on IEAK Customization Wizard modes, see [Determine the licensing version and features to use in IEAK 11](../ie11-ieak/licensing-version-and-features-ieak11.md).
+
+The following table displays which pages are available in IEAK 11, based on the licensing mode:
+
+| **Wizard Pages** | **External** | **Internal** |
+|-------------------------------------------|--------------|--------------|
+| Welcome to the IEAK | Yes | Yes |
+| File Locations | Yes | Yes |
+| Platform Selection | Yes | Yes |
+| Language Selection | Yes | Yes |
+| Package Type Selection | Yes | Yes |
+| Feature Selection | Yes | Yes |
+| Automatic Version Synchronization | Yes | Yes |
+| Custom Components | Yes | Yes |
+| Corporate Install | No | Yes |
+| User Experience | No | Yes |
+| Browser User Interface | Yes | Yes |
+| Search Providers | Yes | Yes |
+| Important URLs - Home page and Support | Yes | Yes |
+| Accelerators | Yes | Yes |
+| Favorites, Favorites Bar, and Feeds | Yes | Yes |
+| Browsing Options | No | Yes |
+| First Run Wizard and Welcome Page Options | Yes | Yes |
+| Compatibility View | Yes | Yes |
+| Connection Manager | Yes | Yes |
+| Connection Settings | Yes | Yes |
+| Automatic Configuration | No | Yes |
+| Proxy Settings | Yes | Yes |
+| Security and Privacy Settings | No | Yes |
+| Add a Root Certificate | Yes | No |
+| Programs | Yes | Yes |
+| Additional Settings | No | Yes |
+| Wizard Complete | Yes | Yes |
+
+
+## Related topics
+- [Microsoft Edge - Deployment Guide for IT Pros](https://go.microsoft.com/fwlink/p/?LinkId=760643)
+- [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md)
+- [Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](../ie11-ieak/index.md)
diff --git a/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md b/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md
index 392e7cc26e..a4cb639bc5 100644
--- a/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md
+++ b/browsers/internet-explorer/ie11-faq/faq-ie11-blocker-toolkit.md
@@ -1,120 +1,121 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: explore
-description: Get answers to commonly asked questions about the Internet Explorer 11 Blocker Toolkit.
-author: lomayor
-ms.author: lomayor
-ms.prod: ie11
-ms.assetid:
-ms.reviewer:
-audience: itpro
manager: dansimp
-title: Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions
-ms.sitesec: library
-ms.date: 05/10/2018
----
-
-# Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions
-
-Get answers to commonly asked questions about the Internet Explorer 11 Blocker Toolkit.
-
->[!Important]
->If you administer your company’s environment using an update management solution, such as Windows Server Update Services (WSUS) or System Center 2012 Configuration Manager, you don’t need to use the Internet Explorer 11 Blocker Toolkit. Update management solutions let you completely manage your Windows Updates and Microsoft Updates, including your Internet Explorer 11 deployment.
-
-- [Automatic updates delivery process](#automatic-updates-delivery-process)
-
-- [How the Internet Explorer 11 Blocker Toolkit works](#how-the-internet-explorer-11-blocker-toolkit-works)
-
-- [Internet Explorer 11 Blocker Toolkit and other update services](#internet-explorer-11-blocker-toolkit-and-other-update-services)
-
-## Automatic Updates delivery process
-
-
-**Q. Which users will receive Internet Explorer 11 as an important update?**
-A. Users running either Windows 7 with Service Pack 1 (SP1) or the 64-bit version of Windows Server 2008 R2 with Service Pack 1 (SP1) will receive Internet Explorer 11 as an important update, if Automatic Updates are turned on. Windows Update is manually run. Automatic Updates will automatically download and install the Internet Explorer 11 files if it’s turned on. For more information about how Internet Explorer works with Automatic Updates and information about other deployment blocking options, see [Internet Explorer 11 Delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md).
-
-**Q. When is the Blocker Toolkit available?**
-A. The Blocker Toolkit is currently available from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722).
-
-**Q. What tools can I use to manage Windows Updates and Microsoft Updates in my company?**
-A. We encourage anyone who wants full control over their company’s deployment of Windows Updates and Microsoft Updates, to use [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus), a free tool for users of Windows Server. You can also use the more advanced configuration management tool, [System Center 2012 Configuration Manager](https://technet.microsoft.com/library/gg682041.aspx).
-
-**Q. How long does the blocker mechanism work?**
-A. The Internet Explorer 11 Blocker Toolkit uses a registry key value to permanently turn off the automatic delivery of Internet Explorer 11. This behavior lasts as long as the registry key value isn’t removed or changed.
-
-**Q. Why should I use the Internet Explorer 11 Blocker Toolkit to stop delivery of Internet Explorer 11? Why can’t I just disable all of Automatic Updates?**
-A. Automatic Updates provide you with ongoing critical security and reliability updates. Turning this feature off can leave your computers more vulnerable. Instead, we suggest that you use an update management solution, such as WSUS, to fully control your environment while leaving this feature running, managing how and when the updates get to your user’s computers.
-
-The Internet Explorer 11 Blocker Toolkit safely allows Internet Explorer 11 to download and install in companies that can’t use WSUS, Configuration Manager, or
-other update management solution.
-
-**Q. Why don’t we just block URL access to Windows Update or Microsoft Update?**
-A. Blocking the Windows Update or Microsoft Update URLs also stops delivery of critical security and reliability updates for all of the supported versions of the Windows operating system; leaving your computers more vulnerable.
-
-## How the Internet Explorer 11 Blocker Toolkit works
-
-**Q. How should I test the Internet Explorer 11 Blocker Toolkit in my company?**
-A. Because the toolkit only sets a registry key to turn on and off the delivery of Internet Explorer 11, there should be no additional impact or side effects to your environment. No additional testing should be necessary.
-
-**Q. What’s the registry key used to block delivery of Internet Explorer 11?**
-A. HKLM\\SOFTWARE\\Microsoft\\Internet Explorer\\Setup\\11.0
-
-**Q. What’s the registry key name and values?**
-The registry key name is **DoNotAllowIE11**, where:
-
-- A value of **1** turns off the automatic delivery of Internet Explorer 11 using Automatic Updates and turns off the Express install option.
-
-- Not providing a registry key, or using a value of anything other than **1**, lets the user install Internet Explorer 11 through Automatic Updates or a
- manual update.
-
-**Q. Does the Internet Explorer 11 Blocker Toolkit stop users from manually installing Internet Explorer 11?**
-A. No. The Internet Explorer 11 Blocker Toolkit only stops computers from automatically installing Internet Explorer 11 through Automatic Updates. Users can still download and install Internet Explorer 11 from the Microsoft Download Center or from external media.
-
-**Q. Does the Internet Explorer 11 Blocker Toolkit stop users from automatically upgrading to Internet Explorer 11?**
-A. Yes. The Internet Explorer 11 Blocker Toolkit also prevents Automatic Updates from automatically upgrading a computer from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11.
-
-**Q. How does the provided script work?**
-A. The script accepts one of two command line options:
-
-- **Block:** Creates the registry key that stops Internet Explorer 11 from installing through Automatic Updates.
-
-- **Unblock:** Removes the registry key that stops Internet Explorer 11 from installing through Automatic Updates.
-
-**Q. What’s the ADM template file used for?**
-A. The Administrative Template (.adm file) lets you import the new Group Policy environment and use Group Policy Objects to centrally manage all of the computers in your company.
-
-**Q. Is the tool localized?**
-A. No. The tool isn’t localized, it’s only available in English (en-us). However, it does work, without any modifications, on any language edition of the supported operating systems.
-
-## Internet Explorer 11 Blocker Toolkit and other update services
-
-**Q: Is there a version of the Internet Explorer Blocker Toolkit that will prevent automatic installation of IE11?**
-Yes. The IE11 Blocker Toolkit is available for download. For more information, see [Toolkit to Disable Automatic Delivery of IE11](https://go.microsoft.com/fwlink/p/?LinkId=328195) on the Microsoft Download Center.
-
-**Q. Does the Internet Explorer 11 blocking mechanism also block delivery of Internet Explorer 11 through update management solutions, like WSUS?**
-A. No. You can still deploy Internet Explorer 11 using one of the upgrade management solutions, even if the blocking mechanism is activated. The Internet Explorer 11 Blocker Toolkit is only intended for companies that don’t use upgrade management solutions.
-
-**Q. If WSUS is set to 'auto-approve' Update Rollup packages (this is not the default configuration), how do I stop Internet Explorer 11 from automatically installing throughout my company?**
-A. You only need to change your settings if:
-
-- You use WSUS to manage updates and allow auto-approvals for Update Rollup installation.
-
- -and-
-
-- You have computers running either Windows 7 SP1 or Windows Server 2008 R2 (SP1) with Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 installed.
-
- -and-
-
-- You don’t want to upgrade your older versions of Internet Explorer to Internet Explorer 11 right now.
-
-If these scenarios apply to your company, see [Internet Explorer 11 delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md) for more information on how to prevent automatic installation.
-
-
-## Additional resources
-
-- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722)
-
-- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11)
-
-- [Internet Explorer 11 delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md)
-
-- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index)
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: explore
+description: Get answers to commonly asked questions about the Internet Explorer 11 Blocker Toolkit.
+author: dansimp
+ms.author: dansimp
+ms.prod: ie11
+ms.assetid:
+ms.reviewer:
+audience: itpro
+manager: dansimp
+title: Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions
+ms.sitesec: library
+ms.date: 05/10/2018
+---
+
+# Internet Explorer 11 Blocker Toolkit - Frequently Asked Questions
+
+Get answers to commonly asked questions about the Internet Explorer 11 Blocker Toolkit.
+
+>[!Important]
+>If you administer your company’s environment using an update management solution, such as Windows Server Update Services (WSUS) or System Center 2012 Configuration Manager, you don’t need to use the Internet Explorer 11 Blocker Toolkit. Update management solutions let you completely manage your Windows Updates and Microsoft Updates, including your Internet Explorer 11 deployment.
+
+- [Automatic updates delivery process](#automatic-updates-delivery-process)
+
+- [How the Internet Explorer 11 Blocker Toolkit works](#how-the-internet-explorer-11-blocker-toolkit-works)
+
+- [Internet Explorer 11 Blocker Toolkit and other update services](#internet-explorer-11-blocker-toolkit-and-other-update-services)
+
+## Automatic Updates delivery process
+
+
+**Q. Which users will receive Internet Explorer 11 as an important update?**
+A. Users running either Windows 7 with Service Pack 1 (SP1) or the 64-bit version of Windows Server 2008 R2 with Service Pack 1 (SP1) will receive Internet Explorer 11 as an important update, if Automatic Updates are turned on. Windows Update is manually run. Automatic Updates will automatically download and install the Internet Explorer 11 files if it’s turned on. For more information about how Internet Explorer works with Automatic Updates and information about other deployment blocking options, see [Internet Explorer 11 Delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md).
+
+**Q. When is the Blocker Toolkit available?**
+A. The Blocker Toolkit is currently available from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=40722).
+
+**Q. What tools can I use to manage Windows Updates and Microsoft Updates in my company?**
+A. We encourage anyone who wants full control over their company’s deployment of Windows Updates and Microsoft Updates, to use [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus), a free tool for users of Windows Server. You can also use the more advanced configuration management tool, [System Center 2012 Configuration Manager](https://technet.microsoft.com/library/gg682041.aspx).
+
+**Q. How long does the blocker mechanism work?**
+A. The Internet Explorer 11 Blocker Toolkit uses a registry key value to permanently turn off the automatic delivery of Internet Explorer 11. This behavior lasts as long as the registry key value isn’t removed or changed.
+
+**Q. Why should I use the Internet Explorer 11 Blocker Toolkit to stop delivery of Internet Explorer 11? Why can’t I just disable all of Automatic Updates?**
+A. Automatic Updates provide you with ongoing critical security and reliability updates. Turning this feature off can leave your computers more vulnerable. Instead, we suggest that you use an update management solution, such as WSUS, to fully control your environment while leaving this feature running, managing how and when the updates get to your user’s computers.
+
+The Internet Explorer 11 Blocker Toolkit safely allows Internet Explorer 11 to download and install in companies that can’t use WSUS, Configuration Manager, or
+other update management solution.
+
+**Q. Why don’t we just block URL access to Windows Update or Microsoft Update?**
+A. Blocking the Windows Update or Microsoft Update URLs also stops delivery of critical security and reliability updates for all of the supported versions of the Windows operating system; leaving your computers more vulnerable.
+
+## How the Internet Explorer 11 Blocker Toolkit works
+
+**Q. How should I test the Internet Explorer 11 Blocker Toolkit in my company?**
+A. Because the toolkit only sets a registry key to turn on and off the delivery of Internet Explorer 11, there should be no additional impact or side effects to your environment. No additional testing should be necessary.
+
+**Q. What’s the registry key used to block delivery of Internet Explorer 11?**
+A. HKLM\\SOFTWARE\\Microsoft\\Internet Explorer\\Setup\\11.0
+
+**Q. What’s the registry key name and values?**
+The registry key name is **DoNotAllowIE11**, where:
+
+- A value of **1** turns off the automatic delivery of Internet Explorer 11 using Automatic Updates and turns off the Express install option.
+
+- Not providing a registry key, or using a value of anything other than **1**, lets the user install Internet Explorer 11 through Automatic Updates or a
+ manual update.
+
+**Q. Does the Internet Explorer 11 Blocker Toolkit stop users from manually installing Internet Explorer 11?**
+A. No. The Internet Explorer 11 Blocker Toolkit only stops computers from automatically installing Internet Explorer 11 through Automatic Updates. Users can still download and install Internet Explorer 11 from the Microsoft Download Center or from external media.
+
+**Q. Does the Internet Explorer 11 Blocker Toolkit stop users from automatically upgrading to Internet Explorer 11?**
+A. Yes. The Internet Explorer 11 Blocker Toolkit also prevents Automatic Updates from automatically upgrading a computer from Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 to Internet Explorer 11.
+
+**Q. How does the provided script work?**
+A. The script accepts one of two command line options:
+
+- **Block:** Creates the registry key that stops Internet Explorer 11 from installing through Automatic Updates.
+
+- **Unblock:** Removes the registry key that stops Internet Explorer 11 from installing through Automatic Updates.
+
+**Q. What’s the ADM template file used for?**
+A. The Administrative Template (.adm file) lets you import the new Group Policy environment and use Group Policy Objects to centrally manage all of the computers in your company.
+
+**Q. Is the tool localized?**
+A. No. The tool isn’t localized, it’s only available in English (en-us). However, it does work, without any modifications, on any language edition of the supported operating systems.
+
+## Internet Explorer 11 Blocker Toolkit and other update services
+
+**Q: Is there a version of the Internet Explorer Blocker Toolkit that will prevent automatic installation of IE11?**
+Yes. The IE11 Blocker Toolkit is available for download. For more information, see [Toolkit to Disable Automatic Delivery of IE11](https://go.microsoft.com/fwlink/p/?LinkId=328195) on the Microsoft Download Center.
+
+**Q. Does the Internet Explorer 11 blocking mechanism also block delivery of Internet Explorer 11 through update management solutions, like WSUS?**
+A. No. You can still deploy Internet Explorer 11 using one of the upgrade management solutions, even if the blocking mechanism is activated. The Internet Explorer 11 Blocker Toolkit is only intended for companies that don’t use upgrade management solutions.
+
+**Q. If WSUS is set to 'auto-approve' Update Rollup packages (this is not the default configuration), how do I stop Internet Explorer 11 from automatically installing throughout my company?**
+A. You only need to change your settings if:
+
+- You use WSUS to manage updates and allow auto-approvals for Update Rollup installation.
+
+ -and-
+
+- You have computers running either Windows 7 SP1 or Windows Server 2008 R2 (SP1) with Internet Explorer 8, Internet Explorer 9, or Internet Explorer 10 installed.
+
+ -and-
+
+- You don’t want to upgrade your older versions of Internet Explorer to Internet Explorer 11 right now.
+
+If these scenarios apply to your company, see [Internet Explorer 11 delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md) for more information on how to prevent automatic installation.
+
+
+## Additional resources
+
+- [Internet Explorer 11 Blocker Toolkit download](https://www.microsoft.com/download/details.aspx?id=40722)
+
+- [Internet Explorer 11 FAQ for IT pros](https://docs.microsoft.com/internet-explorer/ie11-faq/faq-for-it-pros-ie11)
+
+- [Internet Explorer 11 delivery through automatic updates](../ie11-deploy-guide/ie11-delivery-through-automatic-updates.md)
+
+- [Internet Explorer 11 deployment guide](https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/index)
diff --git a/browsers/internet-explorer/ie11-faq/faq-ieak11.md b/browsers/internet-explorer/ie11-faq/faq-ieak11.md
index 3af0ec2d32..8064c74737 100644
--- a/browsers/internet-explorer/ie11-faq/faq-ieak11.md
+++ b/browsers/internet-explorer/ie11-faq/faq-ieak11.md
@@ -1,120 +1,121 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-ms.pagetype: security
-description: Internet Explorer Administration Kit (IEAK) helps corporations, Internet service providers (ISPs), Internet content providers (ICPs), and independent software vendors (ISVs) to deploy and manage web-based solutions.
-author: lomayor
-ms.author: lomayor
-ms.manager: elizapo
-ms.prod: ie11
-ms.assetid:
-ms.reviewer:
-audience: itpro
manager: dansimp
-title: IEAK 11 - Frequently Asked Questions
-ms.sitesec: library
-ms.date: 05/10/2018
----
-
-# IEAK 11 - Frequently Asked Questions
-
-Get answers to commonly asked questions about the Internet Explorer Administration Kit 11 (IEAK 11), and find links to additional material you might find helpful.
-
-**What is IEAK 11?**
-
-IEAK 11 enables you to customize, brand, and distribute customized Internet Explorer 11 browser packages across an organization. Download the kit from the [Internet Explorer Administration Kit (IEAK) information and downloads](../ie11-ieak/ieak-information-and-downloads.md).
-
-**What are the supported operating systems?**
-
-You can customize and install IEAK 11 on the following supported operating systems:
-
-- Windows 8
-
-- Windows Server 2012
-
-- Windows 7 Service Pack 1 (SP1)
-
-- Windows Server 2008 R2 Service Pack 1 (SP1)
-
->[!Note]
->IEAK 11 does not support building custom packages for Windows RT.
-
-
-**What can I customize with IEAK 11?**
-
-The IEAK 11 enables you to customize branding and settings for Internet Explorer 11. For PCs running Windows 7, the custom package also includes the Internet Explorer executable.
-
->[!Note]
->Internet Explorer 11 is preinstalled on PCs running Windows 8. Therefore, the executable is not included in the customized package.
-
-**Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?**
-Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard.
-
->[!Note]
->IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. To download IEAK 11, see [Internet Explorer Administration Kit (IEAK) information and downloads](../ie11-ieak/ieak-information-and-downloads.md).
-
-**Q: Is there a version of the Internet Explorer Administration Kit (IEAK) supporting IE11?**
-Yes. The Internet Explorer Administration Kit 11 (IEAK 11) is available for download. IEAK 11 lets you create custom versions of IE11 for use in your organization. For more information, see the following resources:
-
-- [Internet Explorer Administration Kit Information and Downloads](https://go.microsoft.com/fwlink/p/?LinkId=214250) on the Internet Explorer TechCenter.
-
-- [Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](../ie11-ieak/index.md)
-
-**What are the different modes available for the Internet Explorer Customization Wizard?**
-The IEAK Customization Wizard displays pages based on your licensing mode selection, either **Internal** or **External**. For more information on IEAK Customization Wizard modes, see [What IEAK can do for you](../ie11-ieak/what-ieak-can-do-for-you.md).
-
-The following table displays which pages are available in IEAK 11, based on the licensing mode:
-
-| **Wizard Pages** | **External** | **Internal** |
-|-------------------------------------------|--------------|--------------|
-| Welcome to the IEAK | Yes | Yes |
-| File Locations | Yes | Yes |
-| Platform Selection | Yes | Yes |
-| Language Selection | Yes | Yes |
-| Package Type Selection | Yes | Yes |
-| Feature Selection | Yes | Yes |
-| Automatic Version Synchronization | Yes | Yes |
-| Custom Components | Yes | Yes |
-| Corporate Install | No | Yes |
-| User Experience | No | Yes |
-| Browser User Interface | Yes | Yes |
-| Search Providers | Yes | Yes |
-| Important URLs - Home page and Support | Yes | Yes |
-| Accelerators | Yes | Yes |
-| Favorites, Favorites Bar, and Feeds | Yes | Yes |
-| Browsing Options | No | Yes |
-| First Run Wizard and Welcome Page Options | Yes | Yes |
-| Compatibility View | Yes | Yes |
-| Connection Manager | Yes | Yes |
-| Connection Settings | Yes | Yes |
-| Automatic Configuration | No | Yes |
-| Proxy Settings | Yes | Yes |
-| Security and Privacy Settings | No | Yes |
-| Add a Root Certificate | Yes | No |
-| Programs | Yes | Yes |
-| Additional Settings | No | Yes |
-| Wizard Complete | Yes | Yes |
-
-
-**Q. Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?**
-Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard.
-
-IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. Select a language below and download IEAK 11 from the download center:
-
-| | | |
-|---------|---------|---------|
-|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) |
-|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Chinese(Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) |
-|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) |
-|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) |
-|[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) |
-|[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) |
-|[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) |
-|[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) |
-
-
-## Additional resources
-
-[Download IEAK 11](https://technet.microsoft.com/microsoft-edge/bb219517)
-[IEAK 11 overview](https://technet.microsoft.com/microsoft-edge/dn532244)
-[IEAK 11 product documentation](https://docs.microsoft.com/internet-explorer/ie11-ieak/index)
-[IEAK 11 licensing guidelines](../ie11-ieak/licensing-version-and-features-ieak11.md)
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+ms.pagetype: security
+description: Internet Explorer Administration Kit (IEAK) helps corporations, Internet service providers (ISPs), Internet content providers (ICPs), and independent software vendors (ISVs) to deploy and manage web-based solutions.
+author: dansimp
+ms.author: dansimp
+ms.manager: elizapo
+ms.prod: ie11
+ms.assetid:
+ms.reviewer:
+audience: itpro
+manager: dansimp
+title: IEAK 11 - Frequently Asked Questions
+ms.sitesec: library
+ms.date: 05/10/2018
+---
+
+# IEAK 11 - Frequently Asked Questions
+
+Get answers to commonly asked questions about the Internet Explorer Administration Kit 11 (IEAK 11), and find links to additional material you might find helpful.
+
+**What is IEAK 11?**
+
+IEAK 11 enables you to customize, brand, and distribute customized Internet Explorer 11 browser packages across an organization. Download the kit from the [Internet Explorer Administration Kit (IEAK) information and downloads](../ie11-ieak/ieak-information-and-downloads.md).
+
+**What are the supported operating systems?**
+
+You can customize and install IEAK 11 on the following supported operating systems:
+
+- Windows 8
+
+- Windows Server 2012
+
+- Windows 7 Service Pack 1 (SP1)
+
+- Windows Server 2008 R2 Service Pack 1 (SP1)
+
+>[!Note]
+>IEAK 11 does not support building custom packages for Windows RT.
+
+
+**What can I customize with IEAK 11?**
+
+The IEAK 11 enables you to customize branding and settings for Internet Explorer 11. For PCs running Windows 7, the custom package also includes the Internet Explorer executable.
+
+>[!Note]
+>Internet Explorer 11 is preinstalled on PCs running Windows 8. Therefore, the executable is not included in the customized package.
+
+**Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?**
+Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard.
+
+>[!Note]
+>IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. To download IEAK 11, see [Internet Explorer Administration Kit (IEAK) information and downloads](../ie11-ieak/ieak-information-and-downloads.md).
+
+**Q: Is there a version of the Internet Explorer Administration Kit (IEAK) supporting IE11?**
+Yes. The Internet Explorer Administration Kit 11 (IEAK 11) is available for download. IEAK 11 lets you create custom versions of IE11 for use in your organization. For more information, see the following resources:
+
+- [Internet Explorer Administration Kit Information and Downloads](https://go.microsoft.com/fwlink/p/?LinkId=214250) on the Internet Explorer TechCenter.
+
+- [Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](../ie11-ieak/index.md)
+
+**What are the different modes available for the Internet Explorer Customization Wizard?**
+The IEAK Customization Wizard displays pages based on your licensing mode selection, either **Internal** or **External**. For more information on IEAK Customization Wizard modes, see [What IEAK can do for you](../ie11-ieak/what-ieak-can-do-for-you.md).
+
+The following table displays which pages are available in IEAK 11, based on the licensing mode:
+
+| **Wizard Pages** | **External** | **Internal** |
+|-------------------------------------------|--------------|--------------|
+| Welcome to the IEAK | Yes | Yes |
+| File Locations | Yes | Yes |
+| Platform Selection | Yes | Yes |
+| Language Selection | Yes | Yes |
+| Package Type Selection | Yes | Yes |
+| Feature Selection | Yes | Yes |
+| Automatic Version Synchronization | Yes | Yes |
+| Custom Components | Yes | Yes |
+| Corporate Install | No | Yes |
+| User Experience | No | Yes |
+| Browser User Interface | Yes | Yes |
+| Search Providers | Yes | Yes |
+| Important URLs - Home page and Support | Yes | Yes |
+| Accelerators | Yes | Yes |
+| Favorites, Favorites Bar, and Feeds | Yes | Yes |
+| Browsing Options | No | Yes |
+| First Run Wizard and Welcome Page Options | Yes | Yes |
+| Compatibility View | Yes | Yes |
+| Connection Manager | Yes | Yes |
+| Connection Settings | Yes | Yes |
+| Automatic Configuration | No | Yes |
+| Proxy Settings | Yes | Yes |
+| Security and Privacy Settings | No | Yes |
+| Add a Root Certificate | Yes | No |
+| Programs | Yes | Yes |
+| Additional Settings | No | Yes |
+| Wizard Complete | Yes | Yes |
+
+
+**Q. Can IEAK 11 build custom Internet Explorer 11 packages in languages other than the language of the in-use IEAK 11 version?**
+Yes. You can use IEAK 11 to build custom Internet Explorer 11 packages in any of the supported 24 languages. You'll select the language for the custom package on the Language Selection page of the customization wizard.
+
+IEAK 11 is available in 24 languages but can build customized Internet Explorer 11 packages in all languages of the supported operating systems. Select a language below and download IEAK 11 from the download center:
+
+| | | |
+|---------|---------|---------|
+|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) |
+|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Chinese(Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) |
+|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) |
+|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) |
+|[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) |
+|[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) |
+|[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) |
+|[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) |
+
+
+## Additional resources
+
+[Download IEAK 11](https://technet.microsoft.com/microsoft-edge/bb219517)
+[IEAK 11 overview](https://technet.microsoft.com/microsoft-edge/dn532244)
+[IEAK 11 product documentation](https://docs.microsoft.com/internet-explorer/ie11-ieak/index)
+[IEAK 11 licensing guidelines](../ie11-ieak/licensing-version-and-features-ieak11.md)
diff --git a/browsers/internet-explorer/ie11-ieak/accelerators-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/accelerators-ieak11-wizard.md
index 2927489c83..b211933353 100644
--- a/browsers/internet-explorer/ie11-ieak/accelerators-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/accelerators-ieak11-wizard.md
@@ -1,45 +1,46 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Accelerators page in the IEAK 11 Customization Wizard to add accelerators to employee devices.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 208305ad-1bcd-42f3-aca3-0ad1dda7048b
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Accelerators page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Accelerators page in the IEAK 11 Wizard
-The **Accelerators** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you add accelerators to your employee computers. Accelerators are contextual menu options that can quickly get to a web service from any webpage. For example, an accelerator can look up a highlighted word in the dictionary or a selected location on a map.
-
-**Note**
-The customizations you make on this page apply only to Internet Explorer for the desktop.
-
- **To use the Accelerators page**
-
-1. Click **Import** to automatically import your existing accelerators from your current version of IE into this list.
-
-2. Click **Add** to add more accelerators.
-The **Add Accelerator** box appears.
-
-3. Use the **Browse** button to go to your custom accelerator XML file.
-
-4. Check the **Set this Accelerator as the default for the category** box if you want this accelerator to be the default value that shows up for the category.
-
-5. Click **Edit** to change your accelerator information, click **Set Default** to make an accelerator the default value for a category, or **Remove** to delete an accelerator.
-
-6. Click **Next** to go to the [Favorites, Favorites Bar, and Feeds](favorites-favoritesbar-and-feeds-ieak11-wizard.md) page or **Back** to go to the [Important URLs - Home Page and Support](important-urls-home-page-and-support-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Accelerators page in the IEAK 11 Customization Wizard to add accelerators to employee devices.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 208305ad-1bcd-42f3-aca3-0ad1dda7048b
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Accelerators page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Accelerators page in the IEAK 11 Wizard
+The **Accelerators** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you add accelerators to your employee computers. Accelerators are contextual menu options that can quickly get to a web service from any webpage. For example, an accelerator can look up a highlighted word in the dictionary or a selected location on a map.
+
+**Note**
+The customizations you make on this page apply only to Internet Explorer for the desktop.
+
+ **To use the Accelerators page**
+
+1. Click **Import** to automatically import your existing accelerators from your current version of IE into this list.
+
+2. Click **Add** to add more accelerators.
+The **Add Accelerator** box appears.
+
+3. Use the **Browse** button to go to your custom accelerator XML file.
+
+4. Check the **Set this Accelerator as the default for the category** box if you want this accelerator to be the default value that shows up for the category.
+
+5. Click **Edit** to change your accelerator information, click **Set Default** to make an accelerator the default value for a category, or **Remove** to delete an accelerator.
+
+6. Click **Next** to go to the [Favorites, Favorites Bar, and Feeds](favorites-favoritesbar-and-feeds-ieak11-wizard.md) page or **Back** to go to the [Important URLs - Home Page and Support](important-urls-home-page-and-support-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/add-and-approve-activex-controls-ieak11.md b/browsers/internet-explorer/ie11-ieak/add-and-approve-activex-controls-ieak11.md
index a0d56ae1d9..7e89dab65d 100644
--- a/browsers/internet-explorer/ie11-ieak/add-and-approve-activex-controls-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/add-and-approve-activex-controls-ieak11.md
@@ -1,52 +1,53 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use IEAK 11 to add and approve ActiveX controls for your organization.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 33040bd1-f0e4-4541-9fbb-16e0c76752ab
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Add and approve ActiveX controls using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Add and approve ActiveX controls using IEAK 11
-There are two main approaches to how you can control the use of ActiveX controls in your company. For more info about ActiveX controls, including how to manage the controls using Group Policy, see [Group Policy and ActiveX installation](../ie11-deploy-guide/activex-installation-using-group-policy.md) in the [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md).
-
-**Note**
-ActiveX controls are supported in Internet Explorer for the desktop for Windows 7 and Windows 8.1. They are not supported on the immersive version of Internet Explorer for Windows 8.1.
-
-## Scenario 1: Limited Internet-only use of ActiveX controls
-While you might not care about your employees using ActiveX controls while on your intranet sites, you probably do want to limit ActiveX usage while your employee is on the Internet. By specifying and pre-approving a set of generic controls for use on the Internet, you’re able to let your employees use the Internet, but you can still limit your company’s exposure to potentially hazardous, non-approved ActiveX controls.
-
-For example, your employees need to access an important Internet site, such as for a business partner or service provider, but there are ActiveX controls on their page. To make sure the site is accessible and functions the way it should, you can visit the site to review the controls, adding them as new entries to your `\Windows\Downloaded Program Files` folder. Then, as part of your browser package, you can enable and approve these ActiveX controls to run on this specific site; while all additional controls are blocked.
-
-**To add and approve ActiveX controls**
-
-1. In IE, click **Tools**, and then **Internet Options**.
-
-2. On the **Security** tab, click the zone that needs to change, and click **Custom Level**.
-
-3. Go to **Run ActiveX controls and plug-ins**, and then click **Administrator approved**.
-
-4. Repeat the last two steps until you have configured all the zones you want.
-
-5. When you run the IEAK 11 Customization Wizard to create a custom package, you'll use the [Additional Settings](additional-settings-ieak11-wizard.md) page, clicking each folder to expand its contents. Then select the check boxes for the controls you want to approve.
-
-## Scenario 2: Restricted use of ActiveX controls
-You can get a higher degree of management over ActiveX controls by listing each of them out and then allowing the browser to use only that set of controls. The biggest challenge to using this method is the extra effort you need to put into figuring out all of the controls, and then actually listing them out. Because of that, we only recommend this approach if your complete set of controls is relatively small.
-
-After you decide which controls you want to allow, you can specify them as approved by zone, using the process described in the first scenario.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use IEAK 11 to add and approve ActiveX controls for your organization.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 33040bd1-f0e4-4541-9fbb-16e0c76752ab
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Add and approve ActiveX controls using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Add and approve ActiveX controls using IEAK 11
+There are two main approaches to how you can control the use of ActiveX controls in your company. For more info about ActiveX controls, including how to manage the controls using Group Policy, see [Group Policy and ActiveX installation](../ie11-deploy-guide/activex-installation-using-group-policy.md) in the [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md).
+
+**Note**
+ActiveX controls are supported in Internet Explorer for the desktop for Windows 7 and Windows 8.1. They are not supported on the immersive version of Internet Explorer for Windows 8.1.
+
+## Scenario 1: Limited Internet-only use of ActiveX controls
+While you might not care about your employees using ActiveX controls while on your intranet sites, you probably do want to limit ActiveX usage while your employee is on the Internet. By specifying and pre-approving a set of generic controls for use on the Internet, you’re able to let your employees use the Internet, but you can still limit your company’s exposure to potentially hazardous, non-approved ActiveX controls.
+
+For example, your employees need to access an important Internet site, such as for a business partner or service provider, but there are ActiveX controls on their page. To make sure the site is accessible and functions the way it should, you can visit the site to review the controls, adding them as new entries to your `\Windows\Downloaded Program Files` folder. Then, as part of your browser package, you can enable and approve these ActiveX controls to run on this specific site; while all additional controls are blocked.
+
+**To add and approve ActiveX controls**
+
+1. In IE, click **Tools**, and then **Internet Options**.
+
+2. On the **Security** tab, click the zone that needs to change, and click **Custom Level**.
+
+3. Go to **Run ActiveX controls and plug-ins**, and then click **Administrator approved**.
+
+4. Repeat the last two steps until you have configured all the zones you want.
+
+5. When you run the IEAK 11 Customization Wizard to create a custom package, you'll use the [Additional Settings](additional-settings-ieak11-wizard.md) page, clicking each folder to expand its contents. Then select the check boxes for the controls you want to approve.
+
+## Scenario 2: Restricted use of ActiveX controls
+You can get a higher degree of management over ActiveX controls by listing each of them out and then allowing the browser to use only that set of controls. The biggest challenge to using this method is the extra effort you need to put into figuring out all of the controls, and then actually listing them out. Because of that, we only recommend this approach if your complete set of controls is relatively small.
+
+After you decide which controls you want to allow, you can specify them as approved by zone, using the process described in the first scenario.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/add-root-certificate-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/add-root-certificate-ieak11-wizard.md
index 72e79f106f..eae4f678e5 100644
--- a/browsers/internet-explorer/ie11-ieak/add-root-certificate-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/add-root-certificate-ieak11-wizard.md
@@ -1,29 +1,30 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: We’re sorry. While we continue to recommend that you digitally sign your package, we’ve removed all of the functionality that allowed you to add a root certificate using the Internet Explorer Customization Wizard 11. The wizard page itself will be removed in a future version of the IEAK.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 7ae4e747-49d2-4551-8790-46a61b5fe838
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Add a Root Certificate page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Add a Root Certificate page in the IEAK 11 Wizard
-We’re sorry. While we continue to recommend that you digitally sign your package, we’ve removed all of the functionality that allowed you to add a root certificate using the Internet Explorer Customization Wizard 11. The wizard page itself will be removed in a future version of the IEAK.
-
-Click **Next** to go to the [Programs](programs-ieak11-wizard.md) page or **Back** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: We’re sorry. While we continue to recommend that you digitally sign your package, we’ve removed all of the functionality that allowed you to add a root certificate using the Internet Explorer Customization Wizard 11. The wizard page itself will be removed in a future version of the IEAK.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 7ae4e747-49d2-4551-8790-46a61b5fe838
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Add a Root Certificate page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Add a Root Certificate page in the IEAK 11 Wizard
+We’re sorry. While we continue to recommend that you digitally sign your package, we’ve removed all of the functionality that allowed you to add a root certificate using the Internet Explorer Customization Wizard 11. The wizard page itself will be removed in a future version of the IEAK.
+
+Click **Next** to go to the [Programs](programs-ieak11-wizard.md) page or **Back** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/additional-settings-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/additional-settings-ieak11-wizard.md
index 2a15fe18e9..60be35bc0d 100644
--- a/browsers/internet-explorer/ie11-ieak/additional-settings-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/additional-settings-ieak11-wizard.md
@@ -1,41 +1,42 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Additional Settings page in IEAK 11 Customization Wizard for additional settings that relate to your employee’s desktop, operating system, and security.
-author: lomayor
-ms.prod: ie11
-ms.assetid: c90054af-7b7f-4b00-b55b-5e5569f65f25
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Additional Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Additional Settings page in the IEAK 11 Wizard
-The **Additional Settings** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you pick additional custom, corporate, and Internet settings that relate to your employee’s desktop, operating system, and security. If you don’t change a setting, it’ll be ignored.
-
-The additional settings appear in administration (.adm) files that are stored in your `:\Program Files\Windows IEAK 11\policies` folder. You can also create your own .adm files with options that can be configured using the wizard. Any edits you make to your own .adm file are stored as .ins files, which are used to build the .inf files for your custom install package.
-
-You can store your user settings in a central location so your employees that log on from computer to computer can use them. For example if you have an employee that requires low security using a computer that’s typically operated by someone that needs more restrictive permissions.
-
-You’ll only see this page if you are running the **Internal** version of the IE Customization Wizard 11.
-
-**To use the Additional Settings page**
-
-1. Double-click **Custom Settings**, **Corporate Settings**, or **Internet Settings**, and review the included policy or restriction settings.
-
-2. Pick the setting you want to change, and then update its details.
-
-3. Click **Next** to go to the [Wizard Complete-Next Steps](wizard-complete-ieak11-wizard.md) page or **Back** to go to the [Programs](programs-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Additional Settings page in IEAK 11 Customization Wizard for additional settings that relate to your employee’s desktop, operating system, and security.
+author: dansimp
+ms.prod: ie11
+ms.assetid: c90054af-7b7f-4b00-b55b-5e5569f65f25
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Additional Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Additional Settings page in the IEAK 11 Wizard
+The **Additional Settings** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you pick additional custom, corporate, and Internet settings that relate to your employee’s desktop, operating system, and security. If you don’t change a setting, it’ll be ignored.
+
+The additional settings appear in administration (.adm) files that are stored in your `:\Program Files\Windows IEAK 11\policies` folder. You can also create your own .adm files with options that can be configured using the wizard. Any edits you make to your own .adm file are stored as .ins files, which are used to build the .inf files for your custom install package.
+
+You can store your user settings in a central location so your employees that log on from computer to computer can use them. For example if you have an employee that requires low security using a computer that’s typically operated by someone that needs more restrictive permissions.
+
+You’ll only see this page if you are running the **Internal** version of the IE Customization Wizard 11.
+
+**To use the Additional Settings page**
+
+1. Double-click **Custom Settings**, **Corporate Settings**, or **Internet Settings**, and review the included policy or restriction settings.
+
+2. Pick the setting you want to change, and then update its details.
+
+3. Click **Next** to go to the [Wizard Complete-Next Steps](wizard-complete-ieak11-wizard.md) page or **Back** to go to the [Programs](programs-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md
index 5c77b9bc67..d3883b39ca 100644
--- a/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/auto-config-ieak11-wizard.md
@@ -1,59 +1,60 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Automatic Configuration page in the IEAK 11 Customization Wizard to add URLs to auto-configure IE.
-author: lomayor
-ms.prod: ie11
-ms.assetid: de5b1dbf-6e4d-4f86-ae08-932f14e606b0
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Automatic Configuration page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Automatic Configuration page in the IEAK 11 Wizard
-The **Automatic Configuration** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you provide URLs to the files that’ll automatically configure Internet Explorer 11 for a group of employees or devices.
-
-**Note**
-This page only appears if you’re using the **Internal** version of the wizard.
-
-You can set your proxy settings using Internet setting (.ins) files. You can also configure and maintain your advanced proxy settings using JScript (.js), JavaScript (.jvs), or proxy auto-configuration (.pac) script files. When you provide an auto-proxy script, IE dynamically determines whether to connect directly to a host or to use a proxy server.
-
-You can use the Domain Name System (DNS) and the Dynamic Host Configuration Protocol (DHCP) naming systems to detect and change a browser’s settings automatically when the employee first starts IE on the network. For more info, see [Set up auto detection for DHCP or DNS servers using IEAK 11](auto-detection-dhcp-or-dns-servers-ieak11.md), or refer to the product documentation for your DNS and DHCP software packages.
-
-**To check the existing settings on your employee’s devices**
-
-1. Open IE, click **Tools**, click **Internet Options**, and then click the **Connections** tab.
-
-2. Click **LAN Settings** and make sure that the **Use automatic configuration script** box is selected, confirming the path and name of the file in the **Address** box.
-
-**To use the Automatic Configuration page**
-
-1. Check the **Automatically detect configuration settings** box to automatically detect browser settings.
-
-2. Check the **Enable Automatic Configuration** box if you plan to automatically change your IE settings after deployment, using configuration files. You can then:
-
- - Type the length of time (in minutes) for how often settings are to be applied in your company. Putting zero (**0**), or nothing, in this box will cause automatic configuration to only happen when the computer’s restarted.
-
- - Type the location to your .ins file. You can edit this file directly to make any necessary changes.
-
- The updates will take effect the next time your employee starts IE, or during your next scheduled update.
-
- - Type the location to your automatic proxy script file.
-
- **Note**
- If you specify URLs for both auto-config and auto-proxy, the auto-proxy URL will be incorporated into the .ins file. The correct form for the URL is `https://share/test.ins`.
-
-3. Click **Next** to go to the [Proxy Settings](proxy-settings-ieak11-wizard.md) page or **Back** to go to the [Connection Settings](connection-settings-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Automatic Configuration page in the IEAK 11 Customization Wizard to add URLs to auto-configure IE.
+author: dansimp
+ms.prod: ie11
+ms.assetid: de5b1dbf-6e4d-4f86-ae08-932f14e606b0
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Automatic Configuration page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Automatic Configuration page in the IEAK 11 Wizard
+The **Automatic Configuration** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you provide URLs to the files that’ll automatically configure Internet Explorer 11 for a group of employees or devices.
+
+**Note**
+This page only appears if you’re using the **Internal** version of the wizard.
+
+You can set your proxy settings using Internet setting (.ins) files. You can also configure and maintain your advanced proxy settings using JScript (.js), JavaScript (.jvs), or proxy auto-configuration (.pac) script files. When you provide an auto-proxy script, IE dynamically determines whether to connect directly to a host or to use a proxy server.
+
+You can use the Domain Name System (DNS) and the Dynamic Host Configuration Protocol (DHCP) naming systems to detect and change a browser’s settings automatically when the employee first starts IE on the network. For more info, see [Set up auto detection for DHCP or DNS servers using IEAK 11](auto-detection-dhcp-or-dns-servers-ieak11.md), or refer to the product documentation for your DNS and DHCP software packages.
+
+**To check the existing settings on your employee’s devices**
+
+1. Open IE, click **Tools**, click **Internet Options**, and then click the **Connections** tab.
+
+2. Click **LAN Settings** and make sure that the **Use automatic configuration script** box is selected, confirming the path and name of the file in the **Address** box.
+
+**To use the Automatic Configuration page**
+
+1. Check the **Automatically detect configuration settings** box to automatically detect browser settings.
+
+2. Check the **Enable Automatic Configuration** box if you plan to automatically change your IE settings after deployment, using configuration files. You can then:
+
+ - Type the length of time (in minutes) for how often settings are to be applied in your company. Putting zero (**0**), or nothing, in this box will cause automatic configuration to only happen when the computer’s restarted.
+
+ - Type the location to your .ins file. You can edit this file directly to make any necessary changes.
+
+ The updates will take effect the next time your employee starts IE, or during your next scheduled update.
+
+ - Type the location to your automatic proxy script file.
+
+ **Note**
+ If you specify URLs for both auto-config and auto-proxy, the auto-proxy URL will be incorporated into the .ins file. The correct form for the URL is `https://share/test.ins`.
+
+3. Click **Next** to go to the [Proxy Settings](proxy-settings-ieak11-wizard.md) page or **Back** to go to the [Connection Settings](connection-settings-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md b/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md
index e858e5228b..1a46247c5c 100644
--- a/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md
@@ -1,62 +1,63 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to set up automatic detection for DHCP or DNS servers using IEAK 11 in your organization.
-author: lomayor
-ms.prod: ie11
-ms.assetid: c6bfe7c4-f452-406f-b47e-b7f0d8c44ae1
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Set up auto detection for DHCP or DNS servers using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Set up auto detection for DHCP or DNS servers using IEAK 11
-Set up your network to automatically detect and customize Internet Explorer 11 when it’s first started. Automatic detection is supported on both Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), letting your servers detect and set up your employee’s browser settings from a central location, using a configuration URL (.ins file) or a JavaScript proxy configuration file (.js, .jvs, or .pac).
-
-Before you can set up your environment to use automatic detection, you need to turn the feature on.
-
-**To turn on the automatic detection feature**
-
-- Open Internet Explorer Administration Kit 11 (IEAK 11), run the IE Customization Wizard 11 and on the **Automatic Configuration** page, check **Automatically detect configuration settings**. For more information, see [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md).
-
-## Automatic detection on DHCP and DNS servers
-Automatic detection works even if the browser wasn't originally set up or installed by the administrator.
-
-- **Using DHCP servers:** For local area network (LAN)-based users. This server type lets you specify your global and subnet TCP/IP parameters centrally, defining your users' parameters by using reserved addresses. By doing it this way, a computer can move between subnets, automatically reconfiguring for TCP/IP when it starts.
- Note
- Your DHCP servers must support the DHCPINFORM message, to obtain the DHCP options.
-
-- **Using DNS servers:** For users on dial-up connections. This server type uses a set of protocols and services on a TCP/IP network, which lets users search for other computers by using hierarchical, user-friendly names (hosts), instead of numeric IP addresses. To use this, you have to set up either the host record or the CNAME alias record in the DNS database file.
-
Note
- DHCP has a higher priority than DNS for automatic configuration. If DHCP provides the URL to a .pac, .jvs, .js, or .ins configuration file, the process stops and the DNS lookup doesn't happen.
-
-**To set up automatic detection for DHCP servers**
-
-- Open the [DHCP Administrative Tool](https://go.microsoft.com/fwlink/p/?LinkId=302212), create a new option type, using the code number 252, and then associate it with the URL to your configuration file. For detailed instructions about how to do this, see [Create an option 252 entry in DHCP](https://go.microsoft.com/fwlink/p/?LinkId=294649).
-
- **Examples:**
- `https://www.microsoft.com/webproxy.pac`
- `https://marketing/config.ins`
- `https://123.4.567.8/account.pac`
- For more detailed info about how to set up your DHCP server, see your server documentation.
-
-**To set up automatic detection for DNS servers**
-
-1. In your DNS database file, the file that’s used to associate your host (computer) names to static IP addresses in a zone, you need to create a host record named, **WPAD**. This record contains entries for all of the hosts that require static mappings, such as workstations, name servers, and mail servers. It also has the IP address to the web server storing your automatic configuration (.js, .jvs, .pac, or .ins) file.
The syntax is:
- ` IN A `
- `corserv IN A 192.55.200.143`
- `nameserver2 IN A 192.55.200.2`
- `mailserver1 IN A 192.55.200.51`
- -OR-
- Create a canonical name (CNAME) alias record, named WPAD. This record lets you use more than one name to point to a single host, letting you host both an FTP server and a web server on the same computer. It also includes the resolved name (not the IP address) of the server storing your automatic configuration (.pac) file.
- Note
For more info about creating a WPAD entry, see Creating a WPAD entry in DNS.
-
-2. After the database file propagates to the server, the DNS name, `wpad..com` resolves to the server name that includes your automatic configuration file.
-
-**Note**
-IE11 creates a default URL template based on the host name,**wpad**. For example, `https://wpad..com/wpad.dat`. Because of this, you need to set up a file or redirection point in your web server **WPAD** record, named **wpad.dat**. The **wpad.dat** record delivers the contents of your automatic configuration file.
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to set up automatic detection for DHCP or DNS servers using IEAK 11 in your organization.
+author: dansimp
+ms.prod: ie11
+ms.assetid: c6bfe7c4-f452-406f-b47e-b7f0d8c44ae1
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Set up auto detection for DHCP or DNS servers using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Set up auto detection for DHCP or DNS servers using IEAK 11
+Set up your network to automatically detect and customize Internet Explorer 11 when it’s first started. Automatic detection is supported on both Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), letting your servers detect and set up your employee’s browser settings from a central location, using a configuration URL (.ins file) or a JavaScript proxy configuration file (.js, .jvs, or .pac).
+
+Before you can set up your environment to use automatic detection, you need to turn the feature on.
+
+**To turn on the automatic detection feature**
+
+- Open Internet Explorer Administration Kit 11 (IEAK 11), run the IE Customization Wizard 11 and on the **Automatic Configuration** page, check **Automatically detect configuration settings**. For more information, see [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md).
+
+## Automatic detection on DHCP and DNS servers
+Automatic detection works even if the browser wasn't originally set up or installed by the administrator.
+
+- **Using DHCP servers:** For local area network (LAN)-based users. This server type lets you specify your global and subnet TCP/IP parameters centrally, defining your users' parameters by using reserved addresses. By doing it this way, a computer can move between subnets, automatically reconfiguring for TCP/IP when it starts.
+ Note
+ Your DHCP servers must support the DHCPINFORM message, to obtain the DHCP options.
+
+- **Using DNS servers:** For users on dial-up connections. This server type uses a set of protocols and services on a TCP/IP network, which lets users search for other computers by using hierarchical, user-friendly names (hosts), instead of numeric IP addresses. To use this, you have to set up either the host record or the CNAME alias record in the DNS database file.
+
Note
+ DHCP has a higher priority than DNS for automatic configuration. If DHCP provides the URL to a .pac, .jvs, .js, or .ins configuration file, the process stops and the DNS lookup doesn't happen.
+
+**To set up automatic detection for DHCP servers**
+
+- Open the [DHCP Administrative Tool](https://go.microsoft.com/fwlink/p/?LinkId=302212), create a new option type, using the code number 252, and then associate it with the URL to your configuration file. For detailed instructions about how to do this, see [Create an option 252 entry in DHCP](https://go.microsoft.com/fwlink/p/?LinkId=294649).
+
+ **Examples:**
+ `https://www.microsoft.com/webproxy.pac`
+ `https://marketing/config.ins`
+ `https://123.4.567.8/account.pac`
+ For more detailed info about how to set up your DHCP server, see your server documentation.
+
+**To set up automatic detection for DNS servers**
+
+1. In your DNS database file, the file that’s used to associate your host (computer) names to static IP addresses in a zone, you need to create a host record named, **WPAD**. This record contains entries for all of the hosts that require static mappings, such as workstations, name servers, and mail servers. It also has the IP address to the web server storing your automatic configuration (.js, .jvs, .pac, or .ins) file.
The syntax is:
+ ` IN A `
+ `corserv IN A 192.55.200.143`
+ `nameserver2 IN A 192.55.200.2`
+ `mailserver1 IN A 192.55.200.51`
+ -OR-
+ Create a canonical name (CNAME) alias record, named WPAD. This record lets you use more than one name to point to a single host, letting you host both an FTP server and a web server on the same computer. It also includes the resolved name (not the IP address) of the server storing your automatic configuration (.pac) file.
+ Note
For more info about creating a WPAD entry, see Creating a WPAD entry in DNS.
+
+2. After the database file propagates to the server, the DNS name, `wpad..com` resolves to the server name that includes your automatic configuration file.
+
+**Note**
+IE11 creates a default URL template based on the host name,**wpad**. For example, `https://wpad..com/wpad.dat`. Because of this, you need to set up a file or redirection point in your web server **WPAD** record, named **wpad.dat**. The **wpad.dat** record delivers the contents of your automatic configuration file.
+
diff --git a/browsers/internet-explorer/ie11-ieak/auto-version-sync-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/auto-version-sync-ieak11-wizard.md
index 9a3f704cf0..c317a46e0e 100644
--- a/browsers/internet-explorer/ie11-ieak/auto-version-sync-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/auto-version-sync-ieak11-wizard.md
@@ -1,48 +1,49 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Automatic Version Synchronization page in the IEAK 11 Customization Wizard to download the IE11 Setup file each time you run the Wizard.
-author: lomayor
-ms.prod: ie11
-ms.assetid: bfc7685f-843b-49c3-8b9b-07e69705840c
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Automatic Version Synchronization page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Automatic Version Synchronization page in the IEAK 11 Wizard
-The **Automatic Version Synchronization** page of the Internet Explorer Customization Wizard 11 runs the synchronization process every time you run the wizard, downloading the Internet Explorer 11 Setup file to your computer. The Setup file includes the required full and express packages.
-
-**Important**
-You must run the **Automatic Version Synchronization** page once for each operating system and language combination of IE.
-
-The **Automatic Version Synchronization** page tells you:
-
-- **Version available on your machine**. The version of IE11 that’s running on the computer that’s also running the IE Customization Wizard 11.
-
-- **Latest version available on web**. The most recently released version of the IE Customization Wizard 11. To get this value, the wizard compares the version of IE on your computer to the latest version of IE on the **Downloads** site. If the versions are different, you’ll be asked to update your version of IE.
-
-- **Disk space required**. The amount of space on your hard drive needed to update the browser.
-
-- **Disk space available**. The amount of hard drive space available on the computer that’s running the IE Customization Wizard 11.
-
-
-**To use the Automatic Version Synchronization page**
-
-1. Click **Synchronize**.
-You might receive a security warning before downloading your Setup file, asking if you want to continue. Click **Run** to continue.
-
-2. Click **Next** to go to the [Custom Components](custom-components-ieak11-wizard.md) page or **Back** to go to the [Feature Selection](feature-selection-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Automatic Version Synchronization page in the IEAK 11 Customization Wizard to download the IE11 Setup file each time you run the Wizard.
+author: dansimp
+ms.prod: ie11
+ms.assetid: bfc7685f-843b-49c3-8b9b-07e69705840c
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Automatic Version Synchronization page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Automatic Version Synchronization page in the IEAK 11 Wizard
+The **Automatic Version Synchronization** page of the Internet Explorer Customization Wizard 11 runs the synchronization process every time you run the wizard, downloading the Internet Explorer 11 Setup file to your computer. The Setup file includes the required full and express packages.
+
+**Important**
+You must run the **Automatic Version Synchronization** page once for each operating system and language combination of IE.
+
+The **Automatic Version Synchronization** page tells you:
+
+- **Version available on your machine**. The version of IE11 that’s running on the computer that’s also running the IE Customization Wizard 11.
+
+- **Latest version available on web**. The most recently released version of the IE Customization Wizard 11. To get this value, the wizard compares the version of IE on your computer to the latest version of IE on the **Downloads** site. If the versions are different, you’ll be asked to update your version of IE.
+
+- **Disk space required**. The amount of space on your hard drive needed to update the browser.
+
+- **Disk space available**. The amount of hard drive space available on the computer that’s running the IE Customization Wizard 11.
+
+
+**To use the Automatic Version Synchronization page**
+
+1. Click **Synchronize**.
+You might receive a security warning before downloading your Setup file, asking if you want to continue. Click **Run** to continue.
+
+2. Click **Next** to go to the [Custom Components](custom-components-ieak11-wizard.md) page or **Back** to go to the [Feature Selection](feature-selection-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/before-you-create-custom-pkgs-ieak11.md b/browsers/internet-explorer/ie11-ieak/before-you-create-custom-pkgs-ieak11.md
index 9bea8f5c1c..3508c186af 100644
--- a/browsers/internet-explorer/ie11-ieak/before-you-create-custom-pkgs-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/before-you-create-custom-pkgs-ieak11.md
@@ -1,39 +1,40 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: A list of steps to follow before you start to create your custom browser installation packages.
-author: lomayor
-ms.author: lomayor
-ms.manager: elizapo
-ms.prod: ie11
-ms.assetid: 6ed182b0-46cb-4865-9563-70825be9a5e4
-ms.reviewer:
-audience: itpro
manager: dansimp
-title: Before you start using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 04/24/2018
----
-
-
-# Before you start using IEAK 11
-
-Before you run IEAK 11 and the Customization Wizard, make sure you have met the following requirements:
-
-- Have you determined which licensing version of the Internet Explorer Administration Kit 11 to install? For info, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md).
-
-- Do you meet the necessary hardware and software requirements? See [Hardware and software requirements for IEAK 11](hardware-and-software-reqs-ieak11.md).
-
-- Have you gotten all of the URLs needed to customize your **Home**, **Search**, and **Support** pages? See [Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard](important-urls-home-page-and-support-ieak11-wizard.md).
-
-- Have you reviewed the security features to determine how to set up and manage them? See [Security features and IEAK 11](security-and-ieak11.md).
-
-- Have you created a test lab, where you can run the test version of your browser package to make sure it runs properly?
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: A list of steps to follow before you start to create your custom browser installation packages.
+author: dansimp
+ms.author: dansimp
+ms.manager: elizapo
+ms.prod: ie11
+ms.assetid: 6ed182b0-46cb-4865-9563-70825be9a5e4
+ms.reviewer:
+audience: itpro
+manager: dansimp
+title: Before you start using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 04/24/2018
+---
+
+
+# Before you start using IEAK 11
+
+Before you run IEAK 11 and the Customization Wizard, make sure you have met the following requirements:
+
+- Have you determined which licensing version of the Internet Explorer Administration Kit 11 to install? For info, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md).
+
+- Do you meet the necessary hardware and software requirements? See [Hardware and software requirements for IEAK 11](hardware-and-software-reqs-ieak11.md).
+
+- Have you gotten all of the URLs needed to customize your **Home**, **Search**, and **Support** pages? See [Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard](important-urls-home-page-and-support-ieak11-wizard.md).
+
+- Have you reviewed the security features to determine how to set up and manage them? See [Security features and IEAK 11](security-and-ieak11.md).
+
+- Have you created a test lab, where you can run the test version of your browser package to make sure it runs properly?
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/branding-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/branding-ins-file-setting.md
index 7f9c6d989e..5c9c189f24 100644
--- a/browsers/internet-explorer/ie11-ieak/branding-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/branding-ins-file-setting.md
@@ -1,54 +1,55 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the \[Branding\] .INS file setting to set up your custom branding and setup info in your browser install package.
-author: lomayor
-ms.prod: ie11
-ms.assetid: cde600c6-29cf-4bd3-afd1-21563d2642df
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Branding .INS file to create custom branding and setup info (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Branding .INS file to create custom branding and setup info
-Info about the custom branding and setup information in your browser package.
-
-|Name |Value | Description |
-|-----------|--------------------------------|--------------------------------------------------------------|
-|Add on URL | `` |The add-on URL for the product updates command in the browser.|
-|BrowserDefault|- **0.** Locks down Internet Explorer as the default browser.
- **1.** Preserves the existing default browser.
- **2.** Lets the employee decide the default browser.
| Determines the default browser behavior. |
-|CMBitmapName | `` | The file name for the Connection Manager custom bitmap. |
-|CMBitmapPath | `` | The full file path to the Connection Manager custom bitmap file. |
-|CMProfileName| `` | The name of the Connection Manager profile. |
-|CMProfilePath| `` | The full file path to the Connection Manager profile. |
-|CMUseCustom | - **0.** Don’t use a custom Connection Manager profile.
- **1.** Use a custom Connection Manager profile.
| Determines whether to use a custom Connection Manager profile. |
-|CompanyName |`` |The name of the company with a valid IEAK 11 license, building this .ins file. |
-|EncodeFavs |- **0.** Don’t encode the section.
- **1.** Encode the section.
|Determines whether to encode the **[Favorites]** section for versions of IE earlier than 5.0. |
-|FavoritesDelete |*hexadecimal:* `0x89` |Lets you remove all existing Favorites and Quick Links. |
-|FavoritesOnTop |- **0.** Don’t put the new item at the top of the **Favorites** menu.
- **1.** Put the new item at the top of the **Favorites** menu.
|Determines whether to put new favorite items at the top of the menu. |
-|IE4 Welcome Msg |- **0.** Don’t go to a **Welcome** page the first time the browser is opened.
- **1.** Go to a **Welcome** page the first time the browser is opened.
|Determines whether a **Welcome** page appears. |
-|Language ID |`` |Code value for the language used. |
-|Language Locale |`` |The locale of the version of IE being customized, as denoted by a four-letter string — for example, EN-us for English. |
-|NoIELite |- **0.** Don’t optimize the Active Setup Wizard.
- **1.** Optimize the Active Setup Wizard for download, using existing files, as possible.
|Determines whether to optimize the Active Setup Wizard for download. |
-|SilentInstall |- **0.** Run Windows Update Setup interactively.
- **1.** Run Windows Update Setup non-interactively, but show progress and error messages to the employee.
|Determines whether Windows Update Setup runs interactively on the employee’s computer.**Note**
This only appears for the **Internal** version of the IEAK 11. |
-|StealthInstall |
- **0.** Run Windows Update Setup showing progress and error messages to the employee.
- **1.** Run Windows Update Setup without showing error messages to the employee.
|Determines whether Windows Update Setup shows error messages and dialog boxes.**Note**
This only appears for the **Internal** version of the IEAK 11. |
-|Toolbar Bitmap |`` |Full path to the icon bitmap that appears on the browser toolbar. |
-|Type |- **1.** Internal version. For use on a corporate intranet or network.
- **2.** External version. For use by ISPs, ICPs, or Developers.
|The version of IEAK 11 being used. |
-|User Agent |`` |String to be appended to the default User Agent string. |
-|Version |`` |Version number of the browser. For example, `6,0,0,1`. |
-|WebIntegrated |- **0.** Don’t include the 4.x integrated shell in your custom package.
- **1.** Include the 4.x integrated shell in your custom package.
|Determines whether the IE 4.x integrated shell is included in this package. |
-|Win32DownloadSite |`` |URL from where your employees will download the IEsetup.exe file. |
-|Window_Title |`` |Customized window title for IE. |
-|Window_Title_CN |`` |Company name to be appended to the window title. |
-|WizardVersion |`` |Version of the IEAK that created the .ins file. For example, `6.00.0707.2800`. |
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the \[Branding\] .INS file setting to set up your custom branding and setup info in your browser install package.
+author: dansimp
+ms.prod: ie11
+ms.assetid: cde600c6-29cf-4bd3-afd1-21563d2642df
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Branding .INS file to create custom branding and setup info (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Branding .INS file to create custom branding and setup info
+Info about the custom branding and setup information in your browser package.
+
+|Name |Value | Description |
+|-----------|--------------------------------|--------------------------------------------------------------|
+|Add on URL | `` |The add-on URL for the product updates command in the browser.|
+|BrowserDefault|- **0.** Locks down Internet Explorer as the default browser.
- **1.** Preserves the existing default browser.
- **2.** Lets the employee decide the default browser.
| Determines the default browser behavior. |
+|CMBitmapName | `` | The file name for the Connection Manager custom bitmap. |
+|CMBitmapPath | `` | The full file path to the Connection Manager custom bitmap file. |
+|CMProfileName| `` | The name of the Connection Manager profile. |
+|CMProfilePath| `` | The full file path to the Connection Manager profile. |
+|CMUseCustom | - **0.** Don’t use a custom Connection Manager profile.
- **1.** Use a custom Connection Manager profile.
| Determines whether to use a custom Connection Manager profile. |
+|CompanyName |`` |The name of the company with a valid IEAK 11 license, building this .ins file. |
+|EncodeFavs |- **0.** Don’t encode the section.
- **1.** Encode the section.
|Determines whether to encode the **[Favorites]** section for versions of IE earlier than 5.0. |
+|FavoritesDelete |*hexadecimal:* `0x89` |Lets you remove all existing Favorites and Quick Links. |
+|FavoritesOnTop |- **0.** Don’t put the new item at the top of the **Favorites** menu.
- **1.** Put the new item at the top of the **Favorites** menu.
|Determines whether to put new favorite items at the top of the menu. |
+|IE4 Welcome Msg |- **0.** Don’t go to a **Welcome** page the first time the browser is opened.
- **1.** Go to a **Welcome** page the first time the browser is opened.
|Determines whether a **Welcome** page appears. |
+|Language ID |`` |Code value for the language used. |
+|Language Locale |`` |The locale of the version of IE being customized, as denoted by a four-letter string — for example, EN-us for English. |
+|NoIELite |- **0.** Don’t optimize the Active Setup Wizard.
- **1.** Optimize the Active Setup Wizard for download, using existing files, as possible.
|Determines whether to optimize the Active Setup Wizard for download. |
+|SilentInstall |- **0.** Run Windows Update Setup interactively.
- **1.** Run Windows Update Setup non-interactively, but show progress and error messages to the employee.
|Determines whether Windows Update Setup runs interactively on the employee’s computer.**Note**
This only appears for the **Internal** version of the IEAK 11. |
+|StealthInstall |
- **0.** Run Windows Update Setup showing progress and error messages to the employee.
- **1.** Run Windows Update Setup without showing error messages to the employee.
|Determines whether Windows Update Setup shows error messages and dialog boxes.**Note**
This only appears for the **Internal** version of the IEAK 11. |
+|Toolbar Bitmap |`` |Full path to the icon bitmap that appears on the browser toolbar. |
+|Type |- **1.** Internal version. For use on a corporate intranet or network.
- **2.** External version. For use by ISPs, ICPs, or Developers.
|The version of IEAK 11 being used. |
+|User Agent |`` |String to be appended to the default User Agent string. |
+|Version |`` |Version number of the browser. For example, `6,0,0,1`. |
+|WebIntegrated |- **0.** Don’t include the 4.x integrated shell in your custom package.
- **1.** Include the 4.x integrated shell in your custom package.
|Determines whether the IE 4.x integrated shell is included in this package. |
+|Win32DownloadSite |`` |URL from where your employees will download the IEsetup.exe file. |
+|Window_Title |`` |Customized window title for IE. |
+|Window_Title_CN |`` |Company name to be appended to the window title. |
+|WizardVersion |`` |Version of the IEAK that created the .ins file. For example, `6.00.0707.2800`. |
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md
index ab8937ec4a..c1f3999a3a 100644
--- a/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/browser-ui-ieak11-wizard.md
@@ -1,56 +1,57 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Browser User Interface page in the IEAK 11 Customization Wizard to change the toolbar buttons and the title bar.
-author: lomayor
-ms.prod: ie11
-ms.assetid: c4a18dcd-2e9c-4b5b-bcc5-9b9361a79f0d
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Browser User Interface page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Browser User Interface page in the IEAK 11 Wizard
-The **Browser User Interface** page of the Internet Explorer Customization Wizard 11 lets you change the toolbar buttons and the title bar text in IE.
-
-**Note**
The customizations you make on this page apply only to Internet Explorer for the desktop.
-
- **To use the Browser User Interface page**
-
-1. Check the **Customize Title Bars** box so you can add your custom text to the **Title Bar Text** box.
-The text shows up in the title bar as **IE provided by** <*your_custom_text*>.
-
-2. Check the **Delete existing toolbar buttons, if present** box so you can delete all of the toolbar buttons in your employee’s browser, except for the standard buttons installed with IE (which can’t be removed).
-
-**Note**
Only Administrators can use this option.
-
-3. Click **Add** to add new toolbar buttons.
- The **Browser Toolbar Button Information** box appears.
-
-4. In the **Toolbar caption** box, type the text that shows up when an employee hovers over your custom button. We recommend no more than 10 characters.
-
-5. In the **Toolbar action** box, browse to your script or executable file that runs when an employee clicks your custom button.
-
-6. In the **Toolbar icon** box, browse to the icon file that represents your button while active. This icon must be 20x20 pixels.
-
-7. Check the **This button should be shown on the toolbar by default** box so your custom button shows by default.
- This box should be cleared if you want to offer a custom set of buttons, but want your employees to choose whether or not to use them. In this situation, your buttons will show up in the **Customize Toolbars** dialog box, under **Available toolbar buttons**. Your employees can get to this dialog box in IE by clicking **Tools** from the **Command Bar**, clicking **Toolbars**, and then clicking **Customize**.
-
-8. Click **OK.**
-
-9. Click **Edit** to change your custom toolbar button or **Remove** to delete the button. The removed button will disappear from your employee’s computer after you apply the updated customization. Only custom toolbar buttons can be removed.
-
-10. Click **Next** to go to the [Search Providers](search-providers-ieak11-wizard.md) page or **Back** to go to the [User Experience](user-experience-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Browser User Interface page in the IEAK 11 Customization Wizard to change the toolbar buttons and the title bar.
+author: dansimp
+ms.prod: ie11
+ms.assetid: c4a18dcd-2e9c-4b5b-bcc5-9b9361a79f0d
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Browser User Interface page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Browser User Interface page in the IEAK 11 Wizard
+The **Browser User Interface** page of the Internet Explorer Customization Wizard 11 lets you change the toolbar buttons and the title bar text in IE.
+
+**Note**
The customizations you make on this page apply only to Internet Explorer for the desktop.
+
+ **To use the Browser User Interface page**
+
+1. Check the **Customize Title Bars** box so you can add your custom text to the **Title Bar Text** box.
+The text shows up in the title bar as **IE provided by** <*your_custom_text*>.
+
+2. Check the **Delete existing toolbar buttons, if present** box so you can delete all of the toolbar buttons in your employee’s browser, except for the standard buttons installed with IE (which can’t be removed).
+
+**Note**
Only Administrators can use this option.
+
+3. Click **Add** to add new toolbar buttons.
+ The **Browser Toolbar Button Information** box appears.
+
+4. In the **Toolbar caption** box, type the text that shows up when an employee hovers over your custom button. We recommend no more than 10 characters.
+
+5. In the **Toolbar action** box, browse to your script or executable file that runs when an employee clicks your custom button.
+
+6. In the **Toolbar icon** box, browse to the icon file that represents your button while active. This icon must be 20x20 pixels.
+
+7. Check the **This button should be shown on the toolbar by default** box so your custom button shows by default.
+ This box should be cleared if you want to offer a custom set of buttons, but want your employees to choose whether or not to use them. In this situation, your buttons will show up in the **Customize Toolbars** dialog box, under **Available toolbar buttons**. Your employees can get to this dialog box in IE by clicking **Tools** from the **Command Bar**, clicking **Toolbars**, and then clicking **Customize**.
+
+8. Click **OK.**
+
+9. Click **Edit** to change your custom toolbar button or **Remove** to delete the button. The removed button will disappear from your employee’s computer after you apply the updated customization. Only custom toolbar buttons can be removed.
+
+10. Click **Next** to go to the [Search Providers](search-providers-ieak11-wizard.md) page or **Back** to go to the [User Experience](user-experience-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/browsertoolbars-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/browsertoolbars-ins-file-setting.md
index 56922b0838..b2b123ff69 100644
--- a/browsers/internet-explorer/ie11-ieak/browsertoolbars-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/browsertoolbars-ins-file-setting.md
@@ -1,39 +1,40 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: Use the \[BrowserToolbars\] .INS file setting to customize your Internet Explorer toolbar and buttons.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 83af0558-9df3-4c2e-9350-44f7788efa6d
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the BrowserToolbars .INS file to customize the Internet Explorer toolbar and buttons (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the BrowserToolbars .INS file to customize the Internet Explorer toolbar and buttons
-Info about how to customize the Internet Explorer toolbar.
-
-|Name |Value |Description |
-|-----------|---------------------------|-------------|
-|Action0 |`` |Path and file name for the executable (.exe) file that's associated with your custom toolbar button. |
-|Caption0 |`` |Text that appears as the caption for your custom toolbar button. |
-|DeleteButtons |- **0.** Don’t delete the existing custom toolbar buttons.
- **1.** Delete the existing custom toolbar buttons.
|Determines whether to delete the existing custom toolbar buttons. |
-|HotIcon0 |`` |An icon (.ico) file that appears highlighted on the button when the pointer is moved over it. |
-|Icon0 |`` |An icon (.ico) file that appears dimmed on the button when the pointer isn’t moved over it. |
-|Show0 |- **0.** Don’t show the button by default.
- **1.** Show the button by default.
|Determines whether to show the new button on the toolbar by default. |
-|ToolTipText0 |`` |Tooltip text for the custom toolbar button. |
-
-
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: Use the \[BrowserToolbars\] .INS file setting to customize your Internet Explorer toolbar and buttons.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 83af0558-9df3-4c2e-9350-44f7788efa6d
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the BrowserToolbars .INS file to customize the Internet Explorer toolbar and buttons (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the BrowserToolbars .INS file to customize the Internet Explorer toolbar and buttons
+Info about how to customize the Internet Explorer toolbar.
+
+|Name |Value |Description |
+|-----------|---------------------------|-------------|
+|Action0 |`` |Path and file name for the executable (.exe) file that's associated with your custom toolbar button. |
+|Caption0 |`` |Text that appears as the caption for your custom toolbar button. |
+|DeleteButtons |- **0.** Don’t delete the existing custom toolbar buttons.
- **1.** Delete the existing custom toolbar buttons.
|Determines whether to delete the existing custom toolbar buttons. |
+|HotIcon0 |`` |An icon (.ico) file that appears highlighted on the button when the pointer is moved over it. |
+|Icon0 |`` |An icon (.ico) file that appears dimmed on the button when the pointer isn’t moved over it. |
+|Show0 |- **0.** Don’t show the button by default.
- **1.** Show the button by default.
|Determines whether to show the new button on the toolbar by default. |
+|ToolTipText0 |`` |Tooltip text for the custom toolbar button. |
+
+
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/browsing-options-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/browsing-options-ieak11-wizard.md
index d96bb1744c..a39adaff3e 100644
--- a/browsers/internet-explorer/ie11-ieak/browsing-options-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/browsing-options-ieak11-wizard.md
@@ -2,13 +2,13 @@
ms.localizationpriority: medium
ms.mktglfcycl: deploy
description: How to use the Browsing Options page in the IEAK 11 Customization Wizard to manage items in the Favorites, Favorites Bar, and Feeds section.
-author: lomayor
+author: dansimp
ms.prod: ie11
ms.assetid: d6bd71ba-5df3-4b8c-8bb5-dcbc50fd974e
ms.reviewer:
audience: itpro
manager: dansimp
-ms.author: lomayor
+ms.author: dansimp
title: Use the Browsing Options page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/internet-explorer/ie11-ieak/cabsigning-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/cabsigning-ins-file-setting.md
index 0d0a0bde19..e5bf7ebb40 100644
--- a/browsers/internet-explorer/ie11-ieak/cabsigning-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/cabsigning-ins-file-setting.md
@@ -1,26 +1,27 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the \[CabSigning\] .INS file setting to customize the digital signature info for your apps.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 098707e9-d712-4297-ac68-7d910ca8f43b
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the CabSigning .INS file to customize the digital signature info for your apps (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the CabSigning .INS file to customize the digital signature info for your apps
-Info about how to customize the digital signature info for your apps.
-
-|Name |Value |Description |
-|-----------|---------------------------|-------------|
-|InfoURL |`` |URL that appears on the **Certificate** dialog box. |
-|Name |`` |Company name associated with the certificate. |
-|pvkFile |`` |File path to the privacy key file. |
-|spcFile |`` |File path to the certificate file.|
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the \[CabSigning\] .INS file setting to customize the digital signature info for your apps.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 098707e9-d712-4297-ac68-7d910ca8f43b
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the CabSigning .INS file to customize the digital signature info for your apps (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the CabSigning .INS file to customize the digital signature info for your apps
+Info about how to customize the digital signature info for your apps.
+
+|Name |Value |Description |
+|-----------|---------------------------|-------------|
+|InfoURL |`` |URL that appears on the **Certificate** dialog box. |
+|Name |`` |Company name associated with the certificate. |
+|pvkFile |`` |File path to the privacy key file. |
+|spcFile |`` |File path to the certificate file.|
+
diff --git a/browsers/internet-explorer/ie11-ieak/compat-view-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/compat-view-ieak11-wizard.md
index 7e05be2556..cda9702eb4 100644
--- a/browsers/internet-explorer/ie11-ieak/compat-view-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/compat-view-ieak11-wizard.md
@@ -1,22 +1,23 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-ms.pagetype: appcompat
-description: We’re sorry. We’ve removed all of the functionality included on the **Compatibility View** page of the Internet Explorer Customization Wizard 11.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 51d8f80e-93a5-41e4-9478-b8321458bc30
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Compatibility View page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Compatibility View page in the IEAK 11 Wizard
-We’re sorry. We’ve changed the way Compatibility View works in Internet Explorer 11 and have removed all of the functionality included on the **Compatibility View** page of the Internet Explorer Customization Wizard 11. For more info about the changes we’ve made to the Compatibility View functionality, see [Missing the Compatibility View Button](../ie11-deploy-guide/missing-the-compatibility-view-button.md).
-
-Click **Next** to go to the [Programs](programs-ieak11-wizard.md) page or **Back** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page.
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+ms.pagetype: appcompat
+description: We’re sorry. We’ve removed all of the functionality included on the **Compatibility View** page of the Internet Explorer Customization Wizard 11.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 51d8f80e-93a5-41e4-9478-b8321458bc30
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Compatibility View page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Compatibility View page in the IEAK 11 Wizard
+We’re sorry. We’ve changed the way Compatibility View works in Internet Explorer 11 and have removed all of the functionality included on the **Compatibility View** page of the Internet Explorer Customization Wizard 11. For more info about the changes we’ve made to the Compatibility View functionality, see [Missing the Compatibility View Button](../ie11-deploy-guide/missing-the-compatibility-view-button.md).
+
+Click **Next** to go to the [Programs](programs-ieak11-wizard.md) page or **Back** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page.
+
diff --git a/browsers/internet-explorer/ie11-ieak/connection-mgr-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/connection-mgr-ieak11-wizard.md
index 3fbf4b4276..aaec7b0fa2 100644
--- a/browsers/internet-explorer/ie11-ieak/connection-mgr-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/connection-mgr-ieak11-wizard.md
@@ -1,21 +1,22 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: We’re sorry. We’ve removed all of the functionality included on the **Connection Manager** page of the Internet Explorer Customization Wizard 11.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 1edaa7db-cf6b-4f94-b65f-0feff3d4081a
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Connection Manager page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Connection Manager page in the IEAK 11 Wizard
-We're sorry. We've removed all of the functionality included on the Connection Manager page of the Internet Explorer Customization Wizard 11.
-
-Click **Next** to go to the [Connection Settings](connection-settings-ieak11-wizard.md) page or **Back** to go to the [Compatibility View](compat-view-ieak11-wizard.md) page.
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: We’re sorry. We’ve removed all of the functionality included on the **Connection Manager** page of the Internet Explorer Customization Wizard 11.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 1edaa7db-cf6b-4f94-b65f-0feff3d4081a
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Connection Manager page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Connection Manager page in the IEAK 11 Wizard
+We're sorry. We've removed all of the functionality included on the Connection Manager page of the Internet Explorer Customization Wizard 11.
+
+Click **Next** to go to the [Connection Settings](connection-settings-ieak11-wizard.md) page or **Back** to go to the [Compatibility View](compat-view-ieak11-wizard.md) page.
+
diff --git a/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md
index 1d7f645f31..66beabdbca 100644
--- a/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/connection-settings-ieak11-wizard.md
@@ -1,41 +1,42 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Connection Settings page in IEAK 11 Customization Wizard to import and preset connection settings on your employee’s computers.
-author: lomayor
-ms.prod: ie11
-ms.assetid: dc93ebf7-37dc-47c7-adc3-067d07de8b78
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Connection Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Connection Settings page in the IEAK 11 Wizard
-The **Connection Settings** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you import the connection settings from your computer, to preset the connection settings on your employee’s computers.
-
-**Note**
Using the options on the **Additional Settings** page of the wizard, you can let your employees change their connection settings. For more information see the [Additional Settings](additional-settings-ieak11-wizard.md) page. You can also customize additional connection settings using the **Automatic Configuration** page in the wizard. For more information see the [Automatic Configuration](auto-config-ieak11-wizard.md) page.
-
-**To view your current connection settings**
-
-1. Open IE, click the **Tools** menu, click **Internet Options**, and then click the **Connections** tab.
-
-2. Click **Settings** to view your dial-up settings and click **LAN Settings** to view your network settings.
-
-**To use the Connection Settings page**
-
-1. Decide if you want to customize your connection settings. You can pick:
-
- - **Do not customize Connection Settings.** Pick this option if you don’t want to preset your employee’s connection settings.
-
- - **Import the current Connection Settings from this machine.** Pick this option to import your connection settings from your computer and use them as the preset for your employee’s connection settings.
-
- **Note**
If you want to change any of your settings later, you can click **Modify Settings** to open the **Internet Properties** box, click the **Connection Settings** tab, and make your changes.
-
-2. Check the **Delete existing Dial-up Connection Settings** box to clear any existing settings on your employee’s computers.
-
-3. Click **Next** to go to the [Automatic Configuration](auto-config-ieak11-wizard.md) page or **Back** to go to the [Connection Manager](connection-mgr-ieak11-wizard.md) page.
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Connection Settings page in IEAK 11 Customization Wizard to import and preset connection settings on your employee’s computers.
+author: dansimp
+ms.prod: ie11
+ms.assetid: dc93ebf7-37dc-47c7-adc3-067d07de8b78
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Connection Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Connection Settings page in the IEAK 11 Wizard
+The **Connection Settings** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you import the connection settings from your computer, to preset the connection settings on your employee’s computers.
+
+**Note**
Using the options on the **Additional Settings** page of the wizard, you can let your employees change their connection settings. For more information see the [Additional Settings](additional-settings-ieak11-wizard.md) page. You can also customize additional connection settings using the **Automatic Configuration** page in the wizard. For more information see the [Automatic Configuration](auto-config-ieak11-wizard.md) page.
+
+**To view your current connection settings**
+
+1. Open IE, click the **Tools** menu, click **Internet Options**, and then click the **Connections** tab.
+
+2. Click **Settings** to view your dial-up settings and click **LAN Settings** to view your network settings.
+
+**To use the Connection Settings page**
+
+1. Decide if you want to customize your connection settings. You can pick:
+
+ - **Do not customize Connection Settings.** Pick this option if you don’t want to preset your employee’s connection settings.
+
+ - **Import the current Connection Settings from this machine.** Pick this option to import your connection settings from your computer and use them as the preset for your employee’s connection settings.
+
+ **Note**
If you want to change any of your settings later, you can click **Modify Settings** to open the **Internet Properties** box, click the **Connection Settings** tab, and make your changes.
+
+2. Check the **Delete existing Dial-up Connection Settings** box to clear any existing settings on your employee’s computers.
+
+3. Click **Next** to go to the [Automatic Configuration](auto-config-ieak11-wizard.md) page or **Back** to go to the [Connection Manager](connection-mgr-ieak11-wizard.md) page.
+
diff --git a/browsers/internet-explorer/ie11-ieak/connectionsettings-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/connectionsettings-ins-file-setting.md
index 2f510429c0..779e024e57 100644
--- a/browsers/internet-explorer/ie11-ieak/connectionsettings-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/connectionsettings-ins-file-setting.md
@@ -1,26 +1,27 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: Use the \[ConnectionSettings\] .INS file setting to specify the network connection settings needed to install your custom package.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 41410300-6ddd-43b2-b9e2-0108a2221355
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the ConnectionSettings .INS file to review the network connections for install (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the ConnectionSettings .INS file to review the network connections for install
-Info about the network connection settings used to install your custom package. This section creates a common configuration on all of your employee’s computers.
-
-|Name |Value |Description |
-|-----------|---------------------------|-------------|
-|ConnectName0 |`` |Name for the connection. |
-|ConnectName1 |`` |Secondary name for the connection. |
-|DeleteConnectionSettings | |Determines whether to remove the existing connection settings during installation of your custom package. |
-|Option |- **0.** Don’t let employees import connection settings.
- **1.** Let employees import connection settings.
|Determines whether an employee can import connection settings into the Internet Explorer Customization Wizard. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: Use the \[ConnectionSettings\] .INS file setting to specify the network connection settings needed to install your custom package.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 41410300-6ddd-43b2-b9e2-0108a2221355
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the ConnectionSettings .INS file to review the network connections for install (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the ConnectionSettings .INS file to review the network connections for install
+Info about the network connection settings used to install your custom package. This section creates a common configuration on all of your employee’s computers.
+
+|Name |Value |Description |
+|-----------|---------------------------|-------------|
+|ConnectName0 |`` |Name for the connection. |
+|ConnectName1 |`` |Secondary name for the connection. |
+|DeleteConnectionSettings | |Determines whether to remove the existing connection settings during installation of your custom package. |
+|Option |- **0.** Don’t let employees import connection settings.
- **1.** Let employees import connection settings.
|Determines whether an employee can import connection settings into the Internet Explorer Customization Wizard. |
+
diff --git a/browsers/internet-explorer/ie11-ieak/create-build-folder-structure-ieak11.md b/browsers/internet-explorer/ie11-ieak/create-build-folder-structure-ieak11.md
index 5dab4acabf..91f26adf5b 100644
--- a/browsers/internet-explorer/ie11-ieak/create-build-folder-structure-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/create-build-folder-structure-ieak11.md
@@ -1,24 +1,25 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: How to create your folder structure on the computer that you’ll use to build your custom browser package.
-author: lomayor
-ms.prod: ie11
-ms.assetid: e0d05a4c-099f-4f79-a069-4aa1c28a1080
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Create the build computer folder structure using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Create the build computer folder structure using IEAK 11
-Create your build environment on the computer that you’ll use to build your custom browser package. Your license agreement determines your folder structure and which version of Internet Explorer Administration Kit 11 (IEAK 11) you’ll use: **Internal** or **External**.
-
-|Name |Version |Description |
-|-----------------|----------------------|---------------------------------------------------------|
-|`\` |Internal and External |The main, placeholder folder used for all files built by IEAK or that you referenced in your custom package.|
-|`\\Dist` |Internal only |Destination directory for your files. You’ll only need this folder if you’re creating your browser package on a network drive. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: How to create your folder structure on the computer that you’ll use to build your custom browser package.
+author: dansimp
+ms.prod: ie11
+ms.assetid: e0d05a4c-099f-4f79-a069-4aa1c28a1080
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Create the build computer folder structure using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Create the build computer folder structure using IEAK 11
+Create your build environment on the computer that you’ll use to build your custom browser package. Your license agreement determines your folder structure and which version of Internet Explorer Administration Kit 11 (IEAK 11) you’ll use: **Internal** or **External**.
+
+|Name |Version |Description |
+|-----------------|----------------------|---------------------------------------------------------|
+|`\` |Internal and External |The main, placeholder folder used for all files built by IEAK or that you referenced in your custom package.|
+|`\\Dist` |Internal only |Destination directory for your files. You’ll only need this folder if you’re creating your browser package on a network drive. |
+
diff --git a/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md b/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md
index ee5455e665..3e8043c959 100644
--- a/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md
@@ -1,27 +1,28 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: Review this list of tasks and references before you create and deploy your Internet Explorer 11 custom install packages.
-author: lomayor
-ms.prod: ie11
-ms.assetid: fe71c603-bf07-41e1-a477-ade5b28c9fb3
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Tasks and references to consider before creating and deploying custom packages using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Tasks and references to consider before creating and deploying custom packages using IEAK 11
-Review this list of tasks and references to help you use the Internet Explorer Administration Kit 11 (IEAK 11) to set up, deploy, and manage Internet Explorer 11 in your company.
-
-|Task |References |
-|----------------------------------------|--------------------------------------------------------------|
-|Review concepts and requirements, including info about the version and features you'll use. |- [Hardware and software requirements for IEAK 11](hardware-and-software-reqs-ieak11.md)
- [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md)
- [Before you start using IEAK 11](before-you-create-custom-pkgs-ieak11.md)
|
-|Prep your environment and get all of the info you'll need for running IEAK 11 |- [Create the build computer folder structure using IEAK 11](create-build-folder-structure-ieak11.md)
- [Customize the Toolbar button and Favorites List icons using IEAK 11](guidelines-toolbar-and-favorites-list-ieak11.md)
- [Before you install your package over your network using IEAK 11](prep-network-install-with-ieak11.md)
- [Set up auto detection for DHCP or DNS servers using IEAK 11](auto-detection-dhcp-or-dns-servers-ieak11.md)
- [Register an uninstall app for custom components using IEAK 11](register-uninstall-app-ieak11.md)
- [Add and approve ActiveX controls using the IEAK 11](add-and-approve-activex-controls-ieak11.md)
- [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](ieak11-wizard-custom-options.md)
- [Security features and IEAK 11](security-and-ieak11.md)
|
-|Run the Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard |- [Use the File Locations page in the IEAK 11 Wizard](file-locations-ieak11-wizard.md)
- [Use the Platform Selection page in the IEAK 11 Wizard](platform-selection-ieak11-wizard.md)
- [Use the Language Selection page in the IEAK 11 Wizard](language-selection-ieak11-wizard.md)
- [Use the Package Type Selection page in the IEAK 11 Wizard](pkg-type-selection-ieak11-wizard.md)
- [Use the Feature Selection page in the IEAK 11 Wizard](feature-selection-ieak11-wizard.md)
- [Use the Automatic Version Synchronization page in the IEAK 11 Wizard](auto-version-sync-ieak11-wizard.md)
- [Use the Custom Components page in the IEAK 11 Wizard](custom-components-ieak11-wizard.md)
- [Use the Internal Install page in the IEAK 11 Wizard](internal-install-ieak11-wizard.md)
- [Use the User Experience page in the IEAK 11 Wizard](user-experience-ieak11-wizard.md)
- [Use the Browser User Interface page in the IEAK 11 Wizard](browser-ui-ieak11-wizard.md)
- [Use the Search Providers page in the IEAK 11 Wizard](search-providers-ieak11-wizard.md)
- [Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard](important-urls-home-page-and-support-ieak11-wizard.md)
- [Use the Accelerators page in the IEAK 11 Wizard](accelerators-ieak11-wizard.md)
- [Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard](favorites-favoritesbar-and-feeds-ieak11-wizard.md)
- [Use the Browsing Options page in the IEAK 11 Wizard](browsing-options-ieak11-wizard.md)
- [Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard](first-run-and-welcome-page-ieak11-wizard.md)
- [Use the Compatibility View page in the IEAK 11 Wizard](compat-view-ieak11-wizard.md)
- [Use the Connection Manager page in the IEAK 11 Wizard](connection-mgr-ieak11-wizard.md)
- [Use the Connection Settings page in the IEAK 11 Wizard](connection-settings-ieak11-wizard.md)
- [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md)
- [Use the Proxy Settings page in the IEAK 11 Wizard](proxy-settings-ieak11-wizard.md)
- [Use the Security and Privacy Settings page in the IEAK 11 Wizard](security-and-privacy-settings-ieak11-wizard.md)
- [Use the Add a Root Certificate page in the IEAK 11 Wizard](add-root-certificate-ieak11-wizard.md)
- [Use the Programs page in the IEAK 11 Wizard](programs-ieak11-wizard.md)
- [Use the Additional Settings page in the IEAK 11 Wizard](additional-settings-ieak11-wizard.md)
- [Use the Wizard Complete - Next Steps page in the IEAK 11 Wizard](wizard-complete-ieak11-wizard.md)
|
-|Review your policy settings and create multiple versions of your install package. |- [Create multiple versions of your custom package using IEAK 11](create-multiple-browser-packages-ieak11.md)
- [Use the RSoP snap-in to review policy settings](rsop-snapin-for-policy-settings-ieak11.md)
**Note**
For deployment instructions, additional troubleshooting, and post-installation management, see the [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md)
|
-|Review the general IEAK Customization Wizard 11 information, which applies throughout the process. |- [Troubleshoot custom package and IEAK 11 problems](troubleshooting-custom-browser-pkg-ieak11.md)
- [File types used or created by IEAK 11](file-types-ieak11.md)
- [Customize Automatic Search using IEAK 11](customize-automatic-search-for-ie.md)
- [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md)
- [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md)
- [Use proxy auto-configuration (.pac) files with IEAK 11](proxy-auto-config-examples.md)
- [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md)
|
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: Review this list of tasks and references before you create and deploy your Internet Explorer 11 custom install packages.
+author: dansimp
+ms.prod: ie11
+ms.assetid: fe71c603-bf07-41e1-a477-ade5b28c9fb3
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Tasks and references to consider before creating and deploying custom packages using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Tasks and references to consider before creating and deploying custom packages using IEAK 11
+Review this list of tasks and references to help you use the Internet Explorer Administration Kit 11 (IEAK 11) to set up, deploy, and manage Internet Explorer 11 in your company.
+
+|Task |References |
+|----------------------------------------|--------------------------------------------------------------|
+|Review concepts and requirements, including info about the version and features you'll use. |- [Hardware and software requirements for IEAK 11](hardware-and-software-reqs-ieak11.md)
- [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md)
- [Before you start using IEAK 11](before-you-create-custom-pkgs-ieak11.md)
|
+|Prep your environment and get all of the info you'll need for running IEAK 11 |- [Create the build computer folder structure using IEAK 11](create-build-folder-structure-ieak11.md)
- [Customize the Toolbar button and Favorites List icons using IEAK 11](guidelines-toolbar-and-favorites-list-ieak11.md)
- [Before you install your package over your network using IEAK 11](prep-network-install-with-ieak11.md)
- [Set up auto detection for DHCP or DNS servers using IEAK 11](auto-detection-dhcp-or-dns-servers-ieak11.md)
- [Register an uninstall app for custom components using IEAK 11](register-uninstall-app-ieak11.md)
- [Add and approve ActiveX controls using the IEAK 11](add-and-approve-activex-controls-ieak11.md)
- [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](ieak11-wizard-custom-options.md)
- [Security features and IEAK 11](security-and-ieak11.md)
|
+|Run the Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard |- [Use the File Locations page in the IEAK 11 Wizard](file-locations-ieak11-wizard.md)
- [Use the Platform Selection page in the IEAK 11 Wizard](platform-selection-ieak11-wizard.md)
- [Use the Language Selection page in the IEAK 11 Wizard](language-selection-ieak11-wizard.md)
- [Use the Package Type Selection page in the IEAK 11 Wizard](pkg-type-selection-ieak11-wizard.md)
- [Use the Feature Selection page in the IEAK 11 Wizard](feature-selection-ieak11-wizard.md)
- [Use the Automatic Version Synchronization page in the IEAK 11 Wizard](auto-version-sync-ieak11-wizard.md)
- [Use the Custom Components page in the IEAK 11 Wizard](custom-components-ieak11-wizard.md)
- [Use the Internal Install page in the IEAK 11 Wizard](internal-install-ieak11-wizard.md)
- [Use the User Experience page in the IEAK 11 Wizard](user-experience-ieak11-wizard.md)
- [Use the Browser User Interface page in the IEAK 11 Wizard](browser-ui-ieak11-wizard.md)
- [Use the Search Providers page in the IEAK 11 Wizard](search-providers-ieak11-wizard.md)
- [Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard](important-urls-home-page-and-support-ieak11-wizard.md)
- [Use the Accelerators page in the IEAK 11 Wizard](accelerators-ieak11-wizard.md)
- [Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard](favorites-favoritesbar-and-feeds-ieak11-wizard.md)
- [Use the Browsing Options page in the IEAK 11 Wizard](browsing-options-ieak11-wizard.md)
- [Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard](first-run-and-welcome-page-ieak11-wizard.md)
- [Use the Compatibility View page in the IEAK 11 Wizard](compat-view-ieak11-wizard.md)
- [Use the Connection Manager page in the IEAK 11 Wizard](connection-mgr-ieak11-wizard.md)
- [Use the Connection Settings page in the IEAK 11 Wizard](connection-settings-ieak11-wizard.md)
- [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md)
- [Use the Proxy Settings page in the IEAK 11 Wizard](proxy-settings-ieak11-wizard.md)
- [Use the Security and Privacy Settings page in the IEAK 11 Wizard](security-and-privacy-settings-ieak11-wizard.md)
- [Use the Add a Root Certificate page in the IEAK 11 Wizard](add-root-certificate-ieak11-wizard.md)
- [Use the Programs page in the IEAK 11 Wizard](programs-ieak11-wizard.md)
- [Use the Additional Settings page in the IEAK 11 Wizard](additional-settings-ieak11-wizard.md)
- [Use the Wizard Complete - Next Steps page in the IEAK 11 Wizard](wizard-complete-ieak11-wizard.md)
|
+|Review your policy settings and create multiple versions of your install package. |- [Create multiple versions of your custom package using IEAK 11](create-multiple-browser-packages-ieak11.md)
- [Use the RSoP snap-in to review policy settings](rsop-snapin-for-policy-settings-ieak11.md)
**Note**
For deployment instructions, additional troubleshooting, and post-installation management, see the [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md)
|
+|Review the general IEAK Customization Wizard 11 information, which applies throughout the process. |- [Troubleshoot custom package and IEAK 11 problems](troubleshooting-custom-browser-pkg-ieak11.md)
- [File types used or created by IEAK 11](file-types-ieak11.md)
- [Customize Automatic Search using IEAK 11](customize-automatic-search-for-ie.md)
- [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md)
- [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md)
- [Use proxy auto-configuration (.pac) files with IEAK 11](proxy-auto-config-examples.md)
- [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md)
|
+
diff --git a/browsers/internet-explorer/ie11-ieak/create-multiple-browser-packages-ieak11.md b/browsers/internet-explorer/ie11-ieak/create-multiple-browser-packages-ieak11.md
index 896d25732d..6196fabf79 100644
--- a/browsers/internet-explorer/ie11-ieak/create-multiple-browser-packages-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/create-multiple-browser-packages-ieak11.md
@@ -1,38 +1,39 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Steps to create multiple versions of your custom browser if you support more than 1 version of Windows, more than 1 language, or have different features in each package.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 4c5f3503-8c69-4691-ae97-1523091ab333
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Create multiple versions of your custom package using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Create multiple versions of your custom package using IEAK 11
-You'll need to create multiple versions of your custom browser package if:
-
-- You support more than 1 version of the Windows operating system.
-
-- You support more than 1 language.
-
-- You have custom installation packages with only minor differences. For example, having a different phone number or a different set of URLs in the **Favorites** folder.
-
-The Internet Explorer Customization Wizard 11 stores your original settings in the Install.ins file and will show them each time you re-open the wizard. For more info about .ins files, see [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md).
-
-**To create multiple versions of your browser package**
-
-1. Use the Internet Explorer Customization Wizard 11 to create a custom browser package. For more info about how to run the wizard, start with the [Use the File Locations page in the IEAK 11 Wizard](file-locations-ieak11-wizard.md) topic.
-
-2. Go to the Cie\Custom folder and rename the Install.ins file to a name that reflects the version. Like, if you need a version for your employees in Texas, you could name the file Texas.ins.
-
-3. Run the wizard again, choosing the newly renamed folder as the destination directory for your output files.
-**Important**
Except for the **Title bar** text, **Favorites**, **Links bar**, **Home** page, and **Search bar**, we recommend that you keep all of your wizard settings the same for all of your build computers.
-
-4. Repeat this process until you’ve created a package for each version of your custom installation package.
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Steps to create multiple versions of your custom browser if you support more than 1 version of Windows, more than 1 language, or have different features in each package.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 4c5f3503-8c69-4691-ae97-1523091ab333
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Create multiple versions of your custom package using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Create multiple versions of your custom package using IEAK 11
+You'll need to create multiple versions of your custom browser package if:
+
+- You support more than 1 version of the Windows operating system.
+
+- You support more than 1 language.
+
+- You have custom installation packages with only minor differences. For example, having a different phone number or a different set of URLs in the **Favorites** folder.
+
+The Internet Explorer Customization Wizard 11 stores your original settings in the Install.ins file and will show them each time you re-open the wizard. For more info about .ins files, see [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md).
+
+**To create multiple versions of your browser package**
+
+1. Use the Internet Explorer Customization Wizard 11 to create a custom browser package. For more info about how to run the wizard, start with the [Use the File Locations page in the IEAK 11 Wizard](file-locations-ieak11-wizard.md) topic.
+
+2. Go to the Cie\Custom folder and rename the Install.ins file to a name that reflects the version. Like, if you need a version for your employees in Texas, you could name the file Texas.ins.
+
+3. Run the wizard again, choosing the newly renamed folder as the destination directory for your output files.
+**Important**
Except for the **Title bar** text, **Favorites**, **Links bar**, **Home** page, and **Search bar**, we recommend that you keep all of your wizard settings the same for all of your build computers.
+
+4. Repeat this process until you’ve created a package for each version of your custom installation package.
+
diff --git a/browsers/internet-explorer/ie11-ieak/create-uninstall-inf-files-for-custom-components.md b/browsers/internet-explorer/ie11-ieak/create-uninstall-inf-files-for-custom-components.md
index a74479dce6..3cf498605c 100644
--- a/browsers/internet-explorer/ie11-ieak/create-uninstall-inf-files-for-custom-components.md
+++ b/browsers/internet-explorer/ie11-ieak/create-uninstall-inf-files-for-custom-components.md
@@ -1,29 +1,30 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use Setup information (.inf) files to uninstall custom components from your custom browser packages.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 8257aa41-58de-4339-81dd-9f2ffcc10a08
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use Setup information (.inf) files to uninstall custom components (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use uninstallation .INF files to uninstall custom components
-The Internet Explorer Administration Kit 11 (IEAK 11) uses Setup information (.inf) files to provide installation instructions for your custom browser packages. You can also use this file to uninstall your custom components by removing the files, registry entries, and shortcuts, and adding your custom component to the list of programs that can be uninstalled from **Uninstall or change a program**.
-
-**To uninstall your custom components**
-
-1. Open the Registry Editor and add a new key and value to:
`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"DisplayName",,"description"`
-Where *description* is the string that’s shown in the **Uninstall or change a program** box.
-
-2. Add another new key and value to:
`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"UninstallString”",,"command-line"`
-Where *command-line* is the command that’s run when the component is picked from the **Uninstall or change a program** box.
-
-Your uninstall script must also remove your key from under the **Uninstall** registry key, so that your component no longer appears in the **Uninstall or change a program** after uninstallation. You can also run just a section of an .inf file by using the Setupx.dll InstallHinfSection entry point. To make this work, your installation script must copy the .inf file to the Windows\Inf folder for your custom component.
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use Setup information (.inf) files to uninstall custom components from your custom browser packages.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 8257aa41-58de-4339-81dd-9f2ffcc10a08
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use Setup information (.inf) files to uninstall custom components (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use uninstallation .INF files to uninstall custom components
+The Internet Explorer Administration Kit 11 (IEAK 11) uses Setup information (.inf) files to provide installation instructions for your custom browser packages. You can also use this file to uninstall your custom components by removing the files, registry entries, and shortcuts, and adding your custom component to the list of programs that can be uninstalled from **Uninstall or change a program**.
+
+**To uninstall your custom components**
+
+1. Open the Registry Editor and add a new key and value to:
`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"DisplayName",,"description"`
+Where *description* is the string that’s shown in the **Uninstall or change a program** box.
+
+2. Add another new key and value to:
`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\app-name,"UninstallString”",,"command-line"`
+Where *command-line* is the command that’s run when the component is picked from the **Uninstall or change a program** box.
+
+Your uninstall script must also remove your key from under the **Uninstall** registry key, so that your component no longer appears in the **Uninstall or change a program** after uninstallation. You can also run just a section of an .inf file by using the Setupx.dll InstallHinfSection entry point. To make this work, your installation script must copy the .inf file to the Windows\Inf folder for your custom component.
+
diff --git a/browsers/internet-explorer/ie11-ieak/custom-components-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/custom-components-ieak11-wizard.md
index faf527ba94..571b73d327 100644
--- a/browsers/internet-explorer/ie11-ieak/custom-components-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/custom-components-ieak11-wizard.md
@@ -1,60 +1,61 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Custom Components page in the IEAK 11 Customization Wizard to add additional components for your employees to install with IE.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 38a2b90f-c324-4dc8-ad30-8cd3e3e901d7
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Custom Components page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Custom Components page in the IEAK 11 Wizard
-The **Custom Components** page of the Internet Explorer Customization Wizard 11 lets you add up to 10 additional components that your employees can install at the same time they install IE. These components can be created by Microsoft or your organization as either compressed cabinet (.cab) or self-extracting executable (.exe) files. If you’re using Microsoft components, make sure you have the latest version and software patches from the [Microsoft Support](https://go.microsoft.com/fwlink/p/?LinkId=258658) site. To include Microsoft Update components, you must bundle the associated files into a custom component.
-
-**Important**
You should sign any custom code that’s being downloaded over the Internet. The default settings of Internet Explorer 11 will automatically reject any unsigned code. For more info about digitally signing custom components, see [Security features and IEAK 11](security-and-ieak11.md).
-
-**To use the Custom Component page**
-
-1. Click **Add**.
-The **Add a Custom Component** box appears.
-
-2. Type in the name of your component and then browse to the location of your file (either .cab or .exe).
-
-3. Pick when to install the component. This can be before IE, after IE, or after the computer restarts.
-**Important**
You should install your component before IE if you need to run a batch file to configure your employee settings. You should install your component after IE if you plan to install software updates.
-
-4. Check the **Only install if IE is installed successfully** box if your component should only install if IE installs successfully. For example, if you’re installing a security update that requires IE.
-
-5. If your component is a .cab file, you must provide the extraction command into the **Command** box.
-
-6. If your component has its own globally unique identifier (GUID), replace the value in the **GUID** box. Otherwise, keep the automatically generated GUID.
-
-7. Describe your component using up to 511 characters in the **Description** box.
-
-8. Type any command-line options that need to run while installing your component into the **Parameters** box. For example, if you want your component to install silently, without prompts. For more info about using options, see [IExpress command-line options](iexpress-command-line-options.md).
-
-9. Type the value that Microsoft Update Setup uses to check that the component installed successfully into the **Uninstall Key** box. This check is done by comparing your value to the value in the `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\ApplicationName` key.
-
-10. Type a numeric serial number for your component into the **Version** box, using this format: *xxxx*, *xxxxxx*, *xxxx*, *xxxx*.
-
-11. Click **Add**.
-The boxes clear and you can add another component. Click **Cancel** to go back to the **Custom Components** page.
-
-12. Click **Edit** to change your custom component information, **Verify** to make sure the component is digitally signed, or **Remove** to delete the component from your custom installation package.
-
-13. Click **Next** to go to the [Internal Install](internal-install-ieak11-wizard.md) page or **Back** to go to the [Automatic Version Synchronization](auto-version-sync-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Custom Components page in the IEAK 11 Customization Wizard to add additional components for your employees to install with IE.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 38a2b90f-c324-4dc8-ad30-8cd3e3e901d7
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Custom Components page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Custom Components page in the IEAK 11 Wizard
+The **Custom Components** page of the Internet Explorer Customization Wizard 11 lets you add up to 10 additional components that your employees can install at the same time they install IE. These components can be created by Microsoft or your organization as either compressed cabinet (.cab) or self-extracting executable (.exe) files. If you’re using Microsoft components, make sure you have the latest version and software patches from the [Microsoft Support](https://go.microsoft.com/fwlink/p/?LinkId=258658) site. To include Microsoft Update components, you must bundle the associated files into a custom component.
+
+**Important**
You should sign any custom code that’s being downloaded over the Internet. The default settings of Internet Explorer 11 will automatically reject any unsigned code. For more info about digitally signing custom components, see [Security features and IEAK 11](security-and-ieak11.md).
+
+**To use the Custom Component page**
+
+1. Click **Add**.
+The **Add a Custom Component** box appears.
+
+2. Type in the name of your component and then browse to the location of your file (either .cab or .exe).
+
+3. Pick when to install the component. This can be before IE, after IE, or after the computer restarts.
+**Important**
You should install your component before IE if you need to run a batch file to configure your employee settings. You should install your component after IE if you plan to install software updates.
+
+4. Check the **Only install if IE is installed successfully** box if your component should only install if IE installs successfully. For example, if you’re installing a security update that requires IE.
+
+5. If your component is a .cab file, you must provide the extraction command into the **Command** box.
+
+6. If your component has its own globally unique identifier (GUID), replace the value in the **GUID** box. Otherwise, keep the automatically generated GUID.
+
+7. Describe your component using up to 511 characters in the **Description** box.
+
+8. Type any command-line options that need to run while installing your component into the **Parameters** box. For example, if you want your component to install silently, without prompts. For more info about using options, see [IExpress command-line options](iexpress-command-line-options.md).
+
+9. Type the value that Microsoft Update Setup uses to check that the component installed successfully into the **Uninstall Key** box. This check is done by comparing your value to the value in the `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\ApplicationName` key.
+
+10. Type a numeric serial number for your component into the **Version** box, using this format: *xxxx*, *xxxxxx*, *xxxx*, *xxxx*.
+
+11. Click **Add**.
+The boxes clear and you can add another component. Click **Cancel** to go back to the **Custom Components** page.
+
+12. Click **Edit** to change your custom component information, **Verify** to make sure the component is digitally signed, or **Remove** to delete the component from your custom installation package.
+
+13. Click **Next** to go to the [Internal Install](internal-install-ieak11-wizard.md) page or **Back** to go to the [Automatic Version Synchronization](auto-version-sync-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md
index b40640dffa..e7469fa864 100644
--- a/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/custombranding-ins-file-setting.md
@@ -1,24 +1,25 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: Use the \[CustomBranding\] .INS file setting to specify the location of your branding cabinet (.cab) file.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 9c74e239-65c5-4aa5-812f-e0ed80c5c2b0
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the CustomBranding .INS file to create custom branding and setup info (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the CustomBranding .INS file to create custom branding and setup info
-Provide the URL to your branding cabinet (.cab) file.
-
-
-| Name | Value | Description |
-|----------|------------------|------------------------------------------------------------------------------------------------------------------------|
-| Branding | `` | The location of your branding cabinet (.cab) file. For example, https://www.<your_server>.net/cabs/branding.cab. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: Use the \[CustomBranding\] .INS file setting to specify the location of your branding cabinet (.cab) file.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 9c74e239-65c5-4aa5-812f-e0ed80c5c2b0
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the CustomBranding .INS file to create custom branding and setup info (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the CustomBranding .INS file to create custom branding and setup info
+Provide the URL to your branding cabinet (.cab) file.
+
+
+| Name | Value | Description |
+|----------|------------------|------------------------------------------------------------------------------------------------------------------------|
+| Branding | `` | The location of your branding cabinet (.cab) file. For example, https://www.<your_server>.net/cabs/branding.cab. |
+
diff --git a/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md b/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md
index 5f3eac4aaa..3c0af97192 100644
--- a/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md
+++ b/browsers/internet-explorer/ie11-ieak/customize-automatic-search-for-ie.md
@@ -1,103 +1,104 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: manage
-description: Customize Automatic Search in Internet Explorer so that your employees can type a single word into the Address box to search for frequently used pages.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 694e2f92-5e08-49dc-b83f-677d61fa918a
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Customize Automatic Search using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Customize Automatic Search for Internet Explorer using IEAK 11
-Internet Explorer lets websites advertise any search provider that uses the open search standard described at the A9 website ( [OpenSearch 1.1 Draft 5](https://go.microsoft.com/fwlink/p/?LinkId=208582)). When IE detects new search providers, the **Search** box becomes active and adds the new providers to the drop-down list of providers.
-
-Using the **Administrative Templates** section of Group Policy, you can prevent the search box from appearing, you can add a list of acceptable search providers, or you can restrict your employee’s ability to add or remove search providers.
-
-## Automatic Search Configuration
-You can customize Automatic Search so that your employees can type a single word into the **Address** box to search for frequently used pages. For example, you can let a commonly used webpage about invoices appear if an employee types *invoice* into the **Address** box, even if the URL doesn’t include the term. If a website can’t be associated with the term, or if there are multiple matches, a webpage appears showing the top search results.
-
-**To set up Automatic Search**
-
-1. Create a script (.asp) file that conditionally looks for search terms, and post it to an intranet server here: https://ieautosearch/response.asp?MT=%1&srch=%2.
- For info about the acceptable values for the *%1* and *%2* parameters, see the [Automatic Search parameters](#automatic-search-parameters). For an example of the script file, see the [Sample Automatic Search script](#sample-automatic-search-script).
- **Important**
If you aren’t using IIS in your company, you’ll need to remap this URL to your script file’s location.
-
-2. On the **Additional Settings** page of the IEAK 11, click **Internet Settings**, and then click **Advanced Settings**.
-
-3. Go to the section labeled **Searching** and type *intranet* into the **Search Provider Keyword** box.
-
-**To redirect to a different site than the one provided by the search results**
-
-- In the **Advanced Settings** section, go to the section labeled **Searching** and change the **When searching from the address bar** setting to **Just go to the most likely site**.
-
-**To disable Automatic Search**
-
-- In the **Advanced Settings** section, go to the section labeled **Searching** and change the **When searching from the address bar** setting to **Do not search from the address bar**.
-
-### Automatic Search parameters
-You must replace the Automatic Search script file parameters, *%1* and *%2* so they’re part of the actual URL.
-
-|Parameter |Value |
-|----------|--------------------------------------------------------|
-|1% |The text string typed by an employee into the **Address** bar. |
-|2% |The type of search chosen by an employee. This can include:
- **3.** Display the results and go to the most likely site.
- **2.** Go to the most likely site.
- **1.** Display the results in the main window.
- **0.** Don't search from the **Address** box.
|
-
-### Sample Automatic Search script
-This is a VBScript-based sample of an .asp Automatic Search script.
-
-```
-<%@ Language=VBScript %>
-<%
-' search holds the words typed in the Address bar
-' by the user, without the "go" or
-' "find" or any delimiters like
-' "+" for spaces.
-' If the user typed
-' "Apple pie," search = "Apple pie."
-' If the user typed
-' "find Apple pie," search = "Apple pie."
-
-search = Request.QueryString("MT")
-search = UCase(search)
-searchOption = Request.QueryString("srch")
-
-' This is a simple if/then/else
-' to redirect the browser to the site
-' of your choice based on what the
-' user typed.
-' Example: expense report is an intranet page
-' about filling out an expense report
-
-if (search = "NEW HIRE") then
-Response.Redirect("https://admin/hr/newhireforms.htm")
-elseif (search = "LIBRARY CATALOG") then
-Response.Redirect("https://library/catalog")
-elseif (search = "EXPENSE REPORT") then
-Response.Redirect("https://expense")
-elseif (search = "LUNCH MENU") then
-Response.Redirect("https://cafe/menu/")
-else
-
-' If there is not a match, use the
-' default IE autosearch server
-Response.Redirect("https://auto.search.msn.com/response.asp?MT="
-+ search + "&srch=" + searchOption +
-"&prov=&utf8")
-end if
-%>
-```
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: manage
+description: Customize Automatic Search in Internet Explorer so that your employees can type a single word into the Address box to search for frequently used pages.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 694e2f92-5e08-49dc-b83f-677d61fa918a
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Customize Automatic Search using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Customize Automatic Search for Internet Explorer using IEAK 11
+Internet Explorer lets websites advertise any search provider that uses the open search standard described at the A9 website ( [OpenSearch 1.1 Draft 5](https://go.microsoft.com/fwlink/p/?LinkId=208582)). When IE detects new search providers, the **Search** box becomes active and adds the new providers to the drop-down list of providers.
+
+Using the **Administrative Templates** section of Group Policy, you can prevent the search box from appearing, you can add a list of acceptable search providers, or you can restrict your employee’s ability to add or remove search providers.
+
+## Automatic Search Configuration
+You can customize Automatic Search so that your employees can type a single word into the **Address** box to search for frequently used pages. For example, you can let a commonly used webpage about invoices appear if an employee types *invoice* into the **Address** box, even if the URL doesn’t include the term. If a website can’t be associated with the term, or if there are multiple matches, a webpage appears showing the top search results.
+
+**To set up Automatic Search**
+
+1. Create a script (.asp) file that conditionally looks for search terms, and post it to an intranet server here: https://ieautosearch/response.asp?MT=%1&srch=%2.
+ For info about the acceptable values for the *%1* and *%2* parameters, see the [Automatic Search parameters](#automatic-search-parameters). For an example of the script file, see the [Sample Automatic Search script](#sample-automatic-search-script).
+ **Important**
If you aren’t using IIS in your company, you’ll need to remap this URL to your script file’s location.
+
+2. On the **Additional Settings** page of the IEAK 11, click **Internet Settings**, and then click **Advanced Settings**.
+
+3. Go to the section labeled **Searching** and type *intranet* into the **Search Provider Keyword** box.
+
+**To redirect to a different site than the one provided by the search results**
+
+- In the **Advanced Settings** section, go to the section labeled **Searching** and change the **When searching from the address bar** setting to **Just go to the most likely site**.
+
+**To disable Automatic Search**
+
+- In the **Advanced Settings** section, go to the section labeled **Searching** and change the **When searching from the address bar** setting to **Do not search from the address bar**.
+
+### Automatic Search parameters
+You must replace the Automatic Search script file parameters, *%1* and *%2* so they’re part of the actual URL.
+
+|Parameter |Value |
+|----------|--------------------------------------------------------|
+|1% |The text string typed by an employee into the **Address** bar. |
+|2% |The type of search chosen by an employee. This can include:
- **3.** Display the results and go to the most likely site.
- **2.** Go to the most likely site.
- **1.** Display the results in the main window.
- **0.** Don't search from the **Address** box.
|
+
+### Sample Automatic Search script
+This is a VBScript-based sample of an .asp Automatic Search script.
+
+```
+<%@ Language=VBScript %>
+<%
+' search holds the words typed in the Address bar
+' by the user, without the "go" or
+' "find" or any delimiters like
+' "+" for spaces.
+' If the user typed
+' "Apple pie," search = "Apple pie."
+' If the user typed
+' "find Apple pie," search = "Apple pie."
+
+search = Request.QueryString("MT")
+search = UCase(search)
+searchOption = Request.QueryString("srch")
+
+' This is a simple if/then/else
+' to redirect the browser to the site
+' of your choice based on what the
+' user typed.
+' Example: expense report is an intranet page
+' about filling out an expense report
+
+if (search = "NEW HIRE") then
+Response.Redirect("https://admin/hr/newhireforms.htm")
+elseif (search = "LIBRARY CATALOG") then
+Response.Redirect("https://library/catalog")
+elseif (search = "EXPENSE REPORT") then
+Response.Redirect("https://expense")
+elseif (search = "LUNCH MENU") then
+Response.Redirect("https://cafe/menu/")
+else
+
+' If there is not a match, use the
+' default IE autosearch server
+Response.Redirect("https://auto.search.msn.com/response.asp?MT="
++ search + "&srch=" + searchOption +
+"&prov=&utf8")
+end if
+%>
+```
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/extreginf-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/extreginf-ins-file-setting.md
index d3bee115a5..06e8d6c3f3 100644
--- a/browsers/internet-explorer/ie11-ieak/extreginf-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/extreginf-ins-file-setting.md
@@ -1,28 +1,29 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the \[ExtRegInf\] .INS file setting to specify your Setup information (.inf) files and the installation mode for your custom components.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 53148422-d784-44dc-811d-ef814b86a4c6
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the ExtRegInf .INS file to specify your installation files and mode (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the ExtRegInf .INS file to specify installation files and mode
-Info about how to specify your Setup information (.inf) files and the installation mode for your custom components.
-
-|Name |Value |Description |
-|-----------|---------|------------------------------------------------------------------------------------------------------------------|
-|Chat |*string* |The name of the .inf file and the install mode for components. For example, *,chat.inf,DefaultInstall. |
-|Conf |*string* |The name of the .inf file and the install mode for components. For example, *,conf.inf,DefaultInstall. |
-|Inetres |*string* |The name of the .inf file and the install mode for components. For example, *,inetres.inf,DefaultInstall. |
-|Inetset |*string* |The name of the .inf file and the install mode for components. For example, *,inetset.inf,DefaultInstall. |
-|Subs |*string* |The name of the .inf file and the install mode for components. For example, *,subs.inf,DefaultInstall. |
-|ConnectionSettings |*string* |The name of the .inf file and the install mode for components. For example, *,connect.inf,DefaultInstall. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the \[ExtRegInf\] .INS file setting to specify your Setup information (.inf) files and the installation mode for your custom components.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 53148422-d784-44dc-811d-ef814b86a4c6
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the ExtRegInf .INS file to specify your installation files and mode (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the ExtRegInf .INS file to specify installation files and mode
+Info about how to specify your Setup information (.inf) files and the installation mode for your custom components.
+
+|Name |Value |Description |
+|-----------|---------|------------------------------------------------------------------------------------------------------------------|
+|Chat |*string* |The name of the .inf file and the install mode for components. For example, *,chat.inf,DefaultInstall. |
+|Conf |*string* |The name of the .inf file and the install mode for components. For example, *,conf.inf,DefaultInstall. |
+|Inetres |*string* |The name of the .inf file and the install mode for components. For example, *,inetres.inf,DefaultInstall. |
+|Inetset |*string* |The name of the .inf file and the install mode for components. For example, *,inetset.inf,DefaultInstall. |
+|Subs |*string* |The name of the .inf file and the install mode for components. For example, *,subs.inf,DefaultInstall. |
+|ConnectionSettings |*string* |The name of the .inf file and the install mode for components. For example, *,connect.inf,DefaultInstall. |
+
diff --git a/browsers/internet-explorer/ie11-ieak/favorites-favoritesbar-and-feeds-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/favorites-favoritesbar-and-feeds-ieak11-wizard.md
index e077a6fbed..47bf04d6e2 100644
--- a/browsers/internet-explorer/ie11-ieak/favorites-favoritesbar-and-feeds-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/favorites-favoritesbar-and-feeds-ieak11-wizard.md
@@ -1,109 +1,110 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Favorites, Favorites Bar, and Feeds page in IEAK 11 Customization Wizard to add links, web slices, and feeds to your custom browser package.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 84afa831-5642-4b8f-b7df-212a53ec8fc7
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard
-The **Favorites, Favorites Bar, and Feeds** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you add:
-
-- **Links.** Used so your employees can quickly connect with your important websites. These links can appear in the **Links** folder or on the **Favorites Bar**.
-
-- **Web Slices.** Used so your employees can subscribe to a section of a webpage, tracking information as it changes, such as for weather reports, stock prices, or the progress of an auction item.
-
-- **Feeds.** Used so your employees can quickly access your recommended RSS feeds. While you can’t import a folder of RSS feeds, you can add new links.
-
-Although we provide default items in the **Favorites, Favorites Bar, and Feeds** area, you can remove any of the items, add more items, or add new folders and links as part of your custom package. The customizations you make on this page only apply to Internet Explorer for the desktop.
-
-**To work with Favorites**
-
-1. To import your existing folder of links, pick **Favorites**, and then click **Import**.
-
-2. Go to your existing link folder, most likely in the `\Users\\Favorites` folder, and then click **OK**.
-The links are imported and added to the **Favorites, Favorites Bar, and Feeds** page, beneath the **Favorites** folder.
-
-3. To add a new favorite link, pick **Favorites**, and then click **Add URL**.
-The **Details** box appears.
-
-4. Type the new link name in the **Name** box.
-
-5. Type the new URL in the **URL** box.
-
-6. Optionally, you can add a 16x16 pixel icon to your link by adding the location in the **Icon** box.
-
-7. Click **OK**.
-
-8. To add a new **Favorites** folder, pick **Favorites**, and then click **Add Folder**.
-The **Details** box appears.
-
-9. Type the folder name into the **Name** box, and then click **OK**.
-
-10. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **Favorites** item.
-
-11. If you have multiple **Favorites** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**.
-
-12. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit.
-
-13. Continue with the next procedures in this topic to add additional **Favorites Bar** or **RSS Feeds** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page.
-
-**To work with the Favorites Bar**
-
-1. To import your existing folder of links, pick **Favorites Bar**, and then click **Import**.
-
-2. Go to your existing link folder, most likely in the `\Users\\Favorites\Favorites Bar` folder, and then click **OK**.
-The links are imported and added to the **Favorites, Favorites Bar, and Feeds** page, beneath the **Favorites Bar** folder.
-
-3. To add a new link to the **Favorites Bar**, pick **Favorites Bar**, and then click **Add URL**.
-The **Details** box appears.
-
-4. Type the new quick link name in the **Name** box.
-
-5. Type the new URL in the **URL** box.
-
-6. Optionally, you can add a 16x16 pixel icon to your link by adding the location in the **Icon** box.
-
-7. Pick whether your link is a simple **Link**, a **Feed**, or a **Web Slice**, and then click **OK**.
-
-8. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **Favorites Bar** item.
-
-9. If you have multiple **Favorites Bar** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**.
-
-10. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit.
-
-11. Continue with the next procedures in this topic to add additional **Favorites** or **RSS Feeds** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page.
-
-**To work with RSS Feeds**
-
-1. To add a new link to the **RSS Feeds**, pick **Favorites Bar**, and then click **Add URL**.
-The **Details** box appears.
-
-2. Type the new link name in the **Name** box.
-
-3. Type the new URL in the **URL** box, and then click **OK**.
-
-4. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **RSS Feeds** item.
-
-5. If you have multiple **RSS Feeds** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**.
-
-6. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit.
-
-7. Continue with the next procedures in this topic to add additional **Favorites** or **Favorites Bar** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Favorites, Favorites Bar, and Feeds page in IEAK 11 Customization Wizard to add links, web slices, and feeds to your custom browser package.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 84afa831-5642-4b8f-b7df-212a53ec8fc7
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard
+The **Favorites, Favorites Bar, and Feeds** page of the Internet Explorer Administration Kit (IEAK 11) Customization Wizard lets you add:
+
+- **Links.** Used so your employees can quickly connect with your important websites. These links can appear in the **Links** folder or on the **Favorites Bar**.
+
+- **Web Slices.** Used so your employees can subscribe to a section of a webpage, tracking information as it changes, such as for weather reports, stock prices, or the progress of an auction item.
+
+- **Feeds.** Used so your employees can quickly access your recommended RSS feeds. While you can’t import a folder of RSS feeds, you can add new links.
+
+Although we provide default items in the **Favorites, Favorites Bar, and Feeds** area, you can remove any of the items, add more items, or add new folders and links as part of your custom package. The customizations you make on this page only apply to Internet Explorer for the desktop.
+
+**To work with Favorites**
+
+1. To import your existing folder of links, pick **Favorites**, and then click **Import**.
+
+2. Go to your existing link folder, most likely in the `\Users\\Favorites` folder, and then click **OK**.
+The links are imported and added to the **Favorites, Favorites Bar, and Feeds** page, beneath the **Favorites** folder.
+
+3. To add a new favorite link, pick **Favorites**, and then click **Add URL**.
+The **Details** box appears.
+
+4. Type the new link name in the **Name** box.
+
+5. Type the new URL in the **URL** box.
+
+6. Optionally, you can add a 16x16 pixel icon to your link by adding the location in the **Icon** box.
+
+7. Click **OK**.
+
+8. To add a new **Favorites** folder, pick **Favorites**, and then click **Add Folder**.
+The **Details** box appears.
+
+9. Type the folder name into the **Name** box, and then click **OK**.
+
+10. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **Favorites** item.
+
+11. If you have multiple **Favorites** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**.
+
+12. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit.
+
+13. Continue with the next procedures in this topic to add additional **Favorites Bar** or **RSS Feeds** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page.
+
+**To work with the Favorites Bar**
+
+1. To import your existing folder of links, pick **Favorites Bar**, and then click **Import**.
+
+2. Go to your existing link folder, most likely in the `\Users\\Favorites\Favorites Bar` folder, and then click **OK**.
+The links are imported and added to the **Favorites, Favorites Bar, and Feeds** page, beneath the **Favorites Bar** folder.
+
+3. To add a new link to the **Favorites Bar**, pick **Favorites Bar**, and then click **Add URL**.
+The **Details** box appears.
+
+4. Type the new quick link name in the **Name** box.
+
+5. Type the new URL in the **URL** box.
+
+6. Optionally, you can add a 16x16 pixel icon to your link by adding the location in the **Icon** box.
+
+7. Pick whether your link is a simple **Link**, a **Feed**, or a **Web Slice**, and then click **OK**.
+
+8. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **Favorites Bar** item.
+
+9. If you have multiple **Favorites Bar** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**.
+
+10. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit.
+
+11. Continue with the next procedures in this topic to add additional **Favorites** or **RSS Feeds** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page.
+
+**To work with RSS Feeds**
+
+1. To add a new link to the **RSS Feeds**, pick **Favorites Bar**, and then click **Add URL**.
+The **Details** box appears.
+
+2. Type the new link name in the **Name** box.
+
+3. Type the new URL in the **URL** box, and then click **OK**.
+
+4. Click **Edit** to change any of your new information, **Test URL** to test each of your links to make sure they go to the right place, or **Remove** to delete a **RSS Feeds** item.
+
+5. If you have multiple **RSS Feeds** links, you can update their order in the list. Check the **Add to the top of the list** box, click the link you want to move, and then click **Move Up** or **Move Down**.
+
+6. Check the **Disable IE Suggested Sites** box to disable the Suggested Sites feature. By turning this on, your employees won’t receive suggested sites based on the sites that they visit.
+
+7. Continue with the next procedures in this topic to add additional **Favorites** or **Favorites Bar** links, or you can click **Next** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page or **Back** to go to the [Accelerators](accelerators-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/favoritesex-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/favoritesex-ins-file-setting.md
index cd9cbf7a91..694b8d994d 100644
--- a/browsers/internet-explorer/ie11-ieak/favoritesex-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/favoritesex-ins-file-setting.md
@@ -1,26 +1,27 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the \[FavoritesEx\] .INS file setting to specify your Favorites icon file, whether Favorites is available offline, and your Favorites URLs.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 55de376a-d442-478e-8978-3b064407b631
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the FavoritesEx .INS file for your Favorites icon and URLs (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the FavoritesEx .INS file for your Favorites icon and URLs
-Info about where you store your **Favorites** icon file, whether your **Favorites** are available offline, and the URLs for each **Favorites** site.
-
-|Name |Value |Description |
-|----------------|-----------------------|--------------------------------------------------------------------------|
-|IconFile1 |`` |An icon (.ico file) that represents the **Favorites** item you’re adding. |
-|Offline1 |- **0.** Makes the **Favorites** item unavailable for offline browsing.
- **1.** Makes the **Favorites** item available for offline browsing.
|Determines if the **Favorites** item is available for offline browsing. |
-|Title1 |`` |Title for the **Favorites** item. |
-|Url1 |`` |URL to the **Favorites** item. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the \[FavoritesEx\] .INS file setting to specify your Favorites icon file, whether Favorites is available offline, and your Favorites URLs.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 55de376a-d442-478e-8978-3b064407b631
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the FavoritesEx .INS file for your Favorites icon and URLs (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the FavoritesEx .INS file for your Favorites icon and URLs
+Info about where you store your **Favorites** icon file, whether your **Favorites** are available offline, and the URLs for each **Favorites** site.
+
+|Name |Value |Description |
+|----------------|-----------------------|--------------------------------------------------------------------------|
+|IconFile1 |`` |An icon (.ico file) that represents the **Favorites** item you’re adding. |
+|Offline1 |- **0.** Makes the **Favorites** item unavailable for offline browsing.
- **1.** Makes the **Favorites** item available for offline browsing.
|Determines if the **Favorites** item is available for offline browsing. |
+|Title1 |`` |Title for the **Favorites** item. |
+|Url1 |`` |URL to the **Favorites** item. |
+
diff --git a/browsers/internet-explorer/ie11-ieak/feature-selection-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/feature-selection-ieak11-wizard.md
index 0790851097..b27bc3273a 100644
--- a/browsers/internet-explorer/ie11-ieak/feature-selection-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/feature-selection-ieak11-wizard.md
@@ -2,13 +2,13 @@
ms.localizationpriority: medium
ms.mktglfcycl: deploy
description: How to use the Feature Selection page in the IEAK 11 Customization Wizard to choose which parts of the setup processes and Internet Explorer 11 to change for your company.
-author: lomayor
+author: dansimp
ms.prod: ie11
ms.assetid: 9cb8324e-d73b-41ba-ade9-3acc796e21d8
ms.reviewer:
audience: itpro
manager: dansimp
-ms.author: lomayor
+ms.author: dansimp
title: Use the Feature Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
ms.sitesec: library
---
diff --git a/browsers/internet-explorer/ie11-ieak/file-locations-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/file-locations-ieak11-wizard.md
index 2fa0b58cc8..f3224c2055 100644
--- a/browsers/internet-explorer/ie11-ieak/file-locations-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/file-locations-ieak11-wizard.md
@@ -1,55 +1,56 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the File Locations page in the IEAK 11 Customization Wizard to change the location of your install package and IE11 folders.
-author: lomayor
-ms.prod: ie11
-ms.assetid: bd0620e1-0e07-4560-95ac-11888c2c389e
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the File Locations page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the File Locations page in the IEAK 11 Wizard
-The **File Locations** page of the Internet Explorer Customization Wizard 11 lets you change the location of your folders, including:
-
-- Where you’ll create and store your custom installation package.
-
-- Where you’ll download and store Internet Explorer 11.
-
-**Important**
-You can create a custom installation package on your hard drive and move it to an Internet or intranet server, or you can create it directly on a server. If you create the package on a web server that’s running from your hard drive, use the path to the web server as the destination folder location. Whatever location you choose, it must be protected by appropriate access control lists (ACLs). If the location is not protected, the custom package may be tampered with.
-
-**To use the File Locations page**
-
-1. Browse to the location where you’ll store your finished custom IE installation package and the related subfolders.
-**Note**
Subfolders are created for each language version, based on operating system and media type. For example, if your destination folder is `C:\Inetpub\Wwwroot\Cie\Dist`, then the English-language version is created as `C:\Inetpub\Wwwroot\Cie\Dist\Flat\Win32\En` subfolders.
-
-2. Click **Advanced Options**.
-The **Advanced Options** box opens and lets you change how the wizard downloads and gets files, and how it imports settings from your .ins file.
-
-3. Check the box letting IE Customization Wizard 11 look for the latest components, using Automatic Version Synchronization.
-This option lets the wizard connect to the IE **Downloads** page to look for updated versions of IE since you last ran the wizard.
-**Important**
-You must run Automatic Version Synchronization at least once to check for updated components.
-
-4. Browse to your .ins file location, and then click **Open**.
-By importing settings from an .ins file, you can re-use existing configurations. This saves you time if your packages have the same or similar settings.
-
-5. Browse to your component download folder.
-Automatic Version Synchronization automatically checks the component download folder to see if you have the latest version of IE. To keep this folder up-to-date, you shouldn’t change its location. However, if you want to keep both a previous version of IE and the latest version, we recommend you download the components to a different location.
-
-6. Click **OK** to close the **Advanced Options** box, and then click **Next** to go to the [Platform Selection](platform-selection-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the File Locations page in the IEAK 11 Customization Wizard to change the location of your install package and IE11 folders.
+author: dansimp
+ms.prod: ie11
+ms.assetid: bd0620e1-0e07-4560-95ac-11888c2c389e
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the File Locations page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the File Locations page in the IEAK 11 Wizard
+The **File Locations** page of the Internet Explorer Customization Wizard 11 lets you change the location of your folders, including:
+
+- Where you’ll create and store your custom installation package.
+
+- Where you’ll download and store Internet Explorer 11.
+
+**Important**
+You can create a custom installation package on your hard drive and move it to an Internet or intranet server, or you can create it directly on a server. If you create the package on a web server that’s running from your hard drive, use the path to the web server as the destination folder location. Whatever location you choose, it must be protected by appropriate access control lists (ACLs). If the location is not protected, the custom package may be tampered with.
+
+**To use the File Locations page**
+
+1. Browse to the location where you’ll store your finished custom IE installation package and the related subfolders.
+**Note**
Subfolders are created for each language version, based on operating system and media type. For example, if your destination folder is `C:\Inetpub\Wwwroot\Cie\Dist`, then the English-language version is created as `C:\Inetpub\Wwwroot\Cie\Dist\Flat\Win32\En` subfolders.
+
+2. Click **Advanced Options**.
+The **Advanced Options** box opens and lets you change how the wizard downloads and gets files, and how it imports settings from your .ins file.
+
+3. Check the box letting IE Customization Wizard 11 look for the latest components, using Automatic Version Synchronization.
+This option lets the wizard connect to the IE **Downloads** page to look for updated versions of IE since you last ran the wizard.
+**Important**
+You must run Automatic Version Synchronization at least once to check for updated components.
+
+4. Browse to your .ins file location, and then click **Open**.
+By importing settings from an .ins file, you can re-use existing configurations. This saves you time if your packages have the same or similar settings.
+
+5. Browse to your component download folder.
+Automatic Version Synchronization automatically checks the component download folder to see if you have the latest version of IE. To keep this folder up-to-date, you shouldn’t change its location. However, if you want to keep both a previous version of IE and the latest version, we recommend you download the components to a different location.
+
+6. Click **OK** to close the **Advanced Options** box, and then click **Next** to go to the [Platform Selection](platform-selection-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/file-types-ieak11.md b/browsers/internet-explorer/ie11-ieak/file-types-ieak11.md
index 5dd8eff9da..38703f9131 100644
--- a/browsers/internet-explorer/ie11-ieak/file-types-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/file-types-ieak11.md
@@ -1,37 +1,38 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: Review the file types that are created and used by tools in the Internet Explorer Administration Kit 11 (IEAK 11).
-author: lomayor
-ms.prod: ie11
-ms.assetid: e5735074-3e9b-4a00-b1a7-b8fd8baca327
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: File types used or created by IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# File types used or created by IEAK 11
-A list of the file types used or created by tools in IEAK 11:
-
-|File type |Description |
-|----------|-------------------------|
-|.adm | An admin file (located at `:\Program Files\Windows IEAK 11\policies`), used by Group Policy to define the system policies and restrictions for Windows. You can use the IEAK 11 to change these settings. |
-|.bat |An ASCII text file that contains a sequence of operating system commands, including the parameters and operators supported by the batch command language. When you run the batch file from a command prompt, the computer processes each command sequentially. |
-|.bmp, .gif, .jpeg, and .jpg |Image files you can use to customize your toolbar button and favorites list icons. For info, see the [Customize the Toolbar button and Favorites List icons using IEAK 11](guidelines-toolbar-and-favorites-list-ieak11.md) page. |
-|.cab |A compressed cabinet (.cab) file, created by the Internet Explorer Customization Wizard 11 to store your custom component files. We highly recommend that your .cab files be signed for security purposes. For more info, see the [Security features and IEAK 11](security-and-ieak11.md) page. |
-|.cif |A component info file (IESetup.cif), identifying the new or updated components you're going to install with Internet Explorer. Each component file has an associated *ComponentID* that's used by Windows Update Setup to determine whether a new component or an update exists. |
-|.cmp |Connection profile files that are created by the Connection Manager Administration Kit (CMAK). |
-|.cms |Service provider files, created by the CMAK tool to specify the configuration of the phone book and many of the other functions of your service profiles. |
-|.exe |Executable files that control the setup process, by installing the .cab files that install the custom browser package on your employee's devices. |
-|.inf |Setup information files that provide installation instructions for your custom browser packages. For more info, see the [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md) page. |
-|.ins |Internet Settings files that specify how to configure your custom browser and its components. You can create multiple versions of your custom package by customizing copies of this file. For more info, see the [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md) page. |
-|.pac |Proxy auto-configuration script files that determine whether to connect directly to a host or to use a proxy server. For more info, see the [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md) page. |
-|.js and .jvs |JScript and JavaScript files that let you configure and maintain your advanced proxy settings. For more info, see the [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md) page. |
-|.pvk |A file format used by some certification authorities to store the private key of the digital certificate. The public part of the digital certificate is stored in an SPC file, while the private part is stored in the PVK file. For more info, see the **Understanding certificates** section of the [Security features and IEAK 11](security-and-ieak11.md) page. |
-|.sed |Connection profile files, created by the CMAK tool, including the instructions for building the self-extracting executable (.exe) file for your service profiles.**Important**
You must never edit a .sed file. |
-|.spc |The software publishing certificate file, which includes:
- The name and other identifying information of the owner of the certificate.
- The public key associated with the certificate.
- The serial number.
- The length of time the certificate is valid.
- The digital signature of the certification authority that issued the certificate.
|
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: Review the file types that are created and used by tools in the Internet Explorer Administration Kit 11 (IEAK 11).
+author: dansimp
+ms.prod: ie11
+ms.assetid: e5735074-3e9b-4a00-b1a7-b8fd8baca327
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: File types used or created by IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# File types used or created by IEAK 11
+A list of the file types used or created by tools in IEAK 11:
+
+|File type |Description |
+|----------|-------------------------|
+|.adm | An admin file (located at `:\Program Files\Windows IEAK 11\policies`), used by Group Policy to define the system policies and restrictions for Windows. You can use the IEAK 11 to change these settings. |
+|.bat |An ASCII text file that contains a sequence of operating system commands, including the parameters and operators supported by the batch command language. When you run the batch file from a command prompt, the computer processes each command sequentially. |
+|.bmp, .gif, .jpeg, and .jpg |Image files you can use to customize your toolbar button and favorites list icons. For info, see the [Customize the Toolbar button and Favorites List icons using IEAK 11](guidelines-toolbar-and-favorites-list-ieak11.md) page. |
+|.cab |A compressed cabinet (.cab) file, created by the Internet Explorer Customization Wizard 11 to store your custom component files. We highly recommend that your .cab files be signed for security purposes. For more info, see the [Security features and IEAK 11](security-and-ieak11.md) page. |
+|.cif |A component info file (IESetup.cif), identifying the new or updated components you're going to install with Internet Explorer. Each component file has an associated *ComponentID* that's used by Windows Update Setup to determine whether a new component or an update exists. |
+|.cmp |Connection profile files that are created by the Connection Manager Administration Kit (CMAK). |
+|.cms |Service provider files, created by the CMAK tool to specify the configuration of the phone book and many of the other functions of your service profiles. |
+|.exe |Executable files that control the setup process, by installing the .cab files that install the custom browser package on your employee's devices. |
+|.inf |Setup information files that provide installation instructions for your custom browser packages. For more info, see the [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md) page. |
+|.ins |Internet Settings files that specify how to configure your custom browser and its components. You can create multiple versions of your custom package by customizing copies of this file. For more info, see the [Using Internet Settings (.INS) files with IEAK 11](using-internet-settings-ins-files.md) page. |
+|.pac |Proxy auto-configuration script files that determine whether to connect directly to a host or to use a proxy server. For more info, see the [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md) page. |
+|.js and .jvs |JScript and JavaScript files that let you configure and maintain your advanced proxy settings. For more info, see the [Use the Automatic Configuration page in the IEAK 11 Wizard](auto-config-ieak11-wizard.md) page. |
+|.pvk |A file format used by some certification authorities to store the private key of the digital certificate. The public part of the digital certificate is stored in an SPC file, while the private part is stored in the PVK file. For more info, see the **Understanding certificates** section of the [Security features and IEAK 11](security-and-ieak11.md) page. |
+|.sed |Connection profile files, created by the CMAK tool, including the instructions for building the self-extracting executable (.exe) file for your service profiles.**Important**
You must never edit a .sed file. |
+|.spc |The software publishing certificate file, which includes:
- The name and other identifying information of the owner of the certificate.
- The public key associated with the certificate.
- The serial number.
- The length of time the certificate is valid.
- The digital signature of the certification authority that issued the certificate.
|
+
diff --git a/browsers/internet-explorer/ie11-ieak/first-run-and-welcome-page-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/first-run-and-welcome-page-ieak11-wizard.md
index 68b255a273..507450938d 100644
--- a/browsers/internet-explorer/ie11-ieak/first-run-and-welcome-page-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/first-run-and-welcome-page-ieak11-wizard.md
@@ -1,44 +1,45 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the First Run Wizard and Welcome Page Options page in the IEAK 11 Customization Wizard to set what your employee’s see the first time they log on to IE, based on their operating system.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 85f856a6-b707-48a9-ba99-3a6e898276a9
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard
-The **First Run Wizard and Welcome Page Options** page of the Internet Explorer Customization Wizard 11 lets you decide what your employee’s see the first time they log on to IE, based on their operating system.
-
-- **Windows 8.1 Update and newer.** No longer includes a **Welcome** page, so if you pick the **Use Internet Explorer 11 Welcome Page** or the **Use a custom Welcome page** option, IEAK creates an initial **Home** page that loads before all other **Home** pages, as the first tab. This only applies to the Internet Explorer for the desktop.
-
-- **Windows 7 SP1.** You can disable the first run page for Windows 7 SP1 and then pick a custom **Welcome** page to show instead. If you don’t customize the settings on this page, your employees will see the default IE **Welcome** page.
-
-**To use the First Run Wizard and Welcome Page Options page**
-
-1. Check the **Use IE11 First Run wizard (recommended)** box to use the default First Run wizard in IE.
-Clearing this box lets you use the IE11 **Welcome** page or your custom **Welcome** page.
-
-2. If you cleared the First Run wizard box, you can decide which **Welcome** page to use:
-
- - **Use IE11 Welcome Page.** Check this box if you want to use the default IE11 **Welcome** page.
-
- - **Use a custom Welcome Page.** Check this box if you want to use a custom **Welcome** page. If you choose this option, you need to add the URL to your custom page.
-
-3. Click **Next** to go to the [Compatibility View](compat-view-ieak11-wizard.md) page or **Back** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the First Run Wizard and Welcome Page Options page in the IEAK 11 Customization Wizard to set what your employee’s see the first time they log on to IE, based on their operating system.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 85f856a6-b707-48a9-ba99-3a6e898276a9
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard
+The **First Run Wizard and Welcome Page Options** page of the Internet Explorer Customization Wizard 11 lets you decide what your employee’s see the first time they log on to IE, based on their operating system.
+
+- **Windows 8.1 Update and newer.** No longer includes a **Welcome** page, so if you pick the **Use Internet Explorer 11 Welcome Page** or the **Use a custom Welcome page** option, IEAK creates an initial **Home** page that loads before all other **Home** pages, as the first tab. This only applies to the Internet Explorer for the desktop.
+
+- **Windows 7 SP1.** You can disable the first run page for Windows 7 SP1 and then pick a custom **Welcome** page to show instead. If you don’t customize the settings on this page, your employees will see the default IE **Welcome** page.
+
+**To use the First Run Wizard and Welcome Page Options page**
+
+1. Check the **Use IE11 First Run wizard (recommended)** box to use the default First Run wizard in IE.
+Clearing this box lets you use the IE11 **Welcome** page or your custom **Welcome** page.
+
+2. If you cleared the First Run wizard box, you can decide which **Welcome** page to use:
+
+ - **Use IE11 Welcome Page.** Check this box if you want to use the default IE11 **Welcome** page.
+
+ - **Use a custom Welcome Page.** Check this box if you want to use a custom **Welcome** page. If you choose this option, you need to add the URL to your custom page.
+
+3. Click **Next** to go to the [Compatibility View](compat-view-ieak11-wizard.md) page or **Back** to go to the [Browsing Options](browsing-options-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/guidelines-toolbar-and-favorites-list-ieak11.md b/browsers/internet-explorer/ie11-ieak/guidelines-toolbar-and-favorites-list-ieak11.md
index d811730cee..0864538448 100644
--- a/browsers/internet-explorer/ie11-ieak/guidelines-toolbar-and-favorites-list-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/guidelines-toolbar-and-favorites-list-ieak11.md
@@ -1,28 +1,29 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: Customization guidelines for your Internet Explorer toolbar button and Favorites List icons.
-author: lomayor
-ms.prod: ie11
-ms.assetid: bddc8f23-9ac1-449d-ad71-f77f43ae3b5c
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Customize the toolbar button and Favorites List icons using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Customize the Toolbar button and Favorites List icons using IEAK 11
-Use these customization guidelines to change the browser toolbar button and the **Favorites List** icons, using your own branding and graphics.
-
-**Important**
Check your license agreement to make sure this customization is available.
-
-|Graphic |Type and description |
-|-----------------------|----------------------------------------------------------------------|
-|Browser toolbar button |2 icon (.ico) files with color images for active and inactive states. |
-|Favorites List icons |1 icon (.ico) file for each new URL. |
-
-Your icons must use the .ico file extension, no other image file extension works.
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: Customization guidelines for your Internet Explorer toolbar button and Favorites List icons.
+author: dansimp
+ms.prod: ie11
+ms.assetid: bddc8f23-9ac1-449d-ad71-f77f43ae3b5c
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Customize the toolbar button and Favorites List icons using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Customize the Toolbar button and Favorites List icons using IEAK 11
+Use these customization guidelines to change the browser toolbar button and the **Favorites List** icons, using your own branding and graphics.
+
+**Important**
Check your license agreement to make sure this customization is available.
+
+|Graphic |Type and description |
+|-----------------------|----------------------------------------------------------------------|
+|Browser toolbar button |2 icon (.ico) files with color images for active and inactive states. |
+|Favorites List icons |1 icon (.ico) file for each new URL. |
+
+Your icons must use the .ico file extension, no other image file extension works.
+
diff --git a/browsers/internet-explorer/ie11-ieak/hardware-and-software-reqs-ieak11.md b/browsers/internet-explorer/ie11-ieak/hardware-and-software-reqs-ieak11.md
index 59cb1d693e..0ba0f580a8 100644
--- a/browsers/internet-explorer/ie11-ieak/hardware-and-software-reqs-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/hardware-and-software-reqs-ieak11.md
@@ -1,52 +1,53 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: List of supported hardware and software requirements for Internet Explorer 11 and the Internet Explorer Administration Kit 11.
-author: lomayor
-ms.prod: ie11
-ms.assetid: c50b86dc-7184-43d1-8daf-e750eb88dabb
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Hardware and software requirements for Internet Explorer 11 and the IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Hardware and software requirements for Internet Explorer 11 and the IEAK 11
-Before you can use the Internet Explorer Administration Kit 11 and the Internet Explorer Customization Wizard 11, you must first install Internet Explorer 11. For more info about installing IE11, see the [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md) page.
-
-## Hardware requirements
-Before you start the Internet Explorer Customization Wizard 11, you must check to see how much disk space you have on the drive you're going to use to build the IE11 install package. This drive can be on the same device as the one running the wizard; it just needs to have a secure destination folder.
-
-Before you start to create your install package, you must meet all of the [Internet Explorer 11 requirements](../ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md), plus:
-
-- Up to 100 megabytes (MB) of disk space, depending on how many components you include in the installation package.
-
-- An additional 100 MB of disk space for each custom installation package built. Different media types are considered separate packages.
-
-## Software requirements
-The device you're going to use to build your install packages must be running Internet Explorer 11, on one of these operating systems:
-
-- Windows 10
However, you must use the Windows 8.1 target platform and only the "Configuration-only package" is available.
-
-- Windows 8.1
-
-- Windows Server 2012 R2
-
-- Windows® 7 Service Pack 1 (SP1)
-
-- Windows Server 2008 R2 (SP1)
-
-**Important**
-The device you're going to use to run IEAK 11 must be running the same version of the operating system as the device where you'll build your install packages.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: List of supported hardware and software requirements for Internet Explorer 11 and the Internet Explorer Administration Kit 11.
+author: dansimp
+ms.prod: ie11
+ms.assetid: c50b86dc-7184-43d1-8daf-e750eb88dabb
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Hardware and software requirements for Internet Explorer 11 and the IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Hardware and software requirements for Internet Explorer 11 and the IEAK 11
+Before you can use the Internet Explorer Administration Kit 11 and the Internet Explorer Customization Wizard 11, you must first install Internet Explorer 11. For more info about installing IE11, see the [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md) page.
+
+## Hardware requirements
+Before you start the Internet Explorer Customization Wizard 11, you must check to see how much disk space you have on the drive you're going to use to build the IE11 install package. This drive can be on the same device as the one running the wizard; it just needs to have a secure destination folder.
+
+Before you start to create your install package, you must meet all of the [Internet Explorer 11 requirements](../ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md), plus:
+
+- Up to 100 megabytes (MB) of disk space, depending on how many components you include in the installation package.
+
+- An additional 100 MB of disk space for each custom installation package built. Different media types are considered separate packages.
+
+## Software requirements
+The device you're going to use to build your install packages must be running Internet Explorer 11, on one of these operating systems:
+
+- Windows 10
However, you must use the Windows 8.1 target platform and only the "Configuration-only package" is available.
+
+- Windows 8.1
+
+- Windows Server 2012 R2
+
+- Windows® 7 Service Pack 1 (SP1)
+
+- Windows Server 2008 R2 (SP1)
+
+**Important**
+The device you're going to use to run IEAK 11 must be running the same version of the operating system as the device where you'll build your install packages.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md
index 26d3c2806d..7d50512355 100644
--- a/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/hidecustom-ins-file-setting.md
@@ -1,32 +1,33 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the \[HideCustom\] .INS file setting to decide whether to hide the GUID for each custom component.
-author: lomayor
-ms.prod: ie11
-ms.assetid: e673f7b1-c3aa-4072-92b0-20c6dc3d9277
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the HideCustom .INS file to hide the GUID for each custom component (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the HideCustom .INS file to hide the GUID for each custom component
-Info about whether to hide the globally unique identifier (GUID) for each of your custom components.
-
-|Name |Value |Description |
-|------|-------------------------------------------------------------------------------------|-----------------------------------------------|
-|GUID |
- **0.** Component isn't hidden.
- **1.** Component is hidden.
|Determines whether this is a hidden component. |
-
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the \[HideCustom\] .INS file setting to decide whether to hide the GUID for each custom component.
+author: dansimp
+ms.prod: ie11
+ms.assetid: e673f7b1-c3aa-4072-92b0-20c6dc3d9277
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the HideCustom .INS file to hide the GUID for each custom component (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the HideCustom .INS file to hide the GUID for each custom component
+Info about whether to hide the globally unique identifier (GUID) for each of your custom components.
+
+|Name |Value |Description |
+|------|-------------------------------------------------------------------------------------|-----------------------------------------------|
+|GUID |- **0.** Component isn't hidden.
- **1.** Component is hidden.
|Determines whether this is a hidden component. |
+
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/ie-setup-command-line-options-and-return-codes.md b/browsers/internet-explorer/ie11-ieak/ie-setup-command-line-options-and-return-codes.md
index 66973a3a25..51dc959759 100644
--- a/browsers/internet-explorer/ie11-ieak/ie-setup-command-line-options-and-return-codes.md
+++ b/browsers/internet-explorer/ie11-ieak/ie-setup-command-line-options-and-return-codes.md
@@ -1,68 +1,69 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Reference about the command-line options and return codes for Internet Explorer Setup.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 40c23024-cb5d-4902-ad1b-6e8a189a699f
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Internet Explorer Setup command-line options and return codes (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Internet Explorer Setup command-line options and return codes
-You can use command-line options along with a tool like IExpress to package your custom version of Internet Explorer and to perform a batch installation across your organization.
-
-## IE Setup command-line options
-These command-line options work with IE Setup:
-
-`[/help] [/passive | /quiet] [/update-no] [/no-default] [/nobackup] [/ieak-full: | /ieak-branding: ] [/norestart | /forcerestart] [/log: `
-
-|Parameter (Setup modes) |Description |
-|------------------------|-------------------------------------------------------------------------------------------------|
-|`/passive` |Runs the install without requiring input from the employee, showing progress and error messages. |
-|`/quiet` |Identical to `/passive`, but doesn't show any of the progress or error messages to the employee. |
-
-
-|Parameter (Setup options) |Description |
-|--------------------------|-------------------------------------------------------------------------------------------------|
-|`/update-no` |Doesn't look for Internet Explorer updates. |
-|`/no-default` |Doesn't make Internet Explorer the default browser. |
-|`/no-backup` |Doesn't back up the files necessary to uninstall IE. |
-|`/ieak-full` |Reserved for use by the IEAK 11. |
-|`/ieak-branding` |Reserved for use by the IEAK 11. |
-
-
-|Parameter (Restart options) |Description |
-|----------------------------|--------------------------------------------|
-|`/norestart` |Doesn't restart after installation. |
-|`/forcerestart` |Restarts after installation. |
-
-
-|Parameter (miscellaneous options) |Description |
-|----------------------------------|--------------------------------------------|
-|`/help` |Provides help info. Can't be used with any other option. |
-|`/log ` |Creates a log file about the installation process, at the specified location. |
-
-
-## Windows Setup return and status codes
-Windows Setup needs to tell you whether IE successfully installed. However, because IE11wzd.exe is packaged inside your IE11setup.exe file, the return codes can’t be sent directly back to you. Instead, Setup needs to return the information (both success and failure) to the `HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\InstallInfo` registry branch.
-
-|Subkey |Data type |Value |
-|---------|----------|---------------------------------------|
-|Complete |String |0 = Success |
-|Complete |String |0x80100003 = Files are missing for the requested installation. |
-|Complete |String |0x80100001 = Setup partially succeeded. One or more components weren’t downloaded or installed. Check the **FailedComponents** subkey for the list of components. |
-|Complete |String |0x80100002 = Setup partially succeeded, but the employee cancelled Setup. One or more components weren’t downloaded or installed. Check the **FailedComponents** subkey for the list of components. |
-|FailedComponents |MultiSZ |``Null``Component1 |
-|InstallStatus |Binary |0 = Install completed successfully. |
-|InstallStatus |Binary |1 = Suspend Setup.
The employee cancelled Setup and is then asked to confirm:- 2 = No, don’t cancel. Resume Setup.
- 3 = Yes, cancel confirmed. Quit Setup as soon as possible.
**Important**
If the cancellation is confirmed, Setup will quit as soon as all of the in-progress tasks are done, like copying or extracting files. |
-
-## Related topics
-- [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md)
-- [Express Wizard command-line options](iexpress-command-line-options.md)
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Reference about the command-line options and return codes for Internet Explorer Setup.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 40c23024-cb5d-4902-ad1b-6e8a189a699f
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Internet Explorer Setup command-line options and return codes (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Internet Explorer Setup command-line options and return codes
+You can use command-line options along with a tool like IExpress to package your custom version of Internet Explorer and to perform a batch installation across your organization.
+
+## IE Setup command-line options
+These command-line options work with IE Setup:
+
+`[/help] [/passive | /quiet] [/update-no] [/no-default] [/nobackup] [/ieak-full: | /ieak-branding: ] [/norestart | /forcerestart] [/log: `
+
+|Parameter (Setup modes) |Description |
+|------------------------|-------------------------------------------------------------------------------------------------|
+|`/passive` |Runs the install without requiring input from the employee, showing progress and error messages. |
+|`/quiet` |Identical to `/passive`, but doesn't show any of the progress or error messages to the employee. |
+
+
+|Parameter (Setup options) |Description |
+|--------------------------|-------------------------------------------------------------------------------------------------|
+|`/update-no` |Doesn't look for Internet Explorer updates. |
+|`/no-default` |Doesn't make Internet Explorer the default browser. |
+|`/no-backup` |Doesn't back up the files necessary to uninstall IE. |
+|`/ieak-full` |Reserved for use by the IEAK 11. |
+|`/ieak-branding` |Reserved for use by the IEAK 11. |
+
+
+|Parameter (Restart options) |Description |
+|----------------------------|--------------------------------------------|
+|`/norestart` |Doesn't restart after installation. |
+|`/forcerestart` |Restarts after installation. |
+
+
+|Parameter (miscellaneous options) |Description |
+|----------------------------------|--------------------------------------------|
+|`/help` |Provides help info. Can't be used with any other option. |
+|`/log ` |Creates a log file about the installation process, at the specified location. |
+
+
+## Windows Setup return and status codes
+Windows Setup needs to tell you whether IE successfully installed. However, because IE11wzd.exe is packaged inside your IE11setup.exe file, the return codes can’t be sent directly back to you. Instead, Setup needs to return the information (both success and failure) to the `HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\InstallInfo` registry branch.
+
+|Subkey |Data type |Value |
+|---------|----------|---------------------------------------|
+|Complete |String |0 = Success |
+|Complete |String |0x80100003 = Files are missing for the requested installation. |
+|Complete |String |0x80100001 = Setup partially succeeded. One or more components weren’t downloaded or installed. Check the **FailedComponents** subkey for the list of components. |
+|Complete |String |0x80100002 = Setup partially succeeded, but the employee cancelled Setup. One or more components weren’t downloaded or installed. Check the **FailedComponents** subkey for the list of components. |
+|FailedComponents |MultiSZ |``Null``Component1 |
+|InstallStatus |Binary |0 = Install completed successfully. |
+|InstallStatus |Binary |1 = Suspend Setup.
The employee cancelled Setup and is then asked to confirm:- 2 = No, don’t cancel. Resume Setup.
- 3 = Yes, cancel confirmed. Quit Setup as soon as possible.
**Important**
If the cancellation is confirmed, Setup will quit as soon as all of the in-progress tasks are done, like copying or extracting files. |
+
+## Related topics
+- [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md)
+- [Express Wizard command-line options](iexpress-command-line-options.md)
+
diff --git a/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md b/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md
index 956404de2f..b8c3d25c24 100644
--- a/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md
+++ b/browsers/internet-explorer/ie11-ieak/ieak-information-and-downloads.md
@@ -1,51 +1,52 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-ms.pagetype: security
-description: The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. Use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after Internet Explorer deployment.
-author: lomayor
-ms.author: lomayor
-ms.manager: dougkim
-ms.prod: ie11
-ms.assetid:
-ms.reviewer:
-audience: itpro
manager: dansimp
-title: Internet Explorer Administration Kit (IEAK) information and downloads
-ms.sitesec: library
-ms.date: 05/10/2018
----
-
-# Internet Explorer Administration Kit (IEAK) information and downloads
-
->Applies to: Windows 10
-
-The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. You can use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after Internet Explorer deployment. To find more information on the IEAK, see [What IEAK can do for you](what-ieak-can-do-for-you.md).
-
-
-## Internet Explorer Administration Kit 11 (IEAK 11)
-
-[IEAK 11 documentation](index.md)
-
-[IEAK 11 licensing guidelines](licensing-version-and-features-ieak11.md)
-
-[IEAK 11 - Frequently Asked Questions](../ie11-faq/faq-ieak11.md)
-
-[Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](before-you-create-custom-pkgs-ieak11.md)
-
-## Download IEAK
-
-To download, choose to **Open** the download or **Save** it to your hard drive first.
-
-
-| | | |
-|---------|---------|---------|
-|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) |
-|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) |
-|[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) |[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) |
-|[Chinese (Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) |[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) |
-|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) |
-|[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) |[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) |
-|[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) |[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) |
-|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) |
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+ms.pagetype: security
+description: The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. Use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after Internet Explorer deployment.
+author: dansimp
+ms.author: dansimp
+ms.manager: dougkim
+ms.prod: ie11
+ms.assetid:
+ms.reviewer:
+audience: itpro
+manager: dansimp
+title: Internet Explorer Administration Kit (IEAK) information and downloads
+ms.sitesec: library
+ms.date: 05/10/2018
+---
+
+# Internet Explorer Administration Kit (IEAK) information and downloads
+
+>Applies to: Windows 10
+
+The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment, and management of customized Internet Explorer packages. You can use the IEAK to configure the out-of-box Internet Explorer experience or to manage user settings after Internet Explorer deployment. To find more information on the IEAK, see [What IEAK can do for you](what-ieak-can-do-for-you.md).
+
+
+## Internet Explorer Administration Kit 11 (IEAK 11)
+
+[IEAK 11 documentation](index.md)
+
+[IEAK 11 licensing guidelines](licensing-version-and-features-ieak11.md)
+
+[IEAK 11 - Frequently Asked Questions](../ie11-faq/faq-ieak11.md)
+
+[Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide](before-you-create-custom-pkgs-ieak11.md)
+
+## Download IEAK
+
+To download, choose to **Open** the download or **Save** it to your hard drive first.
+
+
+| | | |
+|---------|---------|---------|
+|[English](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/en-us/ieak.msi) |[French](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fr-fr/ieak.msi) |[Norwegian (Bokmål)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nb-no/ieak.msi) |
+|[Arabic](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ar-sa/ieak.msi) |[German](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/de-de/ieak.msi) |[Polish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pl-pl/ieak.msi) |
+|[Chinese (Simplified)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-cn/ieak.msi) |[Greek](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/el-gr/ieak.msi) |[Portuguese (Brazil)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-br/ieak.msi) |
+|[Chinese (Traditional)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/zh-tw/ieak.msi) |[Hebrew](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/he-il/ieak.msi) |[Portuguese (Portugal)](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/pt-pt/ieak.msi) |
+|[Czech](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/cs-cz/ieak.msi) |[Hungarian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/hu-hu/ieak.msi) |[Russian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ru-ru/ieak.msi) |
+|[Danish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/da-dk/ieak.msi) |[Italian](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/it-it/ieak.msi) |[Spanish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/es-es/ieak.msi) |
+|[Dutch](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/nl-nl/ieak.msi) |[Japanese](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ja-jp/ieak.msi) |[Swedish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/sv-se/ieak.msi) |
+|[Finnish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/fi-fi/ieak.msi) |[Korean](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/ko-kr/ieak.msi) |[Turkish](https://download.microsoft.com/download/A/B/1/AB1954BF-8B20-4F01-808A-FE5EE5269F08/MSI/tr-tr/ieak.msi) |
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/ieak11-wizard-custom-options.md b/browsers/internet-explorer/ie11-ieak/ieak11-wizard-custom-options.md
index 8890f6d65b..f27ec8b5b9 100644
--- a/browsers/internet-explorer/ie11-ieak/ieak11-wizard-custom-options.md
+++ b/browsers/internet-explorer/ie11-ieak/ieak11-wizard-custom-options.md
@@ -1,44 +1,45 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: Review the options available to help you customize your browser install packages for deployment to your employee's devices.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 4b804da3-c3ac-4b60-ab1c-99536ff6e31b
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options
-Use the Internet Explorer Administration Kit 11 (IEAK 11) and the Internet Explorer Customization Wizard 11 to customize your browser install packages for deployment to your employee's devices.
-
-## IE Customization Wizard 11 options
-IEAK 11 lets you customize a lot of Internet Explorer 11, including the IE and Internet Explorer for the desktop experiences. For more info about the experiences, see [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md). For info about which pages appear in the **Internal** or **External** version of IE Customization Wizard 11, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md).
-
-|Internet Explorer Customization Wizard 11 page |Browser experience |Description |
-|-----------------------------------------------|------------------------------------|-----------------------------|
-|[Custom Components](custom-components-ieak11-wizard.md) |Internet Explorer for the desktop |Add up to 10 additional components that your employees can install at the same time they install IE. |
-|[Internal install](internal-install-ieak11-wizard.md) |Internet Explorer for the desktop |Choose to set IE11 as the default browser.
**Note**
This only applies to IE11 on Windows 7 SP1 |
-|[User Experience](user-experience-ieak11-wizard.md) |Internet Explorer for the desktop |Control the installation and restart experience for your employees.
This only applies to IE11 on Windows 7 SP1 |
-|[Browser user interface](browser-ui-ieak11-wizard.md) |Internet Explorer for the desktop |Customize your title bars and toolbar buttons. |
-|[Search Providers](search-providers-ieak11-wizard.md) |Both |Import and add Search providers. |
-|[Important URLs – Home page and Support](important-urls-home-page-and-support-ieak11-wizard.md) |The **Support** page is supported by both experiences. The **Home** page is only supported on Internet Explorer for the desktop. |Add URLs for your **Home** and **Support** pages. |
-|[Accelerators](accelerators-ieak11-wizard.md) |Internet Explorer for the desktop |Import and add default accelerators. |
-|[Favorites, Favorites Bar and Feeds](favorites-favoritesbar-and-feeds-ieak11-wizard.md) |Internet Explorer for the desktop |Import and add items to the **Favorites** folder, the **Favorites Bar**, and the **Feeds** folder.
**Note**
You can turn off the entire **Suggested Sites** feature from this page. |
-|[Browsing Options](browsing-options-ieak11-wizard.md) |Doesn't apply. The choices that you make on this page affect only the items shown on the **Favorites, Favorites Bar, and Feeds** page. |Choose how to manage items in the **Favorites** folder, the **Favorites Bar**, and the **Feeds** folder. You can also turn off the Microsoft-default Favorites, Web slices, links, feeds, and accelerators. |
-|[First Run Wizard and Welcome Page Options](first-run-and-welcome-page-ieak11-wizard.md) |Internet Explorer for the desktop |Decide if the First Run wizard appears the first time an employee starts IE. You can also use the IE11 **Welcome** page, or link to a custom **Welcome** page. |
-|[Compatibility View](compat-view-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. For more information, see [Missing the Compatibility View Button](../ie11-deploy-guide/missing-the-compatibility-view-button.md). |
-|[Connection Manager](connection-mgr-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. |
-|[Connection Settings](connection-settings-ieak11-wizard.md) |Both |Choose whether to customize your connection settings. You can also choose to delete old dial-up connection settings. |
-|[Automatic Configuration](auto-config-ieak11-wizard.md) |Both |Choose whether to automatically detect configuration settings and whether to turn on and customize automatic configuration. |
-|[Proxy Settings](proxy-settings-ieak11-wizard.md) |Both |Turn on and set up your proxy servers.
**Note**
We don't support Gopher Server anymore. |
-|[Add a Root Certification](add-root-certificate-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. |
-|[Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) |The **Security Zones and Privacy** settings are supported by both experiences. The **Content Ratings** are only supported on Internet Explorer for the desktop. |Decide if you want to:
- Customize your security zones and privacy settings
-OR-
- Import your current security zones and privacy settings
-AND-
- Customize your content ratings settings
-OR-
- Import your current content ratings settings
|
-|[Programs](programs-ieak11-wizard.md) |Internet Explorer for the desktop |Decide your default programs or import your current settings. |
-|[Additional Settings](additional-settings-ieak11-wizard.md) |Both |Decide how to set up multiple IE settings that appear in the **Internet Options** box. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: Review the options available to help you customize your browser install packages for deployment to your employee's devices.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 4b804da3-c3ac-4b60-ab1c-99536ff6e31b
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options
+Use the Internet Explorer Administration Kit 11 (IEAK 11) and the Internet Explorer Customization Wizard 11 to customize your browser install packages for deployment to your employee's devices.
+
+## IE Customization Wizard 11 options
+IEAK 11 lets you customize a lot of Internet Explorer 11, including the IE and Internet Explorer for the desktop experiences. For more info about the experiences, see [Internet Explorer 11 (IE11) - Deployment Guide for IT Pros](../ie11-deploy-guide/index.md). For info about which pages appear in the **Internal** or **External** version of IE Customization Wizard 11, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md).
+
+|Internet Explorer Customization Wizard 11 page |Browser experience |Description |
+|-----------------------------------------------|------------------------------------|-----------------------------|
+|[Custom Components](custom-components-ieak11-wizard.md) |Internet Explorer for the desktop |Add up to 10 additional components that your employees can install at the same time they install IE. |
+|[Internal install](internal-install-ieak11-wizard.md) |Internet Explorer for the desktop |Choose to set IE11 as the default browser.**Note**
This only applies to IE11 on Windows 7 SP1 |
+|[User Experience](user-experience-ieak11-wizard.md) |Internet Explorer for the desktop |Control the installation and restart experience for your employees.
This only applies to IE11 on Windows 7 SP1 |
+|[Browser user interface](browser-ui-ieak11-wizard.md) |Internet Explorer for the desktop |Customize your title bars and toolbar buttons. |
+|[Search Providers](search-providers-ieak11-wizard.md) |Both |Import and add Search providers. |
+|[Important URLs – Home page and Support](important-urls-home-page-and-support-ieak11-wizard.md) |The **Support** page is supported by both experiences. The **Home** page is only supported on Internet Explorer for the desktop. |Add URLs for your **Home** and **Support** pages. |
+|[Accelerators](accelerators-ieak11-wizard.md) |Internet Explorer for the desktop |Import and add default accelerators. |
+|[Favorites, Favorites Bar and Feeds](favorites-favoritesbar-and-feeds-ieak11-wizard.md) |Internet Explorer for the desktop |Import and add items to the **Favorites** folder, the **Favorites Bar**, and the **Feeds** folder.
**Note**
You can turn off the entire **Suggested Sites** feature from this page. |
+|[Browsing Options](browsing-options-ieak11-wizard.md) |Doesn't apply. The choices that you make on this page affect only the items shown on the **Favorites, Favorites Bar, and Feeds** page. |Choose how to manage items in the **Favorites** folder, the **Favorites Bar**, and the **Feeds** folder. You can also turn off the Microsoft-default Favorites, Web slices, links, feeds, and accelerators. |
+|[First Run Wizard and Welcome Page Options](first-run-and-welcome-page-ieak11-wizard.md) |Internet Explorer for the desktop |Decide if the First Run wizard appears the first time an employee starts IE. You can also use the IE11 **Welcome** page, or link to a custom **Welcome** page. |
+|[Compatibility View](compat-view-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. For more information, see [Missing the Compatibility View Button](../ie11-deploy-guide/missing-the-compatibility-view-button.md). |
+|[Connection Manager](connection-mgr-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. |
+|[Connection Settings](connection-settings-ieak11-wizard.md) |Both |Choose whether to customize your connection settings. You can also choose to delete old dial-up connection settings. |
+|[Automatic Configuration](auto-config-ieak11-wizard.md) |Both |Choose whether to automatically detect configuration settings and whether to turn on and customize automatic configuration. |
+|[Proxy Settings](proxy-settings-ieak11-wizard.md) |Both |Turn on and set up your proxy servers.
**Note**
We don't support Gopher Server anymore. |
+|[Add a Root Certification](add-root-certificate-ieak11-wizard.md) |No longer supported |This functionality has been removed for IE11. |
+|[Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) |The **Security Zones and Privacy** settings are supported by both experiences. The **Content Ratings** are only supported on Internet Explorer for the desktop. |Decide if you want to:
- Customize your security zones and privacy settings
-OR-
- Import your current security zones and privacy settings
-AND-
- Customize your content ratings settings
-OR-
- Import your current content ratings settings
|
+|[Programs](programs-ieak11-wizard.md) |Internet Explorer for the desktop |Decide your default programs or import your current settings. |
+|[Additional Settings](additional-settings-ieak11-wizard.md) |Both |Decide how to set up multiple IE settings that appear in the **Internet Options** box. |
+
diff --git a/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md b/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md
index d36ca26c63..88e151583a 100644
--- a/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md
+++ b/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md
@@ -1,43 +1,44 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Reference about the command-line options for the IExpress Wizard.
-author: lomayor
-ms.prod: ie11
-ms.assetid: aa16d738-1067-403c-88b3-bada12cf9752
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: IExpress Wizard command-line options (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-**Applies to:**
-- Windows Server 2008 R2 with SP1
-
-# IExpress Wizard command-line options
-Use command-line options with the IExpress Wizard (IExpress.exe) to control your Internet Explorer custom browser package extraction process.
-
-These command-line options work with IExpress:
-`Ie11setup /c:"ie11wzd "`
-
-|Parameter |Action |
-|----------|--------------------------------------------------------------------------------------------|
-|`/q` |Specifies quiet mode, hiding all of the prompts, while files are being extracted. This option won’t suppress prompts during Setup. |
-|`/q:u` |Specifies user-quiet mode, letting some of the progress and error messages appear to the employee. |
-|`/q:a` |Specifies administrator-quiet mode, hiding all of the progress and error messages from the employee. |
-|`/t:` |Specifies where to store your extracted files. |
-|`/c:` |Extracts all of the files without installing them. If `t:/` isn’t used, you’ll be prompted for a storage folder. |
-|`/c:` |Specifies the UNC path and name of the Setup .inf or .exe file. |
-|`/r:n` |Never restarts the computer after installation. |
-|`/r:a` |Always restarts the computer after installation. |
-|`/r:s` |Restarts the computer after installation without prompting the employee. |
-
-For more information, see [Command-line switches for IExpress software update packages](https://go.microsoft.com/fwlink/p/?LinkId=317973).
-
-## Related topics
-- [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md)
-- [Internet Explorer Setup command-line options and return codes](ie-setup-command-line-options-and-return-codes.md)
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Reference about the command-line options for the IExpress Wizard.
+author: dansimp
+ms.prod: ie11
+ms.assetid: aa16d738-1067-403c-88b3-bada12cf9752
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: IExpress Wizard command-line options (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+**Applies to:**
+- Windows Server 2008 R2 with SP1
+
+# IExpress Wizard command-line options
+Use command-line options with the IExpress Wizard (IExpress.exe) to control your Internet Explorer custom browser package extraction process.
+
+These command-line options work with IExpress:
+`Ie11setup /c:"ie11wzd "`
+
+|Parameter |Action |
+|----------|--------------------------------------------------------------------------------------------|
+|`/q` |Specifies quiet mode, hiding all of the prompts, while files are being extracted. This option won’t suppress prompts during Setup. |
+|`/q:u` |Specifies user-quiet mode, letting some of the progress and error messages appear to the employee. |
+|`/q:a` |Specifies administrator-quiet mode, hiding all of the progress and error messages from the employee. |
+|`/t:` |Specifies where to store your extracted files. |
+|`/c:` |Extracts all of the files without installing them. If `t:/` isn’t used, you’ll be prompted for a storage folder. |
+|`/c:` |Specifies the UNC path and name of the Setup .inf or .exe file. |
+|`/r:n` |Never restarts the computer after installation. |
+|`/r:a` |Always restarts the computer after installation. |
+|`/r:s` |Restarts the computer after installation without prompting the employee. |
+
+For more information, see [Command-line switches for IExpress software update packages](https://go.microsoft.com/fwlink/p/?LinkId=317973).
+
+## Related topics
+- [IExpress Wizard for Windows Server 2008 R2 with SP1](iexpress-wizard-for-win-server.md)
+- [Internet Explorer Setup command-line options and return codes](ie-setup-command-line-options-and-return-codes.md)
+
diff --git a/browsers/internet-explorer/ie11-ieak/iexpress-wizard-for-win-server.md b/browsers/internet-explorer/ie11-ieak/iexpress-wizard-for-win-server.md
index ced5d1a708..35dc9f9cc5 100644
--- a/browsers/internet-explorer/ie11-ieak/iexpress-wizard-for-win-server.md
+++ b/browsers/internet-explorer/ie11-ieak/iexpress-wizard-for-win-server.md
@@ -1,72 +1,73 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the IExpress Wizard on Windows Server 2008 R2 with SP1 to create self-extracting files to run your custom Internet Explorer Setup program.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 5100886d-ec88-4c1c-8cd7-be00da874c57
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: IExpress Wizard for Windows Server 2008 R2 with SP1 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# IExpress Wizard for Windows Server 2008 R2 with SP1
-Use the IExpress Wizard and its associated command-line options to create self-extracting files that automatically run your custom Internet Explorer Setup (.inf or .exe file) program that’s contained inside.
-
-## IExpress Wizard location
-The IExpress Wizard (Iexpress.exe) is included as part of Windows Server 2008 R2 with Service Pack 1 (SP1), in the `:\Windows\System32` folder. The wizard uses a self-extraction directive (.sed) file to store your package’s information. When you run the wizard, you have the option to start with an existing .sed file or to create a new one.
-
-## IExpress Wizard features
-The IExpress Wizard:
-
-- Performs silent, unattended installations of your custom IE packages.
-
-- Supports upgrading IE without removing previous installations.
-
-- Supports repeated updating or performing clean installations of the same IE build.
-
-## IExpress Wizard settings
-The IExpress Wizard lets you:
-
-- Decide whether the self-installing package is for administrators or for general employees.
-
-- Set multiple ways to run the installation command, such as in normal or silent mode.
-
-- Determine whether the IExpress dynamic-link libraries (.dll files) are updated on an employee’s computer.
-
-- Determine the compatibility of the installation package, based on the operating system version range, the browser version range, or any application version range.
-
-- Update and add files to the IExpress package, using the UPDFILE tool, without having to rebuild the package.
-
-- Replace Runonce with RunOnceEx (if the newer version of Iernonce.dll exists); giving you control over the job run order and status display.
-
-- Let corporate administrators set up support for roaming employees.
-
-- Let Internet Content Providers (ICPs) and Internet Service Providers (ISPs) generate packages for preconfigured desktops with custom, current content.
-
-- Save disk space by cleaning up the hard drive when running in Setup, uninstallation, and maintenance modes.
-
-- Provide support for multiple download sites.
-
-- Provide support for internal and external development, customization, expandability, and enhanced debugging.
-
-- Provide support for the extended character set, beyond single-byte characters (SBCS).
-
-- Provide support for using the .inf file format to download Internet components. For more information, see [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md).
-
-## Related topics
-- [IExpress command-line options](iexpress-command-line-options.md)
-- [Internet Explorer Setup command-line options and return codes](ie-setup-command-line-options-and-return-codes.md)
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the IExpress Wizard on Windows Server 2008 R2 with SP1 to create self-extracting files to run your custom Internet Explorer Setup program.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 5100886d-ec88-4c1c-8cd7-be00da874c57
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: IExpress Wizard for Windows Server 2008 R2 with SP1 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# IExpress Wizard for Windows Server 2008 R2 with SP1
+Use the IExpress Wizard and its associated command-line options to create self-extracting files that automatically run your custom Internet Explorer Setup (.inf or .exe file) program that’s contained inside.
+
+## IExpress Wizard location
+The IExpress Wizard (Iexpress.exe) is included as part of Windows Server 2008 R2 with Service Pack 1 (SP1), in the `:\Windows\System32` folder. The wizard uses a self-extraction directive (.sed) file to store your package’s information. When you run the wizard, you have the option to start with an existing .sed file or to create a new one.
+
+## IExpress Wizard features
+The IExpress Wizard:
+
+- Performs silent, unattended installations of your custom IE packages.
+
+- Supports upgrading IE without removing previous installations.
+
+- Supports repeated updating or performing clean installations of the same IE build.
+
+## IExpress Wizard settings
+The IExpress Wizard lets you:
+
+- Decide whether the self-installing package is for administrators or for general employees.
+
+- Set multiple ways to run the installation command, such as in normal or silent mode.
+
+- Determine whether the IExpress dynamic-link libraries (.dll files) are updated on an employee’s computer.
+
+- Determine the compatibility of the installation package, based on the operating system version range, the browser version range, or any application version range.
+
+- Update and add files to the IExpress package, using the UPDFILE tool, without having to rebuild the package.
+
+- Replace Runonce with RunOnceEx (if the newer version of Iernonce.dll exists); giving you control over the job run order and status display.
+
+- Let corporate administrators set up support for roaming employees.
+
+- Let Internet Content Providers (ICPs) and Internet Service Providers (ISPs) generate packages for preconfigured desktops with custom, current content.
+
+- Save disk space by cleaning up the hard drive when running in Setup, uninstallation, and maintenance modes.
+
+- Provide support for multiple download sites.
+
+- Provide support for internal and external development, customization, expandability, and enhanced debugging.
+
+- Provide support for the extended character set, beyond single-byte characters (SBCS).
+
+- Provide support for using the .inf file format to download Internet components. For more information, see [Use the uninstallation .INF files to uninstall custom components](create-uninstall-inf-files-for-custom-components.md).
+
+## Related topics
+- [IExpress command-line options](iexpress-command-line-options.md)
+- [Internet Explorer Setup command-line options and return codes](ie-setup-command-line-options-and-return-codes.md)
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md
index 6e1ac8e67a..022767b179 100644
--- a/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md
@@ -1,39 +1,40 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Important URLs - Home Page and Support page in the IEAK 11 Customization Wizard to choose one or more **Home** pages and an online support page for your customized version of IE.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 19e34879-ba9d-41bf-806a-3b9b9b752fc1
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard
-The **Important URLS – Home Page and Support** page of the Internet Explorer Customization Wizard 11 lets you choose one or more **Home** pages and an online support page for your customized version of IE.
-
-**To use the Important URLS – Home Page and Support page**
-
-1. In the **Add a homepage URL** box, type the URL to the page your employees go to when they click the **Home** button, and then click **Add**.
-If you add multiple **Home** pages, each page appears on a separate tab in the browser. If you don’t add a custom **Home** page, IE uses https://www.msn.com by default. If you want to delete an existing page, click the URL and then click **Remove**.
-
-2. Check the **Retain previous Home Page (Upgrade)** box if you have employees with previous versions of IE, who need to keep their **Home** page settings when the browser is updated.
-
-3. Check the **Online support page URL** box to type in the URL to your own support page. Customizing the support page is only supported in Internet Explorer for the desktop.
-
-4. Click **Next** to go to the [Accelerators](accelerators-ieak11-wizard.md) page or **Back** to go to the [Search Providers](search-providers-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Important URLs - Home Page and Support page in the IEAK 11 Customization Wizard to choose one or more **Home** pages and an online support page for your customized version of IE.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 19e34879-ba9d-41bf-806a-3b9b9b752fc1
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard
+The **Important URLS – Home Page and Support** page of the Internet Explorer Customization Wizard 11 lets you choose one or more **Home** pages and an online support page for your customized version of IE.
+
+**To use the Important URLS – Home Page and Support page**
+
+1. In the **Add a homepage URL** box, type the URL to the page your employees go to when they click the **Home** button, and then click **Add**.
+If you add multiple **Home** pages, each page appears on a separate tab in the browser. If you don’t add a custom **Home** page, IE uses https://www.msn.com by default. If you want to delete an existing page, click the URL and then click **Remove**.
+
+2. Check the **Retain previous Home Page (Upgrade)** box if you have employees with previous versions of IE, who need to keep their **Home** page settings when the browser is updated.
+
+3. Check the **Online support page URL** box to type in the URL to your own support page. Customizing the support page is only supported in Internet Explorer for the desktop.
+
+4. Click **Next** to go to the [Accelerators](accelerators-ieak11-wizard.md) page or **Back** to go to the [Search Providers](search-providers-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/index.md b/browsers/internet-explorer/ie11-ieak/index.md
index 6dc2619b8b..3187f8b507 100644
--- a/browsers/internet-explorer/ie11-ieak/index.md
+++ b/browsers/internet-explorer/ie11-ieak/index.md
@@ -1,8 +1,8 @@
---
ms.mktglfcycl: plan
description: IEAK 11 - Internet Explorer Administration Kit 11 Users Guide
-author: lomayor
-ms.author: lomayor
+author: dansimp
+ms.author: dansimp
ms.prod: ie11
ms.assetid: 847bd7b4-d5dd-4e10-87b5-4d7d3a99bbac
title: Internet Explorer Administration Kit 11 (IEAK 11) - Administrator's Guide (Internet Explorer Administration Kit 11 for IT Pros)
diff --git a/browsers/internet-explorer/ie11-ieak/internal-install-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/internal-install-ieak11-wizard.md
index 59969fe56f..15db2bc20f 100644
--- a/browsers/internet-explorer/ie11-ieak/internal-install-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/internal-install-ieak11-wizard.md
@@ -1,39 +1,40 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Internal Install page in the IEAK 11 Customization Wizard to customize Setup for the default browser and the latest browser updates.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 33d078e3-75b8-455b-9126-f0d272ed676f
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Internal Install page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Internal Install page in the IEAK 11 Wizard
-The **Internal Install** page of the Internet Explorer Customization Wizard 11 lets you customize Setup for the default browser and the latest browser updates, based on your company’s guidelines.
-
-**Note**
The customizations made on this page only apply to Internet Explorer for the desktop on Windows 7.
-
-**To use the Internal Install page**
-
-1. Pick either:
-
- - **Allow user to choose.** Lets your employees pick their own default browser.
-OR-
-
- - **Do not set IE as the default browser.** Won’t set IE as the default browser. However, your employees can still make IE the default.
-
-2. Click **Next** to go to the [User Experience](user-experience-ieak11-wizard.md) page or **Back** to go to the [Custom Components](custom-components-ieak11-wizard.md).
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Internal Install page in the IEAK 11 Customization Wizard to customize Setup for the default browser and the latest browser updates.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 33d078e3-75b8-455b-9126-f0d272ed676f
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Internal Install page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Internal Install page in the IEAK 11 Wizard
+The **Internal Install** page of the Internet Explorer Customization Wizard 11 lets you customize Setup for the default browser and the latest browser updates, based on your company’s guidelines.
+
+**Note**
The customizations made on this page only apply to Internet Explorer for the desktop on Windows 7.
+
+**To use the Internal Install page**
+
+1. Pick either:
+
+ - **Allow user to choose.** Lets your employees pick their own default browser.
-OR-
+
+ - **Do not set IE as the default browser.** Won’t set IE as the default browser. However, your employees can still make IE the default.
+
+2. Click **Next** to go to the [User Experience](user-experience-ieak11-wizard.md) page or **Back** to go to the [Custom Components](custom-components-ieak11-wizard.md).
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/isp-security-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/isp-security-ins-file-setting.md
index 58fd70a9aa..b625916fd1 100644
--- a/browsers/internet-explorer/ie11-ieak/isp-security-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/isp-security-ins-file-setting.md
@@ -1,23 +1,24 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the \[ISP_Security\] .INS file setting to add the root certificate for your custom Internet Explorer package.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 4eca2de5-7071-45a2-9c99-75115be00d06
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the ISP_Security .INS file to add your root certificate (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the ISP_Security .INS file to add your root certificate
-Info about where you store the root certificate you’re adding to your custom package.
-
-|Name |Value |Description |
-|---------------|-----------------------|------------------------------------------------------------------------------------------|
-|RootCertPath |`` |Location and name of the root certificate you want to add to your custom install package. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the \[ISP_Security\] .INS file setting to add the root certificate for your custom Internet Explorer package.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 4eca2de5-7071-45a2-9c99-75115be00d06
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the ISP_Security .INS file to add your root certificate (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the ISP_Security .INS file to add your root certificate
+Info about where you store the root certificate you’re adding to your custom package.
+
+|Name |Value |Description |
+|---------------|-----------------------|------------------------------------------------------------------------------------------|
+|RootCertPath |`` |Location and name of the root certificate you want to add to your custom install package. |
+
diff --git a/browsers/internet-explorer/ie11-ieak/language-selection-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/language-selection-ieak11-wizard.md
index a266fcba98..b2f66781b7 100644
--- a/browsers/internet-explorer/ie11-ieak/language-selection-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/language-selection-ieak11-wizard.md
@@ -1,37 +1,38 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Language Selection page in the IEAK 11 Customization Wizard to choose the language for your IEAK 11 custom package.
-author: lomayor
-ms.prod: ie11
-ms.assetid: f9d4ab57-9b1d-4cbc-9398-63f4938df1f6
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Language Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Language Selection page in the IEAK 11 Wizard
-The **Language Selection** page of the Internet Explorer Customization Wizard 11 lets you choose the language for your Internet Explorer Administration Kit 11 (IEAK 11) custom package. You can create custom Internet Explorer 11 packages in any of the languages your operating system version is available in.
-
-**Important**
Make sure that the language of your IEAK 11 installation matches the language of your custom IE11 package. If the languages don’t match, IEAK 11 won’t work properly.
-
-**To use the Language Selection page**
-
-1. Pick the language you want your custom IE11 installation package to use.
-You can support as many languages as you want, but each localized version must be in its own install package.
-**Note**
To keep your settings across multiple versions of the package, you can pick the same destination folder for all versions. The different language versions are then saved in separate subfolders within that destination folder. Like, for an English version, `C:\Cie\Build1\Flat\Win32_WIN8\en-US\` and for a German version, `C:\Cie\Build1\Flat\Win32_WIN8\de-DE\`.
-
-2. Click **Next** to go to the [Package Type Selection](pkg-type-selection-ieak11-wizard.md) page or **Back** to go to the [Platform Selection](platform-selection-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Language Selection page in the IEAK 11 Customization Wizard to choose the language for your IEAK 11 custom package.
+author: dansimp
+ms.prod: ie11
+ms.assetid: f9d4ab57-9b1d-4cbc-9398-63f4938df1f6
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Language Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Language Selection page in the IEAK 11 Wizard
+The **Language Selection** page of the Internet Explorer Customization Wizard 11 lets you choose the language for your Internet Explorer Administration Kit 11 (IEAK 11) custom package. You can create custom Internet Explorer 11 packages in any of the languages your operating system version is available in.
+
+**Important**
Make sure that the language of your IEAK 11 installation matches the language of your custom IE11 package. If the languages don’t match, IEAK 11 won’t work properly.
+
+**To use the Language Selection page**
+
+1. Pick the language you want your custom IE11 installation package to use.
+You can support as many languages as you want, but each localized version must be in its own install package.
+**Note**
To keep your settings across multiple versions of the package, you can pick the same destination folder for all versions. The different language versions are then saved in separate subfolders within that destination folder. Like, for an English version, `C:\Cie\Build1\Flat\Win32_WIN8\en-US\` and for a German version, `C:\Cie\Build1\Flat\Win32_WIN8\de-DE\`.
+
+2. Click **Next** to go to the [Package Type Selection](pkg-type-selection-ieak11-wizard.md) page or **Back** to go to the [Platform Selection](platform-selection-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md b/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md
index 7a6e3d009f..296dec1688 100644
--- a/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/licensing-version-and-features-ieak11.md
@@ -2,8 +2,8 @@
ms.localizationpriority: medium
ms.mktglfcycl: plan
description: Learn about the version of the IEAK 11 you should run, based on your license agreement.
-author: lomayor
-ms.author: lomayor
+author: dansimp
+ms.author: dansimp
ms.prod: ie11
ms.assetid: 69d25451-08af-4db0-9daa-44ab272acc15
ms.reviewer:
diff --git a/browsers/internet-explorer/ie11-ieak/media-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/media-ins-file-setting.md
index 2aa91f6753..a441fe7be2 100644
--- a/browsers/internet-explorer/ie11-ieak/media-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/media-ins-file-setting.md
@@ -1,23 +1,24 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the \[Media\] .INS file setting to specify the types of media on which your custom install package is available.
-author: lomayor
-ms.prod: ie11
-ms.assetid: c57bae60-d520-49a9-a77d-da43f7ebe5b8
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Media .INS file to specify your install media (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Media .INS file to specify your install media
-The types of media on which your custom install package is available.
-
-|Name |Value |Description |
-|-----|------|-----------------|
-|Build_LAN |
- **0.** Don’t create the LAN-based installation package.
- **1.** Create the LAN-based installation package.
|Determines whether you want to create a LAN-based installation package. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the \[Media\] .INS file setting to specify the types of media on which your custom install package is available.
+author: dansimp
+ms.prod: ie11
+ms.assetid: c57bae60-d520-49a9-a77d-da43f7ebe5b8
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Media .INS file to specify your install media (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Media .INS file to specify your install media
+The types of media on which your custom install package is available.
+
+|Name |Value |Description |
+|-----|------|-----------------|
+|Build_LAN |- **0.** Don’t create the LAN-based installation package.
- **1.** Create the LAN-based installation package.
|Determines whether you want to create a LAN-based installation package. |
+
diff --git a/browsers/internet-explorer/ie11-ieak/pkg-type-selection-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/pkg-type-selection-ieak11-wizard.md
index 6cd52f789f..ce2517bf60 100644
--- a/browsers/internet-explorer/ie11-ieak/pkg-type-selection-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/pkg-type-selection-ieak11-wizard.md
@@ -1,39 +1,40 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Package Type Selection page in the IEAK 11 Customization Wizard to pick the media type you’ll use to distribute your custom package.
-author: lomayor
-ms.prod: ie11
-ms.assetid: dd91f788-d05e-4f45-9fd5-d951abf04f2c
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Package Type Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Package Type Selection page in the IEAK 11 Wizard
-The **Package Type Selection** page of the Internet Explorer Customization Wizard 11 lets you pick which type of media you’ll use to distribute your custom installation package. You can pick more than one type, if you need it.
-
-**Important**
You can't create a full installation package for deployment to Windows 10 computers. That option only works for computers running Windows 7 or Windows 8.1.
-
-**To use the File Locations page**
-
-1. Check the **Full Installation Package** box if you’re going to build your package on, or move your package to, a local area network (LAN). This media package includes the Internet Explorer 11 installation files, and is named **IE11-Setup-Full.exe**, in the `\\FLAT\\` folder.-OR-
-
-2. Check the **Configuration-only package** box if you want to update an existing installation of IE11. This media package is named **IE11- Setup-Branding.exe**, in the `\\BrndOnly\\` folder.
-You can distribute this file on any media format or server. It customizes the IE11 features without re-installing IE.
-**Important**
You can’t include custom components in a configuration-only package.
-
-3. Click **Next** to go to the [Feature Selection](feature-selection-ieak11-wizard.md) page or **Back** to go to the [Language Selection](language-selection-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Package Type Selection page in the IEAK 11 Customization Wizard to pick the media type you’ll use to distribute your custom package.
+author: dansimp
+ms.prod: ie11
+ms.assetid: dd91f788-d05e-4f45-9fd5-d951abf04f2c
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Package Type Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Package Type Selection page in the IEAK 11 Wizard
+The **Package Type Selection** page of the Internet Explorer Customization Wizard 11 lets you pick which type of media you’ll use to distribute your custom installation package. You can pick more than one type, if you need it.
+
+**Important**
You can't create a full installation package for deployment to Windows 10 computers. That option only works for computers running Windows 7 or Windows 8.1.
+
+**To use the File Locations page**
+
+1. Check the **Full Installation Package** box if you’re going to build your package on, or move your package to, a local area network (LAN). This media package includes the Internet Explorer 11 installation files, and is named **IE11-Setup-Full.exe**, in the `\\FLAT\\` folder.-OR-
+
+2. Check the **Configuration-only package** box if you want to update an existing installation of IE11. This media package is named **IE11- Setup-Branding.exe**, in the `\\BrndOnly\\` folder.
+You can distribute this file on any media format or server. It customizes the IE11 features without re-installing IE.
+**Important**
You can’t include custom components in a configuration-only package.
+
+3. Click **Next** to go to the [Feature Selection](feature-selection-ieak11-wizard.md) page or **Back** to go to the [Language Selection](language-selection-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/platform-selection-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/platform-selection-ieak11-wizard.md
index a3c0045275..342ac46d58 100644
--- a/browsers/internet-explorer/ie11-ieak/platform-selection-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/platform-selection-ieak11-wizard.md
@@ -2,12 +2,12 @@
ms.localizationpriority: medium
ms.mktglfcycl: deploy
description: How to use the Platform Selection page in the IEAK 11 Customization Wizard to pick the specs for your employee devices that will get the install package.
-author: lomayor
+author: dansimp
ms.prod: ie11
ms.assetid: 9cbf5abd-86f7-42b6-9810-0b606bbe8218
ms.reviewer:
manager: dansimp
-ms.author: lomayor
+ms.author: dansimp
title: Use the Platform Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/internet-explorer/ie11-ieak/prep-network-install-with-ieak11.md b/browsers/internet-explorer/ie11-ieak/prep-network-install-with-ieak11.md
index 56252cfd10..809110fc8b 100644
--- a/browsers/internet-explorer/ie11-ieak/prep-network-install-with-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/prep-network-install-with-ieak11.md
@@ -1,35 +1,36 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: Learn about what you need to do before you deploy your custom browser package using IEAK 11 over your network.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 2c66d22a-4a94-47cc-82ab-7274abe1dfd6
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Before you install your package over your network using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Before you install your package over your network using IEAK 11
-Employees can install the custom browser package using a network server. However, you must either lower the intranet security level or make the server a trusted site.
-
-**To lower your intranet security**
-
-1. In Internet Explorer 11, click **Tools**, **Internet Options**, and then the **Security** tab.
-
-2. Click **Local intranet**, and then **Sites**.
-
-3. Uncheck **Automatically detect intranet network**, uncheck **Include all network paths (UNC)**, and then click **OK**.
-
-**To make your server a trusted site**
-
-1. From the **Security** tab, click **Trusted sites**, and then **Sites**.
-
-2. Type the location of the server with the downloadable custom browser package, and then click **Add**.
-
-3. Repeat this step for every server that will include the custom browser package for download.
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: Learn about what you need to do before you deploy your custom browser package using IEAK 11 over your network.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 2c66d22a-4a94-47cc-82ab-7274abe1dfd6
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Before you install your package over your network using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Before you install your package over your network using IEAK 11
+Employees can install the custom browser package using a network server. However, you must either lower the intranet security level or make the server a trusted site.
+
+**To lower your intranet security**
+
+1. In Internet Explorer 11, click **Tools**, **Internet Options**, and then the **Security** tab.
+
+2. Click **Local intranet**, and then **Sites**.
+
+3. Uncheck **Automatically detect intranet network**, uncheck **Include all network paths (UNC)**, and then click **OK**.
+
+**To make your server a trusted site**
+
+1. From the **Security** tab, click **Trusted sites**, and then **Sites**.
+
+2. Type the location of the server with the downloadable custom browser package, and then click **Add**.
+
+3. Repeat this step for every server that will include the custom browser package for download.
+
diff --git a/browsers/internet-explorer/ie11-ieak/programs-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/programs-ieak11-wizard.md
index 8b0ff1ece4..8b46cc1615 100644
--- a/browsers/internet-explorer/ie11-ieak/programs-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/programs-ieak11-wizard.md
@@ -2,12 +2,12 @@
ms.localizationpriority: medium
ms.mktglfcycl: deploy
description: How to use the Programs page in the IEAK 11 Customization Wizard to pick the default programs to use for Internet services.
-author: lomayor
+author: dansimp
ms.prod: ie11
ms.assetid: f715668f-a50d-4db0-b578-e6526fbfa1fc
ms.reviewer:
manager: dansimp
-ms.author: lomayor
+ms.author: dansimp
title: Use the Programs page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
ms.sitesec: library
ms.date: 07/27/2017
diff --git a/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md b/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md
index 347e753856..06213a78ae 100644
--- a/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md
+++ b/browsers/internet-explorer/ie11-ieak/proxy-auto-config-examples.md
@@ -1,181 +1,182 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Learn about how to use a proxy auto-configuration (.pac) file to specify an automatic proxy URL.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 6c94708d-71bd-44bd-a445-7e6763b374ae
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use proxy auto-configuration (.pac) files with IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use proxy auto-configuration (.pac) files with IEAK 11
-These are various ways you can use a proxy auto-configuration (.pac) file to specify an automatic proxy URL. We've included some examples here to help guide you, but you'll need to change the proxy names, port numbers, and IP addresses to match your organization's info.
-
-Included examples:
-- [Example 1: Connect directly if the host is local](#example-1-connect-directly-if-the-host-is-local)
-- [Example 2: Connect directly if the host is inside the firewall](#example-2-connect-directly-if-the-host-is-inside-the-firewall)
-- [Example 3: Connect directly if the host name is resolvable](#example-3-connect-directly-if-the-host-name-is-resolvable)
-- [Example 4: Connect directly if the host is in specified subnet](#example-4-connect-directly-if-the-host-is-in-specified-subnet)
-- [Example 5: Determine the connection type based on the host domain](#example-5-determine-the-connection-type-based-on-the-host-domain)
-- [Example 6: Determine the connection type based on the protocol](#example-6-determine-the-connection-type-based-on-the-protocol)
-- [Example 7: Determine the proxy server based on the host name matching the IP address](#example-7-determine-the-proxy-server-based-on-the-host-name-matching-the-ip-address)
-- [Example 8: Connect using a proxy server if the host IP address matches the specified IP address](#example-8-connect-using-a-proxy-server-if-the-host-ip-address-matches-the-specified-ip-address)
-- [Example 9: Connect using a proxy server if there are periods in the host name](#example-9-connect-using-a-proxy-server-if-there-are-periods-in-the-host-name)
-- [Example 10: Connect using a proxy server based on specific days of the week](#example-10-connect-using-a-proxy-server-based-on-specific-days-of-the-week)
-
-
-## Example 1: Connect directly if the host is local
-In this example, if the host is local, it can connect directly. However, if the server isn't local, it must connect through a proxy server. Specifically, the `isPlainHostName` function looks to see if there are any periods (.) in the host name. If the function finds periods, it means the host isn’t local and it returns false. Otherwise, the function returns true.
-
-``` javascript
-function FindProxyForURL(url, host)
- {
- if (isPlainHostName(host))
- return "DIRECT";
- else
- return "PROXY proxy:80";
- }
-```
-## Example 2: Connect directly if the host is inside the firewall
-In this example, if the host is inside the firewall, it can connect directly. However, if the server is outside the firewall, it must connect through a proxy server. Specifically, the `localHostOrDomainIs` function only runs for URLs in the local domain. If the host domain name matches the provided domain information, the `dnsDomainIs` function returns true.
-
-``` javascript
-function FindProxyForURL(url, host)
- {
- if ((isPlainHostName(host) ||
- dnsDomainIs(host, ".company.com")) &&
- !localHostOrDomainIs(host, "www.company.com") &&
- !localHostOrDoaminIs(host, "home.company.com"))
- return "DIRECT";
- else
- return "PROXY proxy:80";
-}
-```
-## Example 3: Connect directly if the host name is resolvable
-In this example, if the host name can be resolved, it can connect directly. However, if the name can’t be resolved, the server must connect through a proxy server. Specifically, this function requests the DNS server to resolve the host name it's passed. If the name can be resolved, a direct connection is made. If it can't, the connection is made using a proxy. This is particularly useful when an internal DNS server is used to resolve all internal host names.
-
-**Important**
The `isResolvable` function queries a Domain Name System (DNS) server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail.
-
-``` javascript
-function FindProxyForURL(url, host)
- {
- if (isResolvable(host))
- return "DIRECT";
- else
- return "PROXY proxy:80";
- }
-```
-
-## Example 4: Connect directly if the host is in specified subnet
-In this example, if the host is in a specified subnet, it can connect directly. However, if the server is outside of the specified subnet, it must connect through a proxy server. Specifically, the `isInNet` (host, pattern, mask) function returns true if the host IP address matches the specified pattern. The mask indicates which part of the IP address to match (255=match, 0=ignore).
-
-**Important**
The `isInNet` function queries a DNS server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail.
-
-``` javascript
-function FindProxyForURL(url, host)
- {
- if (isInNet(host, "999.99.9.9", "255.0.255.0"))
- return "DIRECT";
- else
- return "PROXY proxy:80";
- }
-```
-## Example 5: Determine the connection type based on the host domain
-In this example, if the host is local, the server can connect directly. However, if the host isn’t local, this function determines which proxy to use based on the host domain. Specifically, the `shExpMatch(str, shexp)` function returns true if `str` matches the `shexp` using shell expression patterns. This is particularly useful when the host domain name is one of the criteria for proxy selection.
-
-``` javascript
-function FindProxyForURL(url, host)
- {
- if (isPlainHostName(host))
- return "DIRECT";
- else if (shExpMatch(host, "*.com"))
- return "PROXY comproxy:80";
- else if (shExpMatch(host, "*.edu"))
- return "PROXY eduproxy:80";
- else
- return "PROXY proxy";
- }
-```
-## Example 6: Determine the connection type based on the protocol
-In this example, the in-use protocol is extracted from the server and used to make a proxy selection. If no protocol match occurs, the server is directly connected. Specifically the `substring` function extracts the specified number of characters from a string. This is particularly useful when protocol is one of the criteria for proxy selection.
-
-``` javascript
-function FindProxyForURL(url, host)
- {
- if (url.substring(0, 5) == "http:") {
- return "PROXY proxy:80";
- }
- else if (url.substring(0, 4) == "ftp:") {
- return "PROXY fproxy:80";
- }
- else if (url.substring(0, 6) == "https:") {
- return "PROXY secproxy:8080";
- }
- else {
- return "DIRECT";
- }
- }
-```
-## Example 7: Determine the proxy server based on the host name matching the IP address
-In this example, the proxy server is selected by translating the host name into an IP address and then comparing the address to a specified string.
-
-**Important**
The `dnsResolve` function queries a DNS server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail.
-
-``` javascript
-function FindProxyForURL(url, host)
- {
- if (dnsResolve(host) == "999.99.99.999") { // = https://secproxy
- return "PROXY secproxy:8080";
- }
- else {
- return "PROXY proxy:80";
- }
- }
-```
-## Example 8: Connect using a proxy server if the host IP address matches the specified IP address
-In this example, the proxy server is selected by explicitly getting the IP address and then comparing it to a specified string. If no protocol match occurs, the server makes a direct connection. Specifically, the `myIpAddress` function returns the IP address (in integer-period format) for the host that the browser is running on.
-
-``` javascript
-function FindProxyForURL(url, host)
- {
- if (myIpAddress() == "999.99.999.99") {
- return "PROXY proxy:80";
- }
- else {
- return "DIRECT";
- }
- }
-```
-## Example 9: Connect using a proxy server if there are periods in the host name
-In this example, the function looks to see if there are periods (.) in the host name. If there are any periods, the connection occurs using a proxy server. If there are no periods, a direct connection occurs. Specifically, the `dnsDomainLevels` function returns an integer equal to the number of periods in the host name.
-
-**Note**
This is another way to determine connection types based on host name characteristics.
-
-``` javascript
-function FindProxyForURL(url, host)
- {
- if (dnsDomainLevels(host) > 0) { // if the number of periods in host > 0
- return "PROXY proxy:80";
- }
- return "DIRECT";
- }
-```
-## Example 10: Connect using a proxy server based on specific days of the week
-In this example, the function decides whether to connect to a proxy server, based on the days of the week. Connecting on days that don’t fall between the specified date parameters let the server make a direct connection. Specifically the `weekdayRange(day1 [,day2] [,GMT] )` function returns whether the current system time falls within the range specified by the parameters `day1`, `day2`, and `GMT`. Only the first parameter is required. The GMT parameter presumes time values are in Greenwich Mean Time rather than the local time zone. This function is particularly useful for situations where you want to use a proxy server for heavy traffic times, but allow a direct connection when traffic is light.
-
-``` javascript
-function FindProxyForURL(url, host)
- {
- if(weekdayRange("WED", "SAT", "GMT"))
- return "PROXY proxy:80";
- else
- return "DIRECT";
- }
-```
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Learn about how to use a proxy auto-configuration (.pac) file to specify an automatic proxy URL.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 6c94708d-71bd-44bd-a445-7e6763b374ae
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use proxy auto-configuration (.pac) files with IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use proxy auto-configuration (.pac) files with IEAK 11
+These are various ways you can use a proxy auto-configuration (.pac) file to specify an automatic proxy URL. We've included some examples here to help guide you, but you'll need to change the proxy names, port numbers, and IP addresses to match your organization's info.
+
+Included examples:
+- [Example 1: Connect directly if the host is local](#example-1-connect-directly-if-the-host-is-local)
+- [Example 2: Connect directly if the host is inside the firewall](#example-2-connect-directly-if-the-host-is-inside-the-firewall)
+- [Example 3: Connect directly if the host name is resolvable](#example-3-connect-directly-if-the-host-name-is-resolvable)
+- [Example 4: Connect directly if the host is in specified subnet](#example-4-connect-directly-if-the-host-is-in-specified-subnet)
+- [Example 5: Determine the connection type based on the host domain](#example-5-determine-the-connection-type-based-on-the-host-domain)
+- [Example 6: Determine the connection type based on the protocol](#example-6-determine-the-connection-type-based-on-the-protocol)
+- [Example 7: Determine the proxy server based on the host name matching the IP address](#example-7-determine-the-proxy-server-based-on-the-host-name-matching-the-ip-address)
+- [Example 8: Connect using a proxy server if the host IP address matches the specified IP address](#example-8-connect-using-a-proxy-server-if-the-host-ip-address-matches-the-specified-ip-address)
+- [Example 9: Connect using a proxy server if there are periods in the host name](#example-9-connect-using-a-proxy-server-if-there-are-periods-in-the-host-name)
+- [Example 10: Connect using a proxy server based on specific days of the week](#example-10-connect-using-a-proxy-server-based-on-specific-days-of-the-week)
+
+
+## Example 1: Connect directly if the host is local
+In this example, if the host is local, it can connect directly. However, if the server isn't local, it must connect through a proxy server. Specifically, the `isPlainHostName` function looks to see if there are any periods (.) in the host name. If the function finds periods, it means the host isn’t local and it returns false. Otherwise, the function returns true.
+
+``` javascript
+function FindProxyForURL(url, host)
+ {
+ if (isPlainHostName(host))
+ return "DIRECT";
+ else
+ return "PROXY proxy:80";
+ }
+```
+## Example 2: Connect directly if the host is inside the firewall
+In this example, if the host is inside the firewall, it can connect directly. However, if the server is outside the firewall, it must connect through a proxy server. Specifically, the `localHostOrDomainIs` function only runs for URLs in the local domain. If the host domain name matches the provided domain information, the `dnsDomainIs` function returns true.
+
+``` javascript
+function FindProxyForURL(url, host)
+ {
+ if ((isPlainHostName(host) ||
+ dnsDomainIs(host, ".company.com")) &&
+ !localHostOrDomainIs(host, "www.company.com") &&
+ !localHostOrDoaminIs(host, "home.company.com"))
+ return "DIRECT";
+ else
+ return "PROXY proxy:80";
+}
+```
+## Example 3: Connect directly if the host name is resolvable
+In this example, if the host name can be resolved, it can connect directly. However, if the name can’t be resolved, the server must connect through a proxy server. Specifically, this function requests the DNS server to resolve the host name it's passed. If the name can be resolved, a direct connection is made. If it can't, the connection is made using a proxy. This is particularly useful when an internal DNS server is used to resolve all internal host names.
+
+**Important**
The `isResolvable` function queries a Domain Name System (DNS) server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail.
+
+``` javascript
+function FindProxyForURL(url, host)
+ {
+ if (isResolvable(host))
+ return "DIRECT";
+ else
+ return "PROXY proxy:80";
+ }
+```
+
+## Example 4: Connect directly if the host is in specified subnet
+In this example, if the host is in a specified subnet, it can connect directly. However, if the server is outside of the specified subnet, it must connect through a proxy server. Specifically, the `isInNet` (host, pattern, mask) function returns true if the host IP address matches the specified pattern. The mask indicates which part of the IP address to match (255=match, 0=ignore).
+
+**Important**
The `isInNet` function queries a DNS server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail.
+
+``` javascript
+function FindProxyForURL(url, host)
+ {
+ if (isInNet(host, "999.99.9.9", "255.0.255.0"))
+ return "DIRECT";
+ else
+ return "PROXY proxy:80";
+ }
+```
+## Example 5: Determine the connection type based on the host domain
+In this example, if the host is local, the server can connect directly. However, if the host isn’t local, this function determines which proxy to use based on the host domain. Specifically, the `shExpMatch(str, shexp)` function returns true if `str` matches the `shexp` using shell expression patterns. This is particularly useful when the host domain name is one of the criteria for proxy selection.
+
+``` javascript
+function FindProxyForURL(url, host)
+ {
+ if (isPlainHostName(host))
+ return "DIRECT";
+ else if (shExpMatch(host, "*.com"))
+ return "PROXY comproxy:80";
+ else if (shExpMatch(host, "*.edu"))
+ return "PROXY eduproxy:80";
+ else
+ return "PROXY proxy";
+ }
+```
+## Example 6: Determine the connection type based on the protocol
+In this example, the in-use protocol is extracted from the server and used to make a proxy selection. If no protocol match occurs, the server is directly connected. Specifically the `substring` function extracts the specified number of characters from a string. This is particularly useful when protocol is one of the criteria for proxy selection.
+
+``` javascript
+function FindProxyForURL(url, host)
+ {
+ if (url.substring(0, 5) == "http:") {
+ return "PROXY proxy:80";
+ }
+ else if (url.substring(0, 4) == "ftp:") {
+ return "PROXY fproxy:80";
+ }
+ else if (url.substring(0, 6) == "https:") {
+ return "PROXY secproxy:8080";
+ }
+ else {
+ return "DIRECT";
+ }
+ }
+```
+## Example 7: Determine the proxy server based on the host name matching the IP address
+In this example, the proxy server is selected by translating the host name into an IP address and then comparing the address to a specified string.
+
+**Important**
The `dnsResolve` function queries a DNS server. References to Object Model objects, properties, or methods cause the proxy auto-configuration file to fail silently. For example, the references `window.open(...)`, `alert(...)`, and `password(...)` all cause the proxy auto-configuration file to fail.
+
+``` javascript
+function FindProxyForURL(url, host)
+ {
+ if (dnsResolve(host) == "999.99.99.999") { // = https://secproxy
+ return "PROXY secproxy:8080";
+ }
+ else {
+ return "PROXY proxy:80";
+ }
+ }
+```
+## Example 8: Connect using a proxy server if the host IP address matches the specified IP address
+In this example, the proxy server is selected by explicitly getting the IP address and then comparing it to a specified string. If no protocol match occurs, the server makes a direct connection. Specifically, the `myIpAddress` function returns the IP address (in integer-period format) for the host that the browser is running on.
+
+``` javascript
+function FindProxyForURL(url, host)
+ {
+ if (myIpAddress() == "999.99.999.99") {
+ return "PROXY proxy:80";
+ }
+ else {
+ return "DIRECT";
+ }
+ }
+```
+## Example 9: Connect using a proxy server if there are periods in the host name
+In this example, the function looks to see if there are periods (.) in the host name. If there are any periods, the connection occurs using a proxy server. If there are no periods, a direct connection occurs. Specifically, the `dnsDomainLevels` function returns an integer equal to the number of periods in the host name.
+
+**Note**
This is another way to determine connection types based on host name characteristics.
+
+``` javascript
+function FindProxyForURL(url, host)
+ {
+ if (dnsDomainLevels(host) > 0) { // if the number of periods in host > 0
+ return "PROXY proxy:80";
+ }
+ return "DIRECT";
+ }
+```
+## Example 10: Connect using a proxy server based on specific days of the week
+In this example, the function decides whether to connect to a proxy server, based on the days of the week. Connecting on days that don’t fall between the specified date parameters let the server make a direct connection. Specifically the `weekdayRange(day1 [,day2] [,GMT] )` function returns whether the current system time falls within the range specified by the parameters `day1`, `day2`, and `GMT`. Only the first parameter is required. The GMT parameter presumes time values are in Greenwich Mean Time rather than the local time zone. This function is particularly useful for situations where you want to use a proxy server for heavy traffic times, but allow a direct connection when traffic is light.
+
+``` javascript
+function FindProxyForURL(url, host)
+ {
+ if(weekdayRange("WED", "SAT", "GMT"))
+ return "PROXY proxy:80";
+ else
+ return "DIRECT";
+ }
+```
+
diff --git a/browsers/internet-explorer/ie11-ieak/proxy-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/proxy-ins-file-setting.md
index 5b10604a11..80e2e5d2c0 100644
--- a/browsers/internet-explorer/ie11-ieak/proxy-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/proxy-ins-file-setting.md
@@ -1,30 +1,31 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the \[Proxy\] .INS file setting to define whether to use a proxy server.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 30b03c2f-e3e5-48d2-9007-e3fd632f3c18
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Proxy .INS file to specify a proxy server (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Proxy .INS file to specify a proxy server
-Info about whether to use a proxy server. If yes, this also includes the host names for the proxy server.
-
-|Name |Value |Description |
-|-----|------|------------|
-|FTP_Proxy_Server |`` |The host name for the FTP proxy server. |
-|Gopher_Proxy_Server |`` |We no longer support Gopher Server. |
-|HTTP_Proxy_Server |`` |The host name for the HTTP proxy server. |
-|Proxy_Enable |- **0.** Don’t use a proxy server.
- **1.** Use a proxy server.
|Determines whether to use a proxy server. |
-|Proxy_Override |`` |The host name for the proxy server. For example, ``. |
-|Secure_Proxy_Server |`` |The host name for the secure proxy server. |
-|Socks_Proxy_Server |`` |The host name for the SOCKS proxy server. |
-|Use_Same_Proxy |- **0.** Don’t use the same proxy server for all services.
- **1.** Use the same proxy server for all services.
|Determines whether to use a single proxy server for all services. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the \[Proxy\] .INS file setting to define whether to use a proxy server.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 30b03c2f-e3e5-48d2-9007-e3fd632f3c18
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Proxy .INS file to specify a proxy server (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Proxy .INS file to specify a proxy server
+Info about whether to use a proxy server. If yes, this also includes the host names for the proxy server.
+
+|Name |Value |Description |
+|-----|------|------------|
+|FTP_Proxy_Server |`` |The host name for the FTP proxy server. |
+|Gopher_Proxy_Server |`` |We no longer support Gopher Server. |
+|HTTP_Proxy_Server |`` |The host name for the HTTP proxy server. |
+|Proxy_Enable |- **0.** Don’t use a proxy server.
- **1.** Use a proxy server.
|Determines whether to use a proxy server. |
+|Proxy_Override |`` |The host name for the proxy server. For example, ``. |
+|Secure_Proxy_Server |`` |The host name for the secure proxy server. |
+|Socks_Proxy_Server |`` |The host name for the SOCKS proxy server. |
+|Use_Same_Proxy |- **0.** Don’t use the same proxy server for all services.
- **1.** Use the same proxy server for all services.
|Determines whether to use a single proxy server for all services. |
+
diff --git a/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md
index 8ee40e8323..a99dc70ae0 100644
--- a/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/proxy-settings-ieak11-wizard.md
@@ -1,55 +1,56 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Proxy Settings page in the IEAK 11 Customization Wizard to pick the proxy servers used to connect to required services.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 1fa1eee3-e97d-41fa-a48c-4a6e0dc8b544
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Proxy Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Proxy Settings page in the IEAK 11 Wizard
-The **Proxy Settings** page of the Internet Explorer Customization Wizard 11 lets you pick the proxy servers used by your employees to connect for services required by the custom install package.
-
-Using a proxy server lets you limit access to the Internet. You can also use the **Additional Settings** page of the wizard to further restrict your employees from changing the proxy settings.
-
-**To use the Proxy Settings page**
-
-1. Check the **Enable proxy settings** box if you want to use proxy servers for any of your services.
-
-2. Type the address of the proxy server you want to use for your services into the **Address of proxy** box. In most cases, a single proxy server is used for all of your services.
-Proxy locations that don’t begin with a protocol (like, https:// or ftp://) are assumed to be a CERN-type HTTP proxy. For example, the entry *proxy* is treated the same as the entry `https://proxy`.
-
-3. Type the port for each service. The default value is *80*.
-
-4. Check the **Use the same proxy server for all addresses** box to use the same proxy server settings for all of your services.
-
-5. Type any services that shouldn’t use a proxy server into the **Do not use proxy server for addresses beginning with** box.
-When filling out your exceptions, keep in mind:
-
- - Proxy bypass entries can begin with a protocol type, such as https://, https://, or ftp://. However, if a protocol type is used, the exception entry applies only to requests for that protocol.
-
- - Protocol values are not case sensitive and you can use a wildcard character (*) in place of zero or more characters.
-
- - You must use a semicolon between your entries.
-
- - This list is limited to **2064** characters.
-
-6. Check the **Do not use proxy server for local (intranet) addresses** to bypass your proxy servers for all addresses on your intranet.
-
-7. Click **Next** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page or **Back** to go to the [Automatic Configuration](auto-config-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Proxy Settings page in the IEAK 11 Customization Wizard to pick the proxy servers used to connect to required services.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 1fa1eee3-e97d-41fa-a48c-4a6e0dc8b544
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Proxy Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Proxy Settings page in the IEAK 11 Wizard
+The **Proxy Settings** page of the Internet Explorer Customization Wizard 11 lets you pick the proxy servers used by your employees to connect for services required by the custom install package.
+
+Using a proxy server lets you limit access to the Internet. You can also use the **Additional Settings** page of the wizard to further restrict your employees from changing the proxy settings.
+
+**To use the Proxy Settings page**
+
+1. Check the **Enable proxy settings** box if you want to use proxy servers for any of your services.
+
+2. Type the address of the proxy server you want to use for your services into the **Address of proxy** box. In most cases, a single proxy server is used for all of your services.
+Proxy locations that don’t begin with a protocol (like, https:// or ftp://) are assumed to be a CERN-type HTTP proxy. For example, the entry *proxy* is treated the same as the entry `https://proxy`.
+
+3. Type the port for each service. The default value is *80*.
+
+4. Check the **Use the same proxy server for all addresses** box to use the same proxy server settings for all of your services.
+
+5. Type any services that shouldn’t use a proxy server into the **Do not use proxy server for addresses beginning with** box.
+When filling out your exceptions, keep in mind:
+
+ - Proxy bypass entries can begin with a protocol type, such as https://, https://, or ftp://. However, if a protocol type is used, the exception entry applies only to requests for that protocol.
+
+ - Protocol values are not case sensitive and you can use a wildcard character (*) in place of zero or more characters.
+
+ - You must use a semicolon between your entries.
+
+ - This list is limited to **2064** characters.
+
+6. Check the **Do not use proxy server for local (intranet) addresses** to bypass your proxy servers for all addresses on your intranet.
+
+7. Click **Next** to go to the [Security and Privacy Settings](security-and-privacy-settings-ieak11-wizard.md) page or **Back** to go to the [Automatic Configuration](auto-config-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/register-uninstall-app-ieak11.md b/browsers/internet-explorer/ie11-ieak/register-uninstall-app-ieak11.md
index 0a26a051db..c6fb131002 100644
--- a/browsers/internet-explorer/ie11-ieak/register-uninstall-app-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/register-uninstall-app-ieak11.md
@@ -1,28 +1,29 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Learn how to register an uninstall app for your custom components, using IEAK 11.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 4da1d408-af4a-4c89-a491-d6f005fd5005
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Register an uninstall app for custom components using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.date: 07/27/2017
----
-
-
-# Register an uninstall app for custom components using IEAK 11
-Register the uninstall apps for any custom components you’ve included in your Internet Explorer 11 package. Registering these apps lets your employees remove the components later, using **Uninstall or change a program** in the Control Panel.
-
-## Register your uninstallation program
-While you’re running your custom component setup process, your app can add information to the subkeys in the `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\ApplicationName` registry key, registering your uninstallation program.
-
-**Note**
IE11 also uses this registry key to verify that the component installed successfully during setup.
-
-|Subkey |Data type |Value |
-|-------|----------|-----------|
-|DisplayName |*string* |Friendly name for your uninstall app. This name must match your **Uninstall Key** in the **Add a Custom Component** page of the Internet Explorer Customization Wizard 11. For more info, see the [Custom Components](custom-components-ieak11-wizard.md) page. |
-|UninstallString |*string* |Full command-line text, including the path, to uninstall your component. You must not use a batch file or a sub-process. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Learn how to register an uninstall app for your custom components, using IEAK 11.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 4da1d408-af4a-4c89-a491-d6f005fd5005
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Register an uninstall app for custom components using IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.date: 07/27/2017
+---
+
+
+# Register an uninstall app for custom components using IEAK 11
+Register the uninstall apps for any custom components you’ve included in your Internet Explorer 11 package. Registering these apps lets your employees remove the components later, using **Uninstall or change a program** in the Control Panel.
+
+## Register your uninstallation program
+While you’re running your custom component setup process, your app can add information to the subkeys in the `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\ApplicationName` registry key, registering your uninstallation program.
+
+**Note**
IE11 also uses this registry key to verify that the component installed successfully during setup.
+
+|Subkey |Data type |Value |
+|-------|----------|-----------|
+|DisplayName |*string* |Friendly name for your uninstall app. This name must match your **Uninstall Key** in the **Add a Custom Component** page of the Internet Explorer Customization Wizard 11. For more info, see the [Custom Components](custom-components-ieak11-wizard.md) page. |
+|UninstallString |*string* |Full command-line text, including the path, to uninstall your component. You must not use a batch file or a sub-process. |
+
diff --git a/browsers/internet-explorer/ie11-ieak/rsop-snapin-for-policy-settings-ieak11.md b/browsers/internet-explorer/ie11-ieak/rsop-snapin-for-policy-settings-ieak11.md
index db2bad72cd..8bf7232c7c 100644
--- a/browsers/internet-explorer/ie11-ieak/rsop-snapin-for-policy-settings-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/rsop-snapin-for-policy-settings-ieak11.md
@@ -1,46 +1,47 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: manage
-description: Learn how to use the Resultant Set of Policy (RSoP) snap-in to view your policy settings.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 0f21b320-e879-4a06-8589-aae6fc264666
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the RSoP snap-in to review policy settings (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Using the Resultant Set of Policy (RSoP) snap-in to review policy settings
-After you’ve deployed your custom Internet Explorer package to your employees, you can use the Resultant Set of Policy (RSoP) snap-in to view your created policy settings. The RSoP snap-in is a two-step process. First, you run the RSoP wizard to determine what information should be viewed. Second, you open the specific items in the console window to view the settings. For complete instructions about how to use RSoP, see [Resultant Set of Policy](https://go.microsoft.com/fwlink/p/?LinkId=259479).
-
-**To add the RSoP snap-in**
-
-1. On the **Start** screen, type *MMC*.
-The Microsoft Management Console opens.
-
-2. Click **File**, and then click **Add/Remove Snap-in**.
-
-3. In the **Available snap-ins** window, go down to the **Resultant Set of Policy** snap-in option, click **Add**, and then click **OK**.
-You’re now ready to use the RSoP snap-in from the console.
-
-**To use the RSoP snap-in**
-
-1. Right-click **Resultant Set of Policy** and then click **Generate RSoP Data**.
-You’ll only need to go through the resulting RSoP Wizard first time you run the snap-in.
-
-2. Click **Next** on the **Welcome** screen.
-
-3. Under **Computer Configuration**, click **Administrative Templates**, click **Windows Components**, click **IE**, and then click the feature you want to review the policy settings for.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: manage
+description: Learn how to use the Resultant Set of Policy (RSoP) snap-in to view your policy settings.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 0f21b320-e879-4a06-8589-aae6fc264666
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the RSoP snap-in to review policy settings (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Using the Resultant Set of Policy (RSoP) snap-in to review policy settings
+After you’ve deployed your custom Internet Explorer package to your employees, you can use the Resultant Set of Policy (RSoP) snap-in to view your created policy settings. The RSoP snap-in is a two-step process. First, you run the RSoP wizard to determine what information should be viewed. Second, you open the specific items in the console window to view the settings. For complete instructions about how to use RSoP, see [Resultant Set of Policy](https://go.microsoft.com/fwlink/p/?LinkId=259479).
+
+**To add the RSoP snap-in**
+
+1. On the **Start** screen, type *MMC*.
+The Microsoft Management Console opens.
+
+2. Click **File**, and then click **Add/Remove Snap-in**.
+
+3. In the **Available snap-ins** window, go down to the **Resultant Set of Policy** snap-in option, click **Add**, and then click **OK**.
+You’re now ready to use the RSoP snap-in from the console.
+
+**To use the RSoP snap-in**
+
+1. Right-click **Resultant Set of Policy** and then click **Generate RSoP Data**.
+You’ll only need to go through the resulting RSoP Wizard first time you run the snap-in.
+
+2. Click **Next** on the **Welcome** screen.
+
+3. Under **Computer Configuration**, click **Administrative Templates**, click **Windows Components**, click **IE**, and then click the feature you want to review the policy settings for.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md
index 2f2c8052cf..f66425a743 100644
--- a/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/search-providers-ieak11-wizard.md
@@ -1,56 +1,57 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Search Providers page in the IEAK 11 Customization Wizard to add additional providers and set the default.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 48cfaba5-f4c0-493c-b656-445311b7bc52
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Search Providers page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Search Providers page in the IEAK 11 Wizard
-The **Search Providers** page of the Internet Explorer Customization Wizard 11 lets you add a default search provider (typically, Bing®) and additional providers to your custom version of IE.
-
-**Note**
The Internet Explorer Customization Wizard 11 offers improved and extended search settings. However, you can still optionally include support for Search Suggestions and Favicons, as well as Accelerator previews by using an .ins file from a previous version of IEAK.
-
-**To use the Search Providers page**
-
-1. Click **Import** to automatically import your existing search providers from your current version of IE into this list.
-
-2. Click **Add** to add more providers.
-The **Search Provider** box appears.
-
-3. In the **Display Name** box, type the text that appears in the **Search Options** menu for the search provider.
-
-4. In the **URL** box, type the full URL to the search provider, including the https:// prefix.
-
-5. In the **Favicon URL** box, type the full URL to any icon to associate with your provider.
-
-6. In the **Suggestions URL (XML)** box, type the associated search suggestions in XML format.
-
-7. In the **Suggestions URL (JSON)** box, type the associated search suggestions in JavaScript Object Notation format.
-
-8. In the **Accelerator Preview URL** box, type the associated Accelerator preview URL for each provider, if it’s necessary.
-
-9. Check the **Display Search Suggestions for this provider** box to turn on search suggestions for the provider, and then click **OK**.
-
-10. Check the **Search Guide URL Customization** box if you’re going to add your search providers to a custom webpage for your employees. Then, type the URL to the custom webpage in the text box.
-
-11. Click **Edit** to change your search provider information, click **Set Default** to make a search provider the default for your employees, or **Remove** to delete a search provider.
-
-12. Click **Next** to go to the [Important URLs - Home Page and Support](important-urls-home-page-and-support-ieak11-wizard.md) page or **Back** to go to the [Browser User Interface](browser-ui-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Search Providers page in the IEAK 11 Customization Wizard to add additional providers and set the default.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 48cfaba5-f4c0-493c-b656-445311b7bc52
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Search Providers page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Search Providers page in the IEAK 11 Wizard
+The **Search Providers** page of the Internet Explorer Customization Wizard 11 lets you add a default search provider (typically, Bing®) and additional providers to your custom version of IE.
+
+**Note**
The Internet Explorer Customization Wizard 11 offers improved and extended search settings. However, you can still optionally include support for Search Suggestions and Favicons, as well as Accelerator previews by using an .ins file from a previous version of IEAK.
+
+**To use the Search Providers page**
+
+1. Click **Import** to automatically import your existing search providers from your current version of IE into this list.
+
+2. Click **Add** to add more providers.
+The **Search Provider** box appears.
+
+3. In the **Display Name** box, type the text that appears in the **Search Options** menu for the search provider.
+
+4. In the **URL** box, type the full URL to the search provider, including the https:// prefix.
+
+5. In the **Favicon URL** box, type the full URL to any icon to associate with your provider.
+
+6. In the **Suggestions URL (XML)** box, type the associated search suggestions in XML format.
+
+7. In the **Suggestions URL (JSON)** box, type the associated search suggestions in JavaScript Object Notation format.
+
+8. In the **Accelerator Preview URL** box, type the associated Accelerator preview URL for each provider, if it’s necessary.
+
+9. Check the **Display Search Suggestions for this provider** box to turn on search suggestions for the provider, and then click **OK**.
+
+10. Check the **Search Guide URL Customization** box if you’re going to add your search providers to a custom webpage for your employees. Then, type the URL to the custom webpage in the text box.
+
+11. Click **Edit** to change your search provider information, click **Set Default** to make a search provider the default for your employees, or **Remove** to delete a search provider.
+
+12. Click **Next** to go to the [Important URLs - Home Page and Support](important-urls-home-page-and-support-ieak11-wizard.md) page or **Back** to go to the [Browser User Interface](browser-ui-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/security-and-ieak11.md b/browsers/internet-explorer/ie11-ieak/security-and-ieak11.md
index 9db3006a23..71d99f8b9f 100644
--- a/browsers/internet-explorer/ie11-ieak/security-and-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/security-and-ieak11.md
@@ -1,65 +1,66 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: plan
-description: Learn about the security features available in Internet Explorer 11 and IEAK 11.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 5b64c9cb-f8da-411a-88e4-fa69dea473e2
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Security features and IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Security features and IEAK 11
-Use Internet Explorer in conjunction with your new and existing security measures, to make sure the computers in your company aren’t compromised while on the Internet.
-
-## Enhanced Protection Mode
-Extends Protected Mode to further restrict the ability of an attacker to access sensitive or personal information in personal and corporate environments, including:
-
-- Restricting access to higher-level processes in the AppContainer.
-
-- Improving security against memory safety exploits in 64-bit tab processes.
-
-This feature is turned off by default. For more info, see [Enhanced Protected Mode problems with Internet Explorer](../ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md).
-
-## Certificates and Digital Signatures
-Web browsers have security features that help protect users from downloading harmful programs. Depending on the security level and the platform that you are using, the user may be prevented from, or warned against, downloading programs that are not digitally signed. Digital signatures show users where programs come from, verify that the programs have not been altered, and ensure that users do not receive unnecessary warnings when installing the custom browser.
-
-Because of this, the custom .cab files created by the Internet Explorer Customization Wizard should be signed, unless you pre-configure the Local intranet zone with a Low security setting. Any custom components you distribute with your browser package for these platforms should also be signed.
-
-### Understanding digital certificates
-To sign your package and custom programs digitally, you must first obtain a digital certificate. You can obtain a certificate from a certification authority or a privately-controlled certificate server. For more info about obtaining certificates or setting up a certificate server, see the following:
-
-- Microsoft-trusted certification authorities ([Windows root certificate program requirements](https://go.microsoft.com/fwlink/p/?LinkId=759697)).
-
-- Certificates overview documentation ([Certificates](https://go.microsoft.com/fwlink/p/?LinkId=759698)).
-
-- Microsoft Active Directory Certificate Services ( [Active Directory Certificate Services](https://go.microsoft.com/fwlink/p/?LinkId=259521)).
-
-- Enterprise public key infrastructure (PKI) snap-in documentation ([Enterprise PKI](https://go.microsoft.com/fwlink/p/?LinkId=259526)).
-
-After you get a certificate, you should note the public and private keys, which are a matched set of keys that are created by the software publisher for encryption and decryption. They are generated on your device at the time the certificate is requested, and your private key is never sent to the certification authority or any other party.
-
-### Understanding code signing
-Code signing varies, depening on how you plan to distribute your custom install package.
-
-- **If you plan to distribute custom packages over the Internet**, you must sign all custom components and the CMAK profile package (if used). Before you start the Internet Explorer Customization Wizard, make sure that both are signed. Typically, their respective manufacturers will have signed them. Otherwise, you can sign these using the Sign Tool (SignTool.exe) ( [SignTool.exe (Sign Tool)](https://go.microsoft.com/fwlink/p/?LinkId=71298)) or use the File Signing Tool (Signcode.exe) ([Signcode.exe (File Signing Tool)](https://go.microsoft.com/fwlink/p/?LinkId=71299)). You should read the documentation included with these tools for more info about all of the signing options.
-In addition, after you run the Internet Explorer Customization Wizard, we highly recommend that you sign the IEAK package and the branding.cab file (if you are using it separately from the package). You can do this also using the tools mentioned above. For more information, download Code-Signing Best Practices ([Code-Signing Best Practices](https://go.microsoft.com/fwlink/p/?LinkId=71300)).
-
-- **If you plan to distribute your custom packages over an intranet**, sign the custom files or preconfigure the Local intranet zone with a Low security setting, because the default security setting does not allow users to download unsigned programs or code.
-
-### Understanding your private key
-Your device creates two keys during the enrollment process of your digital certificate. One is a public key, which is sent to anyone you want to communicate with, and one is a private key, which is stored on your local device and must be kept secret. You use the private key to encrypt your data and the corresponding public key to decrypt it.
-
-You must keep your private key, private. To do this, we recommend:
-
-- **Separate test and release signing.** Set up a parallel code signing infrastructure, using test certificates created by an internal test root certificate authority. This helps to ensure that your certificates aren’t stored on an insecure build system, reducing the likelihood that they will be compromised.
-
-- **Tamper-proof storage.** Save your private keys on secure, tamper-proof hardware devices.
-
-- **Security.** Protect your private keys using physical security measures, such as cameras and card readers.
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: plan
+description: Learn about the security features available in Internet Explorer 11 and IEAK 11.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 5b64c9cb-f8da-411a-88e4-fa69dea473e2
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Security features and IEAK 11 (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Security features and IEAK 11
+Use Internet Explorer in conjunction with your new and existing security measures, to make sure the computers in your company aren’t compromised while on the Internet.
+
+## Enhanced Protection Mode
+Extends Protected Mode to further restrict the ability of an attacker to access sensitive or personal information in personal and corporate environments, including:
+
+- Restricting access to higher-level processes in the AppContainer.
+
+- Improving security against memory safety exploits in 64-bit tab processes.
+
+This feature is turned off by default. For more info, see [Enhanced Protected Mode problems with Internet Explorer](../ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md).
+
+## Certificates and Digital Signatures
+Web browsers have security features that help protect users from downloading harmful programs. Depending on the security level and the platform that you are using, the user may be prevented from, or warned against, downloading programs that are not digitally signed. Digital signatures show users where programs come from, verify that the programs have not been altered, and ensure that users do not receive unnecessary warnings when installing the custom browser.
+
+Because of this, the custom .cab files created by the Internet Explorer Customization Wizard should be signed, unless you pre-configure the Local intranet zone with a Low security setting. Any custom components you distribute with your browser package for these platforms should also be signed.
+
+### Understanding digital certificates
+To sign your package and custom programs digitally, you must first obtain a digital certificate. You can obtain a certificate from a certification authority or a privately-controlled certificate server. For more info about obtaining certificates or setting up a certificate server, see the following:
+
+- Microsoft-trusted certification authorities ([Windows root certificate program requirements](https://go.microsoft.com/fwlink/p/?LinkId=759697)).
+
+- Certificates overview documentation ([Certificates](https://go.microsoft.com/fwlink/p/?LinkId=759698)).
+
+- Microsoft Active Directory Certificate Services ( [Active Directory Certificate Services](https://go.microsoft.com/fwlink/p/?LinkId=259521)).
+
+- Enterprise public key infrastructure (PKI) snap-in documentation ([Enterprise PKI](https://go.microsoft.com/fwlink/p/?LinkId=259526)).
+
+After you get a certificate, you should note the public and private keys, which are a matched set of keys that are created by the software publisher for encryption and decryption. They are generated on your device at the time the certificate is requested, and your private key is never sent to the certification authority or any other party.
+
+### Understanding code signing
+Code signing varies, depening on how you plan to distribute your custom install package.
+
+- **If you plan to distribute custom packages over the Internet**, you must sign all custom components and the CMAK profile package (if used). Before you start the Internet Explorer Customization Wizard, make sure that both are signed. Typically, their respective manufacturers will have signed them. Otherwise, you can sign these using the Sign Tool (SignTool.exe) ( [SignTool.exe (Sign Tool)](https://go.microsoft.com/fwlink/p/?LinkId=71298)) or use the File Signing Tool (Signcode.exe) ([Signcode.exe (File Signing Tool)](https://go.microsoft.com/fwlink/p/?LinkId=71299)). You should read the documentation included with these tools for more info about all of the signing options.
+In addition, after you run the Internet Explorer Customization Wizard, we highly recommend that you sign the IEAK package and the branding.cab file (if you are using it separately from the package). You can do this also using the tools mentioned above. For more information, download Code-Signing Best Practices ([Code-Signing Best Practices](https://go.microsoft.com/fwlink/p/?LinkId=71300)).
+
+- **If you plan to distribute your custom packages over an intranet**, sign the custom files or preconfigure the Local intranet zone with a Low security setting, because the default security setting does not allow users to download unsigned programs or code.
+
+### Understanding your private key
+Your device creates two keys during the enrollment process of your digital certificate. One is a public key, which is sent to anyone you want to communicate with, and one is a private key, which is stored on your local device and must be kept secret. You use the private key to encrypt your data and the corresponding public key to decrypt it.
+
+You must keep your private key, private. To do this, we recommend:
+
+- **Separate test and release signing.** Set up a parallel code signing infrastructure, using test certificates created by an internal test root certificate authority. This helps to ensure that your certificates aren’t stored on an insecure build system, reducing the likelihood that they will be compromised.
+
+- **Tamper-proof storage.** Save your private keys on secure, tamper-proof hardware devices.
+
+- **Security.** Protect your private keys using physical security measures, such as cameras and card readers.
+
diff --git a/browsers/internet-explorer/ie11-ieak/security-and-privacy-settings-ieak11-wizard.md b/browsers/internet-explorer/ie11-ieak/security-and-privacy-settings-ieak11-wizard.md
index 007b61208d..16ffc69435 100644
--- a/browsers/internet-explorer/ie11-ieak/security-and-privacy-settings-ieak11-wizard.md
+++ b/browsers/internet-explorer/ie11-ieak/security-and-privacy-settings-ieak11-wizard.md
@@ -1,43 +1,44 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: How to use the Security and Privacy Settings page in the IEAK 11 Customization Wizard to manage your security zones, privacy settings, and content ratings.
-author: lomayor
-ms.prod: ie11
-ms.assetid: cb7cd1df-6a79-42f6-b3a1-8ae467053f82
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Security and Privacy Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Security and Privacy Settings page in the IEAK 11 Wizard
-The **Security and Privacy Settings** page of the Internet Explorer Customization Wizard 11 lets you manage your security zones, privacy settings, and content ratings. These settings help restrict the types of content your employees can access from the Internet, including any content that might be considered offensive or otherwise inappropriate in a corporate setting.
-
-**To use the Security and Privacy Settings page**
-
-1. Decide if you want to customize your security zones and privacy settings. You can pick:
-
- - **Do not customize security zones and privacy.** Pick this option if you don’t want to customize your security zones and privacy settings.
-
- - **Import the current security zones and privacy.** Pick this option to import your security zone and privacy settings from your computer and use them as the preset for your employee’s settings.
**Note**
To change your settings, click **Modify Settings** to open the **Internet Properties** box, and then click the **Security** and **Privacy** tabs to make your changes.
-
-2. Decide if you want to customize your content ratings. You can pick:
-
- - **Do not customize content ratings.** Pick this option if you don’t want to customize content ratings.
-
- - **Import the current content ratings settings.** Pick this option to import your content rating settings from your computer and use them as the preset for your employee’s settings.
**Note**
Not all Internet content is rated. If you choose to allow users to view unrated sites, some of those sites could contain inappropriate material. To change your settings, click **Modify Settings** to open the **Content Advisor** box, where you can make your changes.
-
-3. Click **Next** to go to the [Add a Root Certificate](add-root-certificate-ieak11-wizard.md) page or **Back** to go to the [Proxy Settings](proxy-settings-ieak11-wizard.md) page.
-
-
-
-
-
-
-
-
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: How to use the Security and Privacy Settings page in the IEAK 11 Customization Wizard to manage your security zones, privacy settings, and content ratings.
+author: dansimp
+ms.prod: ie11
+ms.assetid: cb7cd1df-6a79-42f6-b3a1-8ae467053f82
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Security and Privacy Settings page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Security and Privacy Settings page in the IEAK 11 Wizard
+The **Security and Privacy Settings** page of the Internet Explorer Customization Wizard 11 lets you manage your security zones, privacy settings, and content ratings. These settings help restrict the types of content your employees can access from the Internet, including any content that might be considered offensive or otherwise inappropriate in a corporate setting.
+
+**To use the Security and Privacy Settings page**
+
+1. Decide if you want to customize your security zones and privacy settings. You can pick:
+
+ - **Do not customize security zones and privacy.** Pick this option if you don’t want to customize your security zones and privacy settings.
+
+ - **Import the current security zones and privacy.** Pick this option to import your security zone and privacy settings from your computer and use them as the preset for your employee’s settings.
**Note**
To change your settings, click **Modify Settings** to open the **Internet Properties** box, and then click the **Security** and **Privacy** tabs to make your changes.
+
+2. Decide if you want to customize your content ratings. You can pick:
+
+ - **Do not customize content ratings.** Pick this option if you don’t want to customize content ratings.
+
+ - **Import the current content ratings settings.** Pick this option to import your content rating settings from your computer and use them as the preset for your employee’s settings.
**Note**
Not all Internet content is rated. If you choose to allow users to view unrated sites, some of those sites could contain inappropriate material. To change your settings, click **Modify Settings** to open the **Content Advisor** box, where you can make your changes.
+
+3. Click **Next** to go to the [Add a Root Certificate](add-root-certificate-ieak11-wizard.md) page or **Back** to go to the [Proxy Settings](proxy-settings-ieak11-wizard.md) page.
+
+
+
+
+
+
+
+
+
diff --git a/browsers/internet-explorer/ie11-ieak/security-imports-ins-file-setting.md b/browsers/internet-explorer/ie11-ieak/security-imports-ins-file-setting.md
index 74e61ad2bb..e65b0e2b77 100644
--- a/browsers/internet-explorer/ie11-ieak/security-imports-ins-file-setting.md
+++ b/browsers/internet-explorer/ie11-ieak/security-imports-ins-file-setting.md
@@ -1,27 +1,28 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: deploy
-description: Use the \[Security Imports\] .INS file setting to decide whether to import security info to your custom package.
-author: lomayor
-ms.prod: ie11
-ms.assetid: 19791c44-aaa7-4f37-9faa-85cbdf29f68e
-ms.reviewer:
-audience: itpro
manager: dansimp
-ms.author: lomayor
-title: Use the Security Imports .INS file to import security info (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Use the Security Imports .INS file to import security info
-Info about how to import security information from your local device to your custom package.
-
-|Name |Value |Description |
-|-----|------|------------|
-|ImportAuthCode |
- **0.** Don’t import the existing settings.
- **1.** Import the existing settings.
|Whether to import the existing Authenticode settings. |
-|ImportRatings |- **0.** Don’t import the existing settings.
- **1.** Import the existing settings.
|Whether to import the existing Content Ratings settings. |
-|ImportSecZones |- **0.** Don’t import the existing settings.
- **1.** Import the existing settings.
|Whether to import the existing Security Zone settings. |
-|ImportSiteCert |- **0.** Don’t import the existing authorities.
- **1.** Import the existing authorities.
|Whether to import the existing site certification authorities. |
-|Win16SiteCerts |- **0.** Don’t use the site certificates.
- **1.** Use the site certificates.
|Whether to use site certificates for computers running 16-bit versions of Windows. |
-
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: deploy
+description: Use the \[Security Imports\] .INS file setting to decide whether to import security info to your custom package.
+author: dansimp
+ms.prod: ie11
+ms.assetid: 19791c44-aaa7-4f37-9faa-85cbdf29f68e
+ms.reviewer:
+audience: itpro
+manager: dansimp
+ms.author: dansimp
+title: Use the Security Imports .INS file to import security info (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Use the Security Imports .INS file to import security info
+Info about how to import security information from your local device to your custom package.
+
+|Name |Value |Description |
+|-----|------|------------|
+|ImportAuthCode |- **0.** Don’t import the existing settings.
- **1.** Import the existing settings.
|Whether to import the existing Authenticode settings. |
+|ImportRatings |- **0.** Don’t import the existing settings.
- **1.** Import the existing settings.
|Whether to import the existing Content Ratings settings. |
+|ImportSecZones |- **0.** Don’t import the existing settings.
- **1.** Import the existing settings.
|Whether to import the existing Security Zone settings. |
+|ImportSiteCert |- **0.** Don’t import the existing authorities.
- **1.** Import the existing authorities.
|Whether to import the existing site certification authorities. |
+|Win16SiteCerts |- **0.** Don’t use the site certificates.
- **1.** Use the site certificates.
|Whether to use site certificates for computers running 16-bit versions of Windows. |
+
diff --git a/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md b/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md
index 228805f528..7b0db0bbc4 100644
--- a/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md
+++ b/browsers/internet-explorer/ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md
@@ -1,123 +1,124 @@
----
-ms.localizationpriority: medium
-ms.mktglfcycl: support
-description: Info about some of the known issues using the Internet Exporer Customization Wizard and a custom Internet Explorer install package.
-author: lomayor
-ms.author: lomayor
-ms.prod: ie11
-ms.assetid: 9e22cc61-6c63-4cab-bfdf-6fe49db945e4
-ms.reviewer:
-audience: itpro
manager: dansimp
-title: Troubleshoot custom package and IEAK 11 problems (Internet Explorer Administration Kit 11 for IT Pros)
-ms.sitesec: library
-ms.date: 07/27/2017
----
-
-
-# Troubleshoot custom package and IEAK 11 problems
-While the Internet Explorer Customization Wizard has been around for quite a while, there are still some known issues that you might encounter while deploying or managing your custom IE install package.
-
-## I am unable to locate some of the wizard pages
-The most common reasons you will not see certain pages is because:
-
-- **Your licensing agreement with Microsoft.** Your licensing agreement determines whether you install the **Internal** or **External** version of the Internet Explorer Customization Wizard, and there are different features available for each version. For info about which features are available for each version, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md).
-
-- **Your choice of operating system.** Depending on the operating system you picked from the **Platform Selection** page of the wizard, you might not see all of the pages. Some features aren’t available for all operating systems. For more information, see [Use the Platform Selection page in the IEAK 11 Wizard](platform-selection-ieak11-wizard.md).
-
-- **Your choice of features.** Depending on what you selected from the **Feature Selection** page of the wizard, you might not see all of the pages. You need to make sure that the features you want to customize are all checked. For more information, see [Use the Feature Selection page in the IEAK 11 Wizard](feature-selection-ieak11-wizard.md).
-
-## Internet Explorer Setup fails on user's devices
-Various issues can cause problems during Setup, including missing files, trust issues, or URL monikers. You can troubleshoot these issues by reviewing the Setup log file, located at `IE11\_main.log` from the **Windows** folder (typically, `C:\Windows`). The log file covers the entire Setup process from the moment IE11Setup.exe starts until the last .cab file finishes, providing error codes that you can use to help determine the cause of the failure.
-
-### Main.log file codes
-
-|Code |Description |
-|-----|------------|
-|0 |Initializing, making a temporary folder, and checking disk space. |
-|1 |Checking for all dependencies. |
-|2 |Downloading files from the server. |
-|3 |Copying files from download location to the temporary installation folder. |
-|4 |Restarting download and retrying Setup, because of a time-out error or other download error. |
-|5 |Checking trust and checking permissions. |
-|6 |Extracting files. |
-|7 |Running Setup program (an .inf or .exe file). |
-|8 |Installation is finished. |
-|9 |Download finished, and all files are downloaded. |
-
-### Main.log error codes
-
-|Code |Description |
-|-----|------------|
-|80100003 |Files are missing from the download folder during installation. |
-|800bxxxx |An error code starting with 800b is a trust failure. |
-|800Cxxxx |An error code starting with 800C is a Urlmon.dll failure. |
-
-
-## Internet Explorer Setup connection times out
-Internet Explorer Setup can switch servers during the installation process to maintain maximum throughput or to recover from a non-responsive download site (you receive less than 1 byte in 2 minutes). If the connection times out, but Setup is able to connect to the next download site on the list, your download starts over. If however the connection times out and Setup can’t connect to a different server, it’ll ask if you want to stop the installation or try again.
-
-To address connection issues (for example, as a result of server problems) where Setup can’t locate another download site by default, we recommend you overwrite your first download server using this workaround:
-
-``` syntax
-\ie11setup.exe /C:"ie11wzd.exe /S:""\ie11setup.exe"" /L:""https://your_Web_server/your_Web_site/ie11sites.dat"""
-```
-
-Where `` represents the folder location where you stored IE11setup.exe.
-
-## Users cannot uninstall IE
-If you cannot uninstall IE using **Uninstall or change a program** in the Control Panel, it could be because the uninstall information is not on the computer. To fix this issue, you should:
-
-1. Review the uninstall log file, IE11Uninst.log, located in the `C:\Windows` folder. This log file covers the entire uninstallation process, including every file change, every registry change, and any dialog boxes that are shown.
-
-2. Try to manually uninstall IE. Go to the backup folder, `:\Windows\$ie11$`, and run the uninstall file, `Spunist.exe`.
-
-
-## The Internet Explorer Customization Wizard 11 does not work with user names that user double-byte character sets
-The customization wizard does not work with user names that use double-byte character sets, such as Chinese or Japanese. To fix this, set the **TEMP** and **TMP** environmental variables to a path that does not use these characters (for example, C:\temp).
-
-1. Open **System Properties**, click the **Advanced** tab, and then click **Environmental Variables**.
-2. Click Edit, and then modify the **TEMP** and **TMP** environmental variables to a non-user profile directory.
-
-
-## Unicode characters are not supported in IEAK 11 path names
-While Unicode characters, such as Emoji, are supported for organization names and other branding items, you must not use Unicode characters in any paths associated with running the Internet Explorer Customization Wizard 11. This includes paths to your IEAK 11 installation and to the storage location for your custom packages after they're built.
-
-## Internet Explorer branding conflicts when using both Unattend and IEAK 11 to customize Internet Explorer settings
-Using both Unattend settings and an IEAK custom package to modify a user's version of Internet Explorer 11 might cause a user to lose personalized settings during an upgrade. For example, many manufacturers configure Internet Explorer using Unattend settings. If a user purchases a laptop, and then signs up for Internet service, their Internet Service Provider (ISP) might provide a version of Internet Explorer that has been branded (for example, with a custom homepage for that ISP) using Internet Explorer Customization Wizard 11. If that user later upgrades to a new version of Internet Explorer, the Unattend settings from the laptop manufacturer will be reapplied, overwriting any settings that the user configured for themselves (such as their homepage).
-
-
-## IEAK 11 does not correctly apply the Delete all existing items under Favorites, Favorites Bar and Feeds option
-The Internet Explorer Customization Wizard 11 does not correctly apply the **Delete all existing items under Favorites**, **Favorites Bar and Feeds** option, available on the **Browsing Options** page.
-
-Selecting to include this feature in your customized Internet Explorer package enables the deletion of existing items in the **Favorites** and **Favorites Bar** areas, but it doesn't enable deletion in the **Feeds** area. In addition, this setting adds a new favorite, titled “Web Slice Gallery” to the **Favorites Bar**.
-
-## F1 does not activate Help on Automatic Version Synchronization page
-Pressing the **F1** button on the **Automatic Version Synchronization** page of the Internet Explorer Customization Wizard 11 does not display the **Help** page. Clicking the **Help** button enables you to open the Help system and view information about this page.
-
-## Certificate installation does not work on IEAK 11
-IEAK 11 doesn't install certificates added using the Add a Root Certificate page of the Internet Explorer Customization Wizard 11. Administrators can manually install certificates using the Certificates Microsoft Management Console snap-in (Certmgr.msc) or using the command-line tool, Certificate Manager (Certmgr.exe).
-
->[!NOTE]
->This applies only when using the External licensing mode of IEAK 11.
-
-## The Additional Settings page appears in the wrong language when using a localized version of IEAK 11
-When using IEAK 11 in other languages, the settings on the Additional Settings page appear in the language of the target platform, regardless of the IEAK 11 language.
-
->[!NOTE]
->This applies only when using the Internal licensing mode of IEAK 11.
-
-To work around this issue, run the customization wizard following these steps:
-1. On the **Language Selection** page, select the language that matches the language of your installed IEAK 11.
-2. Click **Next**, and then click **Synchronize** on the Automatic Version Synchronization page.
-3. After synchronization is complete, cancel the wizard.
-4. Repeat these steps for each platform on the Platform Selection page.
-
-After performing these steps, you must still do the following each time you synchronize a new language and platform:
-1. Open File Explorer to the Program Files\Windows IEAK 11 or Program Files (x86)\Windows IEAK 11 folder.
-2. Open the **Policies** folder, and then open the appropriate platform folder.
-3. Copy the contents of the matching-language folder into the new language folder.
-
-After completing these steps, the Additional Settings page matches your wizard’s language.
-
-## Unable to access feeds stored in a subfolder
-Adding feeds using the **Favorites**, **Favorites Bar**, and **Feeds** page of the Internet Explorer 11 Customization Wizard requires that the feeds be stored in a single folder. Creating two levels of folders, and creating the feed in the subfolder, causes the feed to fail.
+---
+ms.localizationpriority: medium
+ms.mktglfcycl: support
+description: Info about some of the known issues using the Internet Exporer Customization Wizard and a custom Internet Explorer install package.
+author: dansimp
+ms.author: dansimp
+ms.prod: ie11
+ms.assetid: 9e22cc61-6c63-4cab-bfdf-6fe49db945e4
+ms.reviewer:
+audience: itpro
+manager: dansimp
+title: Troubleshoot custom package and IEAK 11 problems (Internet Explorer Administration Kit 11 for IT Pros)
+ms.sitesec: library
+ms.date: 07/27/2017
+---
+
+
+# Troubleshoot custom package and IEAK 11 problems
+While the Internet Explorer Customization Wizard has been around for quite a while, there are still some known issues that you might encounter while deploying or managing your custom IE install package.
+
+## I am unable to locate some of the wizard pages
+The most common reasons you will not see certain pages is because:
+
+- **Your licensing agreement with Microsoft.** Your licensing agreement determines whether you install the **Internal** or **External** version of the Internet Explorer Customization Wizard, and there are different features available for each version. For info about which features are available for each version, see [Determine the licensing version and features to use in IEAK 11](licensing-version-and-features-ieak11.md).
+
+- **Your choice of operating system.** Depending on the operating system you picked from the **Platform Selection** page of the wizard, you might not see all of the pages. Some features aren’t available for all operating systems. For more information, see [Use the Platform Selection page in the IEAK 11 Wizard](platform-selection-ieak11-wizard.md).
+
+- **Your choice of features.** Depending on what you selected from the **Feature Selection** page of the wizard, you might not see all of the pages. You need to make sure that the features you want to customize are all checked. For more information, see [Use the Feature Selection page in the IEAK 11 Wizard](feature-selection-ieak11-wizard.md).
+
+## Internet Explorer Setup fails on user's devices
+Various issues can cause problems during Setup, including missing files, trust issues, or URL monikers. You can troubleshoot these issues by reviewing the Setup log file, located at `IE11\_main.log` from the **Windows** folder (typically, `C:\Windows`). The log file covers the entire Setup process from the moment IE11Setup.exe starts until the last .cab file finishes, providing error codes that you can use to help determine the cause of the failure.
+
+### Main.log file codes
+
+|Code |Description |
+|-----|------------|
+|0 |Initializing, making a temporary folder, and checking disk space. |
+|1 |Checking for all dependencies. |
+|2 |Downloading files from the server. |
+|3 |Copying files from download location to the temporary installation folder. |
+|4 |Restarting download and retrying Setup, because of a time-out error or other download error. |
+|5 |Checking trust and checking permissions. |
+|6 |Extracting files. |
+|7 |Running Setup program (an .inf or .exe file). |
+|8 |Installation is finished. |
+|9 |Download finished, and all files are downloaded. |
+
+### Main.log error codes
+
+|Code |Description |
+|-----|------------|
+|80100003 |Files are missing from the download folder during installation. |
+|800bxxxx |An error code starting with 800b is a trust failure. |
+|800Cxxxx |An error code starting with 800C is a Urlmon.dll failure. |
+
+
+## Internet Explorer Setup connection times out
+Internet Explorer Setup can switch servers during the installation process to maintain maximum throughput or to recover from a non-responsive download site (you receive less than 1 byte in 2 minutes). If the connection times out, but Setup is able to connect to the next download site on the list, your download starts over. If however the connection times out and Setup can’t connect to a different server, it’ll ask if you want to stop the installation or try again.
+
+To address connection issues (for example, as a result of server problems) where Setup can’t locate another download site by default, we recommend you overwrite your first download server using this workaround:
+
+``` syntax
+\ie11setup.exe /C:"ie11wzd.exe /S:""\ie11setup.exe"" /L:""https://your_Web_server/your_Web_site/ie11sites.dat"""
+```
+
+Where `` represents the folder location where you stored IE11setup.exe.
+
+## Users cannot uninstall IE
+If you cannot uninstall IE using **Uninstall or change a program** in the Control Panel, it could be because the uninstall information is not on the computer. To fix this issue, you should:
+
+1. Review the uninstall log file, IE11Uninst.log, located in the `C:\Windows` folder. This log file covers the entire uninstallation process, including every file change, every registry change, and any dialog boxes that are shown.
+
+2. Try to manually uninstall IE. Go to the backup folder, `:\Windows\$ie11$`, and run the uninstall file, `Spunist.exe`.
+
+
+## The Internet Explorer Customization Wizard 11 does not work with user names that user double-byte character sets
+The customization wizard does not work with user names that use double-byte character sets, such as Chinese or Japanese. To fix this, set the **TEMP** and **TMP** environmental variables to a path that does not use these characters (for example, C:\temp).
+
+1. Open **System Properties**, click the **Advanced** tab, and then click **Environmental Variables**.
+2. Click Edit, and then modify the **TEMP** and **TMP** environmental variables to a non-user profile directory.
+
+
+## Unicode characters are not supported in IEAK 11 path names
+While Unicode characters, such as Emoji, are supported for organization names and other branding items, you must not use Unicode characters in any paths associated with running the Internet Explorer Customization Wizard 11. This includes paths to your IEAK 11 installation and to the storage location for your custom packages after they're built.
+
+## Internet Explorer branding conflicts when using both Unattend and IEAK 11 to customize Internet Explorer settings
+Using both Unattend settings and an IEAK custom package to modify a user's version of Internet Explorer 11 might cause a user to lose personalized settings during an upgrade. For example, many manufacturers configure Internet Explorer using Unattend settings. If a user purchases a laptop, and then signs up for Internet service, their Internet Service Provider (ISP) might provide a version of Internet Explorer that has been branded (for example, with a custom homepage for that ISP) using Internet Explorer Customization Wizard 11. If that user later upgrades to a new version of Internet Explorer, the Unattend settings from the laptop manufacturer will be reapplied, overwriting any settings that the user configured for themselves (such as their homepage).
+
+
+## IEAK 11 does not correctly apply the Delete all existing items under Favorites, Favorites Bar and Feeds option
+The Internet Explorer Customization Wizard 11 does not correctly apply the **Delete all existing items under Favorites**, **Favorites Bar and Feeds** option, available on the **Browsing Options** page.
+
+Selecting to include this feature in your customized Internet Explorer package enables the deletion of existing items in the **Favorites** and **Favorites Bar** areas, but it doesn't enable deletion in the **Feeds** area. In addition, this setting adds a new favorite, titled “Web Slice Gallery” to the **Favorites Bar**.
+
+## F1 does not activate Help on Automatic Version Synchronization page
+Pressing the **F1** button on the **Automatic Version Synchronization** page of the Internet Explorer Customization Wizard 11 does not display the **Help** page. Clicking the **Help** button enables you to open the Help system and view information about this page.
+
+## Certificate installation does not work on IEAK 11
+IEAK 11 doesn't install certificates added using the Add a Root Certificate page of the Internet Explorer Customization Wizard 11. Administrators can manually install certificates using the Certificates Microsoft Management Console snap-in (Certmgr.msc) or using the command-line tool, Certificate Manager (Certmgr.exe).
+
+>[!NOTE]
+>This applies only when using the External licensing mode of IEAK 11.
+
+## The Additional Settings page appears in the wrong language when using a localized version of IEAK 11
+When using IEAK 11 in other languages, the settings on the Additional Settings page appear in the language of the target platform, regardless of the IEAK 11 language.
+
+>[!NOTE]
+>This applies only when using the Internal licensing mode of IEAK 11.
+
+To work around this issue, run the customization wizard following these steps:
+1. On the **Language Selection** page, select the language that matches the language of your installed IEAK 11.
+2. Click **Next**, and then click **Synchronize** on the Automatic Version Synchronization page.
+3. After synchronization is complete, cancel the wizard.
+4. Repeat these steps for each platform on the Platform Selection page.
+
+After performing these steps, you must still do the following each time you synchronize a new language and platform:
+1. Open File Explorer to the Program Files\Windows IEAK 11 or Program Files (x86)\Windows IEAK 11 folder.
+2. Open the **Policies** folder, and then open the appropriate platform folder.
+3. Copy the contents of the matching-language folder into the new language folder.
+
+After completing these steps, the Additional Settings page matches your wizard’s language.
+
+## Unable to access feeds stored in a subfolder
+Adding feeds using the **Favorites**, **Favorites Bar**, and **Feeds** page of the Internet Explorer 11 Customization Wizard requires that the feeds be stored in a single folder. Creating two levels of folders, and creating the feed in the subfolder, causes the feed to fail.
diff --git a/browsers/internet-explorer/index.md b/browsers/internet-explorer/index.md
index ad64db8744..6c3085d888 100644
--- a/browsers/internet-explorer/index.md
+++ b/browsers/internet-explorer/index.md
@@ -1,7 +1,8 @@
---
ms.mktglfcycl: deploy
description: The landing page for IE11 that lets you access the documentation.
-author: shortpatti
+author: dansimp
+ms.author: dansimp
ms.prod: ie11
title: Internet Explorer 11 (IE11) (Internet Explorer 11 for IT Pros)
assetid: be3dc32e-80d9-4d9f-a802-c7db6c50dbe0
diff --git a/devices/hololens/TOC.md b/devices/hololens/TOC.md
index fe85d293be..3f07da3690 100644
--- a/devices/hololens/TOC.md
+++ b/devices/hololens/TOC.md
@@ -1,45 +1,58 @@
# [HoloLens overview](index.md)
# [Hololens status](hololens-status.md)
-# Get started with HoloLens (gen 1)
-## [Start your HoloLens (1st gen) for the first time](hololens-start.md)
-## [Install localized version of HoloLens](hololens-install-localized.md)
+# Get Started with HoloLens 2
+## [HoloLens 2 hardware](hololens2-hardware.md)
+## [Get your HoloLens 2 ready to use](hololens2-setup.md)
+## [Set up your HoloLens 2](hololens2-start.md)
+## [Getting around HoloLens 2](hololens2-basic-usage.md)
+
+# Get started with HoloLens (1st gen)
+## [HoloLens (1st gen) hardware](hololens1-hardware.md)
+## [Get your HoloLens (1st gen) ready to use](hololens1-setup.md)
+## [Set up your HoloLens (1st gen)](hololens1-start.md)
+## [Install localized version of HoloLens (1st gen)](hololens1-install-localized.md)
+## [Getting around HoloLens (1st gen)](hololens1-basic-usage.md)
# Get started with HoloLens in commercial environments
-## [Overview and deployment planning](hololens-requirements.md)
-## [Unlock Windows Holographic for Business features](hololens-upgrade-enterprise.md)
+## [Commercial feature overview](hololens-commercial-features.md)
+## [Deployment planning](hololens-requirements.md)
+## [Unlock Windows Holographic for Business features](hololens1-upgrade-enterprise.md)
## [Configure HoloLens using a provisioning package](hololens-provisioning.md)
## [Enroll HoloLens in MDM](hololens-enroll-mdm.md)
## [Set up ring based updates for HoloLens](hololens-updates.md)
-## [Manage custom enterprise apps](hololens-install-apps.md)
## [Enable Bitlocker device encryption for HoloLens](hololens-encryption.md)
+# User management and access management
+## [Share your HoloLens with multiple people](hololens-multiple-users.md)
+## [Set up HoloLens as a kiosk (single application access)](hololens-kiosk.md)
+## [Set up limited application access](hololens-kiosk.md)
+
# Navigating Windows Holographic
-## [Windows Mixed Reality home](holographic-home.md)
-## [Voice and Cortana](hololens-cortana.md)
+## [Start menu and mixed reality home](holographic-home.md)
+## [Use your voice with HoloLens](hololens-cortana.md)
## [Find and save files](hololens-find-and-save-files.md)
## [Create, share, and view photos and video](holographic-photos-and-video.md)
+# Holographic Applications
+## [Try 3D Viewer](holographic-3d-viewer-beta.md)
+## [Find, install, and uninstall applications](holographic-store-apps.md)
+## [Install and uninstall custom applications](holographic-custom-apps.md)
+
# Accessories and connectivity
## [Connect to Bluetooth and USB-C devices](hololens-connect-devices.md)
-## [Restart or recover the HoloLens (1st gen) clicker](hololens-clicker-restart-recover.md)
+## [Use the HoloLens (1st gen) clicker](hololens1-clicker.md)
## [Connect to a network](hololens-network.md)
## [Use HoloLens offline](hololens-offline.md)
-# Application Management
-## [Share HoloLens with multiple people](hololens-multiple-users.md)
-## [Get apps for HoloLens](hololens-get-apps.md)
-## [Use apps on HoloLens](hololens-use-apps.md)
-## [Use HoloLens offline](hololens-offline.md)
-## [Spaces on HoloLens](hololens-spaces-on-hololens.md)
-## [How HoloLens stores data for spaces](hololens-spaces.md)
+# Hologram optics and placement in space
+## [Tips for viewing clear Holograms](hololens-calibration.md)
+## [Mapping physical spaces with HoloLens](hololens-spaces.md)
# Recovery and troubleshooting
## [Restore HoloLens 2 using Advanced Recovery Companion](hololens-recovery.md)
## [Restart, reset, or recover the HoloLens](hololens-restart-recover.md)
-# User/Access Management
-## [Set up single application access](hololens-kiosk.md)
-
+# [Give us feedback](hololens-feedback.md)
# [Insider preview for Microsoft HoloLens](hololens-insider.md)
# [Change history for Microsoft HoloLens documentation](change-history-hololens.md)
diff --git a/devices/hololens/docfx.json b/devices/hololens/docfx.json
index 7cda17b22f..51b4a3afbb 100644
--- a/devices/hololens/docfx.json
+++ b/devices/hololens/docfx.json
@@ -17,7 +17,8 @@
{
"files": [
"**/*.png",
- "**/*.jpg"
+ "**/*.jpg",
+ "**/*.gif"
],
"exclude": [
"**/obj/**",
diff --git a/devices/hololens/holographic-3d-viewer-beta.md b/devices/hololens/holographic-3d-viewer-beta.md
new file mode 100644
index 0000000000..0aada1fe55
--- /dev/null
+++ b/devices/hololens/holographic-3d-viewer-beta.md
@@ -0,0 +1,201 @@
+---
+title: Using 3D Viewer on HoloLens
+description: Describes the types of files and features that 3D Viewer Beta on HoloLens supports, and how to use and troubleshoot the app.
+ms.prod: hololens
+ms.sitesec: library
+author: Teresa-Motiv
+ms.author: v-tea
+ms.topic: article
+ms.localizationpriority: medium
+ms.date: 9/3/19
+ms.reviewer:
+manager: jarrettr
+appliesto:
+- HoloLens (1st gen)
+---
+
+# Using 3D Viewer on HoloLens
+
+3D Viewer lets you view 3D models on HoloLens. You can open and view *supported* .fbx files from Microsoft Edge, OneDrive, and other apps.
+
+If you're having trouble opening a 3D model in 3D Viewer, or certain features of your 3D model are unsupported, see [Supported content specifications](#supported-content-specifications).
+
+To build or optimize 3D models for use with 3D Viewer, see [Optimizing 3D models for 3D Viewer](#optimizing-3d-models-for-3d-viewer-beta).
+
+There are two ways to open a 3D model on HoloLens. See [Viewing 3D models on HoloLens](#viewing-3d-models-on-hololens) to learn more.
+
+If you're having trouble after reading these topics, see [Troubleshooting](#troubleshooting).
+
+## Supported content specifications
+
+### File format
+
+- FBX format
+- Maximum FBX release 2015.1.0
+
+### File size
+
+- Minimum 5 KB
+- Maximum 500 MB
+
+### Geometry
+
+- Polygonal models only. No subdivision surfaces or NURBs
+- Right-handed coordinate system
+- Shear in transformation matrices is not supported
+
+### Textures
+
+- Texture maps must be embedded in the FBX file
+- Supported image formats
+ - JPEG and PNG images
+ - BMP images (24-bit RGB true-color)
+ - TGA images (24-bit RGB and 32-bit RGBQ true-color)
+- Maximum texture resolution of 2048x2048
+- Maximum of one diffuse map, one normal map, and one reflection cube map per mesh
+- Alpha channel in diffuse textures causes pixels to be discarded if below 50%
+
+### Animation
+
+- Scale/rotation/translation animation on individual objects
+- Skeletal (rigged) animation with skinning
+ - Maximum of 4 influences per vertex
+
+### Materials
+
+- Lambert and Phong materials are supported, with adjustable parameters
+- Supported material properties for Lambert
+ - Main Texture (RGB + Alpha Test)
+ - Diffuse Color (RGB)
+ - Ambient Color (RGB)
+- Supported material properties for Phong
+ - Main Texture (RGB + Alpha Test)
+ - Diffuse Color (RGB)
+ - Ambient Color (RGB)
+ - Specular Color (RGB)
+ - Shininess
+ - Reflectivity
+- Custom materials are not supported
+- Maximum of one material per mesh
+- Maximum of one material layer
+- Maximum of 8 materials per file
+
+### File and model limitations
+
+There are hard limits on the size of files, as well as the number of models, vertices, and meshes that can be open simultaneously in 3D Viewer Beta:
+
+- 500 MB maximum file size per model
+- Vertices: 600,000 combined on all open models
+- Meshes: 1,600 combined on all open models
+- Maximum of 40 models open at one time
+
+## Optimizing 3D models for 3D Viewer Beta
+
+### Special considerations
+
+- Avoid black materials or black areas in texture maps. Holograms are made of light, thus HoloLens renders black (the absence of light) as transparent.
+- Before exporting to FBX from your creation tool, ensure all geometry is visible and unlocked and no layers that contain geometry are turned off or templated. Visibility is not respected.
+- Avoid very large translation offsets between nodes (for example, 100,000 units). This can cause the model to jitter while being moved/scaled/rotated.
+
+### Performance optimization
+
+Keep performance in mind while authoring content and validate in the 3D Viewer Beta app on HoloLens during the authoring process for best results. 3D Viewer Beta renders content real-time and performance is subject to HoloLens hardware capabilities.
+
+There are many variables in a 3D model that can impact performance. 3D Viewer Beta will show a warning on load if there are more than 150,000 vertices or more than 400 meshes. Animations can have an impact on the performance of other open models. There are also hard limits on the total number models, vertices, and meshes that can be open simultaneously in 3D Viewer Beta (see [File and model limitations](#file-and-model-limitations)).
+
+If the 3D model isn't running well due to model complexity, consider:
+
+- Reducing polygon count
+- Reducing number of bones in rigged animation
+- Avoiding self-occlusion
+
+Double-sided rendering is supported in 3D Viewer Beta, although it is turned off by default for performance reasons. This can be turned on via the **Double Sided** button on the **Details** page. For best performance, avoid the need for double-sided rendering in your content.
+
+### Validating your 3D model
+
+Validate your model by opening it in 3D Viewer Beta on HoloLens. Select the **Details** button to view your model's characteristics and warnings of unsupported content (if present).
+
+### Rendering 3D models with true-to-life dimensions
+
+By default, 3D Viewer Beta displays 3D models at a comfortable size and position relative to the user. However, if rendering a 3D model with true-to-life measurements is important (for example, when evaluating furniture models in a room), the content creator can set a flag within the file's metadata to prevent resizing of that model by both the application and the user.
+
+To prevent scaling of the model, add a Boolean custom attribute to any object in the scene named Microsoft_DisableScale and set it to true. 3D Viewer Beta will then respect the FbxSystemUnit information baked into the FBX file. Scale in 3D Viewer Beta is 1 meter per FBX unit.
+
+## Viewing 3D models on HoloLens
+
+### Open an FBX file from Microsoft Edge
+
+FBX files can be opened directly from a website using Microsoft Edge on HoloLens.
+
+1. In Microsoft Edge, navigate to the webpage containing the FBX file you want to view.
+1. Select the file to download it.
+1. When the download is complete, select the **Open** button in Microsoft Edge to open the file in 3D Viewer Beta.
+
+The downloaded file can be accessed and opened again later by using Downloads in Microsoft Edge. To save a 3D model and ensure continued access, download the file on your PC and save it to your OneDrive account. The file can then be opened from the OneDrive app on HoloLens.
+
+> [!NOTE]
+> Some websites with downloadable FBX models provide them in compressed ZIP format. 3D Viewer Beta cannot open ZIP files directly. Instead, use your PC to extract the FBX file and save it to your OneDrive account. The file can then be opened from the OneDrive app on HoloLens.
+
+### Open an FBX file from OneDrive
+
+FBX files can be opened from OneDrive by using the OneDrive app on HoloLens. Be sure you've installed OneDrive using Microsoft Store app on HoloLens and that you've already uploaded the FBX file to OneDrive on your PC.
+
+Once in OneDrive, FBX files can be opened on HoloLens using 3D Viewer Beta in one of two ways:
+
+- Launch OneDrive on HoloLens and select the FBX file to open it in 3D Viewer Beta.
+- Launch 3D Viewer Beta, air tap to show the toolbar, and select **Open File**. OneDrive will launch, allowing you to select an FBX file.
+
+## Troubleshooting
+
+### I see a warning when I open a 3D model
+
+You will see a warning if you attempt to open a 3D model that contains features that are not supported by 3D Viewer Beta, or if the model is too complex and performance may be affected. 3D Viewer Beta will still load the 3D model, but performance or visual fidelity may be compromised.
+
+For more info, see [Supported content specifications](#supported-content-specifications) and [Optimizing 3D models for 3D Viewer Beta](#optimizing-3d-models-for-3d-viewer-beta).
+
+### I see a warning and the 3D model doesn't load
+
+You will see an error message when 3D Viewer Beta cannot load a 3D model due to complexity or file size, or if the FBX file is corrupt or invalid. You will also see an error message if you have reached the limit on the total number of models, vertices, or meshes that can be open simultaneously.
+
+For more info, see [Supported content specifications](#supported-content-specifications) and [File and model limitations](#file-and-model-limitations).
+
+If you feel your model meets the supported content specifications and has not exceeded the file or model limitations, you may send your FBX file to the 3D Viewer Beta team at holoapps@microsoft.com. We are not able to respond personally, but having examples of files that do not load properly will help our team improve on future versions of the app.
+
+### My 3D model loads, but does not appear as expected
+
+If your 3D model does not look as expected in 3D Viewer Beta, air tap to show the toolbar, then select **Details**. Aspects of the file which are not supported by 3D Viewer Beta will be highlighted as warnings.
+
+The most common issue you might see is missing textures, likely because they are not embedded in the FBX file. In this case, the model will appear white. This issue can be addressed in the creation process by exporting from your creation tool to FBX with the embed textures option selected.
+
+For more info, see [Supported content specifications](#supported-content-specifications) and [Optimizing 3D models for 3D Viewer Beta](#optimizing-3d-models-for-3d-viewer-beta).
+
+### I experience performance drops while viewing my 3D model
+
+Performance when loading and viewing a 3D model can be affected by the complexity of the model, number of models open simultaneously, or number of models with active animations.
+
+For more info, see [Optimizing 3D models for 3D Viewer Beta](#optimizing-3d-models-for-3d-viewer-beta) and [File and model limitations](#file-and-model-limitations).
+
+### When I open an FBX file on HoloLens, it doesn't open in 3D Viewer Beta
+
+3D Viewer Beta is automatically associated with the .fbx file extension when it is installed.
+
+If you try to open an FBX file and see a dialog box that directs you to Microsoft Store, you do not currently have an app associated with the .fbx file extension on HoloLens.
+
+Verify that 3D Viewer Beta is installed. If it is not installed, download it from Microsoft Store on HoloLens.
+
+If 3D Viewer Beta is already installed, launch 3D Viewer Beta, then try opening the file again. If the issue persists, uninstall and reinstall 3D Viewer Beta. This will re-associate the .fbx file extension with 3D Viewer Beta.
+
+If attempting to open an FBX file opens an app other than 3D Viewer Beta, that app was likely installed after 3D Viewer Beta and has taken over association with the .fbx file extension. If you prefer 3D Viewer Beta to be associated with the .fbx file extension, uninstall and reinstall 3D Viewer Beta.
+
+### The Open File button in 3D Viewer Beta doesn't launch an app
+
+The **Open File** button will open the app associated with the file picker function on HoloLens. If OneDrive is installed, the **Open File** button should launch OneDrive. However, if there is currently no app associated with the file picker function installed on HoloLens, you will be directed to Microsoft Store.
+
+If the **Open File** button launches an app other than OneDrive, that app was likely installed after OneDrive and has taken over association with the file picker function. If you prefer OneDrive to launch when selecting the **Open File** button in 3D Viewer Beta, uninstall and reinstall OneDrive.
+
+If the **Open File** button is not active, it's possible that you have reached the limit of models that can be open in 3D Viewer Beta at one time. If you have 40 models open in 3D Viewer Beta, you will need to close some before you will be able to open additional models.
+
+## Additional resources
+
+- [Support forums](http://forums.hololens.com/categories/3d-viewer-beta)
+- [Third-party notices](https://www.microsoft.com/{lang-locale}/legal/products)
diff --git a/devices/hololens/holographic-custom-apps.md b/devices/hololens/holographic-custom-apps.md
new file mode 100644
index 0000000000..4936fab2b7
--- /dev/null
+++ b/devices/hololens/holographic-custom-apps.md
@@ -0,0 +1,56 @@
+---
+title: Manage custom apps for HoloLens
+description: Side load custom apps on HoloLens. Learn more about installing, and uninstalling holographic apps.
+ms.assetid: 6bd124c4-731c-4bcc-86c7-23f9b67ff616
+ms.date: 07/01/2019
+manager: v-miegge
+keywords: hololens, sideload, side load, side-load, store, uwp, app, install
+ms.prod: hololens
+ms.sitesec: library
+author: mattzmsft
+ms.author: mazeller
+ms.topic: article
+ms.localizationpriority: medium
+appliesto:
+- HoloLens (1st gen)
+- HoloLens 2
+---
+
+# Install and manage custom applications (non-store)
+
+HoloLens supports many existing applications from the Microsoft Store, as well as new apps built specifically for HoloLens. This article focuses on custom holographic applications.
+
+For more information about store apps, see [Manage apps with the store](holographic-store-apps.md).
+
+## Install custom apps
+
+You can install your own applications on HoloLens either by using the Device Portal or by deploying the apps from Visual Studio.
+
+### Installing an application package with the Device Portal
+
+1. Establish a connection from [Device Portal](https://docs.microsoft.com/windows/mixed-reality/using-the-windows-device-portal) to the target HoloLens.
+1. In the left navigation, navigate to the **Apps** page .
+1. Under **App Package** browse to the .appx file that is associated with your application.
+ > [!IMPORTANT]
+ > Make sure to reference any associated dependency and certificate files.
+
+1. Select **Go**.
+
+ 
+
+### Deploying from Microsoft Visual Studio 2015
+
+1. Open your app's Visual Studio solution (.sln file).
+1. Open the project's **Properties**.
+1. Select the following build configuration: **Master/x86/Remote Machine**.
+1. When you select **Remote Machine**:
+
+ - Make sure the address points to the Wi-Fi IP address of your HoloLens.
+ - Set authentication to **Universal (Unencrypted Protocol)**.
+1. Build your solution.
+1. To deploy the app from your development PC to your HoloLens, select **Remote Machine**. If you already have an existing build on the HoloLens, select **Yes** to install this newer version.
+
+ 
+1. The application will install and auto launch on your HoloLens.
+
+After you've installed an app, you'll find it in the **All apps** list (**Start** > **All apps**).
diff --git a/devices/hololens/holographic-home.md b/devices/hololens/holographic-home.md
index 576866ca2c..9b554c0638 100644
--- a/devices/hololens/holographic-home.md
+++ b/devices/hololens/holographic-home.md
@@ -1,6 +1,6 @@
---
-title: Navigate the Windows Mixed Reality home
-description: Navigate the Windows Mixed Reality home in Windows Holographic.
+title: Start menu and mixed reality home
+description: Navigate the mixed reality home in Windows Holographic.
ms.assetid: 742bc126-7996-4f3a-abb2-cf345dff730c
ms.date: 08/07/2019
keywords: hololens
@@ -9,82 +9,79 @@ ms.sitesec: library
author: scooley
ms.author: scooley
ms.topic: article
-ms.localizationpriority: medium
+ms.localizationpriority: high
+appliesto:
+- HoloLens (1st gen)
+- HoloLens 2
---
-# Navigate the Windows Mixed Reality home
+# Start menu and mixed reality home
-## [Navigating MR Home](https://docs.microsoft.com/en-us/windows/mixed-reality/navigating-the-windows-mixed-reality-home)
+Just like the Windows PC experience starts with the desktop, Windows Holographic starts with mixed reality home. Using the Start menu you can open and place app windows, immersive app launchers, and 3D content in mixed reality home, and their placement in your physical space will be remembered.
## Use the Start menu
-The **Start** menu on HoloLens is where you'll open apps and get to the HoloLens camera.
+The Start menu on HoloLens is where you'll open apps, see important status info, and access tools like the camera.
-Wherever you are in HoloLens, you can always open the **Start** menu by using the [bloom gesture](https://support.microsoft.com/help/12644/hololens-use-gestures) on HoloLens (1st gen) or tapping your wrist on HoloLens 2. Usually, you'll use it once to get to **Start**, but sometimes you might need to use it twice.
+Wherever you are in HoloLens, you can always open the Start menu by using **Start gesture**. On HoloLens (1st gen) the Start gesture is [bloom](https://support.microsoft.com/help/12644/hololens-use-gestures). On HoloLens 2, the [Start gesture](hololens2-basic-usage.md#start-gesture) is to tap the Start icon that appears on your wrist. You can also open the Start menu using your voice by saying "Go to Start".
> [!TIP]
-> When the **Start** menu is open, use the start gesture to hide it again.
+> When the Start menu is open, use the Start gesture to close it, or look at the Start menu and say "Close".
-At the top of the **Start** menu, you'll see status indicators for Wi-Fi, battery, and volume, plus a clock. The tiles are your pinned apps. To talk to Cortana, select her tile, or just say "Hey Cortana" from anywhere on HoloLens. At the bottom you'll find the photo and video icons, which open the camera app.
+At the top of the Start menu, you'll see status indicators for Wi-Fi, battery, volume, and a clock. On HoloLens 2 there is also a listening indicator that shows whether the device is speech enabled and is listening for voice commands. At the bottom you'll find the **Photo** and **Video** buttons which allow you to take photos and video recordings. There is also a **Connect** button that allows you to project what you see to another device using Miracast.
-To see the rest of your apps, select **All apps**. To get back to **Start** from the **All apps** list, select **Pinned apps**.
+### Find apps on Start menu
-## Use apps on HoloLens
+The Start menu has a **Pinned apps** list and an **All apps** list.
-Apps on HoloLens use either 2D view or holographic view. Apps with 2D view look like windows, and apps with holographic view surround you and become the only app you see.
+- The **Pinned apps** list shows apps that have been pinned. You can add and remove apps from the **Pinned apps** list using the context menu that appears when you **select and hold** on an app tile.
-### Open apps
+- The **All apps** list shows all apps that are installed on the device. Select the **All apps** button on the right side of the **Start** menu to get to the list.
-You'll find your apps either pinned to **Start** or in the **All apps** list. To get to the **All apps** list, use the bloom gesture to go to **Start**, then select **All apps**.
-
-On **Start** or in the **All apps** list, select an app. It will open in a good position for viewing.
-
->[!NOTE]
->- Up to three 2D app windows can be active at a time. You can open more, but only three will remain active.
->- Each open app can have one active window at a time, except Microsoft Edge, which can have up to three.
->- If you're having problems with apps, make sure there's enough light in your space, and walk around so HoloLens has a current scan. If you keep having trouble, see [HoloLens and holograms: FAQ](https://support.microsoft.com/help/13456/hololens-and-holograms-faq) for more info.
-
-## Move, resize, and rotate apps
-
-Moving and resizing apps on HoloLens works a bit differently than it does on a PC. Instead of dragging the app, you'll use your gaze, along with a [gesture](https://support.microsoft.com/help/12644/hololens-use-gestures) or the [clicker](hololens-clicker.md). You can also rotate an app window in 3D space.
+On both app lists, use the **Page up** and **Page down** buttons on the right side of the Start menu to page through all the apps in the list. Both app lists will automatically open to the page that was last used during a device session.
> [!TIP]
-> Rearrange apps using your voice—gaze at an app and say "Face me," "Bigger," or "Smaller." Or have Cortana move an app for you: say "Hey Cortana, move <*app name*> here."
+> On HoloLens 2, you can directly scroll the app lists using your index finger. Just touch the list with your finger tip and drag upwards or downwards.
-### Move an app
+### Open apps from Start menu
-Gaze at the app, and then do one of the following.
+To open an app from the Start menu, simply **select** an **app tile**. You can also say the name of an app to open it.
-- Tap and hold to select the app. Move your hand to position the app, and raise your finger to place it.
+When you open an app from the Start menu, one of the following will happen, depending on how the app is designed:
-- Select **Adjust**, tap and hold, and move your hand to position the app. Raise your finger to place it, then select **Done**.
-- Select **Adjust**, click and hold the clicker, and move your hand to position the app. Release the clicker, then select **Done**.
+- An **app window** is placed. The app is then loaded in the window and you can use it like a touch screen.
+- A **3D app launcher** for an immersive app is placed. You need to then **select** the launcher to open the immersive app.
+- An app window is placed which acts as a **launcher** for an immersive app. The immersive app will proceed to launch automatically.
-> [!TIP]
-> If you drop apps when you move them, make sure to keep your hand in the gesture frame by following it with your gaze.
+App windows and app launchers placed in mixed reality home will stay around until you decide to remove them. They give you a convenient shortcut in the world to use those app windows or to launch immersive apps without having to open them again from the Start menu.
-### Resize an app
+> [!NOTE]
+>Like on a phone, system resources is managed automatically on HoloLens. For example, when you open a new immersive app, all other running apps will immediately become inactive. There is no need to remove app windows and launchers in mixed reality home to free up system resources.
-Gaze at the app, and then do one of the following.
+## Using apps on HoloLens
-- Gaze at a corner or edge of an app window, and tap and hold. Move your hand to change the app's size, and raise your finger when you're done.
+Apps on HoloLens can use app window view or immersive view. With app window view the app simply shows its content inside a window. With immersive view an app takes you away from mixed realty home where it can then display its content in the physical environment all around you. Apps can also choose to use both views.
-- Select **Adjust**. Gaze at one of the blue squares at the corners of the app, tap and hold, then move your hand to resize the app. Raise your finger to release it, then select **Done**.
-- Select **Adjust**. Gaze at one of the blue squares at the corners of the app, click and hold the clicker, then move your hand to resize the app. Release the clicker, then select **Done**.
+### Use app windows
-> [!TIP]
-> In Adjust mode, you can move or resize any hologram.
+On HoloLens (1st gen) app windows are placed and used in mixed reality home, where you can [move, resize, and rotate](hololens1-basic-usage.md#move-resize-and-rotate-apps) them as you like. In addition to using app windows with gaze and gesture, you can also use them with Bluetooth connected mouse and keyboard.
-### Rotate an app
+On HoloLens 2, in addition to using app windows in mixed reality home, you can also use one app window at a time inside an immersive app. You can also put an app window into **Follow me** mode where it will stay in front of you as you walk around. When you open an app window while inside an immersive app, it will open in **Follow me** mode automatically. You can [move, resize, and rotate](hololens2-basic-usage.md#move-resize-and-rotate-holograms) app windows directly using your hands in both mixed reality home and inside an immersive app.
-Gaze at the app, and tap and hold with both hands to select it. Rotate the app by keeping one hand steady and moving your other hand around it. When you're done, raise both index fingers.
+> [!NOTE]
+>
+> - Up to three app windows can be active in mixed reality home at a time. You can open more, but only three will remain active.
+> - When an app window is not active, it will show content that looks darkened compared to an active window. Some will simply show the app icon instead of any content. To activate an inactive window simply **select** it.
+> - Each open app can have one active window at a time, except Microsoft Edge, which can have up to three.
-## Close apps
+### Close apps
-To close an app that uses 2D view, gaze at it, then select **Close**.
+To close an app that uses an app window, simply close the app window with the **Close** button on the title bar. You can also look at the window and say "Close".
-To close an app that uses holographic view, use the bloom gesture to leave holographic view, then select **Close**.
+To exit an app that uses immersive view, use the Start gesture to bring up the **Start menu**, then select the **Mixed reality home** button.
-## Pin apps
+If an immersive app is in a broken state and you need to restart it, you can make sure the app is first completely shut down by closing its launcher in mixed reality home, then launching it from the Start menu.
-Keep your favorite apps handy by pinning them to **Start**. In the **All apps** list, gaze at an app to highlight it. Tap and hold until the menu appears, then select **Pin**. To unpin an app, gaze at the app on **Start**, then tap and hold and select **Unpin**.
+## Related info
+
+[Find, Install, and Uninstall applications from the Microsoft Store](holographic-store-apps.md)
diff --git a/devices/hololens/holographic-photos-and-video.md b/devices/hololens/holographic-photos-and-video.md
index 25e8d4a104..a02c1fb445 100644
--- a/devices/hololens/holographic-photos-and-video.md
+++ b/devices/hololens/holographic-photos-and-video.md
@@ -8,12 +8,13 @@ ms.sitesec: library
author: Teresa-Motiv
ms.author: v-tea
ms.topic: article
-ms.localizationpriority: medium
+ms.localizationpriority: high
ms.date: 8/12/19
ms.reviewer:
manager: jarrettr
appliesto:
-- Hololens (1st gen)
+- HoloLens (1st gen)
+- HoloLens 2
---
# Create, share, and view photos and video
@@ -22,21 +23,31 @@ Use your HoloLens to take photos and videos that capture the holograms you've pl
To sync your photos and videos to OneDrive, open the OneDrive app and select **Settings** > **Camera upload**, and then turn on **Camera upload**.
-## Take a photo
+## Take a photo on HoloLens (1st gen)
-Use the [bloom](https://support.microsoft.com/help/12644/hololens-use-gestures) gesture to go to **Start**, then select **Photo**. Use gaze to position the photo frame, then air tap to take the picture. The picture will be saved to your collection in the Photos app.
+Use the open the **Start** menu, and then select the Photos app.
-Want to snap a quick pic? Press the volume up and volume down buttons at the same time. [Where are the buttons?](https://support.microsoft.com/help/12649/hololens-whats-in-the-box)
+Use gaze to position the photo frame, then air tap to take the picture. The picture will be saved to your collection in the Photos app.
-## Take a video
+Want to snap a quick picture? Press the [volume up and volume down buttons](hololens1-hardware.md#hololens-components) at the same time.
+
+## Take a video on HoloLens (1st gen)
Use the bloom gesture to go to **Start**, then select **Video**. Use gaze to position the video frame, then air tap to start recording. To stop recording, use bloom once. The video will be saved to your collection in the Photos app.
-To start recording more quickly, press and hold the volume up and volume down buttons simultaneously until a 3-second countdown begins. To stop recording, tap both buttons.
+To start recording more quickly, press and hold the volume up and volume down buttons simultaneously until a three-second countdown begins. To stop recording, tap both buttons.
> [!TIP]
> You can always have Cortana take a photo or a video for you. Just say "Hey Cortana, take a photo" or "Hey Cortana, take a video." [What else can I say to Cortana?](hololens-cortana.md)
-[Take + share photos and video with Mixed reality capture](https://docs.microsoft.com/en-us/windows/mixed-reality/mixed-reality-capture)
+## Find your photos and videos
-[Find and view your photos](https://docs.microsoft.com/en-us/windows/mixed-reality/see-your-photos)
+To see your photos from OneDrive, select **More** > **Settings**, and then turn on **Show my cloud-only content from OneDrive**. (You'll need to sign in to the Photos app with your Microsoft account, if you haven't already.)
+
+To pin a photo or video in your world, open it, then select **Place in mixed world**. Use tap and hold to move it to where you want it.
+
+## Share photos and videos
+
+To share images to a social network, in the Collection view, tap and hold the photo you want to share, then select **Share**. Select **Share Assistant**, then select the app that you want to share to.
+
+You can also share directly from the camera app right after you take a photo—at the top of the image, select **Share**.
diff --git a/devices/hololens/holographic-store-apps.md b/devices/hololens/holographic-store-apps.md
new file mode 100644
index 0000000000..6d0e0d820a
--- /dev/null
+++ b/devices/hololens/holographic-store-apps.md
@@ -0,0 +1,53 @@
+---
+title: Find, install, and uninstall applications
+description: The Microsoft Store is your source for apps and games that work with HoloLens. Learn more about finding, installing, and uninstalling holographic apps.
+ms.assetid: cbe9aa3a-884f-4a92-bf54-8d4917bc3435
+ms.reviewer: v-miegge
+ms.date: 8/30/2019
+manager: jarrettr
+keywords: hololens, store, uwp, app, install
+ms.prod: hololens
+ms.sitesec: library
+author: mattzmsft
+ms.author: mazeller
+ms.topic: article
+ms.localizationpriority: medium
+appliesto:
+- HoloLens (1st gen)
+- HoloLens 2
+---
+
+# Find, install, and uninstall applications from the Microsoft Store
+
+The Microsoft Store is your go-to source for apps and games that work with HoloLens. When you go to the Store on your HoloLens, any apps you see there will run on it.
+
+Apps on HoloLens use either 2D view or holographic view. Apps that use 2D view look like windows and can be positioned all around you. Apps that use holographic view surround you and become the only app you see.
+
+HoloLens supports many existing applications from the Microsoft Store, as well as new apps built specifically for HoloLens. This article focuses on holographic applications from the Microsoft Store.
+
+To learn more about installing and running custom apps, read [Custom holographic applications](holographic-custom-apps.md).
+
+## Find apps
+
+Open the Microsoft Store from the **Start** menu. Then browse for apps and games. You can use Cortana to search by saying "Hey, Cortana" and then saying your search terms.
+
+## Install apps
+
+To download apps, you'll need to be signed in with a Microsoft account. To buy them, you'll need a payment method associated with the Microsoft account you use on your HoloLens. To set up a payment method, go to [account.microsoft.com](http://account.microsoft.com/) and select **Payment & billing** > **Payment options** > **Add a payment option**.
+
+1. To open the [**Start** menu](holographic-home.md), perform a [bloom](hololens1-basic-usage.md) gesture or tap your wrist.
+2. Select the Store app and then tap to place this tile into your world.
+3. Once the Store app opens, use the search bar to look for any desired application.
+4. Select **Get** or **Install** on the application's page (a purchase may be required).
+
+## Uninstall apps
+
+There are two ways to uninstall applications. You can uninstall applications through the Microsoft Store or Start menu.
+
+### Uninstall from the Start menu
+
+On the **Start** menu or in the **All apps** list, gaze at the app. Tap and hold until the menu appears, then select **Uninstall**.
+
+### Uninstall from the Microsoft Store
+
+Open the Microsoft Store from the **Start** menu, and then browse for the application you'd like to uninstall. On the Store page, each application that you have installed has an **Uninstall** button.
diff --git a/devices/hololens/hololens-calibration.md b/devices/hololens/hololens-calibration.md
new file mode 100644
index 0000000000..1296d0f4bd
--- /dev/null
+++ b/devices/hololens/hololens-calibration.md
@@ -0,0 +1,147 @@
+---
+title: Improve visual quality and comfort
+description: Calibrating your IPD (interpupillary distance) can improve the quality of your visuals. Both HoloLens and Windows Mixed Reality immersive headsets offer ways to customize IPD.
+author: Teresa-Motiv
+ms.author: xerxesb
+ms.date: 9/13/2019
+ms.topic: article
+keywords: calibration, comfort, visuals, quality, ipd
+ms.prod: hololens
+ms.sitesec: library
+author: Teresa-Motiv
+ms.localizationpriority: high
+ms.reviewer:
+manager: jarrettr
+appliesto:
+- HoloLens (1st gen)
+- HoloLens 2
+---
+
+# Improve visual quality and comfort
+
+HoloLens 2 and HoloLens (1st gen) both work better when they're calibrated to your unique eyes.
+
+While both devices need to calibrate for the best hologram viewing experience, they use different calibration technologies and techniques. Jump to [HoloLens 2 calibration](#calibrating-your-hololens-2) or [HoloLens (1st gen) calibration](#calibrating-your-hololens-1st-gen).
+
+## Calibrating your HoloLens 2
+
+HoloLens 2 uses eye-tracking technology to improve your experience seeing and interacting with the virtual environment. Calibrating the HoloLens 2 ensures that it can accurately track your eyes (and the eyes of anyone else who uses the device). After calibration, holograms will appear correctly even as the visor shifts on your head.
+
+HoloLens 2 prompts a user to calibrate the device under the following circumstances:
+
+- The user is using the device for the first time
+- The user previously opted out of the calibration process
+- The calibration process did not succeed the last time the user used the device
+
+
+
+During this process, you'll look at a set of targets (gems). It's fine if you blink or close your eyes during calibration but try not to stare at other objects in the room. This allows HoloLens to learn about your eye position to render your holographic world.
+
+
+
+
+
+
+
+If calibration was successful, you'll see a success screen. If not, read more about diagnosing calibration failures [here](#troubleshooting-hololens-2-calibration).
+
+
+
+### Calibration when sharing a device or session
+
+Multiple users can share a HoloLens 2 device, without a need for each person to go through device setup. When a new user puts the device on their head for th first time, HoloLens 2 automatically prompts the user to calibrate visuals. When a user that has previously calibrated visuals puts the device on their head, the display seamlessly adjusts for quality and a comfortable viewing experience.
+
+### Manually starting the calibration process
+
+1. Use the start gesture to open the [**Start** menu](hololens2-basic-usage.md#start-gesture).
+1. If the Settings app isn't pinned to **Start**, select **All Apps**.
+1. Select **Settings**, and then select **System** > **Calibration** > **Eye Calibration** > **Run eye calibration**.
+
+ 
+
+### Troubleshooting HoloLens 2 calibration
+
+Calibration should work for most people, but there are cases where calibration fails.
+
+Some potential reasons for calibration failure include:
+
+- Getting distracted and not following the calibration targets
+- Dirty or scratched device visor or device visor not positioned properly
+- Dirty or scratched glasses
+- Certain types of contact lenses and glasses (colored contact lenses, some toric contact lenses, IR blocking glasses, some high prescription glasses, sunglasses, or similar)
+- More-pronounced makeup and some eyelash extensions
+- Hair or thick eyeglass frames if they are blocking the device from seeing your eyes
+- Certain eye physiology, eye conditions or eye surgery such as narrow eyes, long eyelashes, amblyopia, nystagmus, some cases of LASIK or other eye surgeries
+
+If calibration is unsuccessful try:
+
+- Cleaning your device visor
+- Cleaning your glasses
+- Pushing your device visor as close to your eyes as possible
+- Moving objects in your visor out of the way (such as hair)
+- Turning on a light in your room or moving out of direct sunlight
+
+If you followed all guidelines and calibration is still failing, please let us know by filing feedback in [Feedback Hub](hololens-feedback.md).
+
+### Calibration data and security
+
+Calibration information is stored locally on the device and is not associated with any account information. There is no record of who has used the device without calibration. This mean new users will get prompted to calibrate visuals when they use the device for the first time, as well as users who opted out of calibration previously or if calibration was unsuccessful.
+
+Calibration information can always be deleted from the device in **Settings** > **Privacy** > **Eye tracker**.
+
+### Disable calibration
+
+You can also disable the calibration prompt by following these steps:
+
+1. Select **Settings** > **System** > **Calibration**.
+1. Turn off **When a new person uses this HoloLens, automatically ask to run eye calibration**.
+
+> [!IMPORTANT]
+> Please understand that this setting may adversely affect hologram rendering quality and comfort.
+
+### HoloLens 2 eye-tracking technology
+
+The device uses its eye-tracking technology to improve display quality, and to ensure that all holograms are positioned accurately and comfortable to view in 3D. Because it uses the eyes as landmarks, the device can adjust itself for every user and tune its visuals as the headset shifts slightly throughout use. All adjustments happen on the fly without a need for manual tuning.
+
+HoloLens applications use eye tracking to track where you are looking in real time. This is the main capability developers can leverage to enable a whole new level of context, human understanding and interactions within the Holographic experience. Developers don’t need to do anything to leverage this capability.
+
+## Calibrating your HoloLens (1st gen)
+
+HoloLens (1st gen) adjusts hologram display according to the your [interpupillary distance](https://en.wikipedia.org/wiki/Interpupillary_distance) (IPD). If the IPD is not accurate, holograms may appear unstable or at an incorrect distance. You can improve the quality of your visuals by calibrating the device to your interpupillary distance (IPD).
+
+When you set up your Hololens (1st gen) device, it prompts to calibrate your visuals after Cortana introduces herself. It's recommended that you complete the calibration step during this setup phase. However you can skip it by waiting until Cortana prompts you and then saying "Skip."
+
+During the calibration process, HoloLens asks you to align your finger with a series of six targets per eye. HoloLens uses this process to set the IPD correctly for your eyes.
+
+
+
+### Manually start the calibration process
+
+If you need to update the calibration or if a new user needs to adjust it, you can manually run the Calibration app at any time. The Calibration app is installed by default. You can access it by using eihter the **Start** menu or the Settings app.
+
+To use the **Start** menu to run the Calibration app, follow these steps:
+
+1. Use the [bloom](hololens1-basic-usage.md) gesture to open the **Start** menu.
+1. To view all apps, select **+**.
+1. Select **Calibration**.
+
+
+
+
+
+To use the Settings app to run the Calibration app, follow these steps:
+
+1. Use the [bloom](hololens1-basic-usage.md) gesture to open the **Start** menu.
+1. If **Settings** isn't pinned to **Start**, select **+** to view all apps.
+1. Select **Settings**.
+1. Select **System** > **Utilities** > **Open Calibration**.
+
+
+
+## Immersive headsets
+
+Some immersive headsets provide the ability to customize the IPD setting. To change the IPD for your headset, open the Settings app and select **Mixed reality** > **Headset display**, and then move the slider control. You’ll see the changes in real time in your headset. If you know your IPD, maybe from a visit to the optometrist, you can enter it directly as well.
+
+You can also adjust this setting on your PC by selecting **Settings** > **Mixed reality** > **Headset display**.
+
+If your headset does not support IPD customization, this setting will be disabled.
diff --git a/devices/hololens/hololens-clicker-restart-recover.md b/devices/hololens/hololens-clicker-restart-recover.md
deleted file mode 100644
index 25e49740c9..0000000000
--- a/devices/hololens/hololens-clicker-restart-recover.md
+++ /dev/null
@@ -1,49 +0,0 @@
----
-title: Restart or recover the HoloLens clicker
-description: Things to try if the HoloLens clicker is unresponsive or isn’t working well.
-ms.assetid: 13406eca-e2c6-4cfc-8ace-426ff8f837f4
-ms.reviewer: jarrettrenshaw
-ms.date: 07/01/2019
-manager: v-miegge
-keywords: hololens
-ms.prod: hololens
-ms.sitesec: library
-author: v-miegge
-ms.author: v-miegge
-ms.topic: article
-ms.localizationpriority: medium
----
-
-# Restart or recover the HoloLens clicker
-
-[Clicker recovery](https://support.microsoft.com/en-us/help/15555)
-
-Here are some things to try if the HoloLens clicker is unresponsive or isn’t working well.
-
-## Restart the clicker
-
-Use the tip of a pen to press and hold the [pairing button](https://support.microsoft.com/en-us/help/12646).
-
-
-
-At the same time, click and hold the clicker for 15 seconds. If the clicker was already paired with your HoloLens, it will stay paired after it restarts.
-
-
-
-If the clicker won't turn on or restart, try charging it using the HoloLens charger. If the battery is very low, it might take a few minutes for the white indicator light to turn on.
-
-## Re-pair the clicker
-
-Go to Settings > Devices and select the clicker. Select Remove, wait a few seconds, then pair the clicker again.
-
-## Recover the clicker
-
-If restarting and re-pairing the clicker don’t fix the problem, the Windows Device Recovery Tool can help you recover it. The recovery process may take some time, and the latest version of the clicker software will be installed. To use the tool, you’ll need a computer running Windows 10 or later with at least 4 GB of free storage space.
-
-To recover the clicker:
-
-1. Download and install the [Windows Device Recovery Tool](https://dev.azure.com/ContentIdea/ContentIdea/_queries/query/8a004dbe-73f8-4a32-94bc-368fc2f2a895/) on your computer.
-1. Connect the clicker to your computer using the Micro USB cable that came with your HoloLens.
-1. Run the Windows Device Recovery Tool and follow the instructions.
-
-If the clicker isn’t automatically detected, select **My device was not detected** and follow the instructions to put your device into recovery mode.
diff --git a/devices/hololens/hololens-clicker.md b/devices/hololens/hololens-clicker.md
deleted file mode 100644
index 8ec7e8077b..0000000000
--- a/devices/hololens/hololens-clicker.md
+++ /dev/null
@@ -1,65 +0,0 @@
----
-title: Use the HoloLens Clicker
-description:
-ms.assetid: 7d4a30fd-cf1d-4c9a-8eb1-1968ccecbe59
-ms.reviewer: jarrettrenshaw
-ms.date: 07/01/2019
-manager: v-miegge
-keywords: hololens
-ms.prod: hololens
-ms.sitesec: library
-author: v-miegge
-ms.author: v-miegge
-ms.topic: article
-ms.localizationpriority: medium
----
-
-# Use the HoloLens Clicker
-
-The clicker was designed specifically for HoloLens and gives you another way to interact with holograms. It comes with HoloLens, in a separate box. Use it in place of hand gestures to select, scroll, move, and resize.
-
-
-
-## Hold the clicker
-
-To put on the clicker, slide the loop over your ring or middle finger with the Micro USB port toward your wrist. Rest your thumb in the indentation.
-
-
-
-## Clicker gestures
-
-Clicker gestures are small wrist rotations, not the larger movements used for HoloLens hand gestures. And HoloLens will recognize your gestures and clicks even if the clicker is outside the [gesture frame](https://support.microsoft.com/help/12644), so you can hold the clicker in the position that's most comfortable for you.
-
-- **Select**. To select a hologram, button, or other element, gaze at it, then click.
-
-- **Click and hold**. Click and hold your thumb down on the button to do some of the same things you would with tap and hold, like move or resize a hologram.
-
-- **Scroll**. On the app bar, select **Scroll Tool**. Click and hold, then rotate the clicker up, down, left, or right. To scroll faster, move your hand farther from the center of the scroll tool.
-
-- **Zoom**. On the app bar, select **Zoom Tool**. Click and hold, then rotate the clicker up to zoom in, or down to zoom out.
-
->[!TIP]
->In Microsoft Edge, gaze at a page and double-click to zoom in or out.
-
-## Pair and charge the clicker
-
-To pair the clicker with your HoloLens, see [Pair Bluetooth devices](https://support.microsoft.com/help/12636).
-
-When the clicker battery is low, the battery indicator will blink amber. Plug the Micro USB cable into a USB power supply to charge the device.
-
-## Indicator lights
-
-Here's what the lights on the clicker mean.
-
-- **Blinking white**. The clicker is in pairing mode.
-
-- **Fast-blinking white**. Pairing was successful.
-
-- **Solid white**. The clicker is charging.
-
-- **Blinking amber**. The battery is low.
-
-- **Solid amber**. The clicker ran into an error and you'll need to restart it. While pressing the pairing button, click and hold for 15 seconds.
-
->[!NOTE]
->If the clicker doesn't respond or won't start, see [Restart or recover the HoloLens clicker](https://support.microsoft.com/help/15555/hololens-restart-or-recover-the-hololens-clicker).
diff --git a/devices/hololens/hololens-commercial-features.md b/devices/hololens/hololens-commercial-features.md
new file mode 100644
index 0000000000..1b3fdcdcd4
--- /dev/null
+++ b/devices/hololens/hololens-commercial-features.md
@@ -0,0 +1,77 @@
+---
+title: Commercial features
+description: The Microsoft HoloLens Commercial Suite includes features that make it easier for businesses to manage HoloLens devices. HoloLens 2 devices are equipped with commercial features by default.
+author: scooley
+ms.author: scooley
+ms.date: 08/26/19
+ms.topic: article
+keywords: HoloLens, commercial, features, mdm, mobile device management, kiosk mode
+ms.prod: hololens
+ms.sitesec: library
+ms.localizationpriority: high
+ms.reviewer:
+manager: jarrettr
+appliesto:
+- HoloLens (1st gen)
+- HoloLens 2
+---
+
+# Commercial features
+
+HoloLens includes features that make it easier for businesses to manage HoloLens devices.
+
+Every HoloLens 2 device has commercial features available.
+
+HoloLens (1st gen) came with two licensing options, the developer license and a commercial license. To unlock HoloLens's commercial capabilities, upgrade from the developer license to a commercial license. To purchase the Microsoft HoloLens Commercial Suite, contact your local Microsoft account manager.
+
+>[!VIDEO https://www.youtube.com/embed/tNd0e2CiAkE]
+
+## Key commercial features
+
+- **Kiosk mode.** You can use HoloLens in demo or showcase experiences by using kiosk mode, to limit which apps can run.
+
+ 
+
+- **Mobile Device Management (MDM) for HoloLens.** Your IT department can manage multiple HoloLens devices simultaneously by using solutions such as Microsoft Intune. You can manage settings, select apps to install, and set security configurations that are tailored to your organization's needs.
+
+ 
+
+- **Windows Update for Business.** Windows Update for Business provides controlled operating system updates to devices and support for the long-term servicing channel.
+- **Data security.** BitLocker data encryption is enabled on HoloLens to provide the same level of security protection as any other Windows device.
+- **Work access.** Anyone in your organization can remotely connect to the corporate network through virtual private network (VPN) on a HoloLens. HoloLens can also access Wi-Fi networks that require credentials.
+- **Microsoft Store for Business.** Your IT department can also set up an enterprise private store, containing only your company’s apps for your specific HoloLens usage. Securely distribute your enterprise software to selected group of enterprise users.
+
+## Feature comparison between editions
+
+|Features |HoloLens Development Edition |HoloLens Commercial Suite |HoloLens 2 |
+|---|:---:|:---:|:---:|
+|Device Encryption (BitLocker) | |✔️ |✔️ |
+|Virtual Private Network (VPN) | |✔️ |✔️ |
+|[Kiosk mode](https://docs.microsoft.com/windows/mixed-reality/using-the-windows-device-portal#kiosk-mode) | |✔️ |✔️ |
+|**Management and deployment** | | | |
+|Mobile Device Management (MDM) | |✔️ |✔️ |
+|Ability to block unenrollment | |✔️ |✔️ |
+|Cert-based corporate Wi-Fi access | |✔️ |✔️ |
+|Microsoft Store (Consumer) |Consumer |Filter by using MDM |Filter by using MDM |
+[Business Store Portal](https://docs.microsoft.com/microsoft-store/working-with-line-of-business-apps) | |✔️ |✔️ |
+|**Security and identity** | | | |
+|Sign in by using Azure Active Directory (AAD) account |✔️ |✔️ |✔️ |
+|Sign in by using Microsoft Account (MSA) |✔️ |✔️ |✔️ |
+|Next Generation Credentials with PIN unlock |✔️ |✔️ |✔️ |
+|[Secure boot](https://docs.microsoft.com/windows-hardware/design/device-experiences/oem-secure-boot) |✔️ |✔️ |✔️ |
+|**Servicing and support** | | | |
+|Automatic system updates as they arrive |✔️ |✔️ |✔️ |
+|[Windows Update for Business](https://docs.microsoft.com/windows/deployment/update/waas-manage-updates-wufb) | |✔️ |✔️ |
+|Long-Term Servicing Channel (LTSC) | |✔️ |✔️ |
+
+## Enabling commercial features
+
+Your organization's IT admin can set up commercial features such as Microsoft Store for Business, kiosk mode, and enterprise Wi-Fi access. The [Microsoft HoloLens](https://docs.microsoft.com/hololens) documentation provides step-by-step instructions for enrolling devices and installing apps from Microsoft Store for Business.
+
+## See also
+
+- [Microsoft HoloLens](https://docs.microsoft.com/hololens)
+- [Kiosk mode](/windows/mixed-reality/using-the-windows-device-portal.md#kiosk-mode)
+- [CSPs supported in HoloLens devices](/windows/client-management/mdm/configuration-service-provider-reference#csps-supported-in-hololens-devices)
+- [Microsoft Store For Business and line of business applications](https://blogs.technet.microsoft.com/sbucci/2016/04/13/windows-store-for-business-and-line-of-business-applications/)
+- [Working with line-of-business apps](/microsoft-store/working-with-line-of-business-apps)
diff --git a/devices/hololens/hololens-connect-devices.md b/devices/hololens/hololens-connect-devices.md
index c702921e14..6e8f48fa30 100644
--- a/devices/hololens/hololens-connect-devices.md
+++ b/devices/hololens/hololens-connect-devices.md
@@ -8,39 +8,67 @@ author: Teresa-Motiv
ms.author: v-tea
ms.topic: article
ms.localizationpriority: medium
-ms.date: 8/12/19
+ms.date: 9/13/2019
manager: jarrettr
appliesto:
- HoloLens (1st gen)
- HoloLens 2
---
-# Connect devices and accessories
+# Connect to Bluetooth and USB-C devices
## Pair Bluetooth devices
-Pair a Bluetooth mouse and keyboard with HoloLens, then use them to interact with holograms and to type anywhere you'd use the holographic keyboard. Pair the HoloLens [clicker](hololens-clicker.md) for a different way to interact with HoloLens.
+Pair a Bluetooth mouse and keyboard with HoloLens, then use them to interact with holograms and to type anywhere you'd use the holographic keyboard.
+
+Classes of Bluetooth devices supported by HoloLens 2:
+
+- Mouse
+- Keyboard
+- Bluetooth audio output (A2DP) devices
+
+Classes of Bluetooth devices supported by HoloLens (1st gen):
+
+- Mouse
+- Keyboard
+- HoloLens (1st gen) clicker
> [!NOTE]
-> Other types of Bluetooth devices, such as speakers, headsets, smartphones, and game pads, may appear as available in HoloLens settings, but aren't supported. [Learn more](http://go.microsoft.com/fwlink/p/?LinkId=746660).
+> Other types of Bluetooth devices, such as speakers, headsets, smartphones, and game pads, may appear as available in HoloLens settings, but aren't supported on HoloLens (1st gen). [Learn more](http://go.microsoft.com/fwlink/p/?LinkId=746660).
### Pair a Bluetooth keyboard or mouse
-1. Turn on your keyboard or mouse and make it discoverable. The way you make it discoverable depends on the device. Check the device or visit the manufacturer's website to learn how.
+1. Turn on your keyboard or mouse and make it discoverable. The way you make it discoverable depends on the device. To learn how to do this, check the device or visit the manufacturer's website.
-1. Go to **Start**, then select **Settings**.
-1. Select **Devices** and make sure Bluetooth is on. When you see the device name, select **Pair** and follow the instructions.
+1. Use the bloom gesture (HoloLens (1st gen) or the start gesture (HoloLens 2) to go to **Start**, then select **Settings**.
+1. Select **Devices** and make sure that Bluetooth is on. When you see the device name, select **Pair** and follow the instructions.
### Pair the clicker
+> Applies to HoloLens (1st gen) only.
+
1. Use the bloom gesture to go to **Start**, then select **Settings**.
-1. Select **Devices** and make sure Bluetooth is on.
-1. Use the tip of a pen to press and hold the clicker's pairing button until the status light blinks white. Make sure to hold the button down until the light starts blinking. [Where's the pairing button?](hololens-clicker.md)
+1. Select **Devices** and make sure that Bluetooth is on.
+1. Use the tip of a pen to press and hold the clicker's pairing button until the status light blinks white. Make sure to hold the button down until the light starts blinking. [Where's the pairing button?](hololens1-clicker.md)
1. On the pairing screen, select **Clicker** > **Pair**.
## Connect USB-C devices
+> Applies to HoloLens 2 only.
+
+HoloLens 2 lets you connect a wide range of USB-C devices.
+
+HoloLens 2 supports the following devices classes:
+
+- Mass storage devices (such as thumb drives)
+- Ethernet adapters (including ethernet with charging)
+- USB-C to 3.5mm digital audio adapters
+- USB-C digital audio headsets (including headset adapters with charging)
+- Wired mouse
+- Wired keyboard
+- Combination PD hubs (USB A + PD charging)
+
## Connect to Miracast
-> Applies to HoloLens 2 only.
+Use Miracast by opening the **Start** menu and selecting the display icon or saying "Connect" while gazing at the **Start** menu. Choose an available device from the list that appears and complete pairing to begin projection.
diff --git a/devices/hololens/hololens-cortana.md b/devices/hololens/hololens-cortana.md
index 03ad75f637..5ffe60d2e1 100644
--- a/devices/hololens/hololens-cortana.md
+++ b/devices/hololens/hololens-cortana.md
@@ -1,8 +1,8 @@
---
-title: Cortana on HoloLens
+title: Use your voice with HoloLens
description: Cortana can help you do all kinds of things on your HoloLens
ms.assetid: fd96fb0e-6759-4dbe-be1f-58bedad66fed
-ms.date: 08/14/2019
+ms.date: 9/13/2019
keywords: hololens
ms.prod: hololens
ms.sitesec: library
@@ -10,39 +10,67 @@ author: v-miegge
ms.author: v-miegge
ms.topic: article
manager: jarrettr
-ms.localizationpriority: medium
+ms.localizationpriority: high
+appliesto:
+- HoloLens (1st gen)
+- HoloLens 2
---
# Use your voice with HoloLens
-You can use your voice to do many of the same things you do with gestures on HoloLens, like taking a quick photo or opening an app.
+You can use your voice to do almost anything on HoloLens, such as taking a quick photo or opening an app. Many voice commands are built into HoloLens, while others are available through Cortana.
-## Voice commands
-
-Get around HoloLens faster with these basic commands. If you turn Cortana off, "Hey Cortana" voice commands won't be available, but you'll still be able to use the following built-in voice commands.
-
-**Select**. Use this instead of air tap. Gaze at a hologram, then say "Select."
-
-**Go to start**. Say "Go to Start" anytime to bring up the **Start** menu. Or when you're in an immersive app, say "Go to Start" to get to the quick actions menu.
-
-**Move this**. Instead of air tapping and dragging an app, say "Move this" and use gaze to move it.
-
-**Face me**. Gaze at a hologram, and then say "Face me" to turn it your way.
-
-**Bigger/Smaller**. Gaze at a hologram, and then say "Bigger" or "Smaller" to resize it.
-
-Many buttons and other elements on HoloLens also respond to your voice—for example, **Adjust** and **Close** on the app bar. To find out if a button is voice-enabled, rest your gaze on it for a moment. If it is, you'll see a voice tip.
-
-## Dictation mode
-
-Tired of typing? Switch to dictation mode any time the holographic keyboard is active. Select the microphone icon to get started, or say "Start dictating." To stop dictating, select **Done** or say "Stop dictating." To delete what you just dictated, say "Delete that."
+This article teachs you how to control HoloLens and your holographic world with your voice and with Cortana.
> [!NOTE]
-> You need an Internet connection to use dictation mode.
+> Speech is only supported in [some languages](https://support.microsoft.com/help/4039262#Languages). The speech language is based on the Windows display language, not the keyboard language.
+>
+> You can verify the Windows display language by selecting **Settings** > **Time and Language** > **Language**.
+
+## Built-in voice commands
+
+Get around HoloLens faster with these basic commands. In order to use these you need to enable Speech during first run of the device or in **Settings** > **Privacy** > **Speech**. You can always check whether speech is enabled by looking at the status at the top of Start menu.
+
+### General speech commands
+
+Use these commands throughout Windows Mixed Reality to get around faster. Some commands use the gaze cursor, which you bring up by saying “select.”
+
+| Say this | To do this |
+| - | - |
+| "Select" | Say "select" to bring up the gaze cursor. Then, turn your head to position the cursor on the thing you want to select, and say “select” again. |
+|Open the Start menu | "Go to Start" |
+|Close the Start menu | "Close" |
+|Leave an immersive app | Say "Go to Start" to bring up the quick actions menu, then say "Mixed reality home." |
+|Hide and show hand ray | "Hide hand ray" / "Show hand ray" |
+|See available speech commands | "What can I say?" |
+
+### Hologram commands
+
+To use these commands, gaze at a 3D object, hologram, or app window.
+
+| Say this | To do this |
+| - | - |
+| "Bigger" | Make it bigger |
+| "Smaller" | Make it smaller |
+| "Face me" | Turn it to face you |
+| "Move this" | Move it (follow your gaze) |
+| "Close" | Close it |
+| "Follow" / "Stop following" | Make it follow you as you move around |
+
+### See it, say it
+
+Many buttons and other elements on HoloLens also respond to your voice—for example, **Follow me** and **Close** on the app bar, or the **Back** button in Edge. To find out if a button is voice-enabled, rest your **gaze cursor** on it for a moment to see a voice tip.
+
+### Dictation mode
+
+Tired of typing? Switch to dictation mode any time that the holographic keyboard is active. To get started, select the microphone icon or say "Start dictating." To stop dictating, select **Done** or say "Stop dictating." To delete what you just dictated, say "Delete that."
+
+> [!NOTE]
+> To use dictation mode, you have to have an internet connection.
HoloLens dictation uses explicit punctuation, meaning that you say the name of the punctuation you want to use. For instance, you might say "Hey **comma** what are you up to **question mark**."
-Here are the punctuation keywords you can use:
+Here are the punctuation keywords that you can use:
- Period, comma, question mark, exclamation point/exclamation mark
- New line/new paragraph
@@ -55,11 +83,13 @@ Sometimes it's helpful to spell out things like email addresses. For instance, t
## Do more with Cortana
-Cortana can help you do all kinds of things on your HoloLens, from searching the web to shutting down your device. To get her attention, select Cortana on Start or say "Hey Cortana" anytime.
+Cortana can help you do all kinds of things on your HoloLens, from searching the web to shutting down your device. She can give you suggestions, ideas, reminders, alerts, and more. To get her attention, select Cortana on **Start** or say "Hey Cortana" anytime.

-Here are some things you can try saying (remember to say "Hey Cortana" first):
+Here are some things you can try saying (remember to say "Hey Cortana" first).
+
+**Hey, Cortana**...
- What can I say?
- Increase the volume.
@@ -68,21 +98,22 @@ Here are some things you can try saying (remember to say "Hey Cortana" first):
- Restart.
- Go to sleep.
- Mute.
-- Launch ``.
-- Move `` here (gaze at the spot you want the app to move to).
+- Launch <*app name*>.
+- Move <*app name*> here (gaze at the spot that you want the app to move to).
- Go to Start.
- Take a picture.
- Start recording. (Starts recording a video.)
- Stop recording. (Stops recording a video.)
-- Call ``. (Requires Skype.)
+- Call <*contact*>. (Requires Skype.)
- What time is it?
- Show me the latest NBA scores.
- How much battery do I have left?
- Tell me a joke.
->[!NOTE]
->
->- Some Cortana features you're used to from Windows on your PC or phone (for example, reminders and notifications) aren't supported in Microsoft HoloLens Development Edition. Cortana on HoloLens is English-only, and the Cortana experience may vary among regions.
->- Cortana is on the first time you use HoloLens. You can turn her off in Cortana's settings. In the **All apps** list, select **Cortana > Settings**. Then turn off Cortana can give you suggestions, ideas, reminders, alerts, and more.
->- If Cortana isn't responding to "Hey Cortana," go to Cortana's settings and check to make sure she's on.
->- If you turn Cortana off, "Hey Cortana" voice commands won't be available, but you'll still be able to use other commands (such as "Select" and "Place").
+Some Cortana features that you're used to from Windows on your PC or phone (for example, reminders and notifications) aren't supported in Microsoft HoloLens Development Edition. Cortana on HoloLens is English-only, and the Cortana experience may vary from one region to another.
+
+### Turn Cortana off
+
+Cortana is on the first time you use HoloLens when you enable speech. You can turn her off in Cortana's settings. In the **All apps** list, select **Cortana > Settings**. Then turn off Cortana can give you suggestions, ideas, reminders, alerts, and more.
+
+If Cortana isn't responding to "Hey Cortana," check that speech is enabled on Start and go to Cortana's settings and check to make sure she's on.
diff --git a/devices/hololens/hololens-encryption.md b/devices/hololens/hololens-encryption.md
index 838674f0dc..62352e9767 100644
--- a/devices/hololens/hololens-encryption.md
+++ b/devices/hololens/hololens-encryption.md
@@ -11,17 +11,21 @@ ms.localizationpriority: medium
ms.date: 01/26/2019
ms.reviewer:
manager: dansimp
+appliesto:
+- HoloLens (1st gen)
---
# Enable encryption for HoloLens
-You can enable [BitLocker device encryption](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10#bitlocker-device-encryption) to protect files and information stored on the HoloLens. Device encryption helps protect your data by encrypting it using AES-CBC 128 encryption method, which is equivalent to [EncryptionMethodByDriveType method 3](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp#encryptionmethodbydrivetype) in the BitLocker configuration service provider (CSP). Only someone with the right encryption key (such as a password) can decrypt it or perform a data recovery.
+HoloLens (1st gen) and HoloLens 2 both support device encryption using BitLocker, however, BitLocker is always enabled on HoloLens 2.
+This article will help you enable and manage BitLocker on HoloLens (1st gen).
+On HoloLens (1st gen) you can enable BitLocker device encryption manually or using mobile device management (MDM). Follow these instructions to enable [BitLocker device encryption](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10#bitlocker-device-encryption) to protect files and information stored on the HoloLens. Device encryption helps protect your data using the AES-CBC 128 encryption method, which is equivalent to [EncryptionMethodByDriveType method 3](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp#encryptionmethodbydrivetype) in the BitLocker configuration service provider (CSP). Personnel who have the correct encryption key (such as a password) can decrypt it or perform a data recovery.
## Enable device encryption using MDM
-You can use your mobile device management (MDM) provider to apply a policy that requires device encryption. The policy used is the [Security/RequireDeviceEncryption setting](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-security#security-requiredeviceencryption) in the Policy CSP.
+You can use your Mobile Device Management (MDM) provider to apply a policy that requires device encryption. The policy to use is the [Security/RequireDeviceEncryption setting](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-security#security-requiredeviceencryption) in the Policy CSP.
[See instructions for enabling device encryption using Microsoft Intune.](https://docs.microsoft.com/intune/compliance-policy-create-windows#windows-holographic-for-business)
@@ -39,61 +43,48 @@ Provisioning packages are files created by the Windows Configuration Designer to
### Create a provisioning package that upgrades the Windows Holographic edition and enables encryption
-1. [Create a provisioning package for HoloLens.](hololens-provisioning.md)
-
-2. Go to **Runtime settings** > **Policies** > **Security**, and select **RequireDeviceEncryption**.
+1. [Create a provisioning package for HoloLens.](hololens-provisioning.md)
+1. Go to **Runtime settings** > **Policies** > **Security**, and select **RequireDeviceEncryption**.

-2. Browse to and select the XML license file that was provided when you purchased the Commercial Suite.
+1. Find the XML license file that was provided when you purchased the Commercial Suite.
>[!NOTE]
>You can configure [additional settings in the provisioning package](hololens-provisioning.md).
-3. On the **File** menu, click **Save**.
+1. On the **File** menu, click **Save**.
-4. Read the warning that project files may contain sensitive information, and click **OK**.
+1. Read the warning explaining that project files may contain sensitive information and click **OK**.
>[!IMPORTANT]
- >When you build a provisioning package, you may include sensitive information in the project files and in the provisioning package (.ppkg) file. Although you have the option to encrypt the .ppkg file, project files are not encrypted. You should store the project files in a secure location and delete the project files when they are no longer needed.
-
-3. On the **Export** menu, click **Provisioning package**.
+ >When you build a provisioning package, you may include sensitive information in the project files and provisioning package (.ppkg) file. Although you have the option to encrypt the .ppkg file, project files are not encrypted. You should store the project files in a secure location and delete the project files when no longer needed.
-4. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next**.
-
-5. Set a value for **Package Version**.
+1. On the **Export** menu, click **Provisioning package**.
+1. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next**.
+1. Set a value for **Package Version**.
>[!TIP]
>You can make changes to existing packages and change the version number to update previously applied packages.
-6. On the **Select security details for the provisioning package**, click **Next**.
-
-7. Click **Next** to specify the output location where you want the provisioning package to go once it's built. By default, Windows ICD uses the project folder as the output location.
+1. On the **Select security details for the provisioning package**, click **Next**.
+1. Click **Next** to specify the output location where you want the provisioning package to go once it's built. By default, Windows ICD uses the project folder as the output location.
Optionally, you can click Browse to change the default output location.
-8. Click **Next**.
-
-9. Click **Build** to start building the package. The project information is displayed in the build page and the progress bar indicates the build status.
-
-10. When the build completes, click **Finish**.
-
+1. Click **Next**.
+1. Click **Build** to start building the package. The project information is displayed in the build page and the progress bar indicates the build status.
+1. When the build completes, click **Finish**.
### Apply the provisioning package to HoloLens
1. Connect the device via USB to a PC and start the device, but do not continue past the **fit** page of the initial setup experience (the first page with the blue box).
-
-2. Briefly press and release the **Volume Down** and **Power** buttons simultaneously.
-
-3. HoloLens will show up as a device in File Explorer on the PC.
-
-4. In File Explorer, drag and drop the provisioning package (.ppkg) onto the device storage.
-
-5. Briefly press and release the **Volume Down** and **Power** buttons simultaneously again while on the **fit** page.
-
-6. The device will ask you if you trust the package and would like to apply it. Confirm that you trust the package.
-
-7. You will see whether the package was applied successfully or not. If it failed, you can fix your package and try again. If it succeeded, proceed with device setup.
+1. Briefly press and release the **Volume Down** and **Power** buttons simultaneously.
+1. HoloLens will show up as a device in File Explorer on the PC.
+1. In File Explorer, drag and drop the provisioning package (.ppkg) onto the device storage.
+1. Briefly press and release the **Volume Down** and **Power** buttons simultaneously again while on the **fit** page.
+1. The device will ask you if you trust the package and would like to apply it. Confirm that you trust the package.
+1. You will see whether the package was applied successfully or not. If it failed, you can fix your package and try again. If it succeeded, proceed with device setup.
>[!NOTE]
>If the device was purchased before August 2016, you will need to sign into the device with a Microsoft account, get the latest OS update, and then reset the OS in order to apply the provisioning package.
@@ -101,7 +92,7 @@ Provisioning packages are files created by the Windows Configuration Designer to
## Verify device encryption
Encryption is silent on HoloLens. To verify the device encryption status:
-
+
- On HoloLens, go to **Settings** > **System** > **About**. **BitLocker** is **enabled** if the device is encrypted.
-
+ 
diff --git a/devices/hololens/hololens-enroll-mdm.md b/devices/hololens/hololens-enroll-mdm.md
index 7f5f3200e8..e4d85a4c61 100644
--- a/devices/hololens/hololens-enroll-mdm.md
+++ b/devices/hololens/hololens-enroll-mdm.md
@@ -20,24 +20,22 @@ You can manage multiple Microsoft HoloLens devices simultaneously using solution
>[!NOTE]
>Mobile device management (MDM), including the VPN, Bitlocker, and kiosk mode features, is only available when you [upgrade to Windows Holographic for Business](hololens-upgrade-enterprise.md).
-
## Requirements
- Your organization will need to have mobile device management (MDM) set up in order to manage HoloLens devices. Your MDM provider can be Microsoft Intune or a 3rd party provider that uses Microsoft MDM APIs.
-## Auto-enrollment in MDM
+ Your organization will need to have Mobile Device Management (MDM) set up in order to manage HoloLens devices. Your MDM provider can be Microsoft Intune or a 3rd party provider that uses Microsoft MDM APIs.
-If your organization uses Azure Active Directory (Azure AD) and an MDM solution that accepts an AAD token for authentication (currently, only supported in Microsoft Intune and AirWatch), your IT admin can configure Azure AD to automatically allow MDM enrollment after the user signs in with their Azure AD account. [Learn how to configure Azure AD enrollment.](https://docs.microsoft.com/intune/deploy-use/set-up-windows-device-management-with-microsoft-intune#azure-active-directory-enrollment)
+## Auto-enrollment in MDM
+
+If your organization uses Azure Active Directory (Azure AD) and an MDM solution that accepts an AAD token for authentication (currently, only supported in Microsoft Intune and AirWatch), your IT admin can configure Azure AD to automatically allow MDM enrollment after the user signs in with their Azure AD account. [Learn how to configure Azure AD enrollment.](https://docs.microsoft.com/intune/deploy-use/set-up-windows-device-management-with-microsoft-intune#azure-active-directory-enrollment)
When auto-enrollment is enabled, no additional manual enrollment is needed. When the user signs in with an Azure AD account, the device is enrolled in MDM after completing the first-run experience.
## Enroll through Settings app
When the device is not enrolled in MDM during the first-run experience, the user can manually enroll the device with the organization's MDM server using the Settings app.
-
+
1. Go to **Settings** > **Accounts** > **Work access**.
-
-2. Select **Enroll into device management** and enter your organizational account. You will be redirected to your organization's sign in page.
-
-4. Upon successful authentication to the MDM server, a success message is shown.
+1. Select **Enroll into device management** and enter your organizational account. You will be redirected to your organization's sign in page.
+1. Upon successful authentication to the MDM server, a success message is shown.
Your device is now enrolled with your MDM server. The device will need to restart to acquire policies, certificates, and apps. The Settings app will now reflect that the device is enrolled in device management.
diff --git a/devices/hololens/hololens-feedback.md b/devices/hololens/hololens-feedback.md
new file mode 100644
index 0000000000..51509d0833
--- /dev/null
+++ b/devices/hololens/hololens-feedback.md
@@ -0,0 +1,83 @@
+---
+title: Give us feedback
+description: Create actionable feedback for HoloLens and Windows Mixed Reality developers by using the Feedback Hub.
+ms.assetid: b9b24c72-ff86-44a9-b30d-dd76c49479a9
+author: mattzmsft
+ms.author: mazeller
+ms.date: 09/13/2019
+ms.prod: hololens
+ms.topic: article
+keywords: feedback, bug, issue, error, troubleshoot, help
+manager: jarrettr
+ms.localizationpriority: medium
+appliesto:
+- HoloLens (1st gen)
+- HoloLens 2
+---
+
+# Give us feedback
+
+Use the Feedback Hub to tell us which features you love, which features you could do without, or when something could be better.
+
+## Feedback for Windows Mixed Reality immersive headset on PC
+
+> [!IMPORTANT]
+> Before you report an issue, make sure that your environment meets the following requirements so that you can successfully upload logs and other information:
+>
+> - Have a minimum of 3GB free disk space available on the main drive of the device.
+> - To upload cabs or other large files, connect to a non-metered network.
+
+1. Make sure that you have the immersive headset connected to your PC, and then on the desktop, select **Feedback Hub**.
+1. In the left pane, select **Feedback**.
+ 
+1. To enter new feedback, select **Add new feedback**.
+ 
+1. To make feedback actionable, in **What kind of feedback is this?** select **Problem**.
+1. In **Summarize your issue**, enter a meaningful title for your feedback.
+1. In **Give us more detail**, provide details and repro steps.
+ 
+
+ As the top category, select **Mixed Reality**. Then select an applicable subcategory, as explained in the following table:
+
+ |Subcategory |Description |
+ |----------|----------|
+ | Apps | Issues about a specific application. |
+ | Developer | Issues about authoring or running an app for Mixed Reality. |
+ | Device | Issues about the head-mounted device (HMD) itself. |
+ | Home experience | Issues about your VR environment and your interactions with the your mixed reality home. |
+ | Input | Issues about input methods, such as motion controllers, speech, gamepad, or mouse and keyboard. |
+ | Set up | Anything that is preventing you from setting up the device. |
+ | All other issues | Anything else. |
+
+1. If possible, add traces or video to your feedback to help us identify and fix the issue more quickly. To do this, follow these steps:
+ 1. To start collecting traces, select **Start capture**. The app starts collecting traces and a video capture of your mixed reality scenario.
+
+ 
+ 1. Do not close the Feedback Hub app, but switch to the scenario that produces the issue. Run through the scenario to produce the circumstances that you have described.
+ 1. After you finish your scenario, go back to the Feedback Hub app and select **Stop capture**. The app stops collecting information, stores the information in a file, and attaches the file to your feedback.
+1. Select **Submit**.
+ 
+ The Thank You page indicates that your feedback has been successfully submitted.
+ 
+
+To easily direct other people (such as co-workers, Microsoft staff, [forum](https://forums.hololens.com/) readers et al) to the issue, go to **Feedback** > **My Feedback**, select the issue, select **Share**. This action provides a shortened URL that you can give to others so that they can upvote or escalate your issue.
+
+## Feedback for HoloLens
+
+1. Use the **bloom** gesture to open the **Start** menu, and then select **Feedback Hub**.
+
+ 
+1. Place the app in your environment and then select the app to launch it.
+1. To see if someone else has given similar feedback, in the Feedback search box, enter a few keywords about the topic.
+
+ 
+1. If you find similar feedback, select it, add any details, then select **Upvote**.
+
+ 
+1. If you don’t find any similar feedback, select **Add new feedback**, select a topic from **Select a category**, and then select a subcategory from **Select a subcategory**.
+
+ 
+1. Enter your feedback.
+1. If you are reporting a reproducible issue, you can select **Reproduce**. Without closing Feedback Hub, reproduce the issue. After you finish, come back to Feedback Hub and select **I’m done**. The app adds a mixed reality capture of your repro and relevant diagnostic logs to your feedback.
+1. Select **Post feedback**, and you’re done.
+
diff --git a/devices/hololens/hololens-find-and-save-files.md b/devices/hololens/hololens-find-and-save-files.md
index e147ac2845..8a9687ea25 100644
--- a/devices/hololens/hololens-find-and-save-files.md
+++ b/devices/hololens/hololens-find-and-save-files.md
@@ -16,7 +16,7 @@ ms.localizationpriority: medium
# Find and save files on HoloLens
-Add content from [Find and save files](https://docs.microsoft.com/en-us/windows/mixed-reality/saving-and-finding-your-files)
+Add content from [Find and save files](https://docs.microsoft.com/windows/mixed-reality/saving-and-finding-your-files)
Files you create on HoloLens, including Office documents, photos, and videos, are saved to your HoloLens. To view and manage them, you can use the File Explorer app on HoloLens or File Explorer on your PC. To sync photos and other files to the cloud, use the OneDrive app on HoloLens.
diff --git a/devices/hololens/hololens-get-apps.md b/devices/hololens/hololens-get-apps.md
deleted file mode 100644
index cd14341075..0000000000
--- a/devices/hololens/hololens-get-apps.md
+++ /dev/null
@@ -1,37 +0,0 @@
----
-title: Get apps for HoloLens
-description: The Microsoft Store is your source for apps and games that work with HoloLens.
-ms.assetid: cbe9aa3a-884f-4a92-bf54-8d4917bc3435
-ms.reviewer: jarrettrenshaw
-ms.date: 07/01/2019
-manager: v-miegge
-keywords: hololens
-ms.prod: hololens
-ms.sitesec: library
-author: v-miegge
-ms.author: v-miegge
-ms.topic: article
-ms.localizationpriority: medium
----
-
-# Get apps for HoloLens
-
-The Microsoft Store is your source for apps and games that work with HoloLens. When you go to the Store on your HoloLens, any apps you see there will run on it.
-
-Apps on HoloLens use either 2D view or holographic view. Apps with 2D view look like windows and can be positioned all around you. Apps that use holographic view surround you and become the only app you see.
-
-## Get apps
-
-Open the Microsoft Store from the Start menu. Then browse for apps and games (or use your voice to search), select the microphone on the HoloLens keyboard, and start talking.
-
-To download apps, you'll need to be signed in with a Microsoft account. To buy them, you'll need a payment method associated with the Microsoft account you use on your HoloLens. To set up a payment method, go to [account.microsoft.com](http://account.microsoft.com/) and select **Payment & billing** > **Payment options** > **Add a payment option**.
-
-## Find your apps
-
-Once you've installed an app, you'll find it in the All apps list (Start > All apps ). Keep apps handy by [pinning them to Start](https://support.microsoft.com/help/12638).
-
-App updates are automatic, and they're free.
-
->[!NOTE]
->- To purchase apps in the Store, the billing address for your payment method must match the country or region your HoloLens is set to.
->- Some apps may not be available in all countries and regions.
diff --git a/devices/hololens/hololens-install-apps.md b/devices/hololens/hololens-install-apps.md
deleted file mode 100644
index 7ff737a027..0000000000
--- a/devices/hololens/hololens-install-apps.md
+++ /dev/null
@@ -1,89 +0,0 @@
----
-title: Install apps on HoloLens
-description: The recommended way to install apps on HoloLens is to use Microsoft Store for Business.
-ms.prod: hololens
-ms.mktglfcycl: manage
-ms.sitesec: library
-author: scooley
-ms.author: scooley
-ms.topic: article
-ms.localizationpriority: medium
-ms.date: 10/23/2018
-ms.reviewer:
----
-
-# Install apps on HoloLens
-
-The recommended way to install Universal Windows Platform (UWP) apps on HoloLens is to use Microsoft Store for Business. You can make your own [line-of-business application](https://technet.microsoft.com/itpro/windows/manage/working-with-line-of-business-apps) available through Microsoft Store for Business.
-
-You can also deploy apps using your mobile device management (MDM) provider or use the Windows Device Portal to install apps.
-
-## Use Microsoft Store for Business to deploy apps to HoloLens
-
-Microsoft Store for Business is a private Microsoft Store for your enterprise. People in your organization can open the Store app and select your private Store to install apps that you have made available to them.
-
-
-
-In your Microsoft Store for Business dashboard, you can also download apps to distribute to devices that aren't connected to the Internet, plus add line-of-business (LOB) apps for distribution.
-
-### Requirements
-
-- You need to be a global administrator for your Azure Active Directory (Azure AD) tenant.
-
- >[!TIP]
- >You can create an Azure AD account and tenant as part of the Store for Business sign-up process.
-
-- End users need Azure AD accounts when they access Store for Business content from Windows-based devices.
-
-### Microsoft Store for Business process
-
-1. [Sign up for Microsoft Store for Business.](https://technet.microsoft.com/itpro/windows/manage/sign-up-windows-store-for-business)
-2. [Assign roles and permissions for managing your Store for Business.](https://technet.microsoft.com/itpro/windows/manage/roles-and-permissions-windows-store-for-business)
-3. (Optional) [Configure Microsoft Store for Business to work with your MDM provider.](https://technet.microsoft.com/itpro/windows/manage/configure-mdm-provider-windows-store-for-business)
-3. [Get apps for your Store for Business.](https://technet.microsoft.com/itpro/windows/manage/acquire-apps-windows-store-for-business)
-4. [Distribute apps to your employees.](https://technet.microsoft.com/itpro/windows/manage/distribute-apps-to-your-employees-windows-store-for-business)
-
-### Install apps on HoloLens from Microsoft Store for Business
-
-The method that you use to install an app from your Microsoft Store for Business on HoloLens depends on the distribution method that you choose.
-
-| Distribution method | To install on HoloLens|
-| --- | --- |
-| [Using private store](https://docs.microsoft.com/microsoft-store/distribute-apps-from-your-private-store) | Open the Store app and select the tab for your organization to choose from available apps. |
-| Using MDM | [You can configure MDM to synchronize your Store for Business inventory.](https://technet.microsoft.com/itpro/windows/manage/distribute-apps-with-management-tool) See the **Important** note in [Use MDM to deploy apps to HoloLens.](#use-mdm-to-deploy-apps-to-hololens) |
-
-
-
-## Use MDM to deploy apps to HoloLens
-
->[!IMPORTANT]
->Online-licensed apps cannot be deployed with Microsoft Store for Business on HoloLens via an MDM provider. If attempted, apps will remain in “downloading” state. Instead, you can use your MDM provider to deploy MDM-hosted apps to HoloLens, or deploy offline-licensed apps to HoloLens via Store for Business
-
-
-You can deploy UWP apps to HoloLens using your MDM provider. For Intune instructions, see [Deploy apps in Microsoft Intune](https://docs.microsoft.com/intune/deploy-use/add-apps).
-
-Using Intune, you can also [monitor your app deployment](https://docs.microsoft.com/intune/deploy-use/monitor-apps-in-microsoft-intune).
-
-
-
-## Use the Windows Device Portal to install apps on HoloLens
-
->[!IMPORTANT]
->When you set up HoloLens to use the Device Portal, you must enable **Developer Mode** on the device. **Developer Mode** on a device that has been upgraded to Windows Holographic for Business enables side-loading of apps, which risks the installation of apps that have not been certified by the Microsoft Store. Administrators can block the ability to enable **Developer Mode** using the **ApplicationManagement/AllowDeveloper Unlock** setting in the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). [Learn more about Developer Mode.](https://msdn.microsoft.com/windows/uwp/get-started/enable-your-device-for-development#developer-mode)
-
-1. [Set up the HoloLens to use the Windows Device Portal](https://developer.microsoft.com/windows/mixed-reality/using_the_windows_device_portal#setting_up_hololens_to_use_windows_device_portal). The Device Portal is a web server on your HoloLens that you can connect to from a web browser on your PC.
-
-2. On a PC, connect to the HoloLens using [Wi-Fi](https://docs.microsoft.com/windows/mixed-reality/connecting-to-wi-fi-on-hololens) or USB.
-
-3. [Create a user name and password](https://developer.microsoft.com/windows/mixed-reality/Using_the_Windows_Device_Portal.html#creating_a_username_and_password) if this is the first time you connect to the Windows Device Portal, or enter the user name and password that you previously set up.
-
- >[!TIP]
- >If you see a certificate error in the browser, follow [these troubleshooting steps](https://developer.microsoft.com/windows/mixed-reality/Using_the_Windows_Device_Portal.html#security_certificate).
-
-4. In the Windows Device Portal, click **Apps**.
-
- 
-
-5. In **Install app**, select an **app package** from a folder on your computer or network. If the app package requires additional software, such as dependency frameworks, select **I want to specify framework packages**.
-
-6. In **Deploy**, click **Go** to deploy the app package and added dependencies to the connected HoloLens.
diff --git a/devices/hololens/hololens-install-localized.md b/devices/hololens/hololens-install-localized.md
deleted file mode 100644
index 0d3b2aecfb..0000000000
--- a/devices/hololens/hololens-install-localized.md
+++ /dev/null
@@ -1,38 +0,0 @@
----
-title: Install localized versions of HoloLens (HoloLens)
-description: Learn how to install the Chinese or Japanese versions of HoloLens
-ms.prod: hololens
-ms.mktglfcycl: manage
-ms.sitesec: library
-author: dansimp
-ms.author: dansimp
-ms.topic: article
-ms.localizationpriority: medium
-ms.date: 11/13/2018
-ms.reviewer:
-manager: dansimp
----
-
-# Install localized versions of HoloLens
-
-In order to switch to the Chinese or Japanese version of HoloLens, you’ll need to download the build for the language on a PC and then install it on your HoloLens using the Windows Device Recovery Tool (WDRT).
-
->[!IMPORTANT]
->Installing the Chinese or Japanese builds of HoloLens using WDRT will delete existing data, like personal files and settings, from your HoloLens.
-
-
-2. On your PC, download and install [the Windows Device Recovery Tool (WDRT)](https://support.microsoft.com/help/12379).
-3. Download the package for the language you want to your PC: [Simplified Chinese](https://aka.ms/hololensdownload-ch) or [Japanese](https://aka.ms/hololensdownload-jp).
-4. When the download is finished, select **File Explorer > Downloads**. Right-click the zipped folder you just downloaded, and select **Extract all... > Extract** to unzip it.
-5. Connect your HoloLens to your PC using the micro-USB cable it came with. (Even if you've been using other cables to connect your HoloLens, this one works best.)
-6. The tool will automatically detect your HoloLens. Select the Microsoft HoloLens tile.
-7. On the next screen, select **Manual package selection** and choose the installation file contained in the folder you unzipped in step 4. (Look for a file with the extension “.ffu”.)
-8. Select **Install software** and follow the instructions to finish installing.
-9. Once the build is installed, HoloLens setup will start automatically. Put on the device and follow the setup directions.
-
-When you’re done with setup, go to **Settings -> Update & Security -> Windows Insider Program** and check that you’re configured to receive the latest preview builds. The Chinese/Japanese version of HoloLens will be kept up-to-date with the latest preview builds via the Windows Insider Program the same way the English version is.
-
-## Note for language support
-
-- You can’t change the system language between English, Japanese, and Chinese using the Settings app. Flashing a new build is the only supported way to change the device system language.
-- While you can enter Simplified Chinese / Japanese text using the on-screen Pinyin keyboard, typing in Simplified Chinese / Japanese using a Bluetooth hardware keyboard is not supported at this time. However, on Chinese/Japanese HoloLens, you can continue to use a BT keyboard to type in English (the ~ key on a hardware keyboard toggles the keyboard to type in English).
diff --git a/devices/hololens/hololens-multiple-users.md b/devices/hololens/hololens-multiple-users.md
index d4aac40795..70bee8bc2d 100644
--- a/devices/hololens/hololens-multiple-users.md
+++ b/devices/hololens/hololens-multiple-users.md
@@ -1,33 +1,51 @@
---
-title: Share HoloLens with multiple people (HoloLens)
-description: You can configure HoloLens to be shared by multiple Azure Active Directory accounts.
+title: Share your HoloLens with multiple people
+description: You can configure HoloLens to be shared by multiple Azure Active Directory accounts, or by multiple users that use a single account.
ms.prod: hololens
ms.sitesec: library
-author: dansimp
-ms.author: dansimp
+author: scooley
+ms.author: scooley
ms.topic: article
ms.localizationpriority: medium
-ms.date: 04/30/2018
+ms.date: 09/16/2019
ms.reviewer:
manager: dansimp
+appliesto:
+- HoloLens (1st gen)
+- HoloLens 2
---
-# Share HoloLens with multiple people
+# Share your HoloLens with multiple people
+It's common to share one HoloLens with many people or to have many people share a set of HoloLens devices. This article describes the different ways in which you can share a device.
-A HoloLens device can be shared by multiple Azure Active Directory (Azure AD) accounts, each with their own user settings and user data on the device.
+## Share with multiple people, each using their own account
-**Prerequisite**: The HoloLens device must be running Windows 10, version 1803, and be [upgraded to Windows Holographic for Business](hololens-upgrade-enterprise.md).
+When they use their own Azure Active Directory (Azure AD) accounts, multiple users can each keep their own user settings and user data on the device.
-During setup, you must select **My work or school owns it** and sign in with an Azure AD account. After setup, ensure that **Other People** appears in **Settings** > **Accounts**.
+To make sure that multiple people can use their own accounts on your HoloLens, follow these steps to configure it:
-Other people can use the HoloLens device by signing in with their Azure AD account credentials. To switch users, press the power button once to go to standby and then press the power button again to return to the lock screen, or select the user tile on the upper right of the pins panel to sign out the current user.
+1. Make sure the the device is running Windows 10, version 1803 or later.
+ > [!IMPORTANT]
+ > If you are using a HoloLens (1st gen) device, [upgrade the device to Windows Holographic for Business](hololens1-upgrade-enterprise.md).
+1. When you set up the device, select **My work or school owns it** and sign in by using an Azure AD account.
+1. After you finish setup, make sure that the account settings (**Settings** > **Accounts**) includes **Other users**.
->[!NOTE]
->Each subsequent user will need to perform [Calibration](https://developer.microsoft.com/windows/mixed-reality/calibration) in order to set their correct interpupillary distance (PD) for the device while signed in.
+To use HoloLens, each user follows these steps:
-To see users on the device or to remove a user from the device, go to **Settings** > **Accounts** > **Other users**.
-
+1. If another user has been using the device, do one of the following:
+ - Press the power button once to go to standby, and then press the power button again to return to the lock screen
+ - Select the user tile on the upper right of the Pins panel to sign out the current user.
-
+1. Use your Azure AD account credentials to sign in to the device.
+ If this is the first time that you have used the device, you have to [calibrate](hololens-calibration.md) HoloLens to your own eyes.
+To see a list of the device users or to remove a user from the device, go to **Settings** > **Accounts** > **Other users**.
+
+## Share with multiple people, all using the same account
+
+Multiple users can also share a HoloLens device while using a single user account.
+
+**On HoloLens 2**, when a new user puts the device on their head for the first time (while keeping the same account signed in), the device prompts the new user to quickly calibrate and personalize the viewing experience. The device can store the calibration information so that in the future, the device can automatically optimize the quality and comfort of each user's viewing experience. The users do not need to calibrate the device again.
+
+**On HoloLens (1st gen)** users sharing an account will need to ask to recalibrate in the Settings app. Read more about [calibration](hololens-calibration.md).
diff --git a/devices/hololens/hololens-network.md b/devices/hololens/hololens-network.md
index 6f7cb43370..19c9669559 100644
--- a/devices/hololens/hololens-network.md
+++ b/devices/hololens/hololens-network.md
@@ -1,40 +1,93 @@
---
title: Connect to a network
-description: Connect to a wi-fi or ethernet network with HoloLens.
+description: Instructions on how to connect to internet with HoloLens and how to identify the device's IP address.
ms.assetid: 0895606e-96c0-491e-8b1c-52e56b00365d
+author: mattzmsft
+ms.author: mazeller
+keywords: HoloLens, wifi, wireless, internet, ip, ip address
+ms.date: 08/30/19
ms.prod: hololens
ms.sitesec: library
-author: Teresa-Motiv
-ms.author: v-tea
-ms.topic: article
-ms.localizationpriority: medium
-ms.date: 8/12/19
-manager: jarrettr
+ms.localizationpriority: high
ms.reviewer:
+manager: jarrettr
appliesto:
-- Hololens
- HoloLens (1st gen)
- HoloLens 2
---
# Connect to a network
-You'll need to be connected to a network to do most things on your HoloLens. [What can I do offline](hololens-offline.md)?
+To do most things on your HoloLens, you have to be connected to a network. This guide will help you:
+
+- Connect to a network using Wi-Fi or (for HoloLens 2 only) Ethernet over USB-C
+- Disable and re-enable Wi-Fi
+
+Read more about [using HoloLens offline](hololens-offline.md).
## Connecting for the first time
-The first time you use your HoloLens, you'll be guided through connecting to a Wi-Fi network. If you have trouble connecting to Wi-Fi during setup, make sure your network is either open, password protected, or a captive portal network and doesn't require using certificates to connect. After setup, you can connect to other types of Wi-Fi networks.
+The first time you use your HoloLens, you'll be guided through connecting to a Wi-Fi network. If you have trouble connecting to Wi-Fi during setup, make sure that your network is either an open, password-protected network or a captive portal network. Make sure that the network doesn't require you to use a certificate to connect. After setup, you can connect to other types of Wi-Fi networks.
## Connecting to Wi-Fi after setup
-1. Go to **Start**, then select **Settings**.
-
-1. _HoloLens (1st gen) only_ - Use your gaze to position the Settings app, then air tap to place it, or say "Place."
-
+1. Select **Start** > **Settings**.
+ - *HoloLens (1st gen) only*: Use your gaze to position the Settings app, then air tap to place it, or say "Place."
1. Select **Network & Internet** > **Wi-Fi**. If you don't see your network, scroll down the list.
+1. Select a network, then select **Connect**.
+1. If you are prompted for a network password type it and then select **Next**.
-1. Select a network > **Connect**.
+## Connecting to Wi-Fi on HoloLens (1st gen)
-1. Type the network password if asked for one, then select **Next**.
+HoloLens contains a 802.11ac-capable, 2x2 Wi-Fi radio. Connecting HoloLens to a Wi-Fi network is similar to connecting a Windows 10 Desktop or Mobile device to a Wi-Fi network.
-Also see [Connect to Wifi](https://docs.microsoft.com/en-us/windows/mixed-reality/connecting-to-wi-fi-on-hololens)
+
+
+1. Open the **Start** menu.
+1. Select the Settings app from **Start** or from the **All Apps** list on the right of the **Start** menu. The Settings app will be auto-placed in front of you.
+1. Select **Network & Internet**.
+1. Make sure Wi-Fi is turned on.
+1. Select a Wi-Fi network from the list.
+1. If needed, type in the Wi-Fi network password.
+
+You can also confirm you are connected to a Wi-Fi network by checking the Wi-Fi status in the **Start** menu:
+
+1. Open the **Start** menu.
+1. Look at the top left of the **Start** menu for Wi-Fi status. The state of Wi-Fi and the SSID of the connected network will be shown.
+
+## Disabling Wi-Fi on HoloLens (1st gen)
+
+### Using the Settings app on HoloLens
+
+1. Open the **Start** menu.
+1. Select the **Settings** app from **Start** or from the **All Apps** list on the right of the **Start** menu. The **Settings** app will be auto-placed in front of you.
+1. Select **Network & Internet**.
+1. Select the Wi-Fi slider switch to move it to the **Off** position. This will turn off the RF components of the Wi-Fi radio and disable all Wi-Fi functionality on HoloLens.
+
+ > [!WARNING]
+ > When the Wi-Fi radio is disabled, HoloLens will not be able to automatically load your [spaces](hololens-spaces.md).
+
+1. Move the slider switch to the **On** position to turn on the Wi-Fi radio and restore Wi-Fi functionality on Microsoft HoloLens. The selected Wi-Fi radio state (**On** or **Off**) will persist across reboots.
+
+## Identifying the IP Address of your HoloLens on the Wi-Fi network
+
+### By using the Settings app
+
+1. Open the **Start** menu.
+1. Select the **Settings** app from **Start** or from the **All Apps** list on the right of the **Start** menu. The **Settings** app will be auto-placed in front of you.
+1. Select **Network & Internet**.
+1. Scroll down to beneath the list of available Wi-Fi networks and select **Hardware properties**.
+
+ 
+
+ The IP address appears next to **IPv4 address**.
+
+### By using Cortana
+
+Say "Hey Cortana, What's my IP address?" and Cortana will display and read out your IP address.
+
+### By using Windows Device Portal
+
+1. In a web browser on your PC, open the [device portal](/windows/mixed-reality/using-the-windows-device-portal.md#networking).
+1. Navigate to the **Networking** section.
+ This section displays your IP address and other network information. By using this method, you can copy and paste of the IP address on your development PC.
diff --git a/devices/hololens/hololens-offline.md b/devices/hololens/hololens-offline.md
index 7de0cc1381..908a2bbb45 100644
--- a/devices/hololens/hololens-offline.md
+++ b/devices/hololens/hololens-offline.md
@@ -12,15 +12,29 @@ author: v-miegge
ms.author: v-miegge
ms.topic: article
ms.localizationpriority: medium
+appliesto:
+- HoloLens (1st gen)
+- HoloLens 2
---
# Use HoloLens offline
-[Use offline](https://support.microsoft.com/en-us/help/12645)
+HoloLens support a limited set of offline experiences for connectivity conscious customers and for customers who have environmental limits on connectivity.
+## Near-offline setup
-To set up HoloLens, you'll need to connect to a Wi-Fi network—the setup tutorial will show you how.
+HoloLens need a network connection to go through initial device set up. If your corporate network has network restrictions, the following URLs will need to be available:
+
+| Purpose | URL |
+|------|------|
+| IDPS | https://sdx.microsoft.com/frx/idps |
+| [NCSI](https://docs.microsoft.com/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services#bkmk-ncsi) | http://www.msftconnecttest.com/connecttest.txt |
+| AADv9 | https://login.microsoftonline.com/WebApp/CloudDomainJoin/9 |
+| AADv10 | https://login.microsoftonline.com/WebApp/CloudDomainJoin/10 |
+| AAD Pin | https://account.live.com/aadngc?uiflavor=win10&showSuccess=1 |
+| MSA | https://login.live.com/ppsecure/inlineconnect.srf?id=80600 |
+| MSA Pin | https://account.live.com/msangc?fl=enroll |
## HoloLens limitations
-After your HoloLens is set up, you can use it without a Wi-Fi connection, but apps that use Internet connections may have limited capabilities when you use HoloLens offline.
+After your HoloLens is set up, you can use it without a Wi-Fi connection, but apps that use Internet connections will have limited capabilities when you use HoloLens offline.
diff --git a/devices/hololens/hololens-requirements.md b/devices/hololens/hololens-requirements.md
index f2d6ca4c03..f432f107bd 100644
--- a/devices/hololens/hololens-requirements.md
+++ b/devices/hololens/hololens-requirements.md
@@ -13,44 +13,42 @@ ms.date: 07/15/2019
# Deploy HoloLens in a commercial environment
-TODO - [Commercial features](https://docs.microsoft.com/en-us/windows/mixed-reality/commercial-features)
-
-Deploy and configure HoloLens at scale in a commercial setting.
+You can deploy and configure HoloLens at scale in a commercial setting.
This article includes:
-- infrastructure requirements and recommendations for HoloLens management
-- tools for provisioning HoloLens
-- instructions for remote device management
-- options for application deployment
+- Infrastructure requirements and recommendations for HoloLens management
+- Tools for provisioning HoloLens
+- Instructions for remote device management
+- Options for application deployment
This guide assumes basic familiarity with HoloLens. Follow the [get started guide](./hololens-setup.md) to set up HoloLens for the first time.
## Infrastructure for managing HoloLens
-HoloLens are, at their core, a Windows mobile device integrated with Azure. They work best in commercial environments with wireless network availability (wi-fi) and access to Microsoft services.
+HoloLens is, at its core, a Windows mobile device integrated with Azure. It works best in commercial environments with wireless network availability (wi-fi) and access to Microsoft services.
Critical cloud services include:
- Azure active directory (AAD)
- Windows Update (WU)
-Commercial customers will need enterprise mobility management (EMM) or mobile device management (MDM) infrastructure in order to manage HoloLens devices at scale. This guide uses [Microsoft Intune](https://www.microsoft.com/enterprise-mobility-security/microsoft-intune) as an example though any provider with full support for Microsoft Policy can support HoloLens. Ask your mobile device management provider if they support HoloLens 2.
+Commercial customers will need enterprise mobility management (EMM) or mobile device management (MDM) infrastructure to manage HoloLens devices at scale. This guide uses [Microsoft Intune](https://www.microsoft.com/enterprise-mobility-security/microsoft-intune) as an example, though any provider with full support for Microsoft Policy can support HoloLens. Ask your mobile device management provider if they support HoloLens 2.
HoloLens does support a limited set of cloud disconnected experiences.
## Initial set up at scale
-The HoloLens out of box experience is great for setting up one or two devices or for experiencing HoloLens for the first time. If you're provisioning many HoloLens devices, however, picking your language and settings manually for each device gets tedious and limits scale.
+The HoloLens out of box experience is great for setting up one or two devices or for experiencing HoloLens for the first time. If you're provisioning many HoloLens devices, however, selecting your language and settings manually for each device gets tedious and limits scale.
This section:
-1. introduces Windows provisioning using provisioning packages
-1. walks through applying a provisioning package during first setup
+- Introduces Windows provisioning using provisioning packages
+- Walks through applying a provisioning package during first setup
### Create and apply a provisioning package
-The best way to configure many new HoloLens devices is with Windows provisioning. Using Windows provisioning, you can specify desired configuration and settings required to enroll the devices into management and then apply that configuration to target devices in minutes.
+The best way to configure many new HoloLens device is with Windows provisioning. You can use it to specify desired configuration and settings required to enroll the devices into management and then apply that configuration to target devices in minutes.
A [provisioning package](https://docs.microsoft.com/windows/configuration/provisioning-packages/provisioning-packages) (.ppkg) is a collection of configuration settings. With Windows 10, you can create provisioning packages that let you quickly and efficiently configure a device.
@@ -58,11 +56,11 @@ A [provisioning package](https://docs.microsoft.com/windows/configuration/provis
- HoloLens Enterprise license XML file
-Some of the HoloLens configurations that you can apply in a provisioning package:
+Some of the HoloLens configurations you can apply in a provisioning package:
- Apply certificates to the device
- Set up a Wi-Fi connection
-- Pre-configure out of box questions like language and locale.
+- Pre-configure out of box questions like language and locale
- (HoloLens 2) bulk enroll in mobile device management
- (HoloLens v1) Apply key to enable Windows Holographic for Business
@@ -70,15 +68,15 @@ Follow [this guide](https://docs.microsoft.com/hololens/hololens-provisioning) t
### Set up user identity and enroll in device management
-The last step setting up HoloLens for management at scale is to enroll devices with mobile device management infrastructure. There are several ways to enroll:
+The last step in setting up HoloLens for management at scale is to enroll devices with mobile device management infrastructure. There are several ways to enroll:
1. Bulk enrollment with a security token in a provisioning package.
Pros: this is the most automated approach
Cons: takes initial server-side setup
-1. Auto-enroll on user sign in
+1. Auto-enroll on user sign in.
Pros: easiest approach
- Cons: users will need to complete set up after the provisioning package has been applied
-1. _not recommended_ - Manually enroll post-setup
+ Cons: users will need to complete set up after the provisioning package has been applied
+1. _not recommended_ - Manually enroll post-setup.
Pros: possible to enroll after set up
Cons: most manual approach and devices aren't centrally manageable until they're manually enrolled.
@@ -94,7 +92,7 @@ This article outlines [policies and capabilities HoloLens supports](https://docs
### Push compliance policy via Intune
-[Compliance policies](https://docs.microsoft.com/intune/device-compliance-get-started) are rules and settings that devices must meet to be compliant in your corporate infrastructure. Use these policies with Conditional Access to block access to company resources for devices that are not-compliant.
+[Compliance policies](https://docs.microsoft.com/intune/device-compliance-get-started) are rules and settings that devices must meet to be compliant in your corporate infrastructure. Use these policies with Conditional Access to block access to company resources for devices that are non-compliant.
For example, you can create a policy that requires Bitlocker be enabled.
@@ -102,28 +100,28 @@ For example, you can create a policy that requires Bitlocker be enabled.
### Manage updates
-Intune includes a feature called update rings for Windows 10 devices, including HoloLens 2 and HoloLens v1 (with Holographic for Business). Update rings include a group of settings that determine how and when updates are installed.
+Intune includes a feature called Update rings for Windows 10 devices, including HoloLens 2 and HoloLens v1 (with Holographic for Business). Update rings include a group of settings that determine how and when updates are installed.
For example, you can create a maintenance window to install updates, or choose to restart after updates are installed. You can also choose to pause updates indefinitely until you're ready to update.
-Read more about [configuring update rings with Intune](https://docs.microsoft.com/en-us/intune/windows-update-for-business-configure).
+Read more about [configuring update rings with Intune](https://docs.microsoft.com/intune/windows-update-for-business-configure).
## Application management
-Manage holoLens applications through:
+Manage HoloLens applications through:
1. Microsoft Store
- The Microsoft Store is the best way to distribute and consume application on HoloLens. There is a great set of core HoloLens applications already available in the store or you can [publish your own](https://docs.microsoft.com/en-us/windows/uwp/publish/).
- All applications in the store are available publicly to everyone, if that isn't acceptable, checkout the Microsoft Store for Business.
+ The Microsoft Store is the best way to distribute and consume applications on HoloLens. There is a great set of core HoloLens applications already available in the store or you can [publish your own](https://docs.microsoft.com/windows/uwp/publish/).
+ All applications in the store are available publicly to everyone, but if it isn't acceptable, checkout the Microsoft Store for Business.
1. [Microsoft Store for Business](https://docs.microsoft.com/microsoft-store/)
- Microsoft Store for Business and Education is a custom store for your corporate environment. It lets you use the Microsoft Store built into Windows 10 and HoloLens to find, acquire, distribute, and manage apps for your organization. It lets you deploy apps that are specific to your commercial environment but not to the world.
+ Microsoft Store for Business and Education is a custom store for your corporate environment. It lets you use the Microsoft Store built into Windows 10 and HoloLens to find, acquire, distribute, and manage apps for your organization. It also lets you deploy apps that are specific to your commercial environment but not to the world.
1. Application deployment and management via Intune or another mobile device management solution
Most mobile device management solutions, including Intune, provide a way to deploy line of business applications directly to a set of enrolled devices. See this article for [Intune app install](https://docs.microsoft.com/intune/apps-deploy).
1. _not recommended_ Device Portal
- Applications can also be installed on HoloLens directly using the Windows Device Portal. This isn't recommended since Developer Mode has to be enabled to use device portal.
+ Applications can also be installed on HoloLens directly using the Windows Device Portal. This isn't recommended since Developer Mode has to be enabled to use the device portal.
Read more about [installing apps on HoloLens](https://docs.microsoft.com/hololens/hololens-install-apps).
@@ -131,7 +129,7 @@ Read more about [installing apps on HoloLens](https://docs.microsoft.com/hololen
Get support through the Microsoft support site.
-[File a support request](https://support.microsoft.com/en-us/supportforbusiness/productselection?sapid=e9391227-fa6d-927b-0fff-f96288631b8f).
+[File a support request](https://support.microsoft.com/supportforbusiness/productselection?sapid=e9391227-fa6d-927b-0fff-f96288631b8f).
## Technical Reference
diff --git a/devices/hololens/hololens-setup.md b/devices/hololens/hololens-setup.md
deleted file mode 100644
index 77bb29070f..0000000000
--- a/devices/hololens/hololens-setup.md
+++ /dev/null
@@ -1,75 +0,0 @@
----
-title: Set up a new HoloLens
-description: This guide walks through first time set up. You'll need a Wi-Fi network and either a Microsoft (MSA) or Azure Active Directory (AAD) account.
-ms.prod: hololens
-ms.sitesec: library
-author: scooley
-ms.author: scooley
-ms.topic: quickstart
-ms.localizationpriority: medium
-ms.date: 07/14/2019
----
-
-# Set up HoloLens for the first time
-
-Follow along to set up a HoloLens for the first time. At the end of this quickstart, you'll be able to use HoloLens and navigate HoloLens settings on-device.
-
-This is a high level unboxing guide to become familiar with HoloLens.
-See [Set up HoloLens in the enterprise](hololens-requirements.md) to configure HoloLens for scale enterprise deployment and ongoing device management.
-
-## Prerequisites
-
-- Internet access.
- - Wi-Fi is the easiest way to do first set up on both HoloLens and HoloLens 2. It can be an open Wi-Fi or password-protected Wi-Fi network; the Wi-Fi network does not need to provide access to enterprise resources or intranet sites.
- - HoloLens 2 can connect to the internet via ethernet and a USB-C adapter.
-- a user account - Microsoft (MSA) or Azure Active Directory (AAD)
-
-## Prepare for first-boot
-
-Become familiar with the HoloLens hardware and prepare to turn your HoloLens on for the first time.
-
-1. Be sure your HoloLens is [charged](https://support.microsoft.com/help/12627)
-1. [Adjust fit](https://support.microsoft.com/help/12632) for a comfortable fit.
-1. [Turn on HoloLens](https://support.microsoft.com/help/12642). You will be guided through a calibration procedure and how to perform [the gestures](https://support.microsoft.com/help/12644/hololens-use-gestures) that you will use to operate HoloLens.
-
-## Set up your HoloLens
-
-Set up your HoloLens and your user account.
-
-1. Connect to the internet (select Wi-Fi).
-1. Sign in to your user account. You'll choose between **My work or school owns it** and **I own it**.
- - When you choose **My work or school owns it**, you sign in with an Azure AD account. If your organization uses Azure AD Premium and has configured automatic MDM enrollment, HoloLens will be enrolled in MDM. If your organization does not use Azure AD Premium, automatic MDM enrollment isn't available, so you will need to [enroll HoloLens in device management manually](hololens-enroll-mdm.md#enroll-through-settings-app).
- 1. Enter your organizational account.
- 2. Accept privacy statement.
- 3. Sign in using your Azure AD credentials. This may redirect to your organization's sign-in page.
- 4. Continue with device setup.
- - When you choose **I own it**, you sign in with a Microsoft account. After setup is complete, you can [enroll HoloLens in device management manually](hololens-enroll-mdm.md#enroll-through-settings-app).
- 1. Enter your Microsoft account.
- 2. Enter your password. If your Microsoft account requires [two-step verification (2FA)](https://blogs.technet.microsoft.com/microsoft_blog/2013/04/17/microsoft-account-gets-more-secure/), complete the verification process.
-1. The device sets your time zone based on information obtained from the Wi-Fi network.
-1. Follow the first-start guides to learn how to interact with holograms, control the HoloLens with your voice, and access the start menu.
-
-Congratulations! Setup is complete and you can begin using HoloLens.
-
-## Explore HoloLens
-
-### Check out on-device settings and desktop
-
-HoloLens doesn't have an on-device command line. With that in mind, the settings section in HoloLens plays an important role in diagnosing problems on-device. Understanding the information available to HoloLens users will pay dividends when troubleshooting or configuring the device.
-
-Open settings by opening the start menu and clicking on the **Settings** in the top bar. You can also ask Cortana to open settings.
-
-Follow [this guide](https://docs.microsoft.com/windows/mixed-reality/navigating-the-windows-mixed-reality-home) to navigate around the HoloLens home.
-
-### Connect bluetooth devices
-
-Connecting a bluetooth keyboard makes typing on HoloLens as efficient as a Windows PC.
-
-[Connect a bluetooth keyboard or clicker](https://support.microsoft.com/en-us/help/12636).
-
-## Next steps
-
-Start planning for HoloLens at scale with HoloLens' enterprise management features.
-
-> [!div class="nextstepaction"]
-> [HoloLens in the enterprise](hololens-requirements.md)
\ No newline at end of file
diff --git a/devices/hololens/hololens-spaces-on-hololens.md b/devices/hololens/hololens-spaces-on-hololens.md
deleted file mode 100644
index 5c04bb7c3e..0000000000
--- a/devices/hololens/hololens-spaces-on-hololens.md
+++ /dev/null
@@ -1,40 +0,0 @@
----
-title: Spaces on HoloLens
-description: HoloLens blends holograms with your world
-ms.assetid: bd55ecd1-697a-4b09-8274-48d1499fcb0b
-ms.reviewer: jarrettrenshaw
-ms.date: 07/01/2019
-manager: v-miegge
-keywords: hololens
-ms.prod: hololens
-ms.sitesec: library
-author: v-miegge
-ms.author: v-miegge
-ms.topic: article
-ms.localizationpriority: medium
----
-
-# Spaces on HoloLens
-
-HoloLens blends holograms with your world, mapping your surroundings to remember where you place your apps and content.
-
->[!NOTE]
->For your HoloLens to work properly, HoloLens Wi-Fi needs to be turned on, though it doesn't have to be connected to a network.
-
-## Tips for setting up your space
-
-HoloLens works best in certain kinds of environments. Choose a room with adequate light and plenty of space. Avoid dark spaces and rooms with a lot of dark, shiny, or translucent surfaces (for instance, mirrors or gauzy curtains).
-
->[!NOTE]
->HoloLens is optimized for indoor use. Use it in a safe place with no tripping hazards. [More on safety](https://support.microsoft.com/help/4023454/safety-information).
-
-## Mapping your space
-
-When HoloLens starts mapping your surroundings, you'll see a mesh graphic spreading over the space.
-
-To help HoloLens learn a space, walk around the space and gaze around you. Air tap in a space to light up the mesh and see what's been mapped.
-
-If your space changes significantly—for example, if a piece of furniture is moved—you might need to walk around the space and gaze around you so HoloLens can relearn it.
-
->[!NOTE]
->If HoloLens is having trouble mapping your space or you're have difficulty placing holograms, see [HoloLens and holograms: FAQ](https://support.microsoft.com/help/13456/hololens-and-holograms-faq).
diff --git a/devices/hololens/hololens-spaces.md b/devices/hololens/hololens-spaces.md
index 3df4ee1cc8..b8f98ea416 100644
--- a/devices/hololens/hololens-spaces.md
+++ b/devices/hololens/hololens-spaces.md
@@ -1,71 +1,114 @@
---
-title: How HoloLens stores data for spaces (HoloLens)
-description:
+title: Mapping physical spaces with HoloLens
+description: HoloLens learns what a space looks like over time. Users can facilitate this process by moving the HoloLens in certain ways through the space.
+ms.assetid: bd55ecd1-697a-4b09-8274-48d1499fcb0b
+author: dorreneb
+ms.author: dobrown
+ms.date: 09/16/2019
+keywords: hololens, Windows Mixed Reality, design, spatial mapping, HoloLens, surface reconstruction, mesh, head tracking, mapping
ms.prod: hololens
ms.sitesec: library
-author: dansimp
-ms.author: dansimp
ms.topic: article
ms.localizationpriority: medium
-ms.date: 11/05/2018
-ms.reviewer:
-manager: dansimp
+appliesto:
+- HoloLens 1 (1st gen)
+- HoloLens 2
---
-# How HoloLens stores data for spaces
+# Mapping physical spaces with HoloLens
-In the Windows 10, version 1803 update for Microsoft HoloLens, the mapping data for [spaces](https://support.microsoft.com/help/13760/hololens-spaces-on-hololens) is stored in a local database.
+HoloLens blends holograms with your physical world. To do that, HoloLens has to learn about the physical world around you and remember where you place holograms within that space.
-The map database is not exposed to a user of the device, even when plugged into a PC or when using the File Explorer app. When BitLocker is enabled, the stored map data is also encrypted with the entire volume.
+Over time, the HoloLens builds up a *spatial map* of the environment that it has seen. HoloLens updates the map as the environment changes. As long as you are logged in and the device is turned on, HoloLens creates and updates your spatial maps. If you hold or wear the device with the cameras pointed at a space, the HoloLens tries to map the area. While the HoloLens learns a space naturally over time, there are ways in which you can help HoloLens map your space more quickly and efficiently.
-Holograms that are anchored within the same map section are considered to be “nearby” in the current space.
+> [!NOTE]
+> If your HoloLens can’t map your space or is out of calibration, HoloLens may enter Limited mode. In Limited mode, you won’t be able to place holograms in your surroundings.
+This article explains how HoloLens maps spaces, how to improve spatial mapping, and how to manage the spatial data that HoloLens collects.
-## Frequently asked questions
+## Choosing and setting up and your space
-**How can I remove map data and known spaces from the HoloLens?**
+Features in your environment can make it difficult for the HoloLens to interpret a space. Light levels, materials in the space, the layout of objects, and more can all affect how HoloLens maps an area.
-There are two options for deleting map data in **Settings > System > Holograms**:
+HoloLens works best in certain kinds of environments. To produce the best spatial map, choose a room that has adequate light and plenty of space. Avoid dark spaces and rooms that have a lot of dark, shiny, or translucent surfaces (for instance, mirrors or gauzy curtains).
-- Select **Remove nearby holograms** to delete nearby holograms, clearing the map data and anchored holograms for the current space. A brand new map section would be created and stored in the database for that location while the device is used there. This option can be used to clear the map data for work without affecting any map data from home, for example.
-- Select **Remove all holograms** to delete all holograms, clearing all locally stored map data and anchored holograms. No holograms will be rediscovered and any holograms need to be newly placed.
+HoloLens is optimized for indoor use. Spatial mapping also works best when Wi-Fi is turned on, although it doesn't have to be connected to a network. HoloLens can obtain Wi-Fi access points even if it is not connected or authenticated. HoloLens functionality does not change whether the access points are internet-connected or intranet/local only.
->[!NOTE]
->When you remove nearby or all holograms, HoloLens immediately starts scanning and mapping the current space.
+Only use HoloLens in safe places with no tripping hazards. [More on safety](https://support.microsoft.com/help/4023454/safety-information).
-**How does Wi-Fi data get used by HoloLens and where is the data stored?**
+## Mapping your space
-As long as Wi-Fi is enabled, map data will be correlated with nearby Wi-Fi access points. There is no difference in behavior if a network is connected or just nearby. Network characteristics are not sent to Microsoft, and all Wi-Fi references are kept local on the HoloLens.
+Now you're ready to start mapping your spare. When HoloLens starts mapping your surroundings, you'll see a mesh graphic spreading over the space. In mixed reality home, you can trigger the map to show by selecting on a mapped surface.
-Wi-Fi characteristics are stored locally to help correlate hologram locations and map sections stored within HoloLens’ database of known spaces. It’s inaccessible to users, and not sent to Microsoft via the cloud or via telemetry.
+Here are guidelines for building a great spatial map.
+### Understand the scenarios for the area
+It is important to spend the most time where you will be using the HoloLens, so that the map is relevant and complete. For example, if a user scenario for HoloLens involves moving from Point A to Point B, walk that path two to three times, looking in all directions as you move.
-**Does HoloLens need to be connected to the internet?**
+### Walk slowly around the space
-No, internet connectivity is not required. Observed Wi-Fi access points are obtained without being connected or authenticated. It does not change functionality if the access points are internet connected or intranet/local only.
+If you walk too quickly around the area, it's likely that the HoloLens will miss mapping areas. Walk slowly around the space, stopping every 5-8 feet to look around at your surroundings.
+Smooth movements also help the HoloLens map more efficiently.
+### Look in all directions
+Looking around as you map the space gives the HoloLens more data on where points are relative to each other.
+If you don't look up, for example, the HoloLens may not know where the ceiling in a room is.
-**Since HoloLens no longer requires you to select a space when Wi-Fi is disabled, how does it find the space automatically?**
+Don't forget to look down at the floor as you map the space.
-If Wi-Fi is disabled, the space search can still happen; HoloLens will need to search more of the map data within the spaces database, and finding holograms can take longer.
+### Cover key areas multiple times
-HoloLens will sense and remember spaces even when Wi-Fi is disabled, by securely storing the sensor data when holograms are placed. Without the Wi-Fi info, the space and holograms may be slower to recognize at a later time, as the HoloLens needs to compare active scans to all hologram anchors and map sections stored on the device in order to locate the correct portion of the map.
+Moving through an area multiple times will help pick up features you may have missed on the first walkthrough. To build an ideal map, try traversing an area two to three times.
-HoloLens will visually compare the current scanning data from the sensors to locally stored map sections in the entire spaces database. It will locate holograms faster if the Wi-Fi characteristics can be found, to narrow down the number of spaces to compare.
+If possible, while repeating these movements, spend time walking through an area in one direction, then turn around and walk back the way you came.
+### Take your time mapping the area
+It can take between 15 and 20 minutes for the HoloLens to fully map and adjust itself to its surroundings. If you have a space in which you plan to use a HoloLens frequently, taking that time up front to map the space can prevent issues later on.
+## Possible errors in the spatial map
-
+Errors in spatial mapping data fall into a few categories:
+- *Holes*: Real-world surfaces are missing from the spatial mapping data.
+- *Hallucinations*: Surfaces exist in the spatial mapping data that do not exist in the real world.
+- *Wormholes*: HoloLens 'loses' part of the spatial map by thinking it is in a different part of the map than it actually is.
+- *Bias*: Surfaces in the spatial mapping data are imperfectly aligned with real-world surfaces, either pushed in or pulled out.
+If you see any of these errors please use the [FeedbackHub](hololens-feedback.md) to send feedback.
+
+## Security and storage for spatial data
+
+Windows 10 version 1803 update for Microsoft HoloLens and later stores mapping data in a local (on-device) database.
+
+HoloLens users cannot directly access the map database, even when the device is plugged into a PC or when using the File Explorer app. When BitLocker is enabled on HoloLens, the stored map data is also encrypted along with the entire volume.
+
+### Remove map data and known spaces from HoloLens
+
+There are two options for deleting map data in **Settings > System > Holograms**:
+
+- To delete nearby holograms, select **Remove nearby holograms**. This command clears the map data and anchored holograms for the current space. If you continue to use the device in the same space, it creates and stores a brand new map section to replace the deleted information.
+
+ > [!NOTE]
+ > "Nearby" holograms are holograms that are anchored within the same map section in the current space.
+
+ For example, you can use this option to clear work-related map data without affecting any home-related map data.
+
+- To delete all holograms, select **Remove all holograms**. This command clears all map data that is stored on the device as well as all anchored holograms. You will need to explicitly place any holograms. You will not be able to rediscover the previously-placed holograms.
+
+> [!NOTE]
+> After you remove nearby or all holograms, HoloLens immediately starts scanning and mapping the current space.
+
+### Wi-Fi data in spatial maps
+
+HoloLens stores Wi-Fi characteristics to help correlate hologram locations and map sections that are stored within the HoloLens database of known spaces. Information about Wi-Fi characteristics is not accessible to users, and not sent to Microsoft using the cloud or using telemetry.
+
+As long as Wi-Fi is enabled, HoloLens correlates map data with nearby Wi-Fi access points. There is no difference in behavior whether a network is connected or just detected nearby. If Wi-Fi is disabled, HoloLens still searches the space. However, HoloLens has to search more of the map data within the spaces database, and may need more time to find holograms. Without the Wi-Fi info, the HoloLens has to compare active scans to all hologram anchors and map sections that are stored on the device in order to locate the correct portion of the map.
## Related topics
-- [Environment considerations for HoloLens](https://docs.microsoft.com/windows/mixed-reality/environment-considerations-for-hololens)
- [Spatial mapping design](https://docs.microsoft.com/windows/mixed-reality/spatial-mapping-design)
-- [HoloLens and holograms: FAQ](https://support.microsoft.com/help/13456/hololens-and-holograms-faq)
diff --git a/devices/hololens/hololens-start.md b/devices/hololens/hololens-start.md
deleted file mode 100644
index d303ee0c44..0000000000
--- a/devices/hololens/hololens-start.md
+++ /dev/null
@@ -1,57 +0,0 @@
----
-title: HoloLens (1st gen) first start
-description: Go through the first start experience for HoloLens (1st gen).
-ms.assetid: 0136188e-1305-43be-906e-151d70292e87
-ms.prod: hololens
-author: Teresa-Motiv
-ms.author: v-tea
-ms.topic: article
-ms.date: 8/12/19
-manager: jarrettr
-ms.topic: article
-ms.localizationpriority: medium
----
-
-# Set up HoloLens for the first time
-
-The first time you turn on your HoloLens, you'll be guided through calibrating your device, setting up your device, and signing in. This section walks through the HoloLens (1st gen) first start experience.
-
-In the next section, you'll learn how to work with HoloLens and interact with holograms. Skip ahead to [Get started with HoloLens (1st gen)](holographic-home.md)
-
-## Before you start
-
-Before you get started, make sure you have the following available:
-
-**A Wi-Fi connection**. You'll need to connect your HoloLens to a Wi-Fi network to set it up. The first time you connect, you'll need an open or password-protected network that doesn't require navigating to a website or using certificates to connect. After setup, you can [use your device offline](hololens-offline.md).
-
-**A Microsoft account**. You'll also need to sign in to HoloLens with a Microsoft account (or with your work account, if your organization owns the device). If you don't have a Microsoft account, go to [account.microsoft.com](http://account.microsoft.com) and set one up for free.
-
-**A safe, well-lit space with no tripping hazards**. [Health and safety info](http://go.microsoft.com/fwlink/p/?LinkId=746661).
-
-**The optional comfort accessories** that came with your HoloLens, to help you get the most comfortable fit. [More on fit and comfort](https://support.microsoft.com/help/12632/hololens-fit-your-hololens).
-
-> [!NOTE]
-> [Cortana](hololens-cortana.md) is already on and ready to guide you the first time you use your HoloLens (though she won't be able to respond to your questions until after you set up your device). You can turn Cortana off at any time in Cortana's settings.
-
-## Set up your HoloLens
-
-Set up your HoloLens and your user account.
-
-1. The first time you use your HoloLens, you'll be guided through connecting to a Wi-Fi network. If you have trouble connecting to Wi-Fi during setup, make sure your network is either open, password protected, or a captive portal network and doesn't require using certificates to connect. After setup, you can connect to other types of Wi-Fi networks.
-1. Sign in to your user account. You'll choose between **My work or school owns it** and **I own it**.
- - When you choose **My work or school owns it**, you sign in by using an Azure AD account. If your organization uses Azure AD Premium and has configured automatic MDM enrollment, HoloLens will be enrolled in MDM. If your organization does not use Azure AD Premium, automatic MDM enrollment isn't available, so you will need to [enroll HoloLens in device management manually](hololens-enroll-mdm.md#enroll-through-settings-app).
- 1. Enter your organizational account information.
- 1. Accept the privacy statement.
- 1. Sign in by using your Azure AD credentials. This may redirect to your organization's sign-in page.
- 1. Continue with device setup.
- - When you choose **I own it**, you sign in by using a Microsoft account. After setup is complete, you can [enroll HoloLens in device management manually](hololens-enroll-mdm.md#enroll-through-settings-app).
- 1. Enter your Microsoft account information.
- 1. Enter your password. If your Microsoft account requires [two-step verification (2FA)](https://blogs.technet.microsoft.com/microsoft_blog/2013/04/17/microsoft-account-gets-more-secure/), complete the verification process.
-1. The device sets your time zone based on information obtained from the Wi-Fi network.
-1. Follow the first-start guides to learn how to interact with holograms, control the HoloLens with your voice, and access the start menu.
-
-Congratulations! Setup is complete and you can begin using HoloLens.
-
-## Next steps
-
-- [Get started with HoloLens (1st gen)](holographic-home.md)
diff --git a/devices/hololens/hololens-status.md b/devices/hololens/hololens-status.md
index 60289bad05..9438c6d9d2 100644
--- a/devices/hololens/hololens-status.md
+++ b/devices/hololens/hololens-status.md
@@ -8,7 +8,7 @@ manager: jarrettr
audience: Admin
ms.topic: article
ms.prod: hololens
-localization_priority: Medium
+ms.localizationpriority: Medium
ms.sitesec: library
---
@@ -20,17 +20,17 @@ ms.sitesec: library
Area|HoloLens (1st gen)|HoloLens 2
----|:----:|:----:
-[Azure services](https://status.azure.com/en-us/status)|✔️|✔️
+[Azure services](https://status.azure.com/status)|✔️|✔️
[Store app](https://www.microsoft.com/store/collections/hlgettingstarted/hololens)|✔️|✔️
[Apps](https://www.microsoft.com/hololens/apps)|✔️|✔️
-[MDM](https://docs.microsoft.com/en-us/hololens/hololens-enroll-mdm)|✔️|✔️
+[MDM](https://docs.microsoft.com/hololens/hololens-enroll-mdm)|✔️|✔️
## Notes and related topics
[Frequently asked questions about using Skype for HoloLens](https://support.skype.com/en/faq/FA34641/frequently-asked-questions-about-using-skype-for-hololens)
-For more details about the status of the myriad Azure Services that can connect to HoloLens, see [Azure status](https://azure.microsoft.com/en-us/status/).
+For more details about the status of the myriad Azure Services that can connect to HoloLens, see [Azure status](https://azure.microsoft.com/status/).
-For more details about current known issues, see [HoloLens known issues](https://docs.microsoft.com/en-us/windows/mixed-reality/hololens-known-issues).
+For more details about current known issues, see [HoloLens known issues](https://docs.microsoft.com/windows/mixed-reality/hololens-known-issues).
Follow HoloLens on [Twitter](https://twitter.com/HoloLens) and subscribe on [Reddit](https://www.reddit.com/r/HoloLens/).
diff --git a/devices/hololens/hololens-updates.md b/devices/hololens/hololens-updates.md
index 418cfce2d9..2989515858 100644
--- a/devices/hololens/hololens-updates.md
+++ b/devices/hololens/hololens-updates.md
@@ -14,30 +14,28 @@ manager: dansimp
# Manage updates to HoloLens
->**Looking for how to get the latest update? See [Update HoloLens](https://support.microsoft.com/help/12643/hololens-update-hololens).**
-
>[!NOTE]
>HoloLens devices must be [upgraded to Windows Holographic for Business](hololens-upgrade-enterprise.md) to manage updates.
For a complete list of Update policies, see [Policies supported by Windows Holographic for Business](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider#a-href-idhololenspoliciesapolicies-supported-by-windows-holographic-for-business).
To configure how and when updates are applied, use the following policies:
+
- [Update/AllowAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-allowautoupdate)
- [Update/ScheduledInstallDay](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-scheduledinstallday)
- [Update/ScheduledInstallTime](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-scheduledinstalltime)
To turn off the automatic check for updates, set the following policy to value **5** – Turn off Automatic Updates:
+
- [Update/AllowAutoUpdate](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-allowautoupdate)
In Microsoft Intune, you can use **Automatic Update Behavior** to change this policy. (See [Manage software updates in Microsoft Intune](https://docs.microsoft.com/intune/windows-update-for-business-configure))
-For devices on Windows 10, version 1607 only: You can use the following update policies to configure devices to get updates from Windows Server Update Service (WSUS) instead of Windows Update:
-
-- [Update/AllowUpdateService](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-allowupdateservice)
-- [Update/RequireUpdateApproval](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-requireupdateapproval)
-- [Update/UpdateServiceUrl](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-updateserviceurl)
-
+For devices on Windows 10, version 1607 only: You can use the following update policies to configure devices and get updates from the Windows Server Update Service (WSUS), instead of Windows Update:
+- [Update/AllowUpdateService](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-allowupdateservice)
+- [Update/RequireUpdateApproval](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-requireupdateapproval)
+- [Update/UpdateServiceUrl](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-updateserviceurl)
## Related topics
diff --git a/devices/hololens/hololens-upgrade-enterprise.md b/devices/hololens/hololens-upgrade-enterprise.md
deleted file mode 100644
index 57bf3d0e04..0000000000
--- a/devices/hololens/hololens-upgrade-enterprise.md
+++ /dev/null
@@ -1,102 +0,0 @@
----
-title: Unlock Windows Holographic for Business features (HoloLens)
-description: HoloLens provides extra features designed for business when you upgrade to Windows Holographic for Business.
-ms.prod: hololens
-ms.sitesec: library
-author: dansimp
-ms.author: dansimp
-ms.topic: article
-ms.localizationpriority: medium
-ms.date: 07/09/2018
-ms.reviewer:
-manager: dansimp
----
-
-# Unlock Windows Holographic for Business features
-
-
-
-Microsoft HoloLens is available in the *Development Edition*, which runs Windows Holographic (an edition of Windows 10 designed for HoloLens), and in the [Commercial Suite](https://docs.microsoft.com/windows/mixed-reality/commercial-features), which provides extra features designed for business.
-
-When you purchase the Commercial Suite, you receive a license that upgrades Windows Holographic to Windows Holographic for Business. This license can be applied to the device either through the organization's [mobile device management (MDM) provider](#edition-upgrade-using-mdm) or a [provisioning package](#edition-upgrade-using-a-provisioning-package).
-
->[!TIP]
->In Windows 10, version 1803, you can tell that the HoloLens has been upgraded to the business edition in **Settings** > **System**.
-
-
-
-## Edition upgrade using MDM
-
-The enterprise license can be applied by any MDM provider that supports the [WindowsLicensing configuration service provider (CSP)](https://msdn.microsoft.com/library/windows/hardware/dn904983.aspx). The latest version of the Microsoft MDM API will support WindowsLicensing CSP.
-
-For step-by-step instructions for upgrading HoloLens using Microsoft Intune, see [Upgrade devices running Windows Holographic to Windows Holographic for Business](https://docs.microsoft.com/intune/holographic-upgrade).
-
- On other MDM providers, the specific steps for setting up and deploying the policy might vary.
-
-
-
-## Edition upgrade using a provisioning package
-
-Provisioning packages are files created by the Windows Configuration Designer tool that apply a specified configuration to a device.
-
-### Create a provisioning package that upgrades the Windows Holographic edition
-
-1. [Create a provisioning package for HoloLens.](hololens-provisioning.md)
-
-2. Go to **Runtime settings** > **EditionUpgrade**, and select **EditionUpgradeWithLicense**.
-
- 
-
-2. Browse to and select the XML license file that was provided when you purchased the Commercial Suite.
-
- >[!NOTE]
- >You can configure [additional settings in the provisioning package](hololens-provisioning.md).
-
-3. On the **File** menu, click **Save**.
-
-4. Read the warning that project files may contain sensitive information, and click **OK**.
-
- >[!IMPORTANT]
- >When you build a provisioning package, you may include sensitive information in the project files and in the provisioning package (.ppkg) file. Although you have the option to encrypt the .ppkg file, project files are not encrypted. You should store the project files in a secure location and delete the project files when they are no longer needed.
-
-3. On the **Export** menu, click **Provisioning package**.
-
-4. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next**.
-
-5. Set a value for **Package Version**.
-
- >[!TIP]
- >You can make changes to existing packages and change the version number to update previously applied packages.
-
-6. On the **Select security details for the provisioning package**, click **Next**.
-
-7. Click **Next** to specify the output location where you want the provisioning package to go once it's built. By default, Windows ICD uses the project folder as the output location.
-
- Optionally, you can click **Browse** to change the default output location.
-
-8. Click **Next**.
-
-9. Click **Build** to start building the package. The project information is displayed in the build page and the progress bar indicates the build status.
-
-10. When the build completes, click **Finish**.
-
-
-### Apply the provisioning package to HoloLens
-
-1. Connect the device via USB to a PC and start the device, but do not continue past the **fit** page of the initial setup experience (the first page with the blue box). HoloLens will show up as a device in File Explorer on the PC.
-
- >[!NOTE]
- >If the HoloLens device is running Windows 10, version 1607 or earlier, briefly press and release the **Volume Down** and **Power** buttons simultaneously to open File Explorer.
-
-4. In File Explorer, drag and drop the provisioning package (.ppkg) onto the device storage.
-
-5. Briefly press and release the **Volume Down** and **Power** buttons simultaneously again while on the **fit** page.
-
-6. The device will ask you if you trust the package and would like to apply it. Confirm that you trust the package.
-
-7. You will see whether the package was applied successfully or not. If it failed, you can fix your package and try again. If it succeeded, proceed with device setup.
-
-
-
-
-
diff --git a/devices/hololens/hololens-use-apps.md b/devices/hololens/hololens-use-apps.md
deleted file mode 100644
index e3d0aba0a9..0000000000
--- a/devices/hololens/hololens-use-apps.md
+++ /dev/null
@@ -1,40 +0,0 @@
----
-title: Use apps on HoloLens
-description: Apps on HoloLens use either 2D view or holographic view.
-ms.assetid: 6bd124c4-731c-4bcc-86c7-23f9b67ff616
-ms.reviewer: jarrettrenshaw
-ms.date: 07/01/2019
-manager: v-miegge
-keywords: hololens
-ms.prod: hololens
-ms.sitesec: library
-author: v-miegge
-ms.author: v-miegge
-ms.topic: article
-ms.localizationpriority: medium
----
-
-# Use apps on HoloLens
-
-Apps on HoloLens use either 2D view or holographic view. Apps with 2D view look like windows, and apps with holographic view surround you and become the only app you see.
-
-## Open apps
-
-You'll find your apps either pinned to Start or in the All apps list. To get to the All apps list, use the bloom gesture to go to Start, then select **All apps**.
-
-On Start or in the All apps list, select an app. It will open in a good position for viewing.
-
->[!NOTE]
->- Up to three 2D app windows can be active at a time. You can open more, but only three will remain active.
->- Each open app can have one active window at a time, except Microsoft Edge, which can have up to three.
->- If you're having problems with apps, make sure there's enough light in your space, and walk around so HoloLens has a current scan. If you keep having trouble, see [HoloLens and holograms: FAQ](https://support.microsoft.com/help/13456/hololens-and-holograms-faq) for more info.
-
-## Move, resize, and rotate apps
-
-After opening an app, you can [change its position and size](https://support.microsoft.com/help/12634).
-
-## Close apps
-
-To close an app that uses 2D view, gaze at it, then select **Close**.
-
-To close an app that uses holographic view, use the bloom gesture to leave holographic view, then select **Close**.
diff --git a/devices/hololens/hololens-whats-new.md b/devices/hololens/hololens-whats-new.md
index c250d1c12c..224f3b239d 100644
--- a/devices/hololens/hololens-whats-new.md
+++ b/devices/hololens/hololens-whats-new.md
@@ -16,27 +16,26 @@ manager: dansimp
## Windows 10, version 1809 for Microsoft HoloLens
-### For everyone
-
-Feature | Details
---- | ---
-Quick actions menu | When you're in an app, the Bloom gesture will now open a Quick actions menu to give you quick access to commonly used system features without having to leave the app. See [Set up HoloLens in kiosk mode](hololens-kiosk.md) for information about the Quick actions menu in kiosk mode.

-Stop video capture from the Start or quick actions menu | If you start video capture from the Start menu or quick actions menu, you’ll be able to stop recording from the same place. (Don’t forget, you can always do this with voice commands too.)
-Project to a Miracast-enabled device | Project your HoloLens content to a nearby Surface device or TV/Monitor if using Microsoft Display adapter. On **Start**, select **Connect**, and then select the device you want to project to. **Note:** You can deploy HoloLens to use Miracast projection without enabling developer mode.
-New notifications | View and respond to notification toasts on HoloLens, just like you do on a PC. Gaze to respond to or dismiss them (or if you’re in an immersive experience, use the bloom gesture).
-HoloLens overlays (file picker, keyboard, dialogs, etc.) | You’ll now see overlays such as the keyboard, dialogs, file picker, etc. when using immersive apps.
-Visual feedback overlay UI for volume change | When you use the volume up/down buttons on your HoloLens you’ll see a visual display of the volume level.
-New UI for device boot | A loading indicator was added during the boot process to provide visual feedback that the system is loading. Reboot your device to see the new loading indicator—it’s between the "Hello" message and the Windows boot logo.
-Share UX: Nearby Sharing | Addition of the Windows Nearby Sharing experience, allowing you to share a capture with a nearby Windows device. When you capture a photo or video on HoloLens (or use the share button from an app such as Microsoft Edge), select a nearby Windows device to share with.
-Share from Microsoft Edge | Share button is now available on Microsoft Edge windows on HoloLens. In Microsoft Edge, select **Share**. Use the HoloLens share picker to share web content.
+> **Applies to:** Hololens (1st gen)
+### For everyone
+| Feature | Details |
+|---|---|
+| **Quick actions menu** | When you're in an app, the Bloom gesture will now open a Quick actions menu to give you quick access to commonly used system features without having to leave the app.
See [Set up HoloLens in kiosk mode](hololens-kiosk.md) for information about the Quick actions menu in kiosk mode.
 |
+| **Stop video capture from the Start or quick actions menu** | If you start video capture from the Start menu or quick actions menu, you’ll be able to stop recording from the same place. (Don’t forget, you can always do this with voice commands too.) |
+| **Project to a Miracast-enabled device** | Project your HoloLens content to a nearby Surface device or TV/Monitor if using Microsoft Display adapter. On **Start**, select **Connect**, and then select the device you want to project to. **Note:** You can deploy HoloLens to use Miracast projection without enabling developer mode. |
+| **New notifications** | View and respond to notification toasts on HoloLens, just like you do on a PC. Gaze to respond to or dismiss them (or if you’re in an immersive experience, use the bloom gesture). |
+| **HoloLens overlays**
(file picker, keyboard, dialogs, etc.) | You’ll now see overlays such as the keyboard, dialogs, file picker, etc. when using immersive apps. |
+| **Visual feedback overlay UI for volume change** | When you use the volume up/down buttons on your HoloLens you’ll see a visual display of the volume level. |
+| **New UI for device boot** | A loading indicator was added during the boot process to provide visual feedback that the system is loading. Reboot your device to see the new loading indicator—it’s between the "Hello" message and the Windows boot logo. |
+| **Nearby sharing** | Addition of the Windows Nearby Sharing experience, allowing you to share a capture with a nearby Windows device. When you capture a photo or video on HoloLens (or use the share button from an app such as Microsoft Edge), select a nearby Windows device to share with. |
+| **Share from Microsoft Edge** | Share button is now available on Microsoft Edge windows on HoloLens. In Microsoft Edge, select **Share**. Use the HoloLens share picker to share web content. |
-### For administrators
+### For administrators
-
-| Feature | Details |
-|-----------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Feature | Details |
+|---|----|
| [Enable post-setup provisioning](hololens-provisioning.md) | You can now apply a runtime provisioning package at any time using **Settings**. |
| Assigned access with Azure AD groups | You can now use Azure AD groups for configuration of Windows assigned access to set up single or multi-app kiosk configuration. |
| PIN sign-in on profile switch from sign-in screen | PIN sign-in is now available for **Other User**. |
@@ -54,10 +53,11 @@ Speech Synthesis (TTS) | Speech synthesis feature now supports Chinese, Japanese
[Learn how to install the Chinese and Japanese versions of HoloLens.](hololens-install-localized.md)
-
## Windows 10, version 1803 for Microsoft HoloLens
+> **Applies to:** Hololens (1st gen)
+
Windows 10, version 1803, is the first feature update to Windows Holographic for Business since its release in Windows 10, version 1607. This update introduces the following changes:
- Previously, you could only verify that upgrade license for Commercial Suite had been applied to your HoloLens device by checking to see if VPN was an available option on the device. Now, **Settings** > **System** will display **Windows Holographic for Business** after the upgrade license is applied. [Learn how to unlock Windows Holographic for Business features](hololens-upgrade-enterprise.md).
@@ -85,14 +85,3 @@ Windows 10, version 1803, is the first feature update to Windows Holographic for
- Individual users can sync their corporate email without enrolling their device in mobile device management (MDM). You can use the device with a Microsoft Account, download and install the Mail app, and add an email account directly.
- You can check the MDM sync status for a device in **Settings** > **Accounts** > **Access Work or School** > **Info**. In the **Device sync status** section, you can start a sync, see areas managed by MDM, and create and export an advanced diagnostics report.
-
-
-
-
-
-## Additional resources
-
-- [Reset or recover your HoloLens](https://developer.microsoft.com/windows/mixed-reality/reset_or_recover_your_hololens)
-- [Restart, reset, or recover HoloLens](https://support.microsoft.com/help/13452/hololens-restart-reset-or-recover-hololens)
-- [Manage devices running Windows Holographic with Microsoft Intune](https://docs.microsoft.com/intune/windows-holographic-for-business)
-
diff --git a/devices/hololens/hololens1-basic-usage.md b/devices/hololens/hololens1-basic-usage.md
new file mode 100644
index 0000000000..41dc0c9c89
--- /dev/null
+++ b/devices/hololens/hololens1-basic-usage.md
@@ -0,0 +1,138 @@
+---
+title: Getting around HoloLens (1st gen)
+description: A brief tour of the HoloLens (1st gen) interface
+ms.assetid: 064f7eb0-190e-4643-abeb-ed3b09312042
+ms.date: 9/16/2019
+ms.reviewer: jarrettr
+manager: jarrettr
+keywords: hololens
+ms.prod: hololens
+ms.sitesec: library
+author: v-miegge
+ms.author: v-miegge
+ms.topic: article
+ms.localizationpriority: high
+appliesto:
+- HoloLens (1st gen)
+---
+
+# Getting around HoloLens (1st gen)
+
+Ready to step into the world of holograms? Here's some information to get started.
+
+This guide provides an intro to mixed reality, gestures for interacting with holograms, and an intro to Windows Holographic.
+
+## Discover mixed reality
+
+On HoloLens, holograms blend with your physical environment to look and sound like they're part of your world. Even when holograms are all around you, you can still see your surroundings, move freely, and interact with other people and objects. We call this experience "mixed reality."
+
+The holographic frame positions your holograms where your eyes are most sensitive to detail, and the see-through lenses leave your peripheral vision unobscured. With spatial sound, you can pinpoint a hologram even if it’s behind you. And because HoloLens learns and understands your environment, you can place holograms on and around real objects—and so can your apps and games. So a character in a game might sit down on your sofa, or [space robots could bust out of your walls](https://www.microsoft.com/store/apps/9nblggh5fv3j).
+
+## Use HoloLens with your hands
+
+Getting around HoloLens is a lot like using your smart phone. You can use your hands to manipulate holographic windows, menus, and buttons. Instead of pointing, clicking, or tapping, you'll use your gaze, your [voice](hololens-cortana.md), and gestures to select apps and holograms and to get around HoloLens.
+
+When you know these basic interactions, getting around on HoloLens will be a snap.
+
+We'll walk you through the basics the first time you use your HoloLens. You'll also find a gesture tutorial on your **Start** menu—look for the Learn Gestures app.
+
+### The hand-tracking frame
+
+HoloLens has sensors that can see a few feet to either side of you. When you use your hands, you'll need to keep them inside that frame, or HoloLens won't see them. As you move around, the frame moves with you.
+
+
+
+### Open the Start menu with bloom
+
+To open the **Start** menu:
+
+1. Hold your hand in front of you so it's in the gesture frame.
+1. Bloom: bring all of your fingers together then open your hand.
+ 
+
+### Select holograms with gaze and air tap
+
+To select an app or other hologram, air tap it while looking directly at the hologram you're selecting. To do this, follow these steps:
+
+1. Gaze at the hologram you want to select.
+1. Point your index finger straight up toward the ceiling.
+1. Air tap: lower your finger, then quickly raise it.
+ 
+
+### Select a hologram by using your voice
+
+1. The gaze cursor is a dot that you move around by moving your head. You can use it to target voice commands with precision.
+1. Gaze at the hologram that you want to select.
+1. To select the hologram, say "Select."
+
+## Holograms and apps
+
+Now it's time to put gestures to the test!
+
+You'll find your installed apps in the [Start menu](holographic-home.md) and there are more apps for HoloLens (1st gen) in the Microsoft Store.
+
+Open the **Start** menu and select an app!
+
+Using apps on HoloLens is a little different from on a PC: Some apps use a 2D view and look like other Windows applications. Other apps (immersive apps) use a 3D view and when you launch them, they become the only app you see.
+
+When you place an app window or app launcher, it will stay put until you remove it. You can move or resize these holograms in your mixed reality home at any time.
+
+## Move, resize, and rotate apps
+
+Moving and resizing apps on HoloLens works a bit differently than it does on a PC. Instead of dragging the app, you'll use your gaze, along with a [gesture](https://support.microsoft.com/help/12644/hololens-use-gestures) or the [clicker](hololens-clicker.md). You can also rotate an app window in 3D space.
+
+> [!TIP]
+> Rearrange apps using your voice - gaze at an app and say "Face me," "Bigger," or "Smaller." Or have Cortana move an app for you: say "Hey Cortana, move \**app name\** here."
+
+### Move an app
+
+Gaze at the app (at the title bar of an app window), and then do one of the following.
+
+- Tap and hold to select the app. Move your hand to position the app, and raise your finger to place it.
+- Select **Adjust**, tap and hold, and move your hand to position the app. Raise your finger to place it, then select **Done**.
+- Select **Adjust**, click and hold the clicker, and move your hand to position the app. Release the clicker, then select **Done**.
+
+> [!TIP]
+> If you drop apps when you move them, make sure to keep your hand in the gesture frame by following it with your gaze.
+
+### Resize an app
+
+Gaze at the app, and then do one of the following.
+
+- Gaze at a corner or edge of an app window, and tap and hold. Move your hand to change the app's size, and raise your finger when you're done.
+- Select **Adjust**. Gaze at one of the blue squares at the corners of the app, tap and hold, then move your hand to resize the app. Raise your finger to release it, then select **Done**.
+- Select **Adjust**. Gaze at one of the blue squares at the corners of the app, click and hold the clicker, then move your hand to resize the app. Release the clicker, then select **Done**.
+
+> [!TIP]
+> In Adjust mode, you can move or resize any hologram.
+
+### Rotate an app
+
+Gaze at the app, and tap and hold with both hands to select it. Rotate the app by keeping one hand steady and moving your other hand around it. When you're done, raise both index fingers.
+
+### Scroll content in an app window
+
+Gaze at the content of the app window. Tap and hold and then move your hand slightly upwards or downwards to scroll the content.
+
+## Meet the HoloLens (1st gen) Clicker
+
+The [HoloLens (1st Gen) clicker](hololens1-clicker.md) gives you another way to interact with holograms. [Pair it](hololens-connect-devices.md) with your HoloLens and then use it along with your gaze to select, scroll, and more.
+
+## Next steps
+
+Congratulations! you're ready to use HoloLens (1st gen).
+
+Now you can configure your HoloLens (1st gen) to meet your specific needs.
+
+[Connect bluetooth devices like mouse and keyboard](hololens-connect-devices.md)
+
+[Learn more about Voice and Cortana](hololens-cortana.md)
+
+### Help! I don't see my holograms
+
+If you don’t see holograms that you’ve placed while using HoloLens, here are some things to try:
+
+- Make sure that you’re looking in the right area—remember, holograms stay where you left them!
+- Make sure that you're in a well-lit room without a lot of direct sunlight.
+- Wait. When HoloLens has trouble recognizing your space, previously placed holograms can take up to a minute to reappear.
+- If issue persists, you may want to clear out your Holograms storage data in **Settings** > **System** > **Holograms**, then place holograms in mixed reality home again.
diff --git a/devices/hololens/hololens1-clicker.md b/devices/hololens/hololens1-clicker.md
new file mode 100644
index 0000000000..9e8d26b69d
--- /dev/null
+++ b/devices/hololens/hololens1-clicker.md
@@ -0,0 +1,97 @@
+---
+title: Use the HoloLens clicker
+description: This article outlines how to use the HoloLens clicker, including clicker pairing, charging, and recovery.
+ms.assetid: 7d4a30fd-cf1d-4c9a-8eb1-1968ccecbe59
+ms.date: 09/16/2019
+manager: jarrettr
+keywords: hololens
+ms.prod: hololens
+ms.sitesec: library
+author: v-miegge
+ms.author: v-miegge
+ms.topic: article
+ms.localizationpriority: medium
+appliesto:
+- HoloLens (1st gen)
+---
+
+# Use the HoloLens (1st gen) clicker
+
+The clicker was designed specifically for HoloLens (1st gen) and gives you another way to interact with holograms. It comes with HoloLens (1st gen), in a separate box.
+
+Use it in place of hand gestures to select, scroll, move, and resize apps.
+
+## Clicker hardware and pairing
+
+The HoloLens (1st gen) clicker has a finger loop to make it easier to hold, and an indicator light.
+
+
+
+### Clicker indicator lights
+
+Here's what the lights on the clicker mean.
+
+- **Blinking white**. The clicker is in pairing mode.
+- **Fast-blinking white**. Pairing was successful.
+- **Solid white**. The clicker is charging.
+- **Blinking amber**. The battery is low.
+- **Solid amber**. The clicker ran into an error and you'll need to restart it. While pressing the pairing button, click and hold for 15 seconds.
+
+### Pair the clicker with your HoloLens (1st gen)
+
+1. Use the bloom gesture to go to **Start**, then select **Settings** > **Devices** and verify that Bluetooth is on.
+1. On the clicker, press and hold the pairing button until the status light blinks white.
+1. On the pairing screen, select **Clicker** > **Pair**.
+
+### Charge the clicker
+
+When the clicker battery is low, the battery indicator will blink amber. Plug the Micro USB cable into a USB power supply to charge the device.
+
+## Use the clicker with HoloLens (1st gen)
+
+### Hold the clicker
+
+To put on the clicker, slide the loop over your ring or middle finger so that the Micro USB port faces toward your wrist. Rest your thumb in the indentation.
+
+
+
+### Clicker gestures
+
+Clicker gestures are small wrist rotations, not the larger movements used for HoloLens hand gestures. And HoloLens recognizes your gestures and clicks even if the clicker is outside the [gesture frame](hololens1-basic-usage.md), so you can hold the clicker in the position that's most comfortable for you.
+
+- **Select**. To select a hologram, button, or other element, gaze at it, then click.
+
+- **Click and hold**. Click and hold your thumb down on the button to do some of the same things you would with tap and hold, such as move or resize a hologram.
+
+- **Scroll**. On the app bar, select **Scroll Tool**. Click and hold, then rotate the clicker up, down, left, or right. To scroll faster, move your hand farther from the center of the scroll tool.
+
+- **Zoom**. On the app bar, select **Zoom Tool**. Click and hold, then rotate the clicker up to zoom in, or down to zoom out.
+
+> [!TIP]
+> To zoom in or out when using Microsoft Edge, gaze at a page and double-click.
+
+## Restart or recover the clicker
+
+Here are some things to try if the HoloLens clicker is unresponsive or isn’t working well.
+
+### Restart the clicker
+
+Use the tip of a pen to press and hold the pairing button. At the same time, click and hold the clicker for 15 seconds. If the clicker was already paired with your HoloLens, it will stay paired after it restarts.
+
+If the clicker won't turn on or restart, try charging it by using the HoloLens charger. If the battery is very low, it might take a few minutes for the white indicator light to turn on.
+
+### Re-pair the clicker
+
+Select **Settings** > **Devices** and select the clicker. Select **Remove**, wait a few seconds, then pair the clicker again.
+
+### Recover the clicker
+
+If restarting and re-pairing the clicker don’t fix the problem, the Windows Device Recovery Tool can help you recover it. The recovery process may take some time, and it will install the latest version of the clicker software. To use the tool, you’ll need a computer running Windows 10 or later that has at least 4 GB of free storage space.
+
+To recover the clicker:
+
+1. Download and install the [Windows Device Recovery Tool](https://dev.azure.com/ContentIdea/ContentIdea/_queries/query/8a004dbe-73f8-4a32-94bc-368fc2f2a895/) on your computer.
+1. Connect the clicker to your computer by using the Micro USB cable that came with your HoloLens.
+1. Run the Windows Device Recovery Tool and follow the instructions.
+
+If the clicker isn’t automatically detected, select **My device was not detected** and follow the instructions to put your device into recovery mode.
diff --git a/devices/hololens/hololens1-hardware.md b/devices/hololens/hololens1-hardware.md
new file mode 100644
index 0000000000..aced822bd4
--- /dev/null
+++ b/devices/hololens/hololens1-hardware.md
@@ -0,0 +1,158 @@
+---
+title: HoloLens (1st gen) hardware
+description: An outline of the components that make up Microsoft HoloLens (1st gen), the world's first fully untethered holographic computer running Windows.
+ms.assetid: 527d494e-2ab6-46ca-bd5a-bfc6b43cc833
+ms.date: 09/16/2019
+keywords: hololens
+ms.prod: hololens
+ms.sitesec: library
+author: mattzmsft
+ms.author: mazeller
+ms.topic: article
+manager: jarrettr
+ms.localizationpriority: medium
+appliesto:
+- HoloLens (1st gen)
+---
+
+# HoloLens (1st Gen) hardware
+
+
+
+Microsoft HoloLens (1st gen) is the world's first fully untethered holographic computer. HoloLens redefines personal computing through holographic experiences to empower you in new ways. HoloLens blends cutting-edge optics and sensors to deliver 3D holograms pinned to the real world around you.
+
+## HoloLens components
+
+
+
+Your HoloLens includes the following features:
+
+- **Visor**. Contains the HoloLens sensors and displays. You can rotate the visor up while you are wearing the HoloLens.
+- **Headband**. To put the HoloLens on, use the adjustment wheel to expand the headband. With the HoloLens in place, tighten the adjustment wheel until the headband is comfortable.
+- **Brightness buttons**. When you're wearing the HoloLens, the brightness buttons are on the left side of the device.
+- **Volume buttons**. When you're wearing the HoloLens, the volume buttons are on the right side of the device.
+- **Device arms**. When you pick up, put on, or take off your HoloLens, always grasp or hold it by the device arms.
+
+## In the box
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/c7ceb904-9d5f-4194-9e10-e8a949dbad7d]
+
+The HoloLens box contains the following items:
+
+- **Nose pads**. Select a nose pad that fits the shape of your nose and accommodates your eyewear.
+- **Overhead strap**. When you're wearing the HoloLens while you move around, use the overhead strap to help keep the device in place. Additionally, if you're wearing the HoloLens for extended periods, using the overhead strap may make the device more comfortable to wear.
+- **Micro USB cable**. Use the micro-USB cable to connect your HoloLens to the power supply for charging, or use it to connect your HoloLens to your computer.
+- **Power supply**. Plugs into a power outlet.
+- **Microfiber cloth**. Use the cloth to clean your HoloLens visor.
+
+>[!TIP]
+>The [clicker](hololens1-clicker.md) ships with HoloLens (1st Gen), in a separate box.
+
+## Device specifications
+
+### Display
+
+
+
+| | |
+| - | - |
+| Optics | See-through holographic lenses (waveguides) |
+| Holographic resolution | 2 HD 16:9 light engines producing 2.3M total light points |
+| Holographic density | \>2.5k radiants (light points per radian) |
+| Eye-based rendering | Automatic pupillary distance calibration |
+
+### Sensors
+
+
+
+- 1 inertial measurement unit (IMU)
+- 4 environment understanding cameras
+- 1 depth camera
+- 1 2MP photo / HD video camera
+- Mixed reality capture
+- 4 microphones
+- 1 ambient light sensor
+
+### Input, output, and connectivity
+
+- Built-in speakers
+- Audio 3.5mm jack
+- Volume up/down
+- Brightness up/down
+- Power button
+- Battery status LEDs
+- Wi-Fi 802.11ac
+- Micro USB 2.0
+- Bluetooth 4.1 LE
+
+### Power
+
+- Battery Life
+- 2-3 hours of active use
+- Up to 2 weeks of standby time
+- Fully functional when charging
+- Passively cooled (no fans)
+
+### Processors
+
+
+
+- Intel 32-bit architecture with TPM 2.0 support
+- Custom-built Microsoft Holographic Processing Unit (HPU 1.0)
+
+### Memory
+
+- 64 GB Flash
+- 2 GB RAM
+
+### Fit
+
+| | |
+| - | - |
+| Sizing | Single size with adjustable band. Fits over glasses |
+| Weight | 579 grams |
+
+## Device capabilities
+
+Using the following to understand user actions:
+
+- Gaze tracking
+- Gesture input
+- Voice support
+
+Using the following to understand the environment:
+
+- Spatial sound
+
+## Pre-installed software
+
+- Windows 10
+- Windows Store
+- Holograms
+- Microsoft Edge
+- Photos
+- Settings
+- Windows Feedback
+- Calibration
+- Learn Gestures
+
+## Device certifications
+
+### Safety
+
+HoloLens has been tested and found to conform to the basic impact protection requirements of ANSI Z87.1, CSA Z94.3 and EN 166.
+
+## Care and cleaning
+
+Handle your HoloLens carefully. To lift, carry, and adjust your HoloLens, use the device arms—not the overhead strap. To keep the visor free of dust and fingerprints and avoid touching it. Repeated cleaning could damage the visor, so try to keep your device clean.
+
+Don't use any cleaners or solvents on your HoloLens, and don't submerge it in water or apply water directly to it.
+
+To clean the visor, remove any dust using a camel or goat hair lens brush or a bulb-style lens blower. Lightly moisten the microfiber cloth with a small amount of distilled water, then use it to wipe the visor gently in a circular motion.
+
+To clean the rest of the device, including the headband and device arms, use a lint-free cloth moistened with mild soap and water. Let your HoloLens dry completely before using it again.
+
+
+
+> [!div class="nextstepaction"]
+> [Set up and start your HoloLens (1st gen)](hololens1-setup.md)
diff --git a/devices/hololens/hololens1-install-localized.md b/devices/hololens/hololens1-install-localized.md
new file mode 100644
index 0000000000..52e4862bbe
--- /dev/null
+++ b/devices/hololens/hololens1-install-localized.md
@@ -0,0 +1,39 @@
+---
+title: Install localized versions of HoloLens
+description: Learn how to install the Chinese or Japanese versions of HoloLens
+ms.prod: hololens
+ms.mktglfcycl: manage
+ms.sitesec: library
+author: dansimp
+ms.author: dansimp
+ms.topic: article
+ms.localizationpriority: high
+ms.date: 9/16/2019
+ms.reviewer:
+manager: jarrettr
+appliesto:
+- HoloLens (1st gen)
+---
+
+# Install localized versions of HoloLens (1st gen)
+
+In order to switch to the Chinese or Japanese version of HoloLens, you’ll need to use the Windows Device Recovery Tool (WDRT) to download the build for the language on a PC and then install it on your HoloLens.
+
+> [!IMPORTANT]
+> Using WDRT to install the Chinese or Japanese builds of HoloLens deletes existing data, such as personal files and settings, from your HoloLens.
+
+1. On your PC, download and install [the Windows Device Recovery Tool (WDRT)](https://support.microsoft.com/help/12379).
+1. Download the package for the language you want to your PC: [Simplified Chinese](https://aka.ms/hololensdownload-ch) or [Japanese](https://aka.ms/hololensdownload-jp).
+1. When the download finishes, select **File Explorer** > **Downloads**. Right-click the zipped folder that you just downloaded, and select **Extract all** > **Extract** to unzip it.
+1. Connect your HoloLens to your PC using the micro-USB cable that it shipped with. (Even if you've been using other cables to connect your HoloLens, this one works best.)
+1. After the tool automatically detects your HoloLens, select the Microsoft HoloLens tile.
+1. On the next screen, select **Manual package selection** and select the installation file that resides in the folder that you unzipped in step 4. (Look for a file that has the extension “.ffu”.)
+1. Select **Install software** and follow the instructions.
+1. After the build installs, HoloLens setup automatically starts. Put on the device and follow the setup directions.
+
+When you’re done with setup, go to **Settings** > **Update & Security** > **Windows Insider Program**, and check that you’re configured to receive the latest preview builds. Like the English preview builds, the Windows Insider Program keeps the Chinese and Japanese versions of HoloLens up-to-date with the latest preview builds.
+
+> [!NOTE]
+>
+> - You can’t use the Settings app to change the system language between English, Japanese, and Chinese. Flashing a new build is the only supported way to change the device system language.
+> - While you can use the on-screen Pinyin keyboard to enter Simplified Chinese or Japanese text, using a Bluetooth hardware keyboard to type Simplified Chinese or Japanese text is not supported at this time. However, on Chinese or Japanese HoloLens, you can continue to use a Bluetooth keyboard to type in English (to toggle a hardware keyboard to type in English, press the ~ key).
diff --git a/devices/hololens/hololens1-setup.md b/devices/hololens/hololens1-setup.md
new file mode 100644
index 0000000000..4aefbad094
--- /dev/null
+++ b/devices/hololens/hololens1-setup.md
@@ -0,0 +1,102 @@
+---
+title: Prepare a new HoloLens
+description: This guide walks through first time set up.
+ms.prod: hololens
+ms.sitesec: library
+author: JesseMcCulloch
+ms.author: jemccull
+ms.topic: article
+ms.localizationpriority: high
+ms.date: 8/12/19
+ms.reviewer:
+manager: jarrettr
+appliesto:
+- Hololens (1st gen)
+---
+
+# Get your HoloLens (1st gen) ready to use
+
+Follow along to set up a HoloLens (1st gen) for the first time.
+
+## Charge your HoloLens (1st gen)
+
+To charge your HoloLens, connect the power supply to the charging port by using the included Micro USB cable. Then plug the power supply into a power outlet. When the device is charging, the battery indicator will light up in a wave pattern.
+
+
+
+When your HoloLens is on, the battery indicator shows the battery level in increments. When only one of the five lights is on, the battery level is below 20 percent. If the battery level is critically low and you try to turn on the device, one light will blink briefly, then go out.
+
+> [!TIP]
+> To get an estimate of your current battery level, say "Hey Cortana, how much battery do I have left?"
+
+## Adjust fit
+
+> [!VIDEO https://www.microsoft.com/videoplayer/embed/be3cb527-f2f1-4f85-b4f7-a34fbaba980d]
+
+| | |
+|:--- |:--- |
+|1. Rotate the headband up to about 20-30 degrees.||
+|2. Push the headband back. Do not pull it back, or manipulate the band behind the hinge, because over time this can break the band.||
+|3. Turn the adjustment wheel to extend the headband all the way out. ||
+|4. Hold the device by the device arms, and place it on your head. Make sure that the headband sits at the top of your forehead, and then tighten the adjustment wheel.||
+|5. Slide the visor back, and then check the fit of the device. The headband should sit at the top of the forehead, just below your hairline, with the speakers above your ears. The lenses should be centered over your eyes.||
+
+## Turn on your HoloLens
+
+Use the power button to turn HoloLens on and off or to put it in standby mode.
+
+
+
+If your device doesn't respond or won't start, see [Restart, reset, or recover HoloLens](hololens-restart-recover.md).
+
+When your HoloLens is off or in standby, turn it on by pressing the power button for one second. If it doesn't turn on, plug it in and charge it for at least 30 minutes.
+
+> [!TIP]
+> To restart HoloLens, say "Hey Cortana, reboot the device."
+
+### Put HoloLens in standby
+
+To put your HoloLens in standby while it's turned on, press the power button once. The battery indicators blink off. To wake it from standby, press the power button again.
+
+HoloLens automatically goes into standby after 3 minutes of inactivity. When it's in standby, it automatically shuts down after 4 hours, or after the battery level drops by 10 percent.
+
+### Shut down HoloLens
+
+To shut down (turn off) HoloLens, hold the power button down for four seconds. The battery indicators turn off one by one and the device shuts down.
+
+HoloLens automatically shuts down when the battery level drops to one percent, even if it's plugged in. After you've recharged the battery to three percent, you'll be able to turn HoloLens on again.
+
+## Adjust volume and brightness
+
+The brightness and volume buttons are on top of the device arms—volume to your right and brightness to your left.
+
+
+
+## HoloLens indicator lights
+
+
+
+Not sure what the indicator lights on your HoloLens mean? Here's some help.
+
+|When the lights do this |It means |
+| - | - |
+|Scroll from the center outward. |HoloLens is starting up. |
+|Stay lit (all or some). |HoloLens is on and ready to use. Battery life is shown in 20 percent increments. |
+|Scroll, then light up, then scroll. |HoloLens is on and charging. Battery life is shown in 20 percent increments. |
+|Turn off one by one. |HoloLens is shutting down. |
+|Turn off all at once. |HoloLens is going into standby. |
+|All light up, then one blinks briefly, then all turn off. |Battery is critically low. HoloLens needs to charge. |
+|All scroll, then one blinks, then all scroll. |Battery is critically low. HoloLens is charging. |
+
+## Safety and comfort
+
+### Use in safe surroundings
+
+Use your HoloLens in a safe space that’s free of obstructions and tripping hazards. Don’t use it when you need a clear field of view and your full attention, such as while you’re operating a vehicle or doing other potentially hazardous activities.
+
+### Stay comfortable
+
+Keep your first few sessions with HoloLens brief and be sure to take breaks. If you experience discomfort, stop and rest until you feel better. This might include temporary feelings of nausea, motion sickness, dizziness, disorientation, headache, fatigue, eye strain, or dry eyes.
+
+> [!div class="nextstepaction"]
+> [Start and configure your HoloLens (1st gen)](hololens1-start.md)
diff --git a/devices/hololens/hololens1-start.md b/devices/hololens/hololens1-start.md
new file mode 100644
index 0000000000..466fc431b2
--- /dev/null
+++ b/devices/hololens/hololens1-start.md
@@ -0,0 +1,75 @@
+---
+title: Set up HoloLens (1st gen)
+description: This guide walks through first time set up. You'll need a Wi-Fi network and either a Microsoft (MSA) or Azure Active Directory (Azure AD) account.
+ms.assetid: 0136188e-1305-43be-906e-151d70292e87
+ms.prod: hololens
+author: Teresa-Motiv
+ms.author: v-tea
+ms.topic: article
+ms.date: 8/12/19
+manager: jarrettr
+ms.topic: article
+ms.localizationpriority: high
+appliesto:
+- HoloLens (1st gen)
+---
+
+# Set up your HoloLens (1st gen)
+
+The first time you turn on your HoloLens, you'll be guided through calibrating your device, setting up your device, and signing in. This article walks through the HoloLens (1st gen) first start and setup experience.
+
+In the next section, you'll learn how to work with HoloLens and interact with holograms. To skip ahead to that article, see [Get started with HoloLens (1st gen)](hololens1-basic-usage.md).
+
+## Before you start
+
+Before you get started, make sure you have the following available:
+
+**A Wi-Fi connection**. You'll need to connect your HoloLens to a Wi-Fi network to set it up. The first time you connect, you'll need an open or password-protected network that doesn't require navigating to a website or using certificates to connect. [Learn more about the websites that HoloLens uses](hololens-offline.md).
+
+**A Microsoft account or a work account**. You'll also need to use a Microsoft account (or a work account, if your organization owns the device) to sign in to HoloLens. If you don't have a Microsoft account, go to [account.microsoft.com](http://account.microsoft.com) and set one up for free.
+
+**A safe, well-lit space with no tripping hazards**. [Health and safety info](http://go.microsoft.com/fwlink/p/?LinkId=746661).
+
+**The optional comfort accessories** that came with your HoloLens, to help you get the most comfortable fit. [More on fit and comfort](https://support.microsoft.com/help/12632/hololens-fit-your-hololens).
+
+> [!NOTE]
+>
+> - The first time that you use your HoloLens, [Cortana](hololens-cortana.md) is already on and ready to guide you (though she won't be able to respond to your questions until after you set up your device). You can turn Cortana off at any time in Cortana's settings.
+> - In order to switch to the Chinese or Japanese version of HoloLens, you’ll need to download the build for the language on a PC and then install it on your HoloLens. For more information, see [Install localized versions of HoloLens (1st gen)](hololens1-install-localized.md).
+
+## Start your Hololens and set up Windows
+
+The first time you start your HoloLens, your first task is to set up Windows Holographic on your device.
+
+1. Connect to the internet (HoloLens guides you to select Wi-Fi network).
+
+1. Sign in to your user account. Choose between **My work or school owns it** and **I own it**.
+ - When you choose **My work or school owns it**, you sign in by using an Azure AD account. If your organization uses Azure AD Premium and has configured automatic MDM enrollment, HoloLens automatically enrolls in MDM. If your organization does not use Azure AD Premium, automatic MDM enrollment isn't available, so you will need to [manually enroll HoloLens in device management](hololens-enroll-mdm.md#enroll-through-settings-app). To sign in to your device the first time by using a work or school account, follow these steps:
+ 1. Enter your organizational account information.
+ 1. Accept the privacy statement.
+ 1. Sign in by using your Azure AD credentials. This may redirect to your organization's sign-in page.
+ 1. Continue setting up the device.
+ - When you choose **I own it**, you sign in by using a Microsoft account. After setup is complete, you can [manually enroll HoloLens in device management](hololens-enroll-mdm.md#enroll-through-settings-app).
+ 1. Enter your Microsoft account information.
+ 1. Enter your password. If your Microsoft account requires [two-step verification (2FA)](https://blogs.technet.microsoft.com/microsoft_blog/2013/04/17/microsoft-account-gets-more-secure/), complete the verification process.
+
+1. The device sets your time zone based on information that it obtains from the Wi-Fi network.
+
+## Calibration
+
+After Cortana introduces herself, the next setup step is calibration. For the best HoloLens experience, you should complete the calibration process during setup.
+
+HoloLens (1st gen) uses the distance between your pupils (IPD or [interpupillary distance](https://en.wikipedia.org/wiki/Interpupillary_distance)) to make holograms clear and easy to interact with. If the IPD is not correct, holograms may appear to be unstable or at an incorrect distance.
+
+During calibration, HoloLens asks you to align your finger with a series of six targets per eye. HoloLens uses this process to set the correct IPD for your eyes. If the calibration needs to be updated or adjusted for a new user, the new user can run the Calibration app outside of setup.
+
+
+
+*IPD finger-alignment screen at second step*
+
+Congratulations! Setup is complete and you can begin using HoloLens.
+
+## Next steps
+
+> [!div class="nextstepaction"]
+> [Get started with HoloLens (1st gen)](hololens1-basic-usage.md)
diff --git a/devices/hololens/hololens1-upgrade-enterprise.md b/devices/hololens/hololens1-upgrade-enterprise.md
new file mode 100644
index 0000000000..5e535af10d
--- /dev/null
+++ b/devices/hololens/hololens1-upgrade-enterprise.md
@@ -0,0 +1,91 @@
+---
+title: Unlock Windows Holographic for Business features
+description: When you upgrade to Windows Holographic for Business, HoloLens provides extra features that are designed for business.
+ms.prod: hololens
+ms.sitesec: library
+author: dansimp
+ms.author: dansimp
+ms.topic: article
+ms.localizationpriority: medium
+ms.date: 9/16/2019
+ms.reviewer:
+manager: jarrettr
+appliesto:
+- HoloLens (1st gen)
+---
+
+# Unlock Windows Holographic for Business features
+
+Microsoft HoloLens is available in the *Development Edition*, which runs Windows Holographic (an edition of Windows 10 that is designed for HoloLens), and in the [Commercial Suite](hololens-commercial-features.md), which provides extra features designed for business.
+
+When you purchase the Commercial Suite, you receive a license that upgrades Windows Holographic to Windows Holographic for Business. You can apply this license to the device either by using the organization's [mobile device management (MDM) provider](#edition-upgrade-by-using-mdm) or a [provisioning package](#edition-upgrade-by-using-a-provisioning-package).
+
+> [!TIP]
+> In Windows 10, version 1803, you can check that the HoloLens has been upgraded to the business edition by selecting **Settings** > **System**.
+
+## Edition upgrade by using MDM
+
+The enterprise license can be applied by any MDM provider that supports the [WindowsLicensing configuration service provider (CSP)](https://msdn.microsoft.com/library/windows/hardware/dn904983.aspx). The latest version of the Microsoft MDM API will support WindowsLicensing CSP.
+
+For step-by-step instructions for upgrading HoloLens by using Microsoft Intune, see [Upgrade devices running Windows Holographic to Windows Holographic for Business](https://docs.microsoft.com/intune/holographic-upgrade).
+
+ On other MDM providers, the specific steps for setting up and deploying the policy might vary.
+
+## Edition upgrade by using a provisioning package
+
+Provisioning packages are files created by the Windows Configuration Designer tool that apply a specified configuration to a device.
+
+### Create a provisioning package that upgrades the Windows Holographic edition
+
+1. [Create a provisioning package for HoloLens.](hololens-provisioning.md)
+1. Go to **Runtime settings** > **EditionUpgrade**, and select **EditionUpgradeWithLicense**.
+
+ 
+
+1. Find the XML license file that was provided when you purchased the Commercial Suite.
+
+ > [!NOTE]
+ > You can configure [additional settings in the provisioning package](hololens-provisioning.md).
+
+1. On the **File** menu, select **Save**.
+
+1. Read the warning that project files may contain sensitive information and click **OK**.
+
+ > [!IMPORTANT]
+ > When you build a provisioning package, you may include sensitive information in the project files and provisioning package (.ppkg) file. Although you have the option to encrypt the .ppkg file, project files are not encrypted. You should store the project files in a secure location and delete the project files when no longer needed.
+
+1. On the **Export** menu, select **Provisioning package**.
+
+1. Change **Owner** to **IT Admin**, which sets the precedence of this provisioning package to be higher than others applied to this device from different sources, and then select **Next**.
+
+1. Set a value for **Package Version**.
+
+ > [!TIP]
+ > You can make changes to existing packages and change the version number to update previously applied packages.
+
+1. On **Select security details for the provisioning package**, select **Next**.
+
+1. Select **Next** to specify the output location where you want the provisioning package to go once it's built. By default, Windows ICD uses the project folder as the output location.
+
+ Optionally, you can select **Browse** to change the default output location.
+
+1. Select **Next**.
+
+1. Select **Build** to start building the package. The build page displays the project information, and the progress bar indicates the build status.
+
+1. When the build completes, select **Finish**.
+
+### Apply the provisioning package to HoloLens
+
+1. Using the USB cable, connect the device to a PC. Start the device, but do not continue past the **fit** page of the initial setup experience (the first page with the blue box). On the PC, HoloLens shows up as a device in File Explorer.
+
+ > [!NOTE]
+ > If the HoloLens device is running Windows 10, version 1607 or earlier, open File Explorer by briefly pressing and releasing the **Volume Down** and **Power** buttons simultaneously on the device.
+
+1. In File Explorer, drag and drop the provisioning package (.ppkg) onto the device storage.
+
+1. While HoloLens is still on the **fit** page, briefly press and release the **Volume Down** and **Power** buttons simultaneously again.
+
+1. HoloLens asks you if you trust the package and would like to apply it. Confirm that you trust the package.
+
+1. You will see whether the package was applied successfully or not. If it was not applied successfully, you can fix your package and try again. If successful, proceed with device setup.
diff --git a/devices/hololens/hololens2-basic-usage.md b/devices/hololens/hololens2-basic-usage.md
new file mode 100644
index 0000000000..e15003a8f4
--- /dev/null
+++ b/devices/hololens/hololens2-basic-usage.md
@@ -0,0 +1,181 @@
+---
+title: Getting around HoloLens 2
+description: A guide to using HoloLens 2 with your hands
+ms.assetid: 5f791a5c-bdb2-4c5d-bf46-4a198de68f21
+ms.date: 9/17/2019
+keywords: hololens
+ms.prod: hololens
+ms.sitesec: library
+author: scooley
+ms.author: scooley
+ms.topic: article
+ms.localizationpriority: high
+appliesto:
+- HoloLens 2
+---
+
+# Getting around HoloLens 2
+
+Ready to explore the world of holograms?
+
+This guide provides an intro to:
+
+- Interacting with mixed reality
+- Using your hands and voice for interacting with holograms on HoloLens 2
+- Navigating Windows 10 on HoloLens (Windows Holographic)
+
+## Discover mixed reality
+
+On HoloLens, holograms blend the digital world with your physical environment to look and sound like they're part of your world. Even when holograms are all around you, you can always see your surroundings, move freely, and interact with people and objects. We call this experience "mixed reality".
+
+The holographic frame positions your holograms where your eyes are most sensitive to detail and the see-through lenses leave your peripheral vision unobscured. With spatial sound, you can pinpoint a hologram by listening, even if it’s behind you. And, because HoloLens understands your physical environment, you can place holograms on and around real objects such as tables and walls.
+
+Getting around HoloLens is a lot like using your smart phone. You can use your hands to touch and manipulate holographic windows, menus, and buttons.
+
+Once you know these basic interactions, getting around on HoloLens will be a snap.
+
+> [!TIP]
+> If you have a HoloLens near you right now, the **Tips** app provides literal hands-on tutorials for hand interactions on HoloLens.
+> Use the start gesture to go to **Start** or say "Go to Start" and select **Tips**.
+
+## The hand-tracking frame
+
+HoloLens has sensors that can see a few feet to either side of you. When you use your hands, you'll need to keep them inside that frame, or HoloLens won't see them. However, the frame moves with you as you move around.
+
+
+
+## Touch holograms near you
+
+When a hologram is near you, bring your hand close to it and a white ring should appear on the tip of your index finger. This is the **touch cursor** which helps you touch and interact with holograms with precision. To **select** something, simply **tap** it with the touch cursor. **Scroll** content by **swiping** on the surface of the content with your finger, just like you're using a touch screen.
+
+To **grab** a hologram near you, pinch your **thumb** and **index finger** together on the hologram and hold. To let go, release your fingers. Use this **grab gesture** to move, resize, and rotate 3D objects and app windows in mixed reality home.
+
+To bring up a **context menu**, like the ones you'll find on an app tile in the Start menu, **tap and hold** like you do on a touch screen.
+
+## Use hand ray for holograms out of reach
+
+When there are no holograms near your hands, the **touch cursor** will hide automatically and **hand rays** will appear from the palm of your hands. Hand rays allow you to interact with holograms from a distance.
+
+> [!TIP]
+> If you find hand rays distracting, you can hide them by saying “Hide hand rays”. To make them reappear, say "Show hand rays."
+
+### Select using air tap
+
+To select something using **hand ray**, follow these steps:
+
+1. Use a hand ray from your palm to target the item. You don't need to raise your entire arm, you can keep your elbow low and comfortable.
+1. Point your index finger straight up toward the ceiling.
+1. To perform the **air tap** gesture, pinch your thumb and index finger together and then quickly release them.
+
+ 
+
+### Grab using air tap and hold
+
+To grab a hologram or scroll app window content using **hand ray**, start with an **air tap**, but keep your fingers together instead of releasing them.
+
+Use **air tap and hold** to perform the following actions with hand ray:
+
+- **Scroll**. To scroll app window content, air tap and hold on the content and then move your hand ray up and down or side to side.
+- **Grab**. To grab an app window or hologram, target the app title bar or hologram with your hand ray and then air tap and hold.
+- **Open context menus**. To open context menus, air tap and hold with your hand ray.
+
+## Start gesture
+
+The Start gesture opens the **Start menu**. To perform the Start gesture, hold out your hand with your palm facing you. You’ll see a **Start icon** appear over your inner wrist. Tap this icon using your other hand. The Start menu will open **where you’re looking**.
+
+> [!TIP]
+>
+> - You can use the Start gesture as long as your hands are inside the hand-tracking frame. You do not need to be looking down at the Start icon. Keep your elbow low and comfortable, and look in the direction where you want the Start menu to open.
+> - If the Start menu didn't open at the position you want, simply move your head around to reposition it.
+> - If you have trouble reading the smaller text on the Start menu, step closer to it after it opens.
+> - If your hand is slightly off to the side of the frame, you may still be able to view the Start menu by tapping your inner wrist, even if you don't see the icon.
+
+
+
+To **close** the Start menu, do the Start gesture when the Start menu is open. You can also look at the Start menu and say "Close".
+
+### One-handed Start gesture
+
+You can also perform the Start gesture with only one hand. To do this, hold out your hand with your palm facing you and look at the **Start icon** on your inner wrist. **While keeping your eye on the icon**, pinch your thumb and index finger together.
+
+> [!IMPORTANT]
+> For the one-handed Start gesture to work, your eyes must be calibrated on the device so that eye tracking functions correctly. If you do not see orbiting dots around the Start icon when you look at it, your eyes are not calibrated on the device.
+
+
+
+## Start menu, mixed reality home, and apps
+
+Ready to put all these hand interactions to the test?!
+
+You'll find your installed apps in the [Start menu](holographic-home.md) and you can find additional apps for HoloLens in the [Microsoft Store](holographic-store-apps.md).
+
+Just as Windows PC always starts its experience at the desktop, HoloLens always starts in **mixed reality home** when turned on. Using the Start menu, you can open and place app windows, as well as app launchers and 3D content in mixed reality home. Their placements in your physical space will be remembered by HoloLens.
+
+Open the **Start menu**, then select the **Settings** app tile. An app window will open in front of you.
+
+Settings is an example of a HoloLens app that uses a 2D **app window**. It's very similar to a Windows application on PC.
+
+Now you can open the **Start menu** again and select the **Tips** app tile. A 3D **app launcher** for the app will appear in front of you. To open the app, you need to select the **play** button on the launcher.
+
+Tips is an example of an **immersive app**. An immersive app takes you away from mixed reality home when it runs and becomes the only app you see. To exit, you need to bring up the Start menu and select the **mixed reality home** button at the bottom.
+
+[Go here to learn more](holographic-home.md) about Start menu and mixed reality home, including info on how to use and manage apps on HoloLens 2.
+
+## Move, resize, and rotate holograms
+
+In mixed reality home you can move, resize, and rotate app windows and 3D objects using your hands, hand ray and voice commands.
+
+### Moving holograms
+
+Move a hologram or app by following these steps:
+
+1. Grab the hologram by pinching your index finger and thumb on the hologram or face your hand down and then close your fist over it. Grab a 3D hologram anywhere inside its blue bounding box. For an app window, grab its title bar.
+1. Without letting go, move your hand to position the hologram. When moving an app window this way, the app window automatically turns to face you as it moves, making it easier to use at its new position.
+1. Release your fingers to place it.
+
+### Resizing holograms
+
+Grab and use the **resize handles** that appear on the corners of 3D holograms and app windows to resize them.
+
+For an app window, when resized this way the window content correspondingly increases in size and becomes easier to read.
+
+If you want to resize an app window so that **more content** appears in the window, use the resize handles located on the sides and bottom edges of the app window.
+
+There are two ways to resize a hologram that's further away from you. You can either grab two corners of the hologram, or use the resize controls.
+
+### Rotating holograms
+
+For 3D holograms, grab and use the rotate handles that appear on the vertical edges of the bounding box.
+
+For app windows, moving an app window will cause it to automatically rotate and face you.
+
+You can also grab a 3D hologram or app window with **both hands** (or hand ray) at once and then:
+
+- Move your hands closer together or further apart to resize the hologram.
+- Move your hands closer and further away from your body to rotate the hologram.
+
+### Follow me, stop following
+
+Holograms and app windows stay where you placed them in the world. That's not always convenient if you need to move around and you want an application to stay visible. To ask an app to start or stop following you, select **Follow me** in the top right corner of the app window (next to the **Close** button). An app window that is following you will also follow you into, an out of, an immersive app.
+
+## Use HoloLens with your voice
+
+You can use your voice to do most of the same things you do with hands on HoloLens, like taking a quick photo or opening an app.
+
+| To do this | Say this |
+| - | - |
+| Open the Start menu | "Go to Start" |
+| Select | Say "select" to bring up the gaze cursor. Then, turn your head to position the cursor on the thing you want to select, and say “select” again. |
+| See available speech commands | "What can I say?" |
+
+ [See more voice commands and ways to use speech with HoloLens](hololens-cortana.md)
+
+## Next steps
+
+Congratulations! You're ready to use HoloLens 2!
+
+Now you can configure your HoloLens 2 to meet your specific needs. Other things you may want to try include:
+
+- [Connecting bluetooth devices like a mouse and keyboard](hololens-connect-devices.md)
+- [Installing apps from the store](holographic-store-apps.md)
+- [Sharing your HoloLens with other people](hololens-multiple-users.md)
diff --git a/devices/hololens/hololens2-hardware.md b/devices/hololens/hololens2-hardware.md
new file mode 100644
index 0000000000..dd81a50803
--- /dev/null
+++ b/devices/hololens/hololens2-hardware.md
@@ -0,0 +1,144 @@
+---
+title: HoloLens 2 hardware
+description: An outline of the components that make up Microsoft HoloLens 2, the latest evolution of Microsoft's fully untethered holographic computer running Windows 10.
+ms.assetid: 651d0430-bfbc-4685-a4fd-db7c33ce9325
+ms.date: 9/17/2019
+keywords: hololens
+ms.prod: hololens
+ms.sitesec: library
+author: scooley
+ms.author: scooley
+ms.topic: article
+ms.localizationpriority: high
+appliesto:
+- HoloLens 2
+---
+
+# HoloLens 2 hardware
+
+
+
+Microsoft HoloLens 2 is an untethered holographic computer. It refines the holographic computing journey started by HoloLens (1st gen) to provide a more comfortable and immersive experience paired with more options for collaborating in mixed reality.
+
+## HoloLens components
+
+- **Visor**. Contains the HoloLens sensors and displays. You can rotate the visor up while wearing the HoloLens.
+- **Headband**. To put the HoloLens on, use the adjustment wheel to expand the headband. With the HoloLens in place, tighten the adjustment wheel by turning to the right, until the headband is comfortable.
+- **Brightness buttons**. When wearing the HoloLens, the brightness buttons are on the left side of the device.
+- **Volume buttons**. When wearing the HoloLens, the volume buttons are on the right side of the device.
+
+## In the box
+
+- **Brow pad**. You can remove and replace the brow pad, as needed.
+- **Overhead strap**. When you're wearing the HoloLens while moving around, use the overhead strap to help keep the device in place. When wearing the HoloLens for extended periods, the overhead strap may make the device more comfortable to wear.
+- **USB-C cable**. Use the USB-C cable to connect your HoloLens to the power supply for charging, or to connect your HoloLens to your computer.
+- **Power supply**. Plugs into a power outlet.
+- **Microfiber cloth**. Use to clean your HoloLens visor.
+
+## Device specifications
+
+### Display
+
+| | |
+| - | - |
+| Optics | See-through holographic lenses (waveguides) |
+| Holographic resolution | 2k 3:2 light engines |
+| Holographic density | >2.5k radiants (light points per radian) |
+| Eye-based rendering | Display optimization for 3D eye position |
+
+### Sensors
+
+| | |
+| - | - |
+| Head tracking | 4 visible light cameras |
+| Eye tracking | 2 Infrared (IR) cameras |
+| Depth | 1-MP Time-of-Flight depth sensor |
+| Inertial measurement unit (IMU) | Accelerometer, gyroscope, magnetometer |
+| Camera | 8-MP stills, 1080p30 video |
+
+### Audio and speech
+
+| | |
+| - | - |
+| Microphone array | 5 channels |
+| Speakers | Built-in spatial sound |
+
+### Compute and connectivity
+
+| | |
+| - | - |
+| System on chip | Qualcomm Snapdragon 850 Compute Platform [details](https://www.qualcomm.com/products/snapdragon-850-mobile-compute-platform) |
+| Holographic processing unit | Second-generation custom-built holographic processing unit |
+| Memory | 4-GB LPDDR4x system DRAM |
+| Storage | 64-GB UFS 2.1 |
+| WiFi | 802.11ac 2x2 |
+| Bluetooth | 5.0 |
+| USB | USB Type-C |
+
+### Fit
+
+| | |
+| - | - |
+| Sizing | Single size with adjustable band. Fits over eyeglasses |
+| Weight | 566 grams |
+
+## Device capabilities
+
+### Human understanding
+
+| | |
+| - | - |
+| Hand tracking | Two-handed fully articulated model, direct manipulation |
+| Eye tracking | Real-time tracking |
+| Voice | Command and control on-device; Cortana natural language with internet connectivity |
+
+### Environment understanding
+
+| | |
+| - | - |
+| Six Degrees of Freedom (6DoF) tracking | World-scale positional tracking |
+| Spatial mapping | Real-time environment mesh |
+| Mixed reality capture | Mixed hologram and physical environment photos and videos |
+
+## Pre-installed software
+
+- Windows Holographic Operating System
+- Microsoft Edge
+- Dynamics 365 Remote Assist
+- Dynamics 365 Layout
+- Dynamics 365 Guides
+- 3D Viewer
+- OneDrive for Business
+- HoloLens Tips
+- Cortana
+
+## Device certifications
+
+### Safety
+
+HoloLens 2 has been tested and conforms to the basic impact protection requirements of ANSI Z87.1, CSA Z94.3 and EN 166.
+
+## Care and cleaning
+
+Handle your HoloLens carefully. Use the headband to lift and carry the HoloLens 2.
+
+As you would for eyeglasses or protective eye-wear, try to keep the HoloLens visor free of dust and fingerprints. When possible, avoid touching the visor. Repeated cleaning could damage the visor, so keep your device clean!
+
+Don't use any cleaners or solvents on your HoloLens, and don't submerge it in water or apply water directly to it.
+
+To clean the visor, remove any dust by using a camel or goat hair lens brush or a bulb-style lens blower. Lightly moisten the microfiber cloth with a small amount of distilled water, then use it to wipe the visor gently in a circular motion.
+
+Clean the rest of the device, including the headband and device arms, with a lint-free microfiber cloth moistened with mild soap and water. Let your HoloLens dry completely before reuse.
+
+
+
+### Replace the brow pad
+
+The brow pad is magnetically attached to the device. To detach it, pull gently away. To replace it, snap it back into place.
+
+
+
+## Next step
+
+> [!div class="nextstepaction"]
+> [Set up and start your HoloLens 2](hololens2-setup.md)
diff --git a/devices/hololens/hololens2-setup.md b/devices/hololens/hololens2-setup.md
new file mode 100644
index 0000000000..e8350f4e65
--- /dev/null
+++ b/devices/hololens/hololens2-setup.md
@@ -0,0 +1,101 @@
+---
+title: Prepare a new HoloLens 2
+description: This guide walks through first time set up and hardware guide.
+ms.assetid: 02692dcf-aa22-4d1e-bd00-f89f51048e32
+ms.date: 9/17/2019
+keywords: hololens
+ms.prod: hololens
+ms.sitesec: library
+author: scooley
+ms.author: scooley
+ms.topic: article
+ms.localizationpriority: high
+appliesto:
+- HoloLens 2
+---
+
+# Get your HoloLens 2 ready to use
+
+The procedures below will help you set up a HoloLens 2 for the first time.
+
+## Charge your HoloLens
+
+Connect the power supply to the charging port by using the USB-C cable (included). Plug the power supply into a power outlet.
+
+ - When the device is charging, the battery indicator lights up in a wave pattern.
+ - When your HoloLens is on, the battery indicator displays the battery level in increments.
+ - When only one of the five lights is on, the battery level is below 20 percent.
+ - If the battery level is critically low and you try to turn on the device, one light will blink briefly, then go out.
+
+> [!TIP]
+> To get an estimate of your current battery level, say "Hey Cortana, how much battery do I have left?"
+
+## Adjust fit
+
+Place the HoloLens 2 on your head. If you wear eyeglasses, leave them on. The brow pad should sit comfortably on your forehead and the back band should sit in the middle-back of your head.
+
+If necessary, extend the headband by turning the adjustment wheel, and then loosen the overhead strap.
+
+
+
+### Attach and detach the overhead strap
+
+The overhead strap isn't required, but it can make wearing HoloLens 2 more comfortable during long periods of use.
+
+To detach the front of the overhead strap, unhook the strap and slide it through the retractable loop on the brow pad. To reattach it, pull out the loop and slide the strap back through.
+
+To detach the back of the overhead strap, press the button below each connection tab and pull gently. To reattach it, push the connection tabs back into the slots until they click.
+
+
+
+## Turn on the HoloLens 2
+
+To turn on your HoloLens 2, press the Power button. The LED lights below the Power button display the battery level.
+
+### Power button actions for different power transitions
+
+| To do this | Perform this action and watch for these indicator lights |
+| - | - |
+| To turn on | Single button press - lights will indicate battery state. |
+| To sleep | Single button press - lights will indicate battery state then go dark on sleep. |
+| To wake from sleep | Single button press - lights will indicate battery state. |
+| To turn off | Press and for hold 5s - all five lights will light then go dark on shutdown. |
+| To force the Hololens to restart if it is unresponsive | Press and hold for 10s - all lights will light then go dark on shutdown. They'll relight on restart. |
+
+## HoloLens indicator lights
+
+Not sure what the indicator lights on your HoloLens mean? Here's some help!
+
+### Lights that indicate the state of the device
+
+|When you do this | And then the lights do this | It means |
+| - | - | - |
+| You press the Power button. |All five lights turn on, then change to indicate the battery level. After four seconds, a sound plays. | HoloLens is starting up. |
+| You press the Power button. |All five lights turn on, then change to indicate the battery level. A sound immediately plays. | HoloLens is on, awake, and ready to use. |
+| You press and hold the Power button for five seconds or longer. |All five lights turn on, then fade off one at a time. After the lights turn off, a sound plays and the screen displays "Goodbye." |HoloLens is shutting down. |
+| You press and hold the Power button for less than five seconds. |All five lights turn on, then fade off one at a time. After the lights turn off, a sound plays and the screen displays "Goodbye." |HoloLens is entering sleep. |
+| You press the Power button. |One light flashes five times, then turns off. |The HoloLens battery is critically low. Charge your HoloLens. |
+| You press the Power button. |All five lights flash five times, then turn off. | HoloLens cannot start correctly and is in an error state. |
+
+### Lights that indicate the battery level
+
+| Number of lights | Battery level |
+| - | - |
+|Four solid lights, one light fading in and out |Between 100% and 81% (fully charged) |
+|Three solid lights, one light fading in and out |Between 80% and 61% |
+|Two solid lights, one light fading in and out |Between 60% and 41% |
+|One solid light, one light fading in and out |Between 40% and 21% |
+|One light fading in and out |Between 20% and 5% or lower (critical battery) |
+
+## Safety and comfort
+
+### Use HoloLens in safe surroundings
+
+Use your HoloLens in a safe space, free of obstructions and tripping hazards. Don’t use it when you need a clear field of view or can't commit your full attention, such as while you’re operating a vehicle or doing other potentially hazardous activities.
+
+### Stay comfortable
+
+Keep your first few sessions with HoloLens brief and be sure to take breaks. If you experience discomfort, stop and rest until you feel better. This might include temporary feelings of nausea, motion sickness, dizziness, disorientation, headache, fatigue, eye strain, or dry eyes.
+
+> [!div class="nextstepaction"]
+> [Start and configure your HoloLens 2](hololens2-start.md)
diff --git a/devices/hololens/hololens2-start.md b/devices/hololens/hololens2-start.md
new file mode 100644
index 0000000000..783a6af601
--- /dev/null
+++ b/devices/hololens/hololens2-start.md
@@ -0,0 +1,89 @@
+---
+title: Set up your HoloLens 2
+description: This guide walks through first time set up. You'll need a Wi-Fi network and either a Microsoft (MSA) or Azure Active Directory (AAD) account.
+ms.assetid: 507305f4-e85a-47c5-a055-a3400ae8a10e
+ms.date: 9/17/2019
+keywords: hololens
+ms.prod: hololens
+ms.sitesec: library
+author: scooley
+ms.author: scooley
+ms.topic: article
+ms.localizationpriority: high
+appliesto:
+- HoloLens 2
+---
+
+# Set up your HoloLens 2
+
+The first time you turn on your HoloLens, you'll be guided through setting up your device, signing in with a user account, and calibrating the HoloLens to your eyes. This section walks through the HoloLens 2 initial setup experience.
+
+In the next section, you'll learn how to work with HoloLens and interact with holograms. To skip ahead to that article, see [Get started with HoloLens 2](hololens2-basic-usage.md).
+
+## Before you start
+
+Before you get started, make sure you have the following available:
+
+**A network connection**. You'll need to connect your HoloLens to a network to set it up. With HoloLens 2, you can connect with Wi-Fi or by using ethernet (you'll need a USB-C-to-Ethernet adapter). The first time you connect, you'll need an open or password-protected network that doesn't require navigating to a website or using certificates to connect. [Learn more about the websites that HoloLens uses](hololens-offline.md).
+
+**A Microsoft account**. You'll also need to sign in to HoloLens with a Microsoft account (or with your work account, if your organization owns the device). If you don't have a Microsoft account, go to [account.microsoft.com](http://account.microsoft.com) and set one up for free.
+
+**A safe, well-lit space with no tripping hazards**. [Health and safety info](http://go.microsoft.com/fwlink/p/?LinkId=746661).
+
+**The optional comfort accessories** that came with your HoloLens, to help you get the most comfortable fit. [More on fit and comfort](hololens2-setup.md#adjust-fit).
+
+## Set up Windows
+
+The first time you start your HoloLens 2, your first task is to set up Windows Holographic. When you start your HoloLens, you will hear music and see a Windows logo.
+
+
+
+HoloLens 2 will walk you through the following steps:
+
+1. Select your language.
+ 
+
+1. Select your region.
+ 
+
+1. Calibrate HoloLens to your eyes. If you choose to skip calibration, you'll be prompted the next time you log in.
+
+ To calibrate, you'll look at a set of targets (referred to as gems). It's fine if you blink or close your eyes during calibration, but try not to stare at other objects in the room or physical space. HoloLens uses this process to learn about your eye position so that it can better render your holographic world. After calibration, holograms will appear correctly even as the visor shifts on your head.
+
+ Calibration information is stored locally on the device and is not associated with any account information. For more information, see [Calibration data and security](hololens-calibration.md#calibration-data-and-security).
+
+ 
+
+1. Connect to the internet (select Wi-Fi or your ethernet connection).
+ HoloLens sets your time zone automatically based on information obtained from the Wi-Fi network. After setup finishes, you can change the time zone by using the Settings app.
+
+ 
+
+1. Sign in to your user account. You'll choose between **My work or school owns it** and **I own it**.
+ - When you choose **My work or school owns it**, you sign in with an Azure AD account. If your organization uses Azure AD Premium and has configured automatic MDM enrollment, HoloLens automatically enrolls in MDM. If your organization does not use Azure AD Premium, automatic MDM enrollment isn't available. In that case, you need to [manually enroll HoloLens in device management](hololens-enroll-mdm.md#enroll-through-settings-app).
+ 1. Enter your organizational account information.
+ 1. Accept the privacy statement and the end user license agreement.
+ 1. Sign in by using your Azure AD credentials. This may redirect to your organization's sign-in page.
+ 1. Continue setting up the device.
+ - When you choose **I own it**, you sign in with a Microsoft account. After setup is complete, you can [manually enroll HoloLens in device management](hololens-enroll-mdm.md#enroll-through-settings-app).
+ 1. Enter your Microsoft account information.
+ 2. Enter your password. If your Microsoft account requires [two-step verification (2FA)](https://blogs.technet.microsoft.com/microsoft_blog/2013/04/17/microsoft-account-gets-more-secure/), complete the verification process.
+
+ 
+
+1. Select whether to enable speech on HoloLens 2, and whether to send diagnostic telemetry.
+ 
+
+1. Select your telemetry level. If you can, please enable Full telemetry. This information really helps the HoloLens engineering team.
+ 
+
+1. Learn how to use the start gesture on HoloLens 2.
+ 
+ 
+
+Congratulations! Setup is complete and you're ready to use HoloLens!
+
+## Next steps
+
+> [!div class="nextstepaction"]
+> [Get started with HoloLens 2](hololens2-basic-usage.md)
diff --git a/devices/hololens/images/01-magic-moment.png b/devices/hololens/images/01-magic-moment.png
new file mode 100644
index 0000000000..0d55443b55
Binary files /dev/null and b/devices/hololens/images/01-magic-moment.png differ
diff --git a/devices/hololens/images/02-00-magic-moment.png b/devices/hololens/images/02-00-magic-moment.png
new file mode 100644
index 0000000000..ae76fb70ea
Binary files /dev/null and b/devices/hololens/images/02-00-magic-moment.png differ
diff --git a/devices/hololens/images/02-01-magic-moment-bird-intro.png b/devices/hololens/images/02-01-magic-moment-bird-intro.png
new file mode 100644
index 0000000000..ae76fb70ea
Binary files /dev/null and b/devices/hololens/images/02-01-magic-moment-bird-intro.png differ
diff --git a/devices/hololens/images/02-02-bird-palm.png b/devices/hololens/images/02-02-bird-palm.png
new file mode 100644
index 0000000000..fda1f3dcdd
Binary files /dev/null and b/devices/hololens/images/02-02-bird-palm.png differ
diff --git a/devices/hololens/images/02-03-bird-button.png b/devices/hololens/images/02-03-bird-button.png
new file mode 100644
index 0000000000..749a1ab6fc
Binary files /dev/null and b/devices/hololens/images/02-03-bird-button.png differ
diff --git a/devices/hololens/images/04-language.png b/devices/hololens/images/04-language.png
new file mode 100644
index 0000000000..1106322c29
Binary files /dev/null and b/devices/hololens/images/04-language.png differ
diff --git a/devices/hololens/images/05-region.png b/devices/hololens/images/05-region.png
new file mode 100644
index 0000000000..f350298813
Binary files /dev/null and b/devices/hololens/images/05-region.png differ
diff --git a/devices/hololens/images/06-et-corners.png b/devices/hololens/images/06-et-corners.png
new file mode 100644
index 0000000000..af48472f60
Binary files /dev/null and b/devices/hololens/images/06-et-corners.png differ
diff --git a/devices/hololens/images/07-et-adjust-for-your-eyes.png b/devices/hololens/images/07-et-adjust-for-your-eyes.png
new file mode 100644
index 0000000000..e127ba9a9d
Binary files /dev/null and b/devices/hololens/images/07-et-adjust-for-your-eyes.png differ
diff --git a/devices/hololens/images/07-et-hold-head-still.png b/devices/hololens/images/07-et-hold-head-still.png
new file mode 100644
index 0000000000..a4952767bf
Binary files /dev/null and b/devices/hololens/images/07-et-hold-head-still.png differ
diff --git a/devices/hololens/images/08-et-gems.png b/devices/hololens/images/08-et-gems.png
new file mode 100644
index 0000000000..8eaba193f0
Binary files /dev/null and b/devices/hololens/images/08-et-gems.png differ
diff --git a/devices/hololens/images/09-et-adjusting.png b/devices/hololens/images/09-et-adjusting.png
new file mode 100644
index 0000000000..038dcab588
Binary files /dev/null and b/devices/hololens/images/09-et-adjusting.png differ
diff --git a/devices/hololens/images/10-et-failure1.png b/devices/hololens/images/10-et-failure1.png
new file mode 100644
index 0000000000..249abff7f6
Binary files /dev/null and b/devices/hololens/images/10-et-failure1.png differ
diff --git a/devices/hololens/images/10-et-failure2.png b/devices/hololens/images/10-et-failure2.png
new file mode 100644
index 0000000000..f4b2f34334
Binary files /dev/null and b/devices/hololens/images/10-et-failure2.png differ
diff --git a/devices/hololens/images/10-et-success.png b/devices/hololens/images/10-et-success.png
new file mode 100644
index 0000000000..c74c89056e
Binary files /dev/null and b/devices/hololens/images/10-et-success.png differ
diff --git a/devices/hololens/images/11-network.png b/devices/hololens/images/11-network.png
new file mode 100644
index 0000000000..1fc3884721
Binary files /dev/null and b/devices/hololens/images/11-network.png differ
diff --git a/devices/hololens/images/12-agreement.png b/devices/hololens/images/12-agreement.png
new file mode 100644
index 0000000000..96695c1888
Binary files /dev/null and b/devices/hololens/images/12-agreement.png differ
diff --git a/devices/hololens/images/13-device-owner.png b/devices/hololens/images/13-device-owner.png
new file mode 100644
index 0000000000..fe66cd5386
Binary files /dev/null and b/devices/hololens/images/13-device-owner.png differ
diff --git a/devices/hololens/images/14-sign-in-msa.png b/devices/hololens/images/14-sign-in-msa.png
new file mode 100644
index 0000000000..c0e3aa4d9e
Binary files /dev/null and b/devices/hololens/images/14-sign-in-msa.png differ
diff --git a/devices/hololens/images/15-iris-enrollment.png b/devices/hololens/images/15-iris-enrollment.png
new file mode 100644
index 0000000000..6bda392726
Binary files /dev/null and b/devices/hololens/images/15-iris-enrollment.png differ
diff --git a/devices/hololens/images/16-iris-hold-head-still.png b/devices/hololens/images/16-iris-hold-head-still.png
new file mode 100644
index 0000000000..09205015c0
Binary files /dev/null and b/devices/hololens/images/16-iris-hold-head-still.png differ
diff --git a/devices/hololens/images/17-iris-dots.png b/devices/hololens/images/17-iris-dots.png
new file mode 100644
index 0000000000..2ac6119b89
Binary files /dev/null and b/devices/hololens/images/17-iris-dots.png differ
diff --git a/devices/hololens/images/18-iris-enrollment-done.png b/devices/hololens/images/18-iris-enrollment-done.png
new file mode 100644
index 0000000000..6405ab8581
Binary files /dev/null and b/devices/hololens/images/18-iris-enrollment-done.png differ
diff --git a/devices/hololens/images/19-pin-create.png b/devices/hololens/images/19-pin-create.png
new file mode 100644
index 0000000000..fd0c1ee5e8
Binary files /dev/null and b/devices/hololens/images/19-pin-create.png differ
diff --git a/devices/hololens/images/20-pin-setup.png b/devices/hololens/images/20-pin-setup.png
new file mode 100644
index 0000000000..752fc54e5c
Binary files /dev/null and b/devices/hololens/images/20-pin-setup.png differ
diff --git a/devices/hololens/images/201608-enterprisemanagement-400px.png b/devices/hololens/images/201608-enterprisemanagement-400px.png
new file mode 100644
index 0000000000..11c204f0f6
Binary files /dev/null and b/devices/hololens/images/201608-enterprisemanagement-400px.png differ
diff --git a/devices/hololens/images/201608-kioskmode-400px.png b/devices/hololens/images/201608-kioskmode-400px.png
new file mode 100644
index 0000000000..8d21453b8f
Binary files /dev/null and b/devices/hololens/images/201608-kioskmode-400px.png differ
diff --git a/devices/hololens/images/22-do-more-with-voice.png b/devices/hololens/images/22-do-more-with-voice.png
new file mode 100644
index 0000000000..2bf874c80d
Binary files /dev/null and b/devices/hololens/images/22-do-more-with-voice.png differ
diff --git a/devices/hololens/images/23-do-more-with-voice-learn.png b/devices/hololens/images/23-do-more-with-voice-learn.png
new file mode 100644
index 0000000000..b805befc49
Binary files /dev/null and b/devices/hololens/images/23-do-more-with-voice-learn.png differ
diff --git a/devices/hololens/images/24-telemetry.png b/devices/hololens/images/24-telemetry.png
new file mode 100644
index 0000000000..004d1d5dff
Binary files /dev/null and b/devices/hololens/images/24-telemetry.png differ
diff --git a/devices/hololens/images/25-telemetry-info.png b/devices/hololens/images/25-telemetry-info.png
new file mode 100644
index 0000000000..4c4075a68f
Binary files /dev/null and b/devices/hololens/images/25-telemetry-info.png differ
diff --git a/devices/hololens/images/26-01-startmenu-learning.png b/devices/hololens/images/26-01-startmenu-learning.png
new file mode 100644
index 0000000000..e24da1b854
Binary files /dev/null and b/devices/hololens/images/26-01-startmenu-learning.png differ
diff --git a/devices/hololens/images/26-02-startmenu-learning.png b/devices/hololens/images/26-02-startmenu-learning.png
new file mode 100644
index 0000000000..1a81a79178
Binary files /dev/null and b/devices/hololens/images/26-02-startmenu-learning.png differ
diff --git a/devices/hololens/images/26-03-startmenu-learning.png b/devices/hololens/images/26-03-startmenu-learning.png
new file mode 100644
index 0000000000..55d59d18f5
Binary files /dev/null and b/devices/hololens/images/26-03-startmenu-learning.png differ
diff --git a/devices/hololens/images/26-04-startmenu-learning.png b/devices/hololens/images/26-04-startmenu-learning.png
new file mode 100644
index 0000000000..b7d62f5650
Binary files /dev/null and b/devices/hololens/images/26-04-startmenu-learning.png differ
diff --git a/devices/hololens/images/B-Calibration-4-Gem.png b/devices/hololens/images/B-Calibration-4-Gem.png
new file mode 100644
index 0000000000..fbfd95cb32
Binary files /dev/null and b/devices/hololens/images/B-Calibration-4-Gem.png differ
diff --git a/devices/hololens/images/C-Settings.Calibration.png b/devices/hololens/images/C-Settings.Calibration.png
new file mode 100644
index 0000000000..d27f3d754c
Binary files /dev/null and b/devices/hololens/images/C-Settings.Calibration.png differ
diff --git a/devices/hololens/images/D-CheckThisOut-Prompt.png b/devices/hololens/images/D-CheckThisOut-Prompt.png
new file mode 100644
index 0000000000..a81a75a153
Binary files /dev/null and b/devices/hololens/images/D-CheckThisOut-Prompt.png differ
diff --git a/devices/hololens/images/FitGuideSetep5.png b/devices/hololens/images/FitGuideSetep5.png
new file mode 100644
index 0000000000..9529fe69b0
Binary files /dev/null and b/devices/hololens/images/FitGuideSetep5.png differ
diff --git a/devices/hololens/images/FitGuideStep1.png b/devices/hololens/images/FitGuideStep1.png
new file mode 100644
index 0000000000..846ef9fc0b
Binary files /dev/null and b/devices/hololens/images/FitGuideStep1.png differ
diff --git a/devices/hololens/images/FitGuideStep2.png b/devices/hololens/images/FitGuideStep2.png
new file mode 100644
index 0000000000..6ac59ff43b
Binary files /dev/null and b/devices/hololens/images/FitGuideStep2.png differ
diff --git a/devices/hololens/images/FitGuideStep3.png b/devices/hololens/images/FitGuideStep3.png
new file mode 100644
index 0000000000..e255da8f15
Binary files /dev/null and b/devices/hololens/images/FitGuideStep3.png differ
diff --git a/devices/hololens/images/FitGuideStep4.png b/devices/hololens/images/FitGuideStep4.png
new file mode 100644
index 0000000000..77e99f3d55
Binary files /dev/null and b/devices/hololens/images/FitGuideStep4.png differ
diff --git a/devices/hololens/images/HoloLens2_AppBarFollowing.gif b/devices/hololens/images/HoloLens2_AppBarFollowing.gif
new file mode 100644
index 0000000000..84d7f2589e
Binary files /dev/null and b/devices/hololens/images/HoloLens2_AppBarFollowing.gif differ
diff --git a/devices/hololens/images/HoloLens2_BoundingBox.gif b/devices/hololens/images/HoloLens2_BoundingBox.gif
new file mode 100644
index 0000000000..451bcae997
Binary files /dev/null and b/devices/hololens/images/HoloLens2_BoundingBox.gif differ
diff --git a/devices/hololens/images/HoloLens2_BoundingBox_Rotate.gif b/devices/hololens/images/HoloLens2_BoundingBox_Rotate.gif
new file mode 100644
index 0000000000..43a764a954
Binary files /dev/null and b/devices/hololens/images/HoloLens2_BoundingBox_Rotate.gif differ
diff --git a/devices/hololens/images/HoloLens2_Loader.gif b/devices/hololens/images/HoloLens2_Loader.gif
new file mode 100644
index 0000000000..81d8232494
Binary files /dev/null and b/devices/hololens/images/HoloLens2_Loader.gif differ
diff --git a/devices/hololens/images/HoloLens2_Proximity.gif b/devices/hololens/images/HoloLens2_Proximity.gif
new file mode 100644
index 0000000000..f39f326ea7
Binary files /dev/null and b/devices/hololens/images/HoloLens2_Proximity.gif differ
diff --git a/devices/hololens/images/addnewfeedback-500px.jpg b/devices/hololens/images/addnewfeedback-500px.jpg
new file mode 100644
index 0000000000..8948dd2dae
Binary files /dev/null and b/devices/hololens/images/addnewfeedback-500px.jpg differ
diff --git a/devices/hololens/images/calibration-livecube-200px.png b/devices/hololens/images/calibration-livecube-200px.png
new file mode 100644
index 0000000000..44b0142e40
Binary files /dev/null and b/devices/hololens/images/calibration-livecube-200px.png differ
diff --git a/devices/hololens/images/calibration-settings-500px.jpg b/devices/hololens/images/calibration-settings-500px.jpg
new file mode 100644
index 0000000000..0419f0307f
Binary files /dev/null and b/devices/hololens/images/calibration-settings-500px.jpg differ
diff --git a/devices/hololens/images/calibration-shell.png b/devices/hololens/images/calibration-shell.png
new file mode 100644
index 0000000000..f833452cc5
Binary files /dev/null and b/devices/hololens/images/calibration-shell.png differ
diff --git a/devices/hololens/images/deviceportal-appmanager.jpg b/devices/hololens/images/deviceportal-appmanager.jpg
new file mode 100644
index 0000000000..68576fcfc7
Binary files /dev/null and b/devices/hololens/images/deviceportal-appmanager.jpg differ
diff --git a/devices/hololens/images/displays-400px.jpg b/devices/hololens/images/displays-400px.jpg
new file mode 100644
index 0000000000..0ed5558bdc
Binary files /dev/null and b/devices/hololens/images/displays-400px.jpg differ
diff --git a/devices/hololens/images/feedback1-600px.png b/devices/hololens/images/feedback1-600px.png
new file mode 100644
index 0000000000..ba7cec37da
Binary files /dev/null and b/devices/hololens/images/feedback1-600px.png differ
diff --git a/devices/hololens/images/feedback2-600px.png b/devices/hololens/images/feedback2-600px.png
new file mode 100644
index 0000000000..89d44622a6
Binary files /dev/null and b/devices/hololens/images/feedback2-600px.png differ
diff --git a/devices/hololens/images/feedback3-600px.png b/devices/hololens/images/feedback3-600px.png
new file mode 100644
index 0000000000..0431687b55
Binary files /dev/null and b/devices/hololens/images/feedback3-600px.png differ
diff --git a/devices/hololens/images/feedback4-600px.png b/devices/hololens/images/feedback4-600px.png
new file mode 100644
index 0000000000..35594f2ca8
Binary files /dev/null and b/devices/hololens/images/feedback4-600px.png differ
diff --git a/devices/hololens/images/feedback5-600px.png b/devices/hololens/images/feedback5-600px.png
new file mode 100644
index 0000000000..967987d6ae
Binary files /dev/null and b/devices/hololens/images/feedback5-600px.png differ
diff --git a/devices/hololens/images/feedback6-600px.png b/devices/hololens/images/feedback6-600px.png
new file mode 100644
index 0000000000..431a4da9da
Binary files /dev/null and b/devices/hololens/images/feedback6-600px.png differ
diff --git a/devices/hololens/images/hololens-2-air-tap.gif b/devices/hololens/images/hololens-2-air-tap.gif
new file mode 100644
index 0000000000..9139718cdb
Binary files /dev/null and b/devices/hololens/images/hololens-2-air-tap.gif differ
diff --git a/devices/hololens/images/hololens-2-button-sleep.png b/devices/hololens/images/hololens-2-button-sleep.png
new file mode 100644
index 0000000000..29f75da34f
Binary files /dev/null and b/devices/hololens/images/hololens-2-button-sleep.png differ
diff --git a/devices/hololens/images/hololens-2-button-turn-off.png b/devices/hololens/images/hololens-2-button-turn-off.png
new file mode 100644
index 0000000000..8e3f4a2c72
Binary files /dev/null and b/devices/hololens/images/hololens-2-button-turn-off.png differ
diff --git a/devices/hololens/images/hololens-2-button-turn-on.png b/devices/hololens/images/hololens-2-button-turn-on.png
new file mode 100644
index 0000000000..25ce3fcc58
Binary files /dev/null and b/devices/hololens/images/hololens-2-button-turn-on.png differ
diff --git a/devices/hololens/images/hololens-2-button-wake.png b/devices/hololens/images/hololens-2-button-wake.png
new file mode 100644
index 0000000000..135b1e3a04
Binary files /dev/null and b/devices/hololens/images/hololens-2-button-wake.png differ
diff --git a/devices/hololens/images/hololens-2-gesture-frame.png b/devices/hololens/images/hololens-2-gesture-frame.png
new file mode 100644
index 0000000000..cc1a9f667d
Binary files /dev/null and b/devices/hololens/images/hololens-2-gesture-frame.png differ
diff --git a/devices/hololens/images/hololens-2-screenshot-with-callouts.png b/devices/hololens/images/hololens-2-screenshot-with-callouts.png
new file mode 100644
index 0000000000..769310e749
Binary files /dev/null and b/devices/hololens/images/hololens-2-screenshot-with-callouts.png differ
diff --git a/devices/hololens/images/hololens-2-start-alternative.jpg b/devices/hololens/images/hololens-2-start-alternative.jpg
new file mode 100644
index 0000000000..e5cc5e275e
Binary files /dev/null and b/devices/hololens/images/hololens-2-start-alternative.jpg differ
diff --git a/devices/hololens/images/hololens-2-start-gesture.png b/devices/hololens/images/hololens-2-start-gesture.png
new file mode 100644
index 0000000000..109c6235bb
Binary files /dev/null and b/devices/hololens/images/hololens-2-start-gesture.png differ
diff --git a/devices/hololens/images/hololens-air-tap.gif b/devices/hololens/images/hololens-air-tap.gif
new file mode 100644
index 0000000000..9139718cdb
Binary files /dev/null and b/devices/hololens/images/hololens-air-tap.gif differ
diff --git a/devices/hololens/images/hololens-bloom.gif b/devices/hololens/images/hololens-bloom.gif
new file mode 100644
index 0000000000..db7d8378e5
Binary files /dev/null and b/devices/hololens/images/hololens-bloom.gif differ
diff --git a/devices/hololens/images/hololens-box-contents.png b/devices/hololens/images/hololens-box-contents.png
new file mode 100644
index 0000000000..51b4b5e163
Binary files /dev/null and b/devices/hololens/images/hololens-box-contents.png differ
diff --git a/devices/hololens/images/hololens-buttons.jpg b/devices/hololens/images/hololens-buttons.jpg
new file mode 100644
index 0000000000..868487b0bf
Binary files /dev/null and b/devices/hololens/images/hololens-buttons.jpg differ
diff --git a/devices/hololens/images/hololens-charging.png b/devices/hololens/images/hololens-charging.png
new file mode 100644
index 0000000000..a5dd4d7dcd
Binary files /dev/null and b/devices/hololens/images/hololens-charging.png differ
diff --git a/devices/hololens/images/hololens-cleaning-visor.png b/devices/hololens/images/hololens-cleaning-visor.png
new file mode 100644
index 0000000000..68f990d43b
Binary files /dev/null and b/devices/hololens/images/hololens-cleaning-visor.png differ
diff --git a/devices/hololens/images/hololens-clicker-500px.jpg b/devices/hololens/images/hololens-clicker-500px.jpg
new file mode 100644
index 0000000000..4dd7d954f4
Binary files /dev/null and b/devices/hololens/images/hololens-clicker-500px.jpg differ
diff --git a/devices/hololens/images/hololens-frame.png b/devices/hololens/images/hololens-frame.png
new file mode 100644
index 0000000000..5789f1b8c8
Binary files /dev/null and b/devices/hololens/images/hololens-frame.png differ
diff --git a/devices/hololens/images/hololens-gaze.png b/devices/hololens/images/hololens-gaze.png
new file mode 100644
index 0000000000..d21ffef0b2
Binary files /dev/null and b/devices/hololens/images/hololens-gaze.png differ
diff --git a/devices/hololens/images/hololens-lights.png b/devices/hololens/images/hololens-lights.png
new file mode 100644
index 0000000000..f3a19b84a3
Binary files /dev/null and b/devices/hololens/images/hololens-lights.png differ
diff --git a/devices/hololens/images/hololens-power.png b/devices/hololens/images/hololens-power.png
new file mode 100644
index 0000000000..80c3e7c215
Binary files /dev/null and b/devices/hololens/images/hololens-power.png differ
diff --git a/devices/hololens/images/hololens-vector-white.png b/devices/hololens/images/hololens-vector-white.png
new file mode 100644
index 0000000000..583a307449
Binary files /dev/null and b/devices/hololens/images/hololens-vector-white.png differ
diff --git a/devices/hololens/images/hololens2-exploded-large.png b/devices/hololens/images/hololens2-exploded-large.png
new file mode 100644
index 0000000000..fc639a0f62
Binary files /dev/null and b/devices/hololens/images/hololens2-exploded-large.png differ
diff --git a/devices/hololens/images/hololens2-exploded-medium.png b/devices/hololens/images/hololens2-exploded-medium.png
new file mode 100644
index 0000000000..3e1fbea7de
Binary files /dev/null and b/devices/hololens/images/hololens2-exploded-medium.png differ
diff --git a/devices/hololens/images/hololens2-fit.png b/devices/hololens/images/hololens2-fit.png
new file mode 100644
index 0000000000..dacaf4cbd7
Binary files /dev/null and b/devices/hololens/images/hololens2-fit.png differ
diff --git a/devices/hololens/images/hololens2-headstrap.png b/devices/hololens/images/hololens2-headstrap.png
new file mode 100644
index 0000000000..805637214b
Binary files /dev/null and b/devices/hololens/images/hololens2-headstrap.png differ
diff --git a/devices/hololens/images/hololens2-lift-visor.png b/devices/hololens/images/hololens2-lift-visor.png
new file mode 100644
index 0000000000..4d83f2c730
Binary files /dev/null and b/devices/hololens/images/hololens2-lift-visor.png differ
diff --git a/devices/hololens/images/hololens2-remove-browpad.png b/devices/hololens/images/hololens2-remove-browpad.png
new file mode 100644
index 0000000000..619f14e4fd
Binary files /dev/null and b/devices/hololens/images/hololens2-remove-browpad.png differ
diff --git a/devices/hololens/images/ipd-finger-alignment-300px.jpg b/devices/hololens/images/ipd-finger-alignment-300px.jpg
new file mode 100644
index 0000000000..7a4c929867
Binary files /dev/null and b/devices/hololens/images/ipd-finger-alignment-300px.jpg differ
diff --git a/devices/hololens/images/keyboard.png b/devices/hololens/images/keyboard.png
new file mode 100644
index 0000000000..6962567b83
Binary files /dev/null and b/devices/hololens/images/keyboard.png differ
diff --git a/devices/hololens/images/motherboard-400px.jpg b/devices/hololens/images/motherboard-400px.jpg
new file mode 100644
index 0000000000..5a2a085477
Binary files /dev/null and b/devices/hololens/images/motherboard-400px.jpg differ
diff --git a/devices/hololens/images/searchfeedback-500px.jpg b/devices/hololens/images/searchfeedback-500px.jpg
new file mode 100644
index 0000000000..952e29a6ec
Binary files /dev/null and b/devices/hololens/images/searchfeedback-500px.jpg differ
diff --git a/devices/hololens/images/see-through-400px.jpg b/devices/hololens/images/see-through-400px.jpg
new file mode 100644
index 0000000000..d9fba1c9e0
Binary files /dev/null and b/devices/hololens/images/see-through-400px.jpg differ
diff --git a/devices/hololens/images/sensor-bar-400px.jpg b/devices/hololens/images/sensor-bar-400px.jpg
new file mode 100644
index 0000000000..bf0b8f7f21
Binary files /dev/null and b/devices/hololens/images/sensor-bar-400px.jpg differ
diff --git a/devices/hololens/images/startmenu.jpg b/devices/hololens/images/startmenu.jpg
new file mode 100644
index 0000000000..b685db51ee
Binary files /dev/null and b/devices/hololens/images/startmenu.jpg differ
diff --git a/devices/hololens/images/upvotefeedback-500px.jpg b/devices/hololens/images/upvotefeedback-500px.jpg
new file mode 100644
index 0000000000..f1eda89efa
Binary files /dev/null and b/devices/hololens/images/upvotefeedback-500px.jpg differ
diff --git a/devices/hololens/images/vs2015-remotedeployment.jpg b/devices/hololens/images/vs2015-remotedeployment.jpg
new file mode 100644
index 0000000000..a7d6b43dc3
Binary files /dev/null and b/devices/hololens/images/vs2015-remotedeployment.jpg differ
diff --git a/devices/hololens/images/wifi-hololens-600px.jpg b/devices/hololens/images/wifi-hololens-600px.jpg
new file mode 100644
index 0000000000..eb6930a29f
Binary files /dev/null and b/devices/hololens/images/wifi-hololens-600px.jpg differ
diff --git a/devices/hololens/images/wifi-hololens-hwdetails.jpg b/devices/hololens/images/wifi-hololens-hwdetails.jpg
new file mode 100644
index 0000000000..e4b45047cf
Binary files /dev/null and b/devices/hololens/images/wifi-hololens-hwdetails.jpg differ
diff --git a/devices/hololens/index.md b/devices/hololens/index.md
index 5aee70afdb..c9b0e0575e 100644
--- a/devices/hololens/index.md
+++ b/devices/hololens/index.md
@@ -51,4 +51,4 @@ ms.date: 07/14/2019
* [Documentation for Holographic app development](https://developer.microsoft.com/windows/mixed-reality/development)
* [HoloLens Commercial Suite](https://www.microsoft.com/microsoft-hololens/hololens-commercial)
-* [HoloLens release notes](https://developer.microsoft.com/en-us/windows/mixed-reality/release_notes)
+* [HoloLens release notes](https://developer.microsoft.com/windows/mixed-reality/release_notes)
diff --git a/devices/surface-hub/create-and-test-a-device-account-surface-hub.md b/devices/surface-hub/create-and-test-a-device-account-surface-hub.md
index 104a1125cc..dc72c7463a 100644
--- a/devices/surface-hub/create-and-test-a-device-account-surface-hub.md
+++ b/devices/surface-hub/create-and-test-a-device-account-surface-hub.md
@@ -2,7 +2,7 @@
title: Create and test a device account (Surface Hub)
description: This topic introduces how to create and test the device account that Microsoft Surface Hub uses to communicate with Microsoft Exchange and Skype.
ms.assetid: C8605B5F-2178-4C3A-B4E0-CE32C70ECF67
-ms.reviewer:
+ms.reviewer: rikot
manager: dansimp
keywords: create and test device account, device account, Surface Hub and Microsoft Exchange, Surface Hub and Skype
ms.prod: surface-hub
@@ -12,6 +12,7 @@ ms.author: dansimp
ms.topic: article
ms.date: 03/06/2018
ms.localizationpriority: medium
+ms.audience: itpro
---
# Create and test a device account (Surface Hub)
@@ -22,7 +23,7 @@ This topic introduces how to create and test the device account that Microsoft S
A **device account** is an Exchange resource account that Surface Hub uses to:
- Display its meeting calendar
-- Join Skype for Business calls
+- Join Teams or Skype for Business calls
- Send email (for example, email whiteboard content from a meeting)
Once the device account is provisioned to a Surface Hub, people can add this account to a meeting invitation the same way that they would invite a meeting room.
diff --git a/devices/surface-hub/index.md b/devices/surface-hub/index.md
index 6d0b532210..110355baf4 100644
--- a/devices/surface-hub/index.md
+++ b/devices/surface-hub/index.md
@@ -9,7 +9,7 @@ ms.tgt_pltfrm: na
ms.devlang: na
ms.topic: landing-page
description: "Get started with Microsoft Surface Hub."
-localization_priority: High
+ms.localizationpriority: High
---
# Get started with Surface Hub
diff --git a/devices/surface-hub/surface-hub-2s-connect.md b/devices/surface-hub/surface-hub-2s-connect.md
index 312c9d3d2e..3726eae176 100644
--- a/devices/surface-hub/surface-hub-2s-connect.md
+++ b/devices/surface-hub/surface-hub-2s-connect.md
@@ -71,16 +71,17 @@ You can output video to another display using MiniDP, as indicated in the follow
### Surface Hub 2S video-out settings
-| **Signal Type** | **Resolution** | **Frame rate** | **USB-C** | **MiniDP** |
-| --------------- | -------------- | -------------- | --------- | ---------- |
-| PC | 640 x 480 | 60 | X | X |
-| PC | 720 x 480 | 60 | X | X |
-| PC | 1024 x 768 | 60 | X | X |
-| PC | 1920 x 1080 | 60 | X | X |
-| PC | 3840x2560 | 60 | X | X |
-| HDTV | 720p | 60 | X | X |
-| HDTV | 1080p | 60 | X | X |
-| 4K UHD | 3840x2560 | 60 | X | X |
+| **Signal Type** | **Resolution** | **Frame rate** | **MiniDP** |
+| --------------- | -------------- | -------------- | ---------- |
+| PC | 640 x 480 | 60 | X |
+| PC | 720 x 480 | 60 | X |
+| PC | 1024 x 768 | 60 | X |
+| PC | 1920 x 1080 | 60 | X |
+| PC | 3840 x 2560 | 60 | X |
+| HDTV | 720p | 60 | X |
+| HDTV | 1080p | 60 | X |
+| 4K UHD | 3840 x 2560 | 60 | X |
+
Surface Hub 2S includes a MiniDP video-out port for projecting visual content from Surface Hub 2S to another display. If you plan to use Surface Hub 2S to project to another display, note the following recommendations:
diff --git a/devices/surface-hub/surface-hub-recovery-tool.md b/devices/surface-hub/surface-hub-recovery-tool.md
index 7d21b8c921..75feb89fc2 100644
--- a/devices/surface-hub/surface-hub-recovery-tool.md
+++ b/devices/surface-hub/surface-hub-recovery-tool.md
@@ -20,8 +20,8 @@ The [Microsoft Surface Hub Recovery Tool](https://www.microsoft.com/download/det
To re-image the Surface Hub SSD using the Recovery Tool, you'll need to remove the SSD from the Surface Hub, connect the drive to the USB-to-SATA cable, and then connect the cable to the desktop PC on which the Recovery Tool is installed. For more information on how to remove the existing drive from your Surface Hub, see [Surface Hub SSD replacement](surface-hub-ssd-replacement.md).
->[!IMPORTANT]
->Do not let the device go to sleep or interrupt the download of the image file.
+> [!IMPORTANT]
+> Do not let the device go to sleep or interrupt the download of the image file.
If the tool is unsuccessful in reimaging your drive, please contact [Surface Hub Support](https://support.microsoft.com/help/4037644/surface-contact-surface-warranty-and-software-support).
@@ -77,10 +77,7 @@ Install Surface Hub Recovery Tool on the host PC.
5. When the download is complete, the tool instructs you to connect an SSD drive. If the tool is unable to locate the attached drive, there is a good chance that the cable being used is not reporting the name of the SSD to Windows. The imaging tool must find the name of the drive as "LITEON L CH-128V2S USB Device" before it can continue. For more information on how to remove the existing drive from your Surface Hub, see [Surface Hub SSD replacement](surface-hub-ssd-replacement.md).
-
-~~~
-
-~~~
+ 
6. When the drive is recognized, click **Start** to begin the re-imaging process. On the warning that all data on the drive will be erased, click **OK**.
diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md
index 667d9d13b5..d402397000 100644
--- a/devices/surface/TOC.md
+++ b/devices/surface/TOC.md
@@ -21,6 +21,7 @@
## Deploy
### [Deploy Surface devices](deploy.md)
+### [Deploy the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)
### [Surface Deployment Accelerator](microsoft-surface-deployment-accelerator.md)
### [Step by step: Surface Deployment Accelerator](step-by-step-surface-deployment-accelerator.md)
### [Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md)
@@ -30,16 +31,14 @@
### [Surface System SKU reference](surface-system-sku-reference.md)
## Manage
-### [Optimizing wireless connectivity for Surface devices](surface-wireless-connect.md)
+### [Optimize Wi-Fi connectivity for Surface devices](surface-wireless-connect.md)
### [Best practice power settings for Surface devices](maintain-optimal-power-settings-on-Surface-devices.md)
+### [Surface Dock Firmware Update](surface-dock-firmware-update.md)
### [Battery Limit setting](battery-limit.md)
### [Surface Brightness Control](microsoft-surface-brightness-control.md)
### [Surface Asset Tag](assettag.md)
### [Surface firmware and driver updates](update.md)
-### [Deploy the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)
### [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)
-### [Surface Dock Firmware Update](surface-dock-firmware-update.md)
-
## Secure
### [Manage Surface UEFI settings](manage-surface-uefi-settings.md)
diff --git a/devices/surface/get-started.md b/devices/surface/get-started.md
index 07342f0005..7e007abc4e 100644
--- a/devices/surface/get-started.md
+++ b/devices/surface/get-started.md
@@ -5,11 +5,12 @@ ms.author: robmazz
manager: laurawi
layout: LandingPage
ms.assetid:
+ms.audience: itpro
ms.tgt_pltfrm: na
ms.devlang: na
ms.topic: landing-page
description: "Get started with Microsoft Surface devices"
-localization_priority: High
+ms.localizationpriority: High
---
# Get started with Surface devices
@@ -29,6 +30,7 @@ Harness the power of Surface, Windows, and Office connected together through the
Plan
Autopilot and Surface devices
Surface and SCCM considerations
+ Deploy Surface app with Microsoft Store for Business
@@ -45,7 +47,7 @@ Harness the power of Surface, Windows, and Office connected together through the
@@ -64,16 +66,15 @@ Harness the power of Surface, Windows, and Office connected together through the
-
-
@@ -138,10 +139,10 @@ Harness the power of Surface, Windows, and Office connected together through the
diff --git a/devices/surface/images/manage-surface-uefi-fig10.png b/devices/surface/images/manage-surface-uefi-fig10.png
index 7d36f66808..daccc0efbb 100644
Binary files a/devices/surface/images/manage-surface-uefi-fig10.png and b/devices/surface/images/manage-surface-uefi-fig10.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig11.png b/devices/surface/images/manage-surface-uefi-fig11.png
index daccc0efbb..34d2dc5342 100644
Binary files a/devices/surface/images/manage-surface-uefi-fig11.png and b/devices/surface/images/manage-surface-uefi-fig11.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig12.png b/devices/surface/images/manage-surface-uefi-fig12.png
index 34d2dc5342..b7a58d16c2 100644
Binary files a/devices/surface/images/manage-surface-uefi-fig12.png and b/devices/surface/images/manage-surface-uefi-fig12.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig13.png b/devices/surface/images/manage-surface-uefi-fig13.png
index b7a58d16c2..ee4691bf9e 100644
Binary files a/devices/surface/images/manage-surface-uefi-fig13.png and b/devices/surface/images/manage-surface-uefi-fig13.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig14.png b/devices/surface/images/manage-surface-uefi-fig14.png
index 8845608fbd..8224fb5bab 100644
Binary files a/devices/surface/images/manage-surface-uefi-fig14.png and b/devices/surface/images/manage-surface-uefi-fig14.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig15.png b/devices/surface/images/manage-surface-uefi-fig15.png
new file mode 100644
index 0000000000..8973b83528
Binary files /dev/null and b/devices/surface/images/manage-surface-uefi-fig15.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig16.png b/devices/surface/images/manage-surface-uefi-fig16.png
new file mode 100644
index 0000000000..cac0f7c1c1
Binary files /dev/null and b/devices/surface/images/manage-surface-uefi-fig16.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig17.png b/devices/surface/images/manage-surface-uefi-fig17.png
new file mode 100644
index 0000000000..8b66d3605f
Binary files /dev/null and b/devices/surface/images/manage-surface-uefi-fig17.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig18.png b/devices/surface/images/manage-surface-uefi-fig18.png
new file mode 100644
index 0000000000..8845608fbd
Binary files /dev/null and b/devices/surface/images/manage-surface-uefi-fig18.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig19.png b/devices/surface/images/manage-surface-uefi-fig19.png
new file mode 100644
index 0000000000..8845608fbd
Binary files /dev/null and b/devices/surface/images/manage-surface-uefi-fig19.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig4.png b/devices/surface/images/manage-surface-uefi-fig4.png
index 67866fcbf0..e956cefeaf 100644
Binary files a/devices/surface/images/manage-surface-uefi-fig4.png and b/devices/surface/images/manage-surface-uefi-fig4.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig5.png b/devices/surface/images/manage-surface-uefi-fig5.png
index eae3212f76..00bb44ea76 100644
Binary files a/devices/surface/images/manage-surface-uefi-fig5.png and b/devices/surface/images/manage-surface-uefi-fig5.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig6.png b/devices/surface/images/manage-surface-uefi-fig6.png
index a06c845a9c..e424e84f4b 100644
Binary files a/devices/surface/images/manage-surface-uefi-fig6.png and b/devices/surface/images/manage-surface-uefi-fig6.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig7.png b/devices/surface/images/manage-surface-uefi-fig7.png
index 9af6d1beed..b0a49134f3 100644
Binary files a/devices/surface/images/manage-surface-uefi-fig7.png and b/devices/surface/images/manage-surface-uefi-fig7.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig8.png b/devices/surface/images/manage-surface-uefi-fig8.png
index d8c078cf59..2269fe6c17 100644
Binary files a/devices/surface/images/manage-surface-uefi-fig8.png and b/devices/surface/images/manage-surface-uefi-fig8.png differ
diff --git a/devices/surface/images/manage-surface-uefi-fig9.png b/devices/surface/images/manage-surface-uefi-fig9.png
index 2269fe6c17..7d36f66808 100644
Binary files a/devices/surface/images/manage-surface-uefi-fig9.png and b/devices/surface/images/manage-surface-uefi-fig9.png differ
diff --git a/devices/surface/images/manage-surface-uefi-figure-1.png b/devices/surface/images/manage-surface-uefi-figure-1.png
index b87279bdd5..cd5a789d70 100644
Binary files a/devices/surface/images/manage-surface-uefi-figure-1.png and b/devices/surface/images/manage-surface-uefi-figure-1.png differ
diff --git a/devices/surface/index.md b/devices/surface/index.md
index 8a40146adb..2677bffc49 100644
--- a/devices/surface/index.md
+++ b/devices/surface/index.md
@@ -8,7 +8,7 @@ ms.author: robmazz
manager: laurawi
ms.topic: hub-page
keywords: Microsoft Surface, Microsoft Surface Hub, Surface documentation
-localization_priority: High
+ms.localizationpriority: High
audience: ITPro
ms.prod: Surface
description: Learn about Microsoft Surface and Surface Hub devices.
diff --git a/devices/surface/manage-surface-uefi-settings.md b/devices/surface/manage-surface-uefi-settings.md
index d25c33688f..74e22a3d1b 100644
--- a/devices/surface/manage-surface-uefi-settings.md
+++ b/devices/surface/manage-surface-uefi-settings.md
@@ -128,51 +128,67 @@ For the specified boot order to take effect, you must set the **Enable Alternate
You can also turn on and off IPv6 support for PXE with the **Enable IPv6 for PXE Network Boot** option, for example when performing a Windows deployment using PXE where the PXE server is configured for IPv4 only.
-## About
-
-The **About** page displays regulatory information, such as compliance with FCC rules, as shown in Figure 7.
-
-
-
-*Figure 7. Regulatory information displayed on the About page*
## Exit
-Use the **Restart Now** button on the **Exit** page to exit UEFI settings, as shown in Figure 8.
+Use the **Restart Now** button on the **Exit** page to exit UEFI settings, as shown in Figure 7.
-
+
-*Figure 8. Click Restart Now to exit Surface UEFI and restart the device*
+*Figure 7. Click Restart Now to exit Surface UEFI and restart the device*
## Surface UEFI boot screens
-When you update Surface device firmware, by using either Windows Update or manual installation, the updates are not applied immediately to the device, but instead during the next reboot cycle. You can find out more about the Surface firmware update process in [Manage Surface driver and firmware updates](https://docs.microsoft.com/surface/manage-surface-pro-3-firmware-updates). The progress of the firmware update is displayed on a screen with progress bars of differing colors to indicate the firmware for each component. Each component’s progress bar is shown in Figures 9 through 13.
+When you update Surface device firmware, by using either Windows Update or manual installation, the updates are not applied immediately to the device, but instead during the next reboot cycle. You can find out more about the Surface firmware update process in [Manage Surface driver and firmware updates](https://docs.microsoft.com/surface/manage-surface-pro-3-firmware-updates). The progress of the firmware update is displayed on a screen with progress bars of differing colors to indicate the firmware for each component. Each component’s progress bar is shown in Figures 8 through 17.
-
+
-*Figure 9. The Surface UEFI firmware update displays a blue progress bar*
+*Figure 8. The Surface UEFI firmware update displays a blue progress bar*
-
+
-*Figure 10. The System Embedded Controller firmware update displays a green progress bar*
+*Figure 9. The System Embedded Controller firmware update displays a green progress bar*
-
+
-*Figure 11. The SAM Controller firmware update displays an orange progress bar*
+*Figure 10. The SAM Controller firmware update displays an orange progress bar*
-
+
-*Figure 12. The Intel Management Engine firmware update displays a red progress bar*
+*Figure 11. The Intel Management Engine firmware update displays a red progress bar*
+
+
+
+*Figure 12. The Surface touch firmware update displays a gray progress bar*
+
+
+
+*Figure 13. The Surface KIP firmware update displays a light green progress bar*
+
+
+
+*Figure 14. The Surface ISH firmware update displays a light pink progress bar*
+
+
+
+*Figure 15. The Surface Trackpad firmware update displays a pink progress bar*
+
+
+
+*Figure 16. The Surface TCON firmware update displays a light gray progress bar*
+
+
+
+
+*Figure 17. The Surface TPM firmware update displays a purple progress bar*
-
-*Figure 13. The Surface touch firmware update displays a gray progress bar*
>[!NOTE]
->An additional warning message that indicates Secure Boot is disabled is displayed, as shown in Figure 14.
+>An additional warning message that indicates Secure Boot is disabled is displayed, as shown in Figure 18.
-
+
-*Figure 14. Surface boot screen that indicates Secure Boot has been disabled in Surface UEFI settings*
+*Figure 18. Surface boot screen that indicates Secure Boot has been disabled in Surface UEFI settings*
## Related topics
diff --git a/devices/surface/support-solutions-surface.md b/devices/surface/support-solutions-surface.md
index 5cc8e9de9d..51db33fb4e 100644
--- a/devices/surface/support-solutions-surface.md
+++ b/devices/surface/support-solutions-surface.md
@@ -12,7 +12,7 @@ ms.pagetype: surfacehub
author: dansimp
ms.author: dansimp
ms.topic: article
-ms.date: 09/08/2017
+ms.date: 09/26/2019
ms.localizationpriority: medium
---
@@ -25,43 +25,54 @@ These are the top Microsoft Support solutions for common issues experienced when
## Screen cracked or scratched issues
-- [Contact Microsoft Support](https://support.microsoft.com/en-us/supportforbusiness/productselection)
+- [Contact Microsoft Support](https://support.microsoft.com/supportforbusiness/productselection)
+## Surface Power or battery Issues
+
+- [How to Charge Surface(Surface PSU information)](https://support.microsoft.com/help/4023496)
+
+- [Surface battery won’t charge or Surface won’t run on battery](https://support.microsoft.com/help/4023536)
+
+- [Surface won’t turn on or wake from sleep](https://support.microsoft.com/help/4023537)
+
+- [Maximize your Surface battery life](https://support.microsoft.com/help/4483194)
## Device cover or keyboard issues
- [Troubleshoot your Surface Type Cover or keyboard](https://www.microsoft.com/surface/support/hardware-and-drivers/troubleshoot-surface-keyboards)
-- [Troubleshoot problems with Surface Keyboard, Surface Ergonomic Keyboard, and Microsoft Modern Keyboard with Fingerprint ID](https://www.microsoft.com/surface/support/touch-mouse-and-search/surface-keyboard-troubleshooting)
-- [Set up Microsoft Modern Keyboard with Fingerprint ID](https://www.microsoft.com/surface/support/touch-mouse-and-search/microsoft-modern-keyboard-fingerprintid-set-up)
-- [Enabling Surface Laptop keyboard during MDT deployment](https://blogs.technet.microsoft.com/askcore/2017/08/18/enabling-surface-laptop-keyboard-during-mdt-deployment/)
-
-## Device won't wake from sleep or hibernation issues
+## Surface Dock Issues
-- [Surface won’t turn on or wake from sleep](https://www.microsoft.com/surface/support/warranty-service-and-recovery/surface-wont-turn-on-or-wake-from-sleep?os=windows-10&=undefined)
-- [Surface Pro 4 or Surface Book doesn't hibernate in Windows 10](https://support.microsoft.com/help/3122682)
-- [Surface Pro 3 doesn't hibernate after four hours in connected standby](https://support.microsoft.com/help/2998588/surface-pro-3-doesn-t-hibernate-after-four-hours-in-connected-standby)
-- [Surface Pro 3 Hibernation Doesn’t Occur on Enterprise Install](https://blogs.technet.microsoft.com/askcore/2014/11/05/surface-pro-3-hibernation-doesnt-occur-on-enterprise-install/)
+- [Troubleshoot Surface Dock and docking stations](https://support.microsoft.com/help/4023468/surface-troubleshoot-surface-dock-and-docking-stations)
+- [Troubleshoot connecting Surface to a second screen](https://support.microsoft.com/help/4023496)
-## Other common issues
+- [Microsoft Surface Dock Updater](https://docs.microsoft.com/surface/surface-dock-updater)
-- [Trouble installing Surface updates](https://www.microsoft.com/surface/support/performance-and-maintenance/troubleshoot-updates?os=windows-10&=undefined)
-- [Troubleshooting common Surface Pro 3 issues post-deployment](http://blogs.technet.com/b/askcore/archive/2015/03/19/troubleshooting-common-surface-pro-3-issues-post-deployment.aspx)
-- [Surface Pro 3 hibernation doesn't occur on enterprise install](https://blogs.technet.microsoft.com/askcore/2014/11/05/surface-pro-3-hibernation-doesnt-occur-on-enterprise-install/)
-- [Reusing the same NIC for multiple PXE initiated deployments in System Center Configuration Manger OSD](https://blogs.technet.microsoft.com/system_center_configuration_manager_operating_system_deployment_support_blog/2015/08/27/reusing-the-same-nic-for-multiple-pxe-initiated-deployments-in-system-center-configuration-manger-osd)
-- [Troubleshoot docking stations for Surface Pro and Surface 3](https://www.microsoft.com/surface/support/hardware-and-drivers/troubleshoot-docking-station?os=windows-8.1-update-1&=undefined)
-- [What to do if Surface is running slower](https://www.microsoft.com/surface/support/performance-and-maintenance/what-to-do-if-surface-is-running-slower?os=windows-10&=undefined)
+## Surface Drivers and Firmware
+- [Surface Update History](https://support.microsoft.com/help/4036283)
+- [Download drivers and firmware for Surface](https://support.microsoft.com/help/4023482)
+- [Deploy the latest firmware and drivers for Surface devices](https://docs.microsoft.com/surface/deploy-the-latest-firmware-and-drivers-for-surface-devices)
-
+- [Manage Surface driver and firmware updates](https://docs.microsoft.com/surface/manage-surface-pro-3-firmware-updates)
+- [How to manage Surface driver updates in Configuration Manager](https://support.microsoft.com/help/4098906)
-
+## Deployment Issues
+- [DISK0 not found when you deploy Windows on Surface Pro Model 1796 or Surface Laptop](https://support.microsoft.com/help/4046108)
+- [Surface Pro Model 1796 and Surface Laptop 1TB display two drives](https://support.microsoft.com/help/4046105)
+- [System SKU reference](https://docs.microsoft.com/surface/surface-system-sku-reference)
+## Reset device
+- [Creating and using a USB recovery drive for Surface](https://support.microsoft.com/help/4023512)
+
+- [FAQ: Protecting your data if you send your Surface in for Service](https://support.microsoft.com/help/4023508)
+
+- [Microsoft Surface Data Eraser](https://docs.microsoft.com/surface/microsoft-surface-data-eraser)
diff --git a/devices/surface/surface-diagnostic-toolkit-business.md b/devices/surface/surface-diagnostic-toolkit-business.md
index cd0812b2d9..41b2939439 100644
--- a/devices/surface/surface-diagnostic-toolkit-business.md
+++ b/devices/surface/surface-diagnostic-toolkit-business.md
@@ -3,13 +3,15 @@ title: Deploy Surface Diagnostic Toolkit for Business
description: This topic explains how to use the Surface Diagnostic Toolkit for Business.
ms.prod: w10
ms.mktglfcycl: manage
+ms.localizationpriority: normal
ms.sitesec: library
author: dansimp
ms.author: dansimp
ms.topic: article
-ms.date: 11/15/2018
-ms.reviewer:
+ms.date: 09/27/2019
+ms.reviewer: hachidan
manager: dansimp
+ms.audience: itpro
---
# Deploy Surface Diagnostic Toolkit for Business
@@ -165,8 +167,13 @@ You can select to run a wide range of logs across applications, drivers, hardwar
- [Use Surface Diagnostic Toolkit for Business in desktop mode](surface-diagnostic-toolkit-desktop-mode.md)
- [Use Surface Diagnostic Toolkit for Business using commands](surface-diagnostic-toolkit-command-line.md)
-
## Changes and updates
+### Version 2.42.139.0
+*Release date: September 24, 2019*
+This version of Surface Diagnostic Toolkit for Business adds support for the following:
+- Ability to download hardware reports.
+- Ability to contact Microsoft Support directly from the tool.
+
### Version 2.41.139.0
*Release date: June 24, 2019*
This version of Surface Diagnostic Toolkit for Business adds support for the following:
diff --git a/devices/surface/surface-diagnostic-toolkit-command-line.md b/devices/surface/surface-diagnostic-toolkit-command-line.md
index 39dc1bddd1..c02d79e984 100644
--- a/devices/surface/surface-diagnostic-toolkit-command-line.md
+++ b/devices/surface/surface-diagnostic-toolkit-command-line.md
@@ -8,8 +8,10 @@ author: dansimp
ms.author: dansimp
ms.topic: article
ms.date: 11/15/2018
-ms.reviewer:
+ms.reviewer: hachidan
manager: dansimp
+ms.localizationpriority: normal
+ms.audience: itpro
---
# Run Surface Diagnostic Toolkit for Business using commands
diff --git a/devices/surface/surface-diagnostic-toolkit-desktop-mode.md b/devices/surface/surface-diagnostic-toolkit-desktop-mode.md
index 9022fb4770..4d8b505670 100644
--- a/devices/surface/surface-diagnostic-toolkit-desktop-mode.md
+++ b/devices/surface/surface-diagnostic-toolkit-desktop-mode.md
@@ -8,8 +8,10 @@ author: dansimp
ms.author: dansimp
ms.topic: article
ms.date: 11/15/2018
-ms.reviewer:
+ms.reviewer: hachidan
manager: dansimp
+ms.localizationpriority: normal
+ms.audience: itpro
---
# Use Surface Diagnostic Toolkit for Business in desktop mode
diff --git a/devices/surface/surface-diagnostic-toolkit-for-business-intro.md b/devices/surface/surface-diagnostic-toolkit-for-business-intro.md
index 293aeafe93..35c9b5f49f 100644
--- a/devices/surface/surface-diagnostic-toolkit-for-business-intro.md
+++ b/devices/surface/surface-diagnostic-toolkit-for-business-intro.md
@@ -10,6 +10,8 @@ ms.topic: article
ms.date: 06/11/2019
ms.reviewer: cottmca
manager: dansimp
+ms.localizationpriority: normal
+ms.audience: itpro
---
# Fix common Surface problems using the Surface Diagnostic Toolkit for Business
diff --git a/devices/surface/surface-dock-firmware-update.md b/devices/surface/surface-dock-firmware-update.md
index 92e3f65adf..cee582be7a 100644
--- a/devices/surface/surface-dock-firmware-update.md
+++ b/devices/surface/surface-dock-firmware-update.md
@@ -1,6 +1,6 @@
---
title: Microsoft Surface Dock Firmware Update
-description: This article explains how to use Microsoft Surface Dock Firmware Update, newly redesigned to automatically update Surface Dock firmware while running in the background on your Surface device.
+description: This article explains how to use Microsoft Surface Dock Firmware Update, newly redesigned to update Surface Dock firmware while running in the background on your Surface device.
ms.localizationpriority: normal
ms.prod: w10
ms.mktglfcycl: manage
@@ -15,7 +15,7 @@ ms.audience: itpro
---
# Microsoft Surface Dock Firmware Update
-This article explains how to use Microsoft Surface Dock Firmware Update, newly redesigned to automatically update Surface Dock firmware while running in the background on your Surface device. Once installed, it will update any Surface Dock attached to your Surface device.
+This article explains how to use Microsoft Surface Dock Firmware Update, newly redesigned to update Surface Dock firmware while running in the background on your Surface device. Once installed, it will update any Surface Dock attached to your Surface device.
> [!NOTE]
>Microsoft Surface Dock Firmware Update supersedes the earlier Microsoft Surface Dock Updater tool, previously available for download as part of Surface Tools for IT. It was named Surface_Dock_Updater_vx.xx.xxx.x.msi (where x indicates the version of the tool). The earlier tool has been retired, is no longer available for download, and should not be used.
@@ -24,8 +24,9 @@ This article explains how to use Microsoft Surface Dock Firmware Update, newly r
1. Download and install [Microsoft Surface Dock Firmware Update](https://www.microsoft.com/download/details.aspx?id=46703).
- The file is released in the following naming format: **Surface_Dock_FwUpdate_X.XX.XXX_Win10_XXXXX_XX.XXX.XXXXX_X.MSI** and installs by default to C:\Program Files\SurfaceUpdate.
+ - Requires Surface devices running at least Windows 10 version 1803 or later.
-2. Click **Start > All Apps > Microsoft Surface Dock Updater.** After you connect Surface Dock to your Surface device, the tool checks the firmware status while running in the background.
+2. After you connect Surface Dock to your Surface device, the tool checks the firmware status while running in the background.
4. After several seconds, disconnect your Surface Dock from your device and then wait for 5 seconds before reconnecting. The Surface Dock Firmware Update will normally update the dock silently in background after you disconnect from the dock and reconnect. The process can take a few minutes to complete and will continue even if interrupted.
@@ -36,7 +37,7 @@ If preferred, you can manually complete the update as follows:
> [!NOTE]
>
-> - Manually installing the MSI file may prompt you to restart Surface.; however, restarting >is optional and not required.
+> - Manually installing the MSI file may prompt you to restart Surface; however, restarting is optional and not required.
>- You will need to disconnect and reconnect the dock twice before the update fully completes.
## Network deployment
@@ -106,7 +107,7 @@ Microsoft periodically releases new versions of Surface Dock Firmware Update. To
### Version 1.42.139
*Release Date: September 18 2019*
-This version, contained in Surface_Dock_FwUpdate_1.42.139_Win10_17134_19.084.31680_0.MSI, automatically updates firmware in the background.
+This version, contained in Surface_Dock_FwUpdate_1.42.139_Win10_17134_19.084.31680_0.MSI, updates firmware in the background.
**Updated registry key values:**
- Component10CurrentFwVersion updated to **4ac3970**.
diff --git a/devices/surface/surface-wireless-connect.md b/devices/surface/surface-wireless-connect.md
index eb53754fd6..42d9e3a2c5 100644
--- a/devices/surface/surface-wireless-connect.md
+++ b/devices/surface/surface-wireless-connect.md
@@ -1,18 +1,19 @@
---
-title: Optimizing wireless connectivity for Surface devices
-description: This topic provides guidance around recommended wireless connectivity settings for network admins and users.
+title: Optimize Wi-Fi connectivity for Surface devices
+description: This topic describes recommended Wi-Fi settings to ensure Surface devices stay connected in congested network environments and mobile scenarios.
ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
author: dansimp
-ms.localizationpriority: medium
+ms.audience: itpro
+ms.localizationpriority: normal
ms.author: dansimp
ms.topic: article
ms.date: 08/15/2019
-ms.reviewer:
+ms.reviewer: tokatz
manager: dansimp
---
-# Optimizing wireless connectivity for Surface devices
+# Optimize Wi-Fi connectivity for Surface devices
## Introduction
diff --git a/education/windows/set-up-school-pcs-whats-new.md b/education/windows/set-up-school-pcs-whats-new.md
index fa888ab81c..7d74f93c5d 100644
--- a/education/windows/set-up-school-pcs-whats-new.md
+++ b/education/windows/set-up-school-pcs-whats-new.md
@@ -9,13 +9,19 @@ ms.pagetype: edu
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
-ms.date: 08/15/2019
+ms.date: 09/25/2019
ms.reviewer:
manager: dansimp
---
# What's new in Set up School PCs
-Learn what’s new with the Set up School PCs app each week. Find out about new app features and functionality, and see updated screenshots. You'll also find information about past releases.
+Learn what’s new with the Set up School PCs app each week. Find out about new app features and functionality, see updated screenshots, and find information about past releases.
+
+
+## Week of September 23, 2019
+
+### Easier way to deploy Office 365 to your classroom devices
+ Microsoft Office now appears as an option on the **Apps** screen. Select the app to add it to your provisioning package. Devices install Office 365 ProPlus. This version includes the cloud-connected and most current versions of apps such as Word, PowerPoint, Excel, and Teams.
## Week of June 24, 2019
@@ -24,7 +30,7 @@ Learn what’s new with the Set up School PCs app each week. Find out about new
The previously mentioned provisioning problem was resolved, so the Set up School PCs app once again supports Windows 10, version 1903 and later. The Windows 10 settings that were removed are now back in the app.
### Device rename made optional for Azure AD joined devices
-When you set up your Azure AD join devices in the Set up School PCs app, you no longer need to rename your devices. Set up School PCs will let you keep existing device names.
+When you set up your Azure AD join devices in the app, you no longer need to rename your devices. You can keep existing device names.
## Week of May 23, 2019
@@ -32,29 +38,29 @@ When you set up your Azure AD join devices in the Set up School PCs app, you no
Due to a provisioning problem, Set up School PCs has temporarily stopped support for Windows 10, version 1903 and later. All settings in the app that were for Windows 10, version 1903 and later have been removed. When the problem is resolved, support will resume again.
### Mandatory device rename for Azure AD joined devices
-If you configure Azure AD Join, you are now required to rename your devices during setup. Set up School PCs will not let you keep existing device names.
+If you configure Azure AD Join, you're now required to rename your devices during setup. You can't keep existing device names.
## Week of April 15, 2019
### Support for Minecraft Education Edition upgrade
- Set up School PCs will only add apps to the provisioning package that meet the minimum supported version for Windows 10. For example, Minecraft was the most recent store app to upgrade, and when selected, can only be installed on devices running Windows 10, version 1709 and later. If you select an earlier Windows version, Minecraft won't be added to the provisioning package.
+ Set up School PCs only adds apps to the provisioning package that meet the minimum supported version for Windows 10. For example, Minecraft is the most recent store app to upgrade; it's only installed on devices running Windows 10, version 1709 and later. If you select an earlier version of Windows, Minecraft won't be included in the provisioning package.
## Week of April 8, 2019
### Apps configured as non-removeable
-All apps that are deployed by Set up School PCs are configured on the device as non-removable apps. This feature ensures that students don't unpin or uninstall the apps they need.
+Apps that you deploy with Set up School PCs are configured as non-removable apps. This feature prevents students from unpinning or uninstalling the apps they need.
### Domain name automatically added during sign-in
-Specify your preferred Azure Active Directory tenant domain name to automatically append it to the username on the sign-in screen. With this setting, students don't need to type out long school domain names. They can sign in by typing only their unique usernames.
+Specify your preferred Azure Active Directory tenant domain name to automatically append it to the username on the sign-in screen. With this setting, students don't need to type out long school domain names. To sign in, they type only their unique usernames.
### Set up devices with hidden Wi-Fi network
-Set up devices so that they connect to a hidden Wi-Fi network. To configure a hidden network, open Set up School PCs. When you get to **Wireless network**, choose **Add a Wi-Fi network**. Enter in your Wi-Fi information and select **Hidden network**.
+Set up devices so that they connect to a hidden Wi-Fi network. To configure a hidden network, open the app. When you get to **Wireless network**, choose **Add a Wi-Fi network**. Enter in your Wi-Fi information and select **Hidden network**.
## Week of December 31, 2018
### Add Microsoft Whiteboard to provisioning package
-Microsoft Whiteboard has been added to the list of Microsoft-recommended apps for schools. Whiteboard is a freeform digital canvas where ideas, content, and people come together so students can create and collaborate in real time in the classroom. You can add Whiteboard to your provisioning package in Set up School PCs, on the **Add apps** page. For more information see [Use Set up School PCs app](use-set-up-school-pcs-app.md#create-the-provisioning-package).
+Microsoft Whiteboard is now a Microsoft-recommended app for schools. Whiteboard is a freeform digital canvas where ideas, content, and people come together; students can create and collaborate in real time in the classroom. Add the app to your provisioning package on the **Add apps** page. For more information, see [Use Set up School PCs app](use-set-up-school-pcs-app.md#create-the-provisioning-package).
## Week of November 5, 2018
@@ -69,7 +75,7 @@ The Set up School PCs app was updated with the following changes:
### Three new setup screens added to the app
The following screens and functionality were added to the setup workflow. Select a screen name to view the relevant steps and screenshots in the Set Up School PCs docs.
-* [**Package name**](use-set-up-school-pcs-app.md#package-name): Customize a package name to make it easy to recognize it from your school's other packages. The name is generated by Azure Active Directory and appears as the filename and as the token name in Azure AD in the Azure portal.
+* [**Package name**](use-set-up-school-pcs-app.md#package-name): Customize a package name to make it easy to recognize it from your school's other packages. Azure Active Directory generates the name. It appears as the filename, and as the token name in Azure AD in the Azure portal.
* [**Product key**](use-set-up-school-pcs-app.md#product-key): Enter a product key to upgrade your current edition of Windows 10, or change the existing product key.
@@ -79,17 +85,17 @@ The following screens and functionality were added to the setup workflow. Select
Packages now expire 180 days from the date you create them.
### Updated apps with more helpful, descriptive text
-We've updated the app's **Skip** buttons to clarify the intent of each action. You'll also see an **Exit** button on the last page of the app.
+The **Skip** buttons in the app now communicate the intent of each action. An **Exit** button also appears on the last page of the app.
### Option to keep existing device names
The [**Name these devices** screen](use-set-up-school-pcs-app.md#device-names) now gives you the option to keep the original or existing names of your student devices.
### Skype and Messaging apps to be removed from student PCs by default
-We've added the Skype and Messaging app to a selection of apps that are, by default, removed from student devices.
+The Skype and Messaging apps are part of a selection of apps that are, by default, removed from student devices.
## Next steps
-Learn more about setting up devices with the Set up School PCs app.
+Learn how to create provisioning packages and set up devices in the app.
* [What's in my provisioning package?](set-up-school-pcs-provisioning-package.md)
* [Shared PC mode for schools](set-up-school-pcs-shared-pc-mode.md)
* [Set up School PCs technical reference](set-up-school-pcs-technical.md)
diff --git a/mdop/agpm/administrative-template-settings.md b/mdop/agpm/administrative-template-settings.md
index ba47c7e2f0..7d675b587e 100644
--- a/mdop/agpm/administrative-template-settings.md
+++ b/mdop/agpm/administrative-template-settings.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1abbf0c1-fd32-46a8-a3ba-c005f066523d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/administrative-templates-folder-agpm30ops.md b/mdop/agpm/administrative-templates-folder-agpm30ops.md
index 2a83078fab..357c524122 100644
--- a/mdop/agpm/administrative-templates-folder-agpm30ops.md
+++ b/mdop/agpm/administrative-templates-folder-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0cc5b570-b6d3-4841-9646-02521c13519c
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/administrative-templates-folder-agpm40.md b/mdop/agpm/administrative-templates-folder-agpm40.md
index ad14b8a812..daec342d3b 100644
--- a/mdop/agpm/administrative-templates-folder-agpm40.md
+++ b/mdop/agpm/administrative-templates-folder-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: abc41968-4505-4b09-94f2-67ee0e6c9aaf
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/advanced-group-policy-management-40.md b/mdop/agpm/advanced-group-policy-management-40.md
index eee54f15cc..5fccc1a30d 100644
--- a/mdop/agpm/advanced-group-policy-management-40.md
+++ b/mdop/agpm/advanced-group-policy-management-40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9873a1f7-97fc-4546-9538-b4c0308529c0
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-25-navengl.md b/mdop/agpm/agpm-25-navengl.md
index f670327ad5..3eab801c30 100644
--- a/mdop/agpm/agpm-25-navengl.md
+++ b/mdop/agpm/agpm-25-navengl.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6db42f2e-88b2-4305-ab6b-d3cd0c5d686c
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-3-navengl.md b/mdop/agpm/agpm-3-navengl.md
index c9bd8c14e6..b22f23bf00 100644
--- a/mdop/agpm/agpm-3-navengl.md
+++ b/mdop/agpm/agpm-3-navengl.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b0d0051d-2900-4a0f-8307-552ad26b0e3b
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-4-navengl.md b/mdop/agpm/agpm-4-navengl.md
index b74ee375cb..76b3146249 100644
--- a/mdop/agpm/agpm-4-navengl.md
+++ b/mdop/agpm/agpm-4-navengl.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 81693f30-1b8e-4e63-b1ac-e6de1bc30cc0
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-40-sp1-navengl.md b/mdop/agpm/agpm-40-sp1-navengl.md
index 4dc1d9c084..94076ee683 100644
--- a/mdop/agpm/agpm-40-sp1-navengl.md
+++ b/mdop/agpm/agpm-40-sp1-navengl.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4e55d9e6-635c-4ba6-acbb-ed1d1b580a5b
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-40-sp2-navengl.md b/mdop/agpm/agpm-40-sp2-navengl.md
index 3722b06033..cc07406cc0 100644
--- a/mdop/agpm/agpm-40-sp2-navengl.md
+++ b/mdop/agpm/agpm-40-sp2-navengl.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 915c9791-ac07-43db-bd53-957b641c700f
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-40-sp3-navengl.md b/mdop/agpm/agpm-40-sp3-navengl.md
index 36960dfbb9..daf9dd9544 100644
--- a/mdop/agpm/agpm-40-sp3-navengl.md
+++ b/mdop/agpm/agpm-40-sp3-navengl.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: cd80eea9-601f-4e45-b89e-c3904addee37
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-server-connection-settings-agpm30ops.md b/mdop/agpm/agpm-server-connection-settings-agpm30ops.md
index b1137e1bc4..bc916bbcd2 100644
--- a/mdop/agpm/agpm-server-connection-settings-agpm30ops.md
+++ b/mdop/agpm/agpm-server-connection-settings-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5f03e397-b868-4c49-9cbf-a5f5d0ddcc39
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-server-connection-settings-agpm40.md b/mdop/agpm/agpm-server-connection-settings-agpm40.md
index e804960bbd..c713631290 100644
--- a/mdop/agpm/agpm-server-connection-settings-agpm40.md
+++ b/mdop/agpm/agpm-server-connection-settings-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: cc67f122-6309-4820-92c2-f6a27d897123
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-server-connection-settings.md b/mdop/agpm/agpm-server-connection-settings.md
index 613bb7281f..a615120897 100644
--- a/mdop/agpm/agpm-server-connection-settings.md
+++ b/mdop/agpm/agpm-server-connection-settings.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: faf78e5b-2b0d-4069-9b8c-910add892200
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-server-tab-agpm30ops.md b/mdop/agpm/agpm-server-tab-agpm30ops.md
index 11f742945d..1732bd6a6e 100644
--- a/mdop/agpm/agpm-server-tab-agpm30ops.md
+++ b/mdop/agpm/agpm-server-tab-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fb3b0265-53ed-4bf6-88a4-c409f5f1bed4
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-server-tab-agpm40.md b/mdop/agpm/agpm-server-tab-agpm40.md
index e7cc510fdb..b2974b2c84 100644
--- a/mdop/agpm/agpm-server-tab-agpm40.md
+++ b/mdop/agpm/agpm-server-tab-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a6689437-233e-4f33-a0d6-f7d432c96c00
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/agpm-server-tab.md b/mdop/agpm/agpm-server-tab.md
index 8fa23f34ae..ad3006d8b0 100644
--- a/mdop/agpm/agpm-server-tab.md
+++ b/mdop/agpm/agpm-server-tab.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ce4490b7-b564-49af-8962-858ee39e0016
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/approve-or-reject-a-pending-action-agpm30ops.md b/mdop/agpm/approve-or-reject-a-pending-action-agpm30ops.md
index e46c90285d..3d7d96b30b 100644
--- a/mdop/agpm/approve-or-reject-a-pending-action-agpm30ops.md
+++ b/mdop/agpm/approve-or-reject-a-pending-action-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6d78989a-b600-4876-9dd9-bc6207ff2ce7
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/approve-or-reject-a-pending-action-agpm40.md b/mdop/agpm/approve-or-reject-a-pending-action-agpm40.md
index fcea90cd4b..c03d30ec60 100644
--- a/mdop/agpm/approve-or-reject-a-pending-action-agpm40.md
+++ b/mdop/agpm/approve-or-reject-a-pending-action-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 078ea8b5-9ac5-45fc-9ac1-a1aa629c10b4
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/approve-or-reject-a-pending-action.md b/mdop/agpm/approve-or-reject-a-pending-action.md
index b86ec7dc7b..7d7dea9ee8 100644
--- a/mdop/agpm/approve-or-reject-a-pending-action.md
+++ b/mdop/agpm/approve-or-reject-a-pending-action.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 22921a51-50fb-4a47-bec1-4f563f523675
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/back-up-the-archive-agpm40.md b/mdop/agpm/back-up-the-archive-agpm40.md
index 2d6683352f..af468e9671 100644
--- a/mdop/agpm/back-up-the-archive-agpm40.md
+++ b/mdop/agpm/back-up-the-archive-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 538d85eb-3596-4c1d-bbd7-26bc28857c28
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/back-up-the-archive.md b/mdop/agpm/back-up-the-archive.md
index 424db72881..71c30b98c3 100644
--- a/mdop/agpm/back-up-the-archive.md
+++ b/mdop/agpm/back-up-the-archive.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 400176da-3518-4475-ad19-c96cda6ca7ba
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/best-practices-for-version-control-agpm40.md b/mdop/agpm/best-practices-for-version-control-agpm40.md
index f44e46fe21..59b5394a61 100644
--- a/mdop/agpm/best-practices-for-version-control-agpm40.md
+++ b/mdop/agpm/best-practices-for-version-control-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4a2a1ac7-67f3-4ba3-ab07-860d33da0efe
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/best-practices-for-version-control.md b/mdop/agpm/best-practices-for-version-control.md
index 74572fe88d..e9e4d02c9b 100644
--- a/mdop/agpm/best-practices-for-version-control.md
+++ b/mdop/agpm/best-practices-for-version-control.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 89067f6a-f7ea-4dad-999d-118284cf6c5a
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/check-in-a-gpo-agpm30ops.md b/mdop/agpm/check-in-a-gpo-agpm30ops.md
index 785c61aefc..f23e725ea1 100644
--- a/mdop/agpm/check-in-a-gpo-agpm30ops.md
+++ b/mdop/agpm/check-in-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 437397db-c94b-4940-b1a4-05442619ebee
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/check-in-a-gpo-agpm40.md b/mdop/agpm/check-in-a-gpo-agpm40.md
index 2c44785dfd..fb203386c7 100644
--- a/mdop/agpm/check-in-a-gpo-agpm40.md
+++ b/mdop/agpm/check-in-a-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b838c8a2-eb9e-4e5b-8740-d7701a4294ac
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/check-in-a-gpo-approver.md b/mdop/agpm/check-in-a-gpo-approver.md
index eae694f22d..7547a20849 100644
--- a/mdop/agpm/check-in-a-gpo-approver.md
+++ b/mdop/agpm/check-in-a-gpo-approver.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e428cfff-651f-4903-bf01-d742714d2fa9
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/checklist-administer-the-agpm-server-and-archive-agpm40.md b/mdop/agpm/checklist-administer-the-agpm-server-and-archive-agpm40.md
index 84166e43be..f04859c49f 100644
--- a/mdop/agpm/checklist-administer-the-agpm-server-and-archive-agpm40.md
+++ b/mdop/agpm/checklist-administer-the-agpm-server-and-archive-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d9c60203-90c2-48a7-9318-197e0ec5038b
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/checklist-administer-the-agpm-server-and-archive.md b/mdop/agpm/checklist-administer-the-agpm-server-and-archive.md
index 918d0e79f3..ff4a199b6e 100644
--- a/mdop/agpm/checklist-administer-the-agpm-server-and-archive.md
+++ b/mdop/agpm/checklist-administer-the-agpm-server-and-archive.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0b2eb536-c3cc-462f-a42f-27a53f57bc55
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm30ops.md b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm30ops.md
index 5d035608be..5c37765df2 100644
--- a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm30ops.md
+++ b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a7a17706-304a-4455-9ada-52508ec620f1
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm40.md b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm40.md
index f64e3178eb..7df4177133 100644
--- a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm40.md
+++ b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 44631bed-16d2-4b5a-af70-17a73fb5f6af
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo.md b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo.md
index 1c05b3d735..a6b860cc5d 100644
--- a/mdop/agpm/checklist-create-edit-and-deploy-a-gpo.md
+++ b/mdop/agpm/checklist-create-edit-and-deploy-a-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 614e2d9a-c18b-4f62-99fd-e17a2ac8559d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/choosing-which-version-of-agpm-to-install.md b/mdop/agpm/choosing-which-version-of-agpm-to-install.md
index 9f4c03d4bf..792101fd83 100644
--- a/mdop/agpm/choosing-which-version-of-agpm-to-install.md
+++ b/mdop/agpm/choosing-which-version-of-agpm-to-install.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 31357d2a-bc23-4e15-93f4-0beda8ab7a7b
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/common-secondary-tab-features.md b/mdop/agpm/common-secondary-tab-features.md
index b723efba3f..b54804d0eb 100644
--- a/mdop/agpm/common-secondary-tab-features.md
+++ b/mdop/agpm/common-secondary-tab-features.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 44a15c28-944c-49c1-8534-115ce1c362ed
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-agpm-server-connections-agpm30ops.md b/mdop/agpm/configure-agpm-server-connections-agpm30ops.md
index 74dc22dd7f..01c078c958 100644
--- a/mdop/agpm/configure-agpm-server-connections-agpm30ops.md
+++ b/mdop/agpm/configure-agpm-server-connections-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6062b77b-2fd7-442c-ad1b-6f14419ebd5f
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-agpm-server-connections-agpm40.md b/mdop/agpm/configure-agpm-server-connections-agpm40.md
index b4e7744dc7..c41c27ec1a 100644
--- a/mdop/agpm/configure-agpm-server-connections-agpm40.md
+++ b/mdop/agpm/configure-agpm-server-connections-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bbbb15e8-35e7-403c-b695-7a6ebeb87839
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-an-agpm-server-connection-agpm40.md b/mdop/agpm/configure-an-agpm-server-connection-agpm40.md
index 20fa0ad21e..3fec7b9300 100644
--- a/mdop/agpm/configure-an-agpm-server-connection-agpm40.md
+++ b/mdop/agpm/configure-an-agpm-server-connection-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 409cbbcf-3b0e-459d-9bd2-75cb7b9430b0
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-an-agpm-server-connection-reviewer-agpm30ops.md b/mdop/agpm/configure-an-agpm-server-connection-reviewer-agpm30ops.md
index e8003ab16d..196bbbed79 100644
--- a/mdop/agpm/configure-an-agpm-server-connection-reviewer-agpm30ops.md
+++ b/mdop/agpm/configure-an-agpm-server-connection-reviewer-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ae78dc74-111d-4509-b0a6-e8b8b451c22a
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-e-mail-notification-agpm30ops.md b/mdop/agpm/configure-e-mail-notification-agpm30ops.md
index 02ef47c3f7..7a4f5887a8 100644
--- a/mdop/agpm/configure-e-mail-notification-agpm30ops.md
+++ b/mdop/agpm/configure-e-mail-notification-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b32ce395-d1b9-4c5b-b765-97cdbf455f9e
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-e-mail-notification-agpm40.md b/mdop/agpm/configure-e-mail-notification-agpm40.md
index b126a1fc3c..19f24e340c 100644
--- a/mdop/agpm/configure-e-mail-notification-agpm40.md
+++ b/mdop/agpm/configure-e-mail-notification-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 06f19556-f296-4a80-86a4-4f446c992204
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-e-mail-notification.md b/mdop/agpm/configure-e-mail-notification.md
index e133904f01..7bda0b1a9c 100644
--- a/mdop/agpm/configure-e-mail-notification.md
+++ b/mdop/agpm/configure-e-mail-notification.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6e152de0-4376-4963-8d1a-3e7f5866d30f
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-e-mail-security-for-agpm-agpm30ops.md b/mdop/agpm/configure-e-mail-security-for-agpm-agpm30ops.md
index bc53e8aa80..ed184df8d5 100644
--- a/mdop/agpm/configure-e-mail-security-for-agpm-agpm30ops.md
+++ b/mdop/agpm/configure-e-mail-security-for-agpm-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4850ed8e-a1c6-43f0-95c5-853aa66a94ae
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-e-mail-security-for-agpm-agpm40.md b/mdop/agpm/configure-e-mail-security-for-agpm-agpm40.md
index faab3fd398..6b62a3bc2a 100644
--- a/mdop/agpm/configure-e-mail-security-for-agpm-agpm40.md
+++ b/mdop/agpm/configure-e-mail-security-for-agpm-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b9c48894-0a10-4d03-8027-50ed3b02485a
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-logging-and-tracing-agpm30ops.md b/mdop/agpm/configure-logging-and-tracing-agpm30ops.md
index a47217417b..dd666e4815 100644
--- a/mdop/agpm/configure-logging-and-tracing-agpm30ops.md
+++ b/mdop/agpm/configure-logging-and-tracing-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4f89552f-e949-48b0-9325-23746034eaa4
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-logging-and-tracing-agpm40.md b/mdop/agpm/configure-logging-and-tracing-agpm40.md
index e3906f9cf6..c1e150c7bd 100644
--- a/mdop/agpm/configure-logging-and-tracing-agpm40.md
+++ b/mdop/agpm/configure-logging-and-tracing-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2418cb6a-7189-4080-8fe2-9c8d47dec62c
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-logging-and-tracing.md b/mdop/agpm/configure-logging-and-tracing.md
index 9ee2278316..8f9b6b9e07 100644
--- a/mdop/agpm/configure-logging-and-tracing.md
+++ b/mdop/agpm/configure-logging-and-tracing.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 419231f9-e9db-4f91-a7cf-a0a73db25256
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-the-agpm-server-connection-reviewer.md b/mdop/agpm/configure-the-agpm-server-connection-reviewer.md
index 57d5dc665d..ba9b7f9381 100644
--- a/mdop/agpm/configure-the-agpm-server-connection-reviewer.md
+++ b/mdop/agpm/configure-the-agpm-server-connection-reviewer.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 74e8f348-a8ed-4d69-a8e0-9c974aaeca2d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configure-the-agpm-server-connection.md b/mdop/agpm/configure-the-agpm-server-connection.md
index afcbe48f4f..a6322bd687 100644
--- a/mdop/agpm/configure-the-agpm-server-connection.md
+++ b/mdop/agpm/configure-the-agpm-server-connection.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9a42b5bc-41be-44ef-a6e2-6f56e2cf1996
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configuring-advanced-group-policy-management-agpm40.md b/mdop/agpm/configuring-advanced-group-policy-management-agpm40.md
index d75d6e0e98..837ee68502 100644
--- a/mdop/agpm/configuring-advanced-group-policy-management-agpm40.md
+++ b/mdop/agpm/configuring-advanced-group-policy-management-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8c978ddf-2789-44e4-9c08-de7b4cd1afa0
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/configuring-advanced-group-policy-management.md b/mdop/agpm/configuring-advanced-group-policy-management.md
index 207e7d745b..2617957e16 100644
--- a/mdop/agpm/configuring-advanced-group-policy-management.md
+++ b/mdop/agpm/configuring-advanced-group-policy-management.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 836f4a49-2c77-4f6b-8727-9df7ef443141
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/contents-tab-agpm30ops.md b/mdop/agpm/contents-tab-agpm30ops.md
index ca23b55b63..4e3f28a7a2 100644
--- a/mdop/agpm/contents-tab-agpm30ops.md
+++ b/mdop/agpm/contents-tab-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6ada6430-cd93-47aa-af6e-d7f5b5620132
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/contents-tab-agpm40.md b/mdop/agpm/contents-tab-agpm40.md
index d7f2b51096..695acca3e9 100644
--- a/mdop/agpm/contents-tab-agpm40.md
+++ b/mdop/agpm/contents-tab-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: cf9d1f17-3c3d-422f-bd6b-3db87be45554
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/contents-tab-features-agpm30ops.md b/mdop/agpm/contents-tab-features-agpm30ops.md
index b0103aeb44..b902fc0724 100644
--- a/mdop/agpm/contents-tab-features-agpm30ops.md
+++ b/mdop/agpm/contents-tab-features-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 725f025a-c30a-4d07-add1-4e0ed9a1a5fd
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/contents-tab-features-agpm40.md b/mdop/agpm/contents-tab-features-agpm40.md
index 6edfb8b2a8..7b909fc508 100644
--- a/mdop/agpm/contents-tab-features-agpm40.md
+++ b/mdop/agpm/contents-tab-features-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f1f4849d-bf94-47d5-ad81-0eee33abcaca
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/contents-tab.md b/mdop/agpm/contents-tab.md
index 11d7827842..4d154e05f6 100644
--- a/mdop/agpm/contents-tab.md
+++ b/mdop/agpm/contents-tab.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8a756bc1-3900-4d83-93c4-7ebc4705d956
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/control-a-previously-uncontrolled-gpo.md b/mdop/agpm/control-a-previously-uncontrolled-gpo.md
index 135e1bfcab..6932d224a9 100644
--- a/mdop/agpm/control-a-previously-uncontrolled-gpo.md
+++ b/mdop/agpm/control-a-previously-uncontrolled-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 452689a9-4e32-4e3b-8208-56353a82bf36
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/control-an-uncontrolled-gpo-agpm30ops.md b/mdop/agpm/control-an-uncontrolled-gpo-agpm30ops.md
index c3ec80fd27..87d980d262 100644
--- a/mdop/agpm/control-an-uncontrolled-gpo-agpm30ops.md
+++ b/mdop/agpm/control-an-uncontrolled-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 603f00f9-1e65-4b2f-902a-e53dafedbd8d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/control-an-uncontrolled-gpo-agpm40.md b/mdop/agpm/control-an-uncontrolled-gpo-agpm40.md
index d475f64bd0..438609f31c 100644
--- a/mdop/agpm/control-an-uncontrolled-gpo-agpm40.md
+++ b/mdop/agpm/control-an-uncontrolled-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: dc81545c-8da5-4b6f-b266-f01a82e27c6b
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/controlled-gpo-commands-agpm30ops.md b/mdop/agpm/controlled-gpo-commands-agpm30ops.md
index e7f472be8e..494e7b2c47 100644
--- a/mdop/agpm/controlled-gpo-commands-agpm30ops.md
+++ b/mdop/agpm/controlled-gpo-commands-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 82db4772-154a-4a8d-99cd-2c69e1738698
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/controlled-gpo-commands-agpm40.md b/mdop/agpm/controlled-gpo-commands-agpm40.md
index 82220a3109..38253ca7d8 100644
--- a/mdop/agpm/controlled-gpo-commands-agpm40.md
+++ b/mdop/agpm/controlled-gpo-commands-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 370d3db9-4efc-4799-983d-e29ba5f32b07
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/controlled-tab.md b/mdop/agpm/controlled-tab.md
index 91f3106011..64d9853749 100644
--- a/mdop/agpm/controlled-tab.md
+++ b/mdop/agpm/controlled-tab.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8995a9e1-ace4-40b7-a47b-e1e9924541ba
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/create-a-new-controlled-gpo-agpm30ops.md b/mdop/agpm/create-a-new-controlled-gpo-agpm30ops.md
index d476d76832..2b6c82070c 100644
--- a/mdop/agpm/create-a-new-controlled-gpo-agpm30ops.md
+++ b/mdop/agpm/create-a-new-controlled-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f89eaae8-7858-4222-ba3f-a93a9d7ea5a3
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/create-a-new-controlled-gpo-agpm40.md b/mdop/agpm/create-a-new-controlled-gpo-agpm40.md
index 0331289cbd..e688f80ebc 100644
--- a/mdop/agpm/create-a-new-controlled-gpo-agpm40.md
+++ b/mdop/agpm/create-a-new-controlled-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5ce760f6-9f05-42b4-b787-7835ab8e324e
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/create-a-new-controlled-gpo.md b/mdop/agpm/create-a-new-controlled-gpo.md
index c8beb4c4a2..dc4d11b70b 100644
--- a/mdop/agpm/create-a-new-controlled-gpo.md
+++ b/mdop/agpm/create-a-new-controlled-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b43ce0f4-4519-4278-83c4-c7d5163ddd11
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/create-a-template-agpm30ops.md b/mdop/agpm/create-a-template-agpm30ops.md
index 4e0a8ecb46..0af27e71f6 100644
--- a/mdop/agpm/create-a-template-agpm30ops.md
+++ b/mdop/agpm/create-a-template-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8208f14a-5c18-43a7-8564-118230398cca
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/create-a-template-agpm40.md b/mdop/agpm/create-a-template-agpm40.md
index 16e28ce80a..bb0d209a5b 100644
--- a/mdop/agpm/create-a-template-agpm40.md
+++ b/mdop/agpm/create-a-template-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b38423af-7d24-437a-98bc-01f1ae891127
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/create-a-template.md b/mdop/agpm/create-a-template.md
index 16c9a86ee5..f25308b5ea 100644
--- a/mdop/agpm/create-a-template.md
+++ b/mdop/agpm/create-a-template.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6992bd55-4a4f-401f-9815-c468bac598ef
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm30ops.md b/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm30ops.md
index c54885f7d7..946f6e4a3c 100644
--- a/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm30ops.md
+++ b/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: acce0e0f-7e67-479c-9daa-e678fccd7ced
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm40.md b/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm40.md
index c4b3be7551..7b81b2a43d 100644
--- a/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm40.md
+++ b/mdop/agpm/creating-a-template-and-setting-a-default-template-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ffa72c2a-64eb-4492-8072-c3a66179b546
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/creating-a-template-and-setting-a-default-template.md b/mdop/agpm/creating-a-template-and-setting-a-default-template.md
index 3aeb2a2ac7..049e02aff3 100644
--- a/mdop/agpm/creating-a-template-and-setting-a-default-template.md
+++ b/mdop/agpm/creating-a-template-and-setting-a-default-template.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8771b4b5-4dea-4be1-a675-f60cfd3ec5dc
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/creating-controlling-or-importing-a-gpo-agpm30ops.md b/mdop/agpm/creating-controlling-or-importing-a-gpo-agpm30ops.md
index 2d6c3cc9f1..5415bea6ec 100644
--- a/mdop/agpm/creating-controlling-or-importing-a-gpo-agpm30ops.md
+++ b/mdop/agpm/creating-controlling-or-importing-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ce8b232e-7758-4a6a-9e2f-18967da6cdad
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/creating-controlling-or-importing-a-gpo-approver.md b/mdop/agpm/creating-controlling-or-importing-a-gpo-approver.md
index 5534f1f89a..99e2495711 100644
--- a/mdop/agpm/creating-controlling-or-importing-a-gpo-approver.md
+++ b/mdop/agpm/creating-controlling-or-importing-a-gpo-approver.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f2c8bef5-b654-4864-99d4-9207cfb0a137
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/creating-controlling-or-importing-a-gpo-editor-agpm30ops.md b/mdop/agpm/creating-controlling-or-importing-a-gpo-editor-agpm30ops.md
index d5ac6710c9..489ce5e692 100644
--- a/mdop/agpm/creating-controlling-or-importing-a-gpo-editor-agpm30ops.md
+++ b/mdop/agpm/creating-controlling-or-importing-a-gpo-editor-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0cc1b6ee-3335-4d84-9e1c-d1aefabfef51
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/creating-controlling-or-importing-a-gpo-editor.md b/mdop/agpm/creating-controlling-or-importing-a-gpo-editor.md
index 990725ed87..39ac25e986 100644
--- a/mdop/agpm/creating-controlling-or-importing-a-gpo-editor.md
+++ b/mdop/agpm/creating-controlling-or-importing-a-gpo-editor.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5259ce25-f570-4346-9f50-6b051724a998
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/creating-or-controlling-a-gpo-agpm40-app.md b/mdop/agpm/creating-or-controlling-a-gpo-agpm40-app.md
index ae19e2af92..2206a562b7 100644
--- a/mdop/agpm/creating-or-controlling-a-gpo-agpm40-app.md
+++ b/mdop/agpm/creating-or-controlling-a-gpo-agpm40-app.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ca2fa40e-c6e9-4c57-9da1-e5375df4a2fd
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/creating-or-controlling-a-gpo-agpm40-ed.md b/mdop/agpm/creating-or-controlling-a-gpo-agpm40-ed.md
index acc64f4c0f..37b7564e65 100644
--- a/mdop/agpm/creating-or-controlling-a-gpo-agpm40-ed.md
+++ b/mdop/agpm/creating-or-controlling-a-gpo-agpm40-ed.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 807f3b3f-ad3d-4851-9772-7f54a065632a
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delegate-access-to-a-gpo.md b/mdop/agpm/delegate-access-to-a-gpo.md
index 42df98f0d2..86bb7646c4 100644
--- a/mdop/agpm/delegate-access-to-a-gpo.md
+++ b/mdop/agpm/delegate-access-to-a-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f1d6bb6c-d5bf-4080-a6cb-32774689f804
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm30ops.md b/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm30ops.md
index a83688d311..12617d0f27 100644
--- a/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm30ops.md
+++ b/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7b37b188-2b6b-4e52-be97-8ef899e9893b
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm40.md b/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm40.md
index 2f79f15624..d8d548450f 100644
--- a/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm40.md
+++ b/mdop/agpm/delegate-access-to-an-individual-gpo-in-the-archive-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 284d2aa2-7c10-4ffa-8978-bbe30867c1c1
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delegate-access-to-an-individual-gpo.md b/mdop/agpm/delegate-access-to-an-individual-gpo.md
index 3eca548ecb..ef1ebe53fa 100644
--- a/mdop/agpm/delegate-access-to-an-individual-gpo.md
+++ b/mdop/agpm/delegate-access-to-an-individual-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b2a7d550-14bf-4b41-b6e4-2cc091eedd2d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delegate-access-to-the-production-environment-agpm30ops.md b/mdop/agpm/delegate-access-to-the-production-environment-agpm30ops.md
index 83237183a6..6a0eaaf9c7 100644
--- a/mdop/agpm/delegate-access-to-the-production-environment-agpm30ops.md
+++ b/mdop/agpm/delegate-access-to-the-production-environment-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c1ebae2e-909b-4e64-b368-b7d3cc67b1eb
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delegate-access-to-the-production-environment-agpm40.md b/mdop/agpm/delegate-access-to-the-production-environment-agpm40.md
index a56dd205f1..79476c9882 100644
--- a/mdop/agpm/delegate-access-to-the-production-environment-agpm40.md
+++ b/mdop/agpm/delegate-access-to-the-production-environment-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4c670581-8c47-41ea-80eb-02846ff1ec1f
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm30ops.md b/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm30ops.md
index 47b815dc6f..367806c7ef 100644
--- a/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm30ops.md
+++ b/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d232069e-71d5-4b4d-b22e-bef11de1cfd4
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm40.md b/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm40.md
index 052f1cd78d..2a6a673529 100644
--- a/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm40.md
+++ b/mdop/agpm/delegate-domain-level-access-to-the-archive-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 11ca1d40-4b5c-496e-8922-d01412717858
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delegate-domain-level-access.md b/mdop/agpm/delegate-domain-level-access.md
index 8b14fc2952..3facfda7f0 100644
--- a/mdop/agpm/delegate-domain-level-access.md
+++ b/mdop/agpm/delegate-domain-level-access.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 64c8e773-38cc-4991-9ed2-5a801094d06e
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm30ops.md b/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm30ops.md
index 1a909c75dd..20c4c7176a 100644
--- a/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm30ops.md
+++ b/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 509b02e7-ce0b-4919-b58a-c3a33051152e
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm40.md b/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm40.md
index a6e9a29c85..6401b24ac5 100644
--- a/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm40.md
+++ b/mdop/agpm/delegate-management-of-a-controlled-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 96b4bfb3-5657-4267-8326-85d7a0db87ce
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delete-a-controlled-gpo-agpm30ops.md b/mdop/agpm/delete-a-controlled-gpo-agpm30ops.md
index 0616b6addc..15a7b0ca84 100644
--- a/mdop/agpm/delete-a-controlled-gpo-agpm30ops.md
+++ b/mdop/agpm/delete-a-controlled-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f51c1737-c116-4faf-a6f6-c72303f60a3b
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delete-a-controlled-gpo-agpm40.md b/mdop/agpm/delete-a-controlled-gpo-agpm40.md
index a57e046369..df8fd91963 100644
--- a/mdop/agpm/delete-a-controlled-gpo-agpm40.md
+++ b/mdop/agpm/delete-a-controlled-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2a461018-aa0b-4ae3-b079-efc554ca4a3d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delete-a-gpo-approver.md b/mdop/agpm/delete-a-gpo-approver.md
index c5611d8396..b690ae67d6 100644
--- a/mdop/agpm/delete-a-gpo-approver.md
+++ b/mdop/agpm/delete-a-gpo-approver.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 85fca371-5707-49c1-aa51-813fc3a58dfc
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/delete-a-gpo-editor.md b/mdop/agpm/delete-a-gpo-editor.md
index 3990f6289a..151980b771 100644
--- a/mdop/agpm/delete-a-gpo-editor.md
+++ b/mdop/agpm/delete-a-gpo-editor.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 66be3dde-653e-4c25-8cb7-00e7090c8d31
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/deleting-or-restoring-a-gpo-agpm30ops.md b/mdop/agpm/deleting-or-restoring-a-gpo-agpm30ops.md
index 5542d0c0d0..b50eaff2eb 100644
--- a/mdop/agpm/deleting-or-restoring-a-gpo-agpm30ops.md
+++ b/mdop/agpm/deleting-or-restoring-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ee4a467a-187a-48e3-8f0d-548de0606a56
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/deleting-or-restoring-a-gpo-agpm40.md b/mdop/agpm/deleting-or-restoring-a-gpo-agpm40.md
index f753b56232..f45ac8dc42 100644
--- a/mdop/agpm/deleting-or-restoring-a-gpo-agpm40.md
+++ b/mdop/agpm/deleting-or-restoring-a-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d4f92f4d-eba7-4e6e-b166-13670864d298
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/deleting-restoring-or-destroying-a-gpo-agpm30ops.md b/mdop/agpm/deleting-restoring-or-destroying-a-gpo-agpm30ops.md
index 1b8e2fa12c..2c2c5983b2 100644
--- a/mdop/agpm/deleting-restoring-or-destroying-a-gpo-agpm30ops.md
+++ b/mdop/agpm/deleting-restoring-or-destroying-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3e1b862e-007a-4b60-900f-0489069f5c75
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/deleting-restoring-or-destroying-a-gpo-agpm40.md b/mdop/agpm/deleting-restoring-or-destroying-a-gpo-agpm40.md
index b97ab849ad..7373c4011f 100644
--- a/mdop/agpm/deleting-restoring-or-destroying-a-gpo-agpm40.md
+++ b/mdop/agpm/deleting-restoring-or-destroying-a-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3af6c396-61c8-4b32-9fd8-28e9f15e575c
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/deleting-restoring-or-destroying-a-gpo.md b/mdop/agpm/deleting-restoring-or-destroying-a-gpo.md
index b68db7b2ea..86d70a45a4 100644
--- a/mdop/agpm/deleting-restoring-or-destroying-a-gpo.md
+++ b/mdop/agpm/deleting-restoring-or-destroying-a-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 089c68e7-c1a5-418a-8776-cf23960f10c4
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/deploy-a-gpo-agpm30ops.md b/mdop/agpm/deploy-a-gpo-agpm30ops.md
index 776112e102..1e51162115 100644
--- a/mdop/agpm/deploy-a-gpo-agpm30ops.md
+++ b/mdop/agpm/deploy-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3767b722-db43-40f1-a714-bb8e38bcaa10
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/deploy-a-gpo-agpm40.md b/mdop/agpm/deploy-a-gpo-agpm40.md
index dd8273b4fc..6c16327cc3 100644
--- a/mdop/agpm/deploy-a-gpo-agpm40.md
+++ b/mdop/agpm/deploy-a-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a6febeaa-144b-4c02-99af-d972f0f2b544
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/deploy-a-gpo.md b/mdop/agpm/deploy-a-gpo.md
index cddc1433c8..fcb0ff6fe7 100644
--- a/mdop/agpm/deploy-a-gpo.md
+++ b/mdop/agpm/deploy-a-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a0a3f292-e3ab-46ae-a0fd-d7b2b4ad8883
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/destroy-a-gpo-agpm30ops.md b/mdop/agpm/destroy-a-gpo-agpm30ops.md
index 39d4b138ce..12697f828f 100644
--- a/mdop/agpm/destroy-a-gpo-agpm30ops.md
+++ b/mdop/agpm/destroy-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bfabd71a-47f3-462e-b86f-5f15762b9e28
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/destroy-a-gpo-agpm40.md b/mdop/agpm/destroy-a-gpo-agpm40.md
index 8fe48c6000..9762120942 100644
--- a/mdop/agpm/destroy-a-gpo-agpm40.md
+++ b/mdop/agpm/destroy-a-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 09bce8c4-f75b-4633-b80b-d894bbec95c9
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/destroy-a-gpo.md b/mdop/agpm/destroy-a-gpo.md
index 7ba2a6f165..f1b33449d2 100644
--- a/mdop/agpm/destroy-a-gpo.md
+++ b/mdop/agpm/destroy-a-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d74941a3-beef-46cd-a4ca-80a324dcfadf
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/domain-delegation-tab-agpm30ops.md b/mdop/agpm/domain-delegation-tab-agpm30ops.md
index e6ce2ce32d..d2989bdb1a 100644
--- a/mdop/agpm/domain-delegation-tab-agpm30ops.md
+++ b/mdop/agpm/domain-delegation-tab-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 523cdf39-f4b8-4d20-a917-3485756658ce
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/domain-delegation-tab-agpm40.md b/mdop/agpm/domain-delegation-tab-agpm40.md
index 884dfe968b..4a847fcdba 100644
--- a/mdop/agpm/domain-delegation-tab-agpm40.md
+++ b/mdop/agpm/domain-delegation-tab-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5be5841e-92fb-4af6-aa68-0ae50f8d5141
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/domain-delegation-tab.md b/mdop/agpm/domain-delegation-tab.md
index 27847ba556..01cb0b02be 100644
--- a/mdop/agpm/domain-delegation-tab.md
+++ b/mdop/agpm/domain-delegation-tab.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 15a9bfff-e25b-4b62-9ebc-521a5f4eae96
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/edit-a-gpo-offline-agpm30ops.md b/mdop/agpm/edit-a-gpo-offline-agpm30ops.md
index 9d85b7de64..8e84747307 100644
--- a/mdop/agpm/edit-a-gpo-offline-agpm30ops.md
+++ b/mdop/agpm/edit-a-gpo-offline-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 51677d8a-6209-41b5-82ed-4f3be817abc0
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/edit-a-gpo-offline-agpm40.md b/mdop/agpm/edit-a-gpo-offline-agpm40.md
index 86cd27fe82..6288426883 100644
--- a/mdop/agpm/edit-a-gpo-offline-agpm40.md
+++ b/mdop/agpm/edit-a-gpo-offline-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9c75eb3c-d4d5-41e0-b65e-8b4464a42cd9
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/edit-a-gpo-offline.md b/mdop/agpm/edit-a-gpo-offline.md
index f10b9771de..bc1aba3836 100644
--- a/mdop/agpm/edit-a-gpo-offline.md
+++ b/mdop/agpm/edit-a-gpo-offline.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4a148952-9fe9-4ec4-8df1-b25e37c97a54
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/editing-a-gpo-agpm30ops.md b/mdop/agpm/editing-a-gpo-agpm30ops.md
index ff27db8319..59b629a5c0 100644
--- a/mdop/agpm/editing-a-gpo-agpm30ops.md
+++ b/mdop/agpm/editing-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3024051a-ff33-46d0-9c3e-68ebae7f6b60
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/editing-a-gpo-agpm40.md b/mdop/agpm/editing-a-gpo-agpm40.md
index d1f6bbfeae..affa8b706e 100644
--- a/mdop/agpm/editing-a-gpo-agpm40.md
+++ b/mdop/agpm/editing-a-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ef42eefe-7705-46b2-954d-18966335cbbf
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/editing-a-gpo.md b/mdop/agpm/editing-a-gpo.md
index 860e142fc9..8569b51552 100644
--- a/mdop/agpm/editing-a-gpo.md
+++ b/mdop/agpm/editing-a-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ec77d3bb-8a64-4d8e-9c28-87763de02ec0
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/export-a-gpo-to-a-file.md b/mdop/agpm/export-a-gpo-to-a-file.md
index 6f8016e934..6cbcfe2245 100644
--- a/mdop/agpm/export-a-gpo-to-a-file.md
+++ b/mdop/agpm/export-a-gpo-to-a-file.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0d01b1f7-a6a4-4d0d-9aa7-2d6f1ae93d9d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/feature-visibility-settings-agpm30ops.md b/mdop/agpm/feature-visibility-settings-agpm30ops.md
index 923dbcddcb..5a6f4b5583 100644
--- a/mdop/agpm/feature-visibility-settings-agpm30ops.md
+++ b/mdop/agpm/feature-visibility-settings-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6a844478-a6b0-490d-923f-5a6f82467831
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/feature-visibility-settings-agpm40.md b/mdop/agpm/feature-visibility-settings-agpm40.md
index ea02966e81..126b1eb425 100644
--- a/mdop/agpm/feature-visibility-settings-agpm40.md
+++ b/mdop/agpm/feature-visibility-settings-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d3c0b02a-b943-4001-8b9c-dfac8fe58789
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/feature-visibility-settings.md b/mdop/agpm/feature-visibility-settings.md
index 4b5bdb06b8..7a3848854c 100644
--- a/mdop/agpm/feature-visibility-settings.md
+++ b/mdop/agpm/feature-visibility-settings.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9db2ba03-fb75-4f95-9138-ec89b9fc8d01
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/history-window-agpm30ops.md b/mdop/agpm/history-window-agpm30ops.md
index 890e223a94..bc85f0fee8 100644
--- a/mdop/agpm/history-window-agpm30ops.md
+++ b/mdop/agpm/history-window-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 114f50a4-508d-4589-b006-6cd05cffe6b7
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/history-window-agpm40.md b/mdop/agpm/history-window-agpm40.md
index 0100174bae..0d1f91b021 100644
--- a/mdop/agpm/history-window-agpm40.md
+++ b/mdop/agpm/history-window-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5bea62e7-d267-40b2-a66d-fb1be7373a1c
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/history-window.md b/mdop/agpm/history-window.md
index 15710eda36..7de100917a 100644
--- a/mdop/agpm/history-window.md
+++ b/mdop/agpm/history-window.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f11f9ad9-bffe-4c56-8c46-fe9c0a8e55c1
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates-agpm30ops.md b/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates-agpm30ops.md
index d1630c746f..b7d575576e 100644
--- a/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates-agpm30ops.md
+++ b/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e391fa91-3956-4150-9d43-900cfc88d543
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates-agpm40.md b/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates-agpm40.md
index 38b81a26ac..6201499127 100644
--- a/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates-agpm40.md
+++ b/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3f03c368-162b-450f-be6c-2807c3e8d741
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates.md b/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates.md
index 33485698c3..684eac2b0a 100644
--- a/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates.md
+++ b/mdop/agpm/identify-differences-between-gpos-gpo-versions-or-templates.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6320afc4-af81-47e8-9f4c-463ff99d5a53
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/import-a-gpo-from-a-file-agpmadmin.md b/mdop/agpm/import-a-gpo-from-a-file-agpmadmin.md
index d4b755d702..ae05829359 100644
--- a/mdop/agpm/import-a-gpo-from-a-file-agpmadmin.md
+++ b/mdop/agpm/import-a-gpo-from-a-file-agpmadmin.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2cbcda72-4de3-47ad-aaf8-4fc7341d5a00
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/import-a-gpo-from-a-file-ed.md b/mdop/agpm/import-a-gpo-from-a-file-ed.md
index 697dafa9de..7029d3c69e 100644
--- a/mdop/agpm/import-a-gpo-from-a-file-ed.md
+++ b/mdop/agpm/import-a-gpo-from-a-file-ed.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6e901a52-1101-4fed-9f90-3819b573b378
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/import-a-gpo-from-production-agpm30ops.md b/mdop/agpm/import-a-gpo-from-production-agpm30ops.md
index 5cadc7906b..7754206dd0 100644
--- a/mdop/agpm/import-a-gpo-from-production-agpm30ops.md
+++ b/mdop/agpm/import-a-gpo-from-production-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 35c2a682-ece8-4577-a083-7e3e9facfd13
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/import-a-gpo-from-production-agpm40-app.md b/mdop/agpm/import-a-gpo-from-production-agpm40-app.md
index ef0343b66b..cc8288be07 100644
--- a/mdop/agpm/import-a-gpo-from-production-agpm40-app.md
+++ b/mdop/agpm/import-a-gpo-from-production-agpm40-app.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c5b2f40d-1dc7-4dbf-b8b3-4d97ad73e1e5
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/import-a-gpo-from-production-agpm40-ed.md b/mdop/agpm/import-a-gpo-from-production-agpm40-ed.md
index 521e17cd6f..fcddfd97af 100644
--- a/mdop/agpm/import-a-gpo-from-production-agpm40-ed.md
+++ b/mdop/agpm/import-a-gpo-from-production-agpm40-ed.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ad14203a-2e6a-41d4-a05e-4508c80045fd
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/import-a-gpo-from-production-approver.md b/mdop/agpm/import-a-gpo-from-production-approver.md
index b3b6509ac6..0f31b8a9c4 100644
--- a/mdop/agpm/import-a-gpo-from-production-approver.md
+++ b/mdop/agpm/import-a-gpo-from-production-approver.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 071270fa-1890-40ce-ab89-ce070a54aa59
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/import-a-gpo-from-production-editor-agpm30ops.md b/mdop/agpm/import-a-gpo-from-production-editor-agpm30ops.md
index 6233511c16..272f402550 100644
--- a/mdop/agpm/import-a-gpo-from-production-editor-agpm30ops.md
+++ b/mdop/agpm/import-a-gpo-from-production-editor-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ad90f13e-e73c-400f-b86f-c12f2e75d19d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/import-a-gpo-from-production-editor.md b/mdop/agpm/import-a-gpo-from-production-editor.md
index a67b4eb887..15f7c96a1f 100644
--- a/mdop/agpm/import-a-gpo-from-production-editor.md
+++ b/mdop/agpm/import-a-gpo-from-production-editor.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ffa02b2a-2a43-4fc0-a06e-7d4b59022cc3
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/label-the-current-version-of-a-gpo-agpm30ops.md b/mdop/agpm/label-the-current-version-of-a-gpo-agpm30ops.md
index 2a32a77423..12807c514e 100644
--- a/mdop/agpm/label-the-current-version-of-a-gpo-agpm30ops.md
+++ b/mdop/agpm/label-the-current-version-of-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3845211a-0bc9-4875-9906-cb758c443825
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/label-the-current-version-of-a-gpo-agpm40.md b/mdop/agpm/label-the-current-version-of-a-gpo-agpm40.md
index 8e2ca70456..9374aa08cd 100644
--- a/mdop/agpm/label-the-current-version-of-a-gpo-agpm40.md
+++ b/mdop/agpm/label-the-current-version-of-a-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: cadc8769-21da-44b0-8122-6cafdb448913
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/label-the-current-version-of-a-gpo.md b/mdop/agpm/label-the-current-version-of-a-gpo.md
index 518cff6f2c..e4608abdad 100644
--- a/mdop/agpm/label-the-current-version-of-a-gpo.md
+++ b/mdop/agpm/label-the-current-version-of-a-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5e4e50f8-e4a8-4bda-aac4-1569d5fbd6a7
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/limit-the-gpo-versions-stored-agpm30ops.md b/mdop/agpm/limit-the-gpo-versions-stored-agpm30ops.md
index c74a38c572..35f49b04fd 100644
--- a/mdop/agpm/limit-the-gpo-versions-stored-agpm30ops.md
+++ b/mdop/agpm/limit-the-gpo-versions-stored-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: da14edc5-0c36-4c54-b122-861c86b99eb1
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/limit-the-gpo-versions-stored-agpm40.md b/mdop/agpm/limit-the-gpo-versions-stored-agpm40.md
index 9ca2d0acda..6d48c8c1eb 100644
--- a/mdop/agpm/limit-the-gpo-versions-stored-agpm40.md
+++ b/mdop/agpm/limit-the-gpo-versions-stored-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d802c7b6-f303-4b23-aefd-f19f1300b0ff
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/logging-and-tracing-settings-agpm30ops.md b/mdop/agpm/logging-and-tracing-settings-agpm30ops.md
index adb810c271..82b6e1ce94 100644
--- a/mdop/agpm/logging-and-tracing-settings-agpm30ops.md
+++ b/mdop/agpm/logging-and-tracing-settings-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 858b6fbf-65b4-42fa-95a9-69b04e5734d7
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/logging-and-tracing-settings-agpm40.md b/mdop/agpm/logging-and-tracing-settings-agpm40.md
index 2c42860152..fd2477a527 100644
--- a/mdop/agpm/logging-and-tracing-settings-agpm40.md
+++ b/mdop/agpm/logging-and-tracing-settings-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 66d03306-80d8-4132-bf71-2827157b1fc9
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/logging-and-tracing-settings.md b/mdop/agpm/logging-and-tracing-settings.md
index 67460cfdb5..ff3a6190db 100644
--- a/mdop/agpm/logging-and-tracing-settings.md
+++ b/mdop/agpm/logging-and-tracing-settings.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: db6b43c7-fdde-4d11-b5ab-a81346e56940
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/managing-the-agpm-service-agpm30ops.md b/mdop/agpm/managing-the-agpm-service-agpm30ops.md
index 3b9da4b940..91793ce0d5 100644
--- a/mdop/agpm/managing-the-agpm-service-agpm30ops.md
+++ b/mdop/agpm/managing-the-agpm-service-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a522b1f1-c57b-43aa-9d75-acc6f9bedbf9
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/managing-the-agpm-service-agpm40.md b/mdop/agpm/managing-the-agpm-service-agpm40.md
index 76fedcb48b..01b91e94ad 100644
--- a/mdop/agpm/managing-the-agpm-service-agpm40.md
+++ b/mdop/agpm/managing-the-agpm-service-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 48ca02aa-6acf-403b-afd4-66ae8a953246
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/managing-the-agpm-service.md b/mdop/agpm/managing-the-agpm-service.md
index da8f07c50c..43064fd9ba 100644
--- a/mdop/agpm/managing-the-agpm-service.md
+++ b/mdop/agpm/managing-the-agpm-service.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 331f64d2-1236-4711-81b4-1b92f019bfa5
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/managing-the-archive-agpm40.md b/mdop/agpm/managing-the-archive-agpm40.md
index 39f7a9a28e..ea712c84ad 100644
--- a/mdop/agpm/managing-the-archive-agpm40.md
+++ b/mdop/agpm/managing-the-archive-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b11a3d71-74ea-4dd7-b243-6f2880b7af2d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/managing-the-archive.md b/mdop/agpm/managing-the-archive.md
index 6b1a2d21c5..eeacbaf3a0 100644
--- a/mdop/agpm/managing-the-archive.md
+++ b/mdop/agpm/managing-the-archive.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7c7654e9-ab0e-4531-8ef7-ae77ef391620
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/modify-the-agpm-service-account.md b/mdop/agpm/modify-the-agpm-service-account.md
index 780d107283..4481c6d031 100644
--- a/mdop/agpm/modify-the-agpm-service-account.md
+++ b/mdop/agpm/modify-the-agpm-service-account.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0d8d8c7b-f299-4fee-8414-406492156942
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/modify-the-agpm-service-agpm30ops.md b/mdop/agpm/modify-the-agpm-service-agpm30ops.md
index 8834c5eb34..814f3ad6d7 100644
--- a/mdop/agpm/modify-the-agpm-service-agpm30ops.md
+++ b/mdop/agpm/modify-the-agpm-service-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3485f85f-59d1-48dc-8748-36826214dcb1
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/modify-the-agpm-service-agpm40.md b/mdop/agpm/modify-the-agpm-service-agpm40.md
index 1fdf5b8ecb..31925f9da1 100644
--- a/mdop/agpm/modify-the-agpm-service-agpm40.md
+++ b/mdop/agpm/modify-the-agpm-service-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3239d088-bb86-4ec4-bc56-dbe8f1c710f5
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/modify-the-archive-path.md b/mdop/agpm/modify-the-archive-path.md
index ea4a9c81c7..a442dba78a 100644
--- a/mdop/agpm/modify-the-archive-path.md
+++ b/mdop/agpm/modify-the-archive-path.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6d90daf9-58db-4166-b5b3-e84bb261164a
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/modify-the-port-on-which-the-agpm-service-listens.md b/mdop/agpm/modify-the-port-on-which-the-agpm-service-listens.md
index 420514276e..d4481a3d70 100644
--- a/mdop/agpm/modify-the-port-on-which-the-agpm-service-listens.md
+++ b/mdop/agpm/modify-the-port-on-which-the-agpm-service-listens.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a82c6873-e916-4a04-b263-aa612cd6956b
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/move-the-agpm-server-and-the-archive-agpm40.md b/mdop/agpm/move-the-agpm-server-and-the-archive-agpm40.md
index 696cc928a3..065322c6a7 100644
--- a/mdop/agpm/move-the-agpm-server-and-the-archive-agpm40.md
+++ b/mdop/agpm/move-the-agpm-server-and-the-archive-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9ec48d3a-c293-45f0-8939-32ccdc062303
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/move-the-agpm-server-and-the-archive.md b/mdop/agpm/move-the-agpm-server-and-the-archive.md
index 29baec8da0..1c4ba6015e 100644
--- a/mdop/agpm/move-the-agpm-server-and-the-archive.md
+++ b/mdop/agpm/move-the-agpm-server-and-the-archive.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 13cb83c4-bb42-4e81-8660-5b7540f473d8
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-25.md b/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-25.md
index c0c1b78cb0..d84f580b21 100644
--- a/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-25.md
+++ b/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-25.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 005f0bb5-789f-42a9-bcaf-7e8c31a8df66
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-30-agpm30ops.md b/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-30-agpm30ops.md
index 77dfd7402a..1b9ebfc6e4 100644
--- a/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-30-agpm30ops.md
+++ b/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-30-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: aaefe6d1-a9e5-43eb-b4d8-85880798cb8b
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-40.md b/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-40.md
index e6c33c6490..c4c260282d 100644
--- a/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-40.md
+++ b/mdop/agpm/operations-guide-for-microsoft-advanced-group-policy-management-40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0bafeba3-20a9-4360-be5d-03f786df11ee
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/other-enhancements-to-the-gpmc.md b/mdop/agpm/other-enhancements-to-the-gpmc.md
index fdf7e3ab2f..b4bf662f24 100644
--- a/mdop/agpm/other-enhancements-to-the-gpmc.md
+++ b/mdop/agpm/other-enhancements-to-the-gpmc.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ef344101-17e1-4e06-9dc8-2f20ca796774
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/overview-of-advanced-group-policy-management-agpm30ops.md b/mdop/agpm/overview-of-advanced-group-policy-management-agpm30ops.md
index ae01c964e7..19cb9b5a66 100644
--- a/mdop/agpm/overview-of-advanced-group-policy-management-agpm30ops.md
+++ b/mdop/agpm/overview-of-advanced-group-policy-management-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3a8d1e58-12b9-42bd-898f-6d57514dfbb9
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/overview-of-advanced-group-policy-management-agpm40.md b/mdop/agpm/overview-of-advanced-group-policy-management-agpm40.md
index 67111dde93..a9b6c13c20 100644
--- a/mdop/agpm/overview-of-advanced-group-policy-management-agpm40.md
+++ b/mdop/agpm/overview-of-advanced-group-policy-management-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2c12f3b4-8472-4c5b-b7f8-1c98a80d6b47
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/overview-of-advanced-group-policy-management.md b/mdop/agpm/overview-of-advanced-group-policy-management.md
index d39125dff8..ab987de9d0 100644
--- a/mdop/agpm/overview-of-advanced-group-policy-management.md
+++ b/mdop/agpm/overview-of-advanced-group-policy-management.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 028de9dd-848b-42bc-a982-65ba5c433772
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/pending-gpo-commands-agpm30ops.md b/mdop/agpm/pending-gpo-commands-agpm30ops.md
index ac209741db..335ce54580 100644
--- a/mdop/agpm/pending-gpo-commands-agpm30ops.md
+++ b/mdop/agpm/pending-gpo-commands-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3868dda0-8a41-4bba-9b0c-9f656f9a3cd5
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/pending-gpo-commands-agpm40.md b/mdop/agpm/pending-gpo-commands-agpm40.md
index 6355b75c72..828e0f34aa 100644
--- a/mdop/agpm/pending-gpo-commands-agpm40.md
+++ b/mdop/agpm/pending-gpo-commands-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b62f49e1-43ab-4c93-8102-96cd97a4adad
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/pending-tab.md b/mdop/agpm/pending-tab.md
index 651aed92e0..b3797e17cc 100644
--- a/mdop/agpm/pending-tab.md
+++ b/mdop/agpm/pending-tab.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 54a9a977-c0bc-4553-922b-b2e10e162df9
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-agpm-administrator-tasks-agpm30ops.md b/mdop/agpm/performing-agpm-administrator-tasks-agpm30ops.md
index cb634d1f12..d3dd8dcca6 100644
--- a/mdop/agpm/performing-agpm-administrator-tasks-agpm30ops.md
+++ b/mdop/agpm/performing-agpm-administrator-tasks-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9678b0f4-70a5-411e-a896-afa4dc9ea6c4
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-agpm-administrator-tasks-agpm40.md b/mdop/agpm/performing-agpm-administrator-tasks-agpm40.md
index f8ccba7272..73153462b6 100644
--- a/mdop/agpm/performing-agpm-administrator-tasks-agpm40.md
+++ b/mdop/agpm/performing-agpm-administrator-tasks-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bc746f39-bdc9-4e2a-bc48-c3c7905de098
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-agpm-administrator-tasks.md b/mdop/agpm/performing-agpm-administrator-tasks.md
index 71b1c9749c..621841c925 100644
--- a/mdop/agpm/performing-agpm-administrator-tasks.md
+++ b/mdop/agpm/performing-agpm-administrator-tasks.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 32e694a7-be64-4943-bce2-2a3a15e5341f
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-approver-tasks-agpm30ops.md b/mdop/agpm/performing-approver-tasks-agpm30ops.md
index 4c519657e9..354cf61ee9 100644
--- a/mdop/agpm/performing-approver-tasks-agpm30ops.md
+++ b/mdop/agpm/performing-approver-tasks-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9f711824-191b-4b4b-a1c6-a3b2116006a4
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-approver-tasks-agpm40.md b/mdop/agpm/performing-approver-tasks-agpm40.md
index 2a949f0a84..85377d6b65 100644
--- a/mdop/agpm/performing-approver-tasks-agpm40.md
+++ b/mdop/agpm/performing-approver-tasks-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e0a4b7fe-ce69-4755-9104-c7f523ea6b62
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-approver-tasks.md b/mdop/agpm/performing-approver-tasks.md
index fd4190ca12..643f462b96 100644
--- a/mdop/agpm/performing-approver-tasks.md
+++ b/mdop/agpm/performing-approver-tasks.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6f6310b3-19c1-47c9-8615-964ddd10ce14
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-editor-tasks-agpm30ops.md b/mdop/agpm/performing-editor-tasks-agpm30ops.md
index e6f638319a..56a79bf8fa 100644
--- a/mdop/agpm/performing-editor-tasks-agpm30ops.md
+++ b/mdop/agpm/performing-editor-tasks-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d4ac3277-2557-41cf-ac90-5adb6c30687c
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-editor-tasks-agpm40.md b/mdop/agpm/performing-editor-tasks-agpm40.md
index d359605154..cdac449d72 100644
--- a/mdop/agpm/performing-editor-tasks-agpm40.md
+++ b/mdop/agpm/performing-editor-tasks-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 81976a01-2a95-4256-b703-9fb3c884ef34
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-editor-tasks.md b/mdop/agpm/performing-editor-tasks.md
index 5ba1b63760..e2b158f4f9 100644
--- a/mdop/agpm/performing-editor-tasks.md
+++ b/mdop/agpm/performing-editor-tasks.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b1e62615-2e02-460e-81d1-4a3fbe59f62d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-reviewer-tasks-agpm30ops.md b/mdop/agpm/performing-reviewer-tasks-agpm30ops.md
index 79dddb832c..dc9f09707d 100644
--- a/mdop/agpm/performing-reviewer-tasks-agpm30ops.md
+++ b/mdop/agpm/performing-reviewer-tasks-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1faf396d-be0d-49ac-b063-0722fda2e43d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-reviewer-tasks-agpm40.md b/mdop/agpm/performing-reviewer-tasks-agpm40.md
index e4dc40829d..03929f7e0b 100644
--- a/mdop/agpm/performing-reviewer-tasks-agpm40.md
+++ b/mdop/agpm/performing-reviewer-tasks-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b5f0805c-da55-45a5-a94c-2473af92b54a
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/performing-reviewer-tasks.md b/mdop/agpm/performing-reviewer-tasks.md
index f2ea335680..efab9279e1 100644
--- a/mdop/agpm/performing-reviewer-tasks.md
+++ b/mdop/agpm/performing-reviewer-tasks.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4bdd43fa-5c73-4900-8947-b45906f47f60
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/production-delegation-tab-agpm30ops.md b/mdop/agpm/production-delegation-tab-agpm30ops.md
index 32ef7974df..a66636f4d2 100644
--- a/mdop/agpm/production-delegation-tab-agpm30ops.md
+++ b/mdop/agpm/production-delegation-tab-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9851637d-d5c1-4d29-8582-e8779500a14e
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/production-delegation-tab-agpm40.md b/mdop/agpm/production-delegation-tab-agpm40.md
index 118c822a7d..12e0ac126a 100644
--- a/mdop/agpm/production-delegation-tab-agpm40.md
+++ b/mdop/agpm/production-delegation-tab-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 046bb9bc-769a-4306-bc49-c159a9533552
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/recycle-bin-commands-agpm30ops.md b/mdop/agpm/recycle-bin-commands-agpm30ops.md
index d3ed4beea9..7f252a28e7 100644
--- a/mdop/agpm/recycle-bin-commands-agpm30ops.md
+++ b/mdop/agpm/recycle-bin-commands-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ffe8f020-7aa9-40ad-8019-cc99901a7840
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/recycle-bin-commands-agpm40.md b/mdop/agpm/recycle-bin-commands-agpm40.md
index a1be8b3f88..e25387fa75 100644
--- a/mdop/agpm/recycle-bin-commands-agpm40.md
+++ b/mdop/agpm/recycle-bin-commands-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 347a101f-0ba0-4afc-bd59-752cc06bb904
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/recycle-bin-tab.md b/mdop/agpm/recycle-bin-tab.md
index 749191d42c..5b47c0650b 100644
--- a/mdop/agpm/recycle-bin-tab.md
+++ b/mdop/agpm/recycle-bin-tab.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9ce62e98-c03e-4a75-90e0-51be83c6d2db
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp1.md b/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp1.md
index 26e276ed65..d727f2d26b 100644
--- a/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp1.md
+++ b/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 91835bf8-e53c-4202-986e-8d37050d1267
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp2.md b/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp2.md
index 9c609242ce..5ce4c30b65 100644
--- a/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp2.md
+++ b/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0593cd11-3308-4942-bf19-8a7bb9447f01
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp3.md b/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp3.md
index cfeb0c897e..24f3ccb1f0 100644
--- a/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp3.md
+++ b/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40-sp3.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 955d7674-a8d9-4fc5-b18a-5a1639e38014
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40.md b/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40.md
index 1230a91148..abe185ad6b 100644
--- a/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40.md
+++ b/mdop/agpm/release-notes-for-microsoft-advanced-group-policy-management-40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 44c19e61-c8e8-48aa-a2c2-20396d14d5bb
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/rename-a-gpo-or-template-agpm30ops.md b/mdop/agpm/rename-a-gpo-or-template-agpm30ops.md
index 6c457983f8..891a770b95 100644
--- a/mdop/agpm/rename-a-gpo-or-template-agpm30ops.md
+++ b/mdop/agpm/rename-a-gpo-or-template-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 19d17ddf-8b58-4677-929e-9550fa388b93
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/rename-a-gpo-or-template-agpm40.md b/mdop/agpm/rename-a-gpo-or-template-agpm40.md
index a2a1b19820..6eddae8e9e 100644
--- a/mdop/agpm/rename-a-gpo-or-template-agpm40.md
+++ b/mdop/agpm/rename-a-gpo-or-template-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 84293f7a-4ff7-497e-bdbc-cabb70189a03
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/rename-a-gpo-or-template.md b/mdop/agpm/rename-a-gpo-or-template.md
index e437925f07..b4f6b328cf 100644
--- a/mdop/agpm/rename-a-gpo-or-template.md
+++ b/mdop/agpm/rename-a-gpo-or-template.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 64a1aaf4-f672-48b5-94c6-473bf1076cf3
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-control-of-a-previously-uncontrolled-gpo.md b/mdop/agpm/request-control-of-a-previously-uncontrolled-gpo.md
index c31e31cb35..48168f5274 100644
--- a/mdop/agpm/request-control-of-a-previously-uncontrolled-gpo.md
+++ b/mdop/agpm/request-control-of-a-previously-uncontrolled-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 00e8725d-5d7f-4eed-a5e6-c3631632cfbd
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-control-of-an-uncontrolled-gpo-agpm30ops.md b/mdop/agpm/request-control-of-an-uncontrolled-gpo-agpm30ops.md
index 1f12840287..90dde7498f 100644
--- a/mdop/agpm/request-control-of-an-uncontrolled-gpo-agpm30ops.md
+++ b/mdop/agpm/request-control-of-an-uncontrolled-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b668a67a-5a2c-4f6a-8b1c-efa3ca0794d4
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-control-of-an-uncontrolled-gpo-agpm40.md b/mdop/agpm/request-control-of-an-uncontrolled-gpo-agpm40.md
index b82b4bae0c..aca66f0620 100644
--- a/mdop/agpm/request-control-of-an-uncontrolled-gpo-agpm40.md
+++ b/mdop/agpm/request-control-of-an-uncontrolled-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a34e0aeb-33a1-4c9f-b187-1d08493a785c
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-deletion-of-a-gpo-agpm30ops.md b/mdop/agpm/request-deletion-of-a-gpo-agpm30ops.md
index 4b6b24a531..6ef7e4a702 100644
--- a/mdop/agpm/request-deletion-of-a-gpo-agpm30ops.md
+++ b/mdop/agpm/request-deletion-of-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 576ece5c-dc6d-4b5e-8628-01c15ae2c9a8
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-deletion-of-a-gpo-agpm40.md b/mdop/agpm/request-deletion-of-a-gpo-agpm40.md
index 0124dc0a64..7d9ad25c8e 100644
--- a/mdop/agpm/request-deletion-of-a-gpo-agpm40.md
+++ b/mdop/agpm/request-deletion-of-a-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2410f7a1-ccca-44cf-ab26-76ad474409e7
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-deployment-of-a-gpo-agpm30ops.md b/mdop/agpm/request-deployment-of-a-gpo-agpm30ops.md
index fcb659cd00..7179891f76 100644
--- a/mdop/agpm/request-deployment-of-a-gpo-agpm30ops.md
+++ b/mdop/agpm/request-deployment-of-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f44ae0fb-bcf7-477b-b99e-9dd6a55ee597
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-deployment-of-a-gpo-agpm40.md b/mdop/agpm/request-deployment-of-a-gpo-agpm40.md
index 5c633c5a9c..11a8af4db4 100644
--- a/mdop/agpm/request-deployment-of-a-gpo-agpm40.md
+++ b/mdop/agpm/request-deployment-of-a-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5783cfd0-bd93-46b4-8fa0-684bd39aa8fc
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-deployment-of-a-gpo.md b/mdop/agpm/request-deployment-of-a-gpo.md
index 7c38b0addd..6c6043c1c1 100644
--- a/mdop/agpm/request-deployment-of-a-gpo.md
+++ b/mdop/agpm/request-deployment-of-a-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9aa9af29-4754-4f72-b624-bb3e1087cbe1
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm30ops.md b/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm30ops.md
index a5d72f95b9..0b1f4ef213 100644
--- a/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm30ops.md
+++ b/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: dcc3baea-8af7-4886-a301-98b6ac5819cd
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm40.md b/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm40.md
index 6d7272bb13..2ce8f77638 100644
--- a/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm40.md
+++ b/mdop/agpm/request-restoration-of-a-deleted-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bac5ca3b-be47-49b5-bf1b-96280625fda8
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-the-creation-of-a-new-controlled-gpo-agpm30ops.md b/mdop/agpm/request-the-creation-of-a-new-controlled-gpo-agpm30ops.md
index 2ad25d82f2..7a8c1a3ab6 100644
--- a/mdop/agpm/request-the-creation-of-a-new-controlled-gpo-agpm30ops.md
+++ b/mdop/agpm/request-the-creation-of-a-new-controlled-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4194c2f3-8116-4a35-be1a-81c84072daec
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-the-creation-of-a-new-controlled-gpo-agpm40.md b/mdop/agpm/request-the-creation-of-a-new-controlled-gpo-agpm40.md
index c191185c64..bee0c5410d 100644
--- a/mdop/agpm/request-the-creation-of-a-new-controlled-gpo-agpm40.md
+++ b/mdop/agpm/request-the-creation-of-a-new-controlled-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: cb265238-386f-4780-a59a-0c9a4a87d736
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/request-the-creation-of-a-new-controlled-gpo.md b/mdop/agpm/request-the-creation-of-a-new-controlled-gpo.md
index fa93f03e77..d7c1fe6de4 100644
--- a/mdop/agpm/request-the-creation-of-a-new-controlled-gpo.md
+++ b/mdop/agpm/request-the-creation-of-a-new-controlled-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e1875d81-8553-42ee-8f3a-023d6ced86ca
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/resources-for-agpm.md b/mdop/agpm/resources-for-agpm.md
index 04cbb5788f..3ebc42e3e4 100644
--- a/mdop/agpm/resources-for-agpm.md
+++ b/mdop/agpm/resources-for-agpm.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b44b58c0-2810-40d6-9677-f2f64e1add75
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/restore-a-deleted-gpo-agpm30ops.md b/mdop/agpm/restore-a-deleted-gpo-agpm30ops.md
index b213359f0d..37a1bcf1c0 100644
--- a/mdop/agpm/restore-a-deleted-gpo-agpm30ops.md
+++ b/mdop/agpm/restore-a-deleted-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 853feb0a-d2d9-4be9-a07e-e113a56a9968
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/restore-a-deleted-gpo-agpm40.md b/mdop/agpm/restore-a-deleted-gpo-agpm40.md
index 85f0cb5bb3..173a4d8932 100644
--- a/mdop/agpm/restore-a-deleted-gpo-agpm40.md
+++ b/mdop/agpm/restore-a-deleted-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0a131d26-a741-4a51-b612-c0bc7dbba06b
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/restore-a-deleted-gpo.md b/mdop/agpm/restore-a-deleted-gpo.md
index b88e837db1..a70c7bb3ae 100644
--- a/mdop/agpm/restore-a-deleted-gpo.md
+++ b/mdop/agpm/restore-a-deleted-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e6953296-7b7d-4d1e-ad82-d4a23044cdd7
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/restore-the-archive-from-a-backup-agpm40.md b/mdop/agpm/restore-the-archive-from-a-backup-agpm40.md
index 40dfa1d821..48e9b29395 100644
--- a/mdop/agpm/restore-the-archive-from-a-backup-agpm40.md
+++ b/mdop/agpm/restore-the-archive-from-a-backup-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b83f6173-a236-4da2-b16e-8df20920d4cc
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/restore-the-archive-from-a-backup.md b/mdop/agpm/restore-the-archive-from-a-backup.md
index 67953e93ac..14a140fd80 100644
--- a/mdop/agpm/restore-the-archive-from-a-backup.md
+++ b/mdop/agpm/restore-the-archive-from-a-backup.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 49666337-d72c-4e44-99e4-9eb59b2355a9
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/review-gpo-links-agpm30ops.md b/mdop/agpm/review-gpo-links-agpm30ops.md
index 9871c1b92c..344d2114e2 100644
--- a/mdop/agpm/review-gpo-links-agpm30ops.md
+++ b/mdop/agpm/review-gpo-links-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5ae95afc-2b89-45cf-916c-efe2d43b2211
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/review-gpo-links-agpm40.md b/mdop/agpm/review-gpo-links-agpm40.md
index 7485933f68..0aa1c8288a 100644
--- a/mdop/agpm/review-gpo-links-agpm40.md
+++ b/mdop/agpm/review-gpo-links-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3aaba9da-f0aa-466f-bd1c-49f11d00ea54
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/review-gpo-links.md b/mdop/agpm/review-gpo-links.md
index b419911628..5df2d37d92 100644
--- a/mdop/agpm/review-gpo-links.md
+++ b/mdop/agpm/review-gpo-links.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3c472448-f16a-493c-a229-5ca60a470965
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/review-gpo-settings-agpm30ops.md b/mdop/agpm/review-gpo-settings-agpm30ops.md
index 6c569b8d1b..e8287b80ff 100644
--- a/mdop/agpm/review-gpo-settings-agpm30ops.md
+++ b/mdop/agpm/review-gpo-settings-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bed956d0-082e-4fa9-bf1e-572d0d3d02ec
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/review-gpo-settings-agpm40.md b/mdop/agpm/review-gpo-settings-agpm40.md
index 77e60f42cc..86d54adf3c 100644
--- a/mdop/agpm/review-gpo-settings-agpm40.md
+++ b/mdop/agpm/review-gpo-settings-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c346bcde-dd6a-4775-aeab-721ca3a361b2
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/review-gpo-settings.md b/mdop/agpm/review-gpo-settings.md
index 952c2ac544..31cdb5b678 100644
--- a/mdop/agpm/review-gpo-settings.md
+++ b/mdop/agpm/review-gpo-settings.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e82570b2-d8ce-4bf0-8ad7-8910409f3041
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo-agpm30ops.md b/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo-agpm30ops.md
index f9c5735347..5317c7cad8 100644
--- a/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo-agpm30ops.md
+++ b/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2a98ad8f-32cb-41eb-ab99-0318f2a55d81
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo.md b/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo.md
index 7068147b6c..1f984420dd 100644
--- a/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo.md
+++ b/mdop/agpm/roll-back-to-a-previous-version-of-a-gpo.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 028631c0-4cb9-4642-90ad-04cd813051b7
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/roll-back-to-an-earlier-version-of-a-gpo-agpm40.md b/mdop/agpm/roll-back-to-an-earlier-version-of-a-gpo-agpm40.md
index 3df03b1ccd..eda0e2c1fe 100644
--- a/mdop/agpm/roll-back-to-an-earlier-version-of-a-gpo-agpm40.md
+++ b/mdop/agpm/roll-back-to-an-earlier-version-of-a-gpo-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 06ce9251-95e0-46d0-99c2-b9a0690e5891
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/search-and-filter-the-list-of-gpos.md b/mdop/agpm/search-and-filter-the-list-of-gpos.md
index 1ad003bf5a..0266fdfa89 100644
--- a/mdop/agpm/search-and-filter-the-list-of-gpos.md
+++ b/mdop/agpm/search-and-filter-the-list-of-gpos.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1bc58a38-033c-4aed-9eb4-c239827f5501
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/set-a-default-template-agpm30ops.md b/mdop/agpm/set-a-default-template-agpm30ops.md
index 05832f8ef0..8da4e564b8 100644
--- a/mdop/agpm/set-a-default-template-agpm30ops.md
+++ b/mdop/agpm/set-a-default-template-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 84edbd69-451b-4c10-a898-781d4b75d09c
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/set-a-default-template-agpm40.md b/mdop/agpm/set-a-default-template-agpm40.md
index 4369a82870..c6b0a93381 100644
--- a/mdop/agpm/set-a-default-template-agpm40.md
+++ b/mdop/agpm/set-a-default-template-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 07208b6b-cb3a-4f6c-9c84-36d4dc1486d8
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/set-a-default-template.md b/mdop/agpm/set-a-default-template.md
index 8386ca2b9c..26a7b044a5 100644
--- a/mdop/agpm/set-a-default-template.md
+++ b/mdop/agpm/set-a-default-template.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e0acf980-437f-4357-b237-298aaebe490d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/start-and-stop-the-agpm-service-agpm30ops.md b/mdop/agpm/start-and-stop-the-agpm-service-agpm30ops.md
index 93d74f5f37..4618d3c9fd 100644
--- a/mdop/agpm/start-and-stop-the-agpm-service-agpm30ops.md
+++ b/mdop/agpm/start-and-stop-the-agpm-service-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b9d26920-c439-4992-9a78-73e4fba8309d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/start-and-stop-the-agpm-service-agpm40.md b/mdop/agpm/start-and-stop-the-agpm-service-agpm40.md
index 533b33af92..3cc649d89b 100644
--- a/mdop/agpm/start-and-stop-the-agpm-service-agpm40.md
+++ b/mdop/agpm/start-and-stop-the-agpm-service-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: dcc9566c-c515-4fbe-b7f5-8ac030141307
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/start-and-stop-the-agpm-service.md b/mdop/agpm/start-and-stop-the-agpm-service.md
index 3dbf704495..e81cfefbbd 100644
--- a/mdop/agpm/start-and-stop-the-agpm-service.md
+++ b/mdop/agpm/start-and-stop-the-agpm-service.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 769aa0ce-224a-446f-9958-9518af4ad159
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-25.md b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-25.md
index fbeee131b7..e177ef9954 100644
--- a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-25.md
+++ b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-25.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 454298c9-0fab-497a-9808-c0246a4c8db5
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-30.md b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-30.md
index 63df928e4f..f0fa732a4c 100644
--- a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-30.md
+++ b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-30.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d067f465-d7c8-4f6d-b311-66b9b06874f7
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-40.md b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-40.md
index 05228f0a31..fa3516b9a3 100644
--- a/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-40.md
+++ b/mdop/agpm/step-by-step-guide-for-microsoft-advanced-group-policy-management-40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: dc6f9b16-b1d4-48f3-88bb-f29301f0131c
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/technical-overview-of-agpm.md b/mdop/agpm/technical-overview-of-agpm.md
index 8a6b243011..3ea90686e5 100644
--- a/mdop/agpm/technical-overview-of-agpm.md
+++ b/mdop/agpm/technical-overview-of-agpm.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 36bc0ab5-f752-474c-8559-721ea95169c2
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/template-commands-agpm30ops.md b/mdop/agpm/template-commands-agpm30ops.md
index 046c815f0c..cd6beac689 100644
--- a/mdop/agpm/template-commands-agpm30ops.md
+++ b/mdop/agpm/template-commands-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2ec11b3f-0c5c-4788-97bd-bd4bf64ba51a
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/template-commands-agpm40.md b/mdop/agpm/template-commands-agpm40.md
index d8a5c7af94..ad999f7a40 100644
--- a/mdop/agpm/template-commands-agpm40.md
+++ b/mdop/agpm/template-commands-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 243a9b18-bf3f-44fa-94d7-5c793f7322da
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/templates-tab.md b/mdop/agpm/templates-tab.md
index ff01b1c77f..75b67d4b89 100644
--- a/mdop/agpm/templates-tab.md
+++ b/mdop/agpm/templates-tab.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5676e9f9-eb52-49e1-a55d-15c1059af368
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/test-a-gpo-in-a-separate-organizational-unit-agpm40.md b/mdop/agpm/test-a-gpo-in-a-separate-organizational-unit-agpm40.md
index 5770353813..e3ebc0c30b 100644
--- a/mdop/agpm/test-a-gpo-in-a-separate-organizational-unit-agpm40.md
+++ b/mdop/agpm/test-a-gpo-in-a-separate-organizational-unit-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9a9e6d22-74e6-41d8-ac2f-12a1b76ad5a0
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/troubleshooting-advanced-group-policy-management-agpm30ops.md b/mdop/agpm/troubleshooting-advanced-group-policy-management-agpm30ops.md
index 85beacad4b..9b374f5a81 100644
--- a/mdop/agpm/troubleshooting-advanced-group-policy-management-agpm30ops.md
+++ b/mdop/agpm/troubleshooting-advanced-group-policy-management-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f7ece97c-e9f8-4b18-8c7a-a615c98d5c60
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/troubleshooting-advanced-group-policy-management.md b/mdop/agpm/troubleshooting-advanced-group-policy-management.md
index eef7bb66d5..4284e54ffd 100644
--- a/mdop/agpm/troubleshooting-advanced-group-policy-management.md
+++ b/mdop/agpm/troubleshooting-advanced-group-policy-management.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f58849cf-6c5b-44d8-b356-0ed7a5b24cee
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/troubleshooting-agpm-agpm40.md b/mdop/agpm/troubleshooting-agpm-agpm40.md
index 937da5a8bb..27451ca6e3 100644
--- a/mdop/agpm/troubleshooting-agpm-agpm40.md
+++ b/mdop/agpm/troubleshooting-agpm-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bedcd817-beb2-47bf-aebd-e3923c4fd06f
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/troubleshooting-agpm40-upgrades.md b/mdop/agpm/troubleshooting-agpm40-upgrades.md
index 90e2ca7e1d..c19488dbb0 100644
--- a/mdop/agpm/troubleshooting-agpm40-upgrades.md
+++ b/mdop/agpm/troubleshooting-agpm40-upgrades.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1abbf0c1-fd32-46a8-a3ba-c005f066523d
ms.reviewer:
manager: dansimp
-ms.author: jedodson
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/uncontrolled-gpo-commands-agpm30ops.md b/mdop/agpm/uncontrolled-gpo-commands-agpm30ops.md
index c371132ecd..1ad9a2806a 100644
--- a/mdop/agpm/uncontrolled-gpo-commands-agpm30ops.md
+++ b/mdop/agpm/uncontrolled-gpo-commands-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 94c07b09-cb96-4ff2-b963-b25f103e73e9
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/uncontrolled-gpo-commands-agpm40.md b/mdop/agpm/uncontrolled-gpo-commands-agpm40.md
index 4039771a91..0b74dd5b18 100644
--- a/mdop/agpm/uncontrolled-gpo-commands-agpm40.md
+++ b/mdop/agpm/uncontrolled-gpo-commands-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 05a8050f-adc3-465b-8524-bbe95745165c
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/uncontrolled-tab.md b/mdop/agpm/uncontrolled-tab.md
index 209267d4d1..49a863ddc3 100644
--- a/mdop/agpm/uncontrolled-tab.md
+++ b/mdop/agpm/uncontrolled-tab.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d7e658bf-a72b-4813-bdc8-2fdb7251e742
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/use-a-test-environment-agpm30ops.md b/mdop/agpm/use-a-test-environment-agpm30ops.md
index 191a0368bf..825a592d62 100644
--- a/mdop/agpm/use-a-test-environment-agpm30ops.md
+++ b/mdop/agpm/use-a-test-environment-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 86295084-b39e-4040-bb3f-15c3c1e99b1a
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/use-a-test-environment.md b/mdop/agpm/use-a-test-environment.md
index 7ceb7db026..ca6badb289 100644
--- a/mdop/agpm/use-a-test-environment.md
+++ b/mdop/agpm/use-a-test-environment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b8d7b3ee-030a-4b5b-8223-4a3276fd47a7
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/user-interface-advanced-group-policy-management-agpm30ops.md b/mdop/agpm/user-interface-advanced-group-policy-management-agpm30ops.md
index ec24e0f6b9..870b709194 100644
--- a/mdop/agpm/user-interface-advanced-group-policy-management-agpm30ops.md
+++ b/mdop/agpm/user-interface-advanced-group-policy-management-agpm30ops.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 19aab694-8283-4d97-9425-1845404b461f
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/user-interface-advanced-group-policy-management-agpm40.md b/mdop/agpm/user-interface-advanced-group-policy-management-agpm40.md
index 4dea408268..7104e96d2a 100644
--- a/mdop/agpm/user-interface-advanced-group-policy-management-agpm40.md
+++ b/mdop/agpm/user-interface-advanced-group-policy-management-agpm40.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1bf67f6a-4f24-4020-a8c1-fe440de9caa3
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/user-interface-advanced-group-policy-management.md b/mdop/agpm/user-interface-advanced-group-policy-management.md
index df9a57c840..b8a2fbc5b2 100644
--- a/mdop/agpm/user-interface-advanced-group-policy-management.md
+++ b/mdop/agpm/user-interface-advanced-group-policy-management.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 73324c99-adca-46dc-b516-ef78b7235f59
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/using-a-test-environment.md b/mdop/agpm/using-a-test-environment.md
index e85967ce48..37535bf276 100644
--- a/mdop/agpm/using-a-test-environment.md
+++ b/mdop/agpm/using-a-test-environment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fc5fcc7c-1ac8-483a-a6bd-2279ae2ee3fb
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/agpm/whats-new-in-agpm-30.md b/mdop/agpm/whats-new-in-agpm-30.md
index 65ef1f96ca..0483edc1f5 100644
--- a/mdop/agpm/whats-new-in-agpm-30.md
+++ b/mdop/agpm/whats-new-in-agpm-30.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0d082b86-63c5-45ce-9529-6e5f37254f9d
ms.reviewer:
manager: dansimp
-ms.author: macapara
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/appv-v4/about-app-v-package-accelerators--app-v-46-sp1-.md b/mdop/appv-v4/about-app-v-package-accelerators--app-v-46-sp1-.md
index e162df6f9b..638fd0e895 100644
--- a/mdop/appv-v4/about-app-v-package-accelerators--app-v-46-sp1-.md
+++ b/mdop/appv-v4/about-app-v-package-accelerators--app-v-46-sp1-.md
@@ -1,11 +1,11 @@
---
title: About App-V Package Accelerators (App-V 4.6 SP1)
description: About App-V Package Accelerators (App-V 4.6 SP1)
-author: dansimp
+author: manikadhiman
ms.assetid: fc2d2375-8f17-4a6d-b374-771cb947cb8c
ms.reviewer:
manager: dansimp
-ms.author: manikadhiman
+ms.author: v-madhi
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-modify-a-virtual-application-package--app-v-46-.md b/mdop/appv-v4/how-to-modify-a-virtual-application-package--app-v-46-.md
index 0809dc55d0..98641cae37 100644
--- a/mdop/appv-v4/how-to-modify-a-virtual-application-package--app-v-46-.md
+++ b/mdop/appv-v4/how-to-modify-a-virtual-application-package--app-v-46-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 346ec470-3822-48a7-95e7-61f46eb38dc2
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-modify-file-mapping-information.md b/mdop/appv-v4/how-to-modify-file-mapping-information.md
index edbae8f8d9..8fdeaaf6cd 100644
--- a/mdop/appv-v4/how-to-modify-file-mapping-information.md
+++ b/mdop/appv-v4/how-to-modify-file-mapping-information.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d3a9d10a-6cc8-4399-9479-b20f729c4dd9
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-modify-private-key-permissions-to-support-management-server-or-streaming-server.md b/mdop/appv-v4/how-to-modify-private-key-permissions-to-support-management-server-or-streaming-server.md
index abaea1f0a2..f4c26c1e0a 100644
--- a/mdop/appv-v4/how-to-modify-private-key-permissions-to-support-management-server-or-streaming-server.md
+++ b/mdop/appv-v4/how-to-modify-private-key-permissions-to-support-management-server-or-streaming-server.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1ebe86fa-0fbc-4512-aebc-0a5da991cd43
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-modify-the-files-included-in-a-package.md b/mdop/appv-v4/how-to-modify-the-files-included-in-a-package.md
index 210316d6fe..2b1f6f9355 100644
--- a/mdop/appv-v4/how-to-modify-the-files-included-in-a-package.md
+++ b/mdop/appv-v4/how-to-modify-the-files-included-in-a-package.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e331ac85-1c9c-49be-9d96-5444de38fd56
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-modify-the-location-of-the-log-directory.md b/mdop/appv-v4/how-to-modify-the-location-of-the-log-directory.md
index 0e8236a077..884b299f77 100644
--- a/mdop/appv-v4/how-to-modify-the-location-of-the-log-directory.md
+++ b/mdop/appv-v4/how-to-modify-the-location-of-the-log-directory.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8e222d29-6f58-43bb-9ea7-da9a2ebfa48c
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-modify-the-location-of-the-scratch-directory.md b/mdop/appv-v4/how-to-modify-the-location-of-the-scratch-directory.md
index 3b1dea1dc4..db5ae76ad1 100644
--- a/mdop/appv-v4/how-to-modify-the-location-of-the-scratch-directory.md
+++ b/mdop/appv-v4/how-to-modify-the-location-of-the-scratch-directory.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 25ebc2fa-d532-4800-9825-9d08306fc2e0
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-modify-the-log-directory-location.md b/mdop/appv-v4/how-to-modify-the-log-directory-location.md
index 19fda7f044..59765268ac 100644
--- a/mdop/appv-v4/how-to-modify-the-log-directory-location.md
+++ b/mdop/appv-v4/how-to-modify-the-log-directory-location.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 203c674f-8d46-4d42-9af0-245a2681fc0f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-modify-the-operating-systems-associated-with-an-existing-windows-installer-file.md b/mdop/appv-v4/how-to-modify-the-operating-systems-associated-with-an-existing-windows-installer-file.md
index 2fe4f2b3c2..910e66507f 100644
--- a/mdop/appv-v4/how-to-modify-the-operating-systems-associated-with-an-existing-windows-installer-file.md
+++ b/mdop/appv-v4/how-to-modify-the-operating-systems-associated-with-an-existing-windows-installer-file.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0633f7e2-aebf-4e00-be02-35bc59dec420
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-modify-the-scratch-directory-location.md b/mdop/appv-v4/how-to-modify-the-scratch-directory-location.md
index fdcc89e4df..55a1689ba0 100644
--- a/mdop/appv-v4/how-to-modify-the-scratch-directory-location.md
+++ b/mdop/appv-v4/how-to-modify-the-scratch-directory-location.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 61ecb379-85be-4316-8023-a2c1811504e5
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-modify-virtual-registry-key-information.md b/mdop/appv-v4/how-to-modify-virtual-registry-key-information.md
index c7f20c2042..717a3d0b0b 100644
--- a/mdop/appv-v4/how-to-modify-virtual-registry-key-information.md
+++ b/mdop/appv-v4/how-to-modify-virtual-registry-key-information.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: cf2559f2-a8cc-4fc7-916e-8368843c7ebc
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-move-an-application-group.md b/mdop/appv-v4/how-to-move-an-application-group.md
index 1995381961..8ea5ba9d04 100644
--- a/mdop/appv-v4/how-to-move-an-application-group.md
+++ b/mdop/appv-v4/how-to-move-an-application-group.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7f9f9f2e-f394-4ad3-8615-4237a7dcfb95
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-move-an-application.md b/mdop/appv-v4/how-to-move-an-application.md
index d99811eea8..09e30ae09f 100644
--- a/mdop/appv-v4/how-to-move-an-application.md
+++ b/mdop/appv-v4/how-to-move-an-application.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3ebbf30c-b435-4a69-a0ba-2313aaf0017c
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-open-a-sequenced-application-using-the-command-line.md b/mdop/appv-v4/how-to-open-a-sequenced-application-using-the-command-line.md
index c060c24575..21dbdb2640 100644
--- a/mdop/appv-v4/how-to-open-a-sequenced-application-using-the-command-line.md
+++ b/mdop/appv-v4/how-to-open-a-sequenced-application-using-the-command-line.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: dc23ee65-8aea-470e-bb3f-a2f2b06cb241
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-perform-administrative-tasks-in-the-application-virtualization-server-management-console.md b/mdop/appv-v4/how-to-perform-administrative-tasks-in-the-application-virtualization-server-management-console.md
index 9391a45aeb..9c58f5b780 100644
--- a/mdop/appv-v4/how-to-perform-administrative-tasks-in-the-application-virtualization-server-management-console.md
+++ b/mdop/appv-v4/how-to-perform-administrative-tasks-in-the-application-virtualization-server-management-console.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b80e39eb-4b2a-4f66-8c85-dd5712efed33
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-perform-general-administrative-tasks-in-the-app-v-client-management-console.md b/mdop/appv-v4/how-to-perform-general-administrative-tasks-in-the-app-v-client-management-console.md
index 3870ab64ff..343308dd05 100644
--- a/mdop/appv-v4/how-to-perform-general-administrative-tasks-in-the-app-v-client-management-console.md
+++ b/mdop/appv-v4/how-to-perform-general-administrative-tasks-in-the-app-v-client-management-console.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 22abdb1e-ab35-440d-bf74-d358dd1a6558
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-perform-general-administrative-tasks-in-the-client-management-console.md b/mdop/appv-v4/how-to-perform-general-administrative-tasks-in-the-client-management-console.md
index 5d4925fc05..6680c9eb75 100644
--- a/mdop/appv-v4/how-to-perform-general-administrative-tasks-in-the-client-management-console.md
+++ b/mdop/appv-v4/how-to-perform-general-administrative-tasks-in-the-client-management-console.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 90bb7101-1075-4654-8a5e-ad08374e381f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-print-a-reportserver.md b/mdop/appv-v4/how-to-print-a-reportserver.md
index df30ae8d2e..b5032610a5 100644
--- a/mdop/appv-v4/how-to-print-a-reportserver.md
+++ b/mdop/appv-v4/how-to-print-a-reportserver.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9cb3a2f1-69bf-47b2-b2cf-8afdcd77138f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-publish-a-virtual-application-on-the-client.md b/mdop/appv-v4/how-to-publish-a-virtual-application-on-the-client.md
index be85378bb4..50cea0dd3a 100644
--- a/mdop/appv-v4/how-to-publish-a-virtual-application-on-the-client.md
+++ b/mdop/appv-v4/how-to-publish-a-virtual-application-on-the-client.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 90af843e-b5b3-4a71-a3a1-fa5f4c087f28
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-publish-application-shortcuts.md b/mdop/appv-v4/how-to-publish-application-shortcuts.md
index 9ba0f5d68e..6d4a244cfe 100644
--- a/mdop/appv-v4/how-to-publish-application-shortcuts.md
+++ b/mdop/appv-v4/how-to-publish-application-shortcuts.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fc5efe86-1bbe-438b-b7d8-4f9b815cc58e
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-refresh-the-publishing-servers.md b/mdop/appv-v4/how-to-refresh-the-publishing-servers.md
index 9f7be22717..a0e9a2926b 100644
--- a/mdop/appv-v4/how-to-refresh-the-publishing-servers.md
+++ b/mdop/appv-v4/how-to-refresh-the-publishing-servers.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 92e1d7b0-10ee-4531-9049-1056b44934e2
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-refresh-virtual-applications-from-the-desktop-notification-area.md b/mdop/appv-v4/how-to-refresh-virtual-applications-from-the-desktop-notification-area.md
index ef2d00371a..7933691955 100644
--- a/mdop/appv-v4/how-to-refresh-virtual-applications-from-the-desktop-notification-area.md
+++ b/mdop/appv-v4/how-to-refresh-virtual-applications-from-the-desktop-notification-area.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 801610d9-e89c-48bb-972c-20e37b945a02
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-remove-a-package-by-using-the-command-line.md b/mdop/appv-v4/how-to-remove-a-package-by-using-the-command-line.md
index 88540f333d..d0f45a1774 100644
--- a/mdop/appv-v4/how-to-remove-a-package-by-using-the-command-line.md
+++ b/mdop/appv-v4/how-to-remove-a-package-by-using-the-command-line.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 47697ec7-20e5-4258-8865-a0a710d41d5a
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-remove-a-server-group.md b/mdop/appv-v4/how-to-remove-a-server-group.md
index 008a1a8d1e..e7575feff4 100644
--- a/mdop/appv-v4/how-to-remove-a-server-group.md
+++ b/mdop/appv-v4/how-to-remove-a-server-group.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3017f4f4-614b-4db4-834c-b6fd9b45f10c
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-remove-a-server.md b/mdop/appv-v4/how-to-remove-a-server.md
index b9d9c56690..bccd5fb64d 100644
--- a/mdop/appv-v4/how-to-remove-a-server.md
+++ b/mdop/appv-v4/how-to-remove-a-server.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: afb2a889-733c-4058-9a50-caa2ca10bd58
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-remove-an-application-from-a-license-group.md b/mdop/appv-v4/how-to-remove-an-application-from-a-license-group.md
index ef40089f5e..8d0d072de5 100644
--- a/mdop/appv-v4/how-to-remove-an-application-from-a-license-group.md
+++ b/mdop/appv-v4/how-to-remove-an-application-from-a-license-group.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 973dfb11-b4d1-4b79-8f6a-aaea3e52b04f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-remove-an-application-group.md b/mdop/appv-v4/how-to-remove-an-application-group.md
index f6b2edb65f..04c1069006 100644
--- a/mdop/appv-v4/how-to-remove-an-application-group.md
+++ b/mdop/appv-v4/how-to-remove-an-application-group.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3016b373-f5a0-4c82-96e8-e5e7960f0cc4
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-remove-an-application-license-group.md b/mdop/appv-v4/how-to-remove-an-application-license-group.md
index 964ff0c24f..6e686e7f7b 100644
--- a/mdop/appv-v4/how-to-remove-an-application-license-group.md
+++ b/mdop/appv-v4/how-to-remove-an-application-license-group.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 35830916-7015-44cd-829b-23599a5029a7
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-remove-the-application-virtualization-system-components.md b/mdop/appv-v4/how-to-remove-the-application-virtualization-system-components.md
index 5cc9a8ed29..40b1a72de1 100644
--- a/mdop/appv-v4/how-to-remove-the-application-virtualization-system-components.md
+++ b/mdop/appv-v4/how-to-remove-the-application-virtualization-system-components.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 45bb1e43-8708-48b7-9169-e3659f32686f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-rename-an-application-group.md b/mdop/appv-v4/how-to-rename-an-application-group.md
index 6070df5aec..a1ee2619d3 100644
--- a/mdop/appv-v4/how-to-rename-an-application-group.md
+++ b/mdop/appv-v4/how-to-rename-an-application-group.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4dfd3336-ea9a-4a56-91e1-7e9d742c7b9a
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-rename-an-application.md b/mdop/appv-v4/how-to-rename-an-application.md
index ca8414d735..d039ae22e5 100644
--- a/mdop/appv-v4/how-to-rename-an-application.md
+++ b/mdop/appv-v4/how-to-rename-an-application.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 983136b7-66bf-49f6-8dea-8933b622072d
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-repair-an-application.md b/mdop/appv-v4/how-to-repair-an-application.md
index 1ec69efc56..a6a164f1df 100644
--- a/mdop/appv-v4/how-to-repair-an-application.md
+++ b/mdop/appv-v4/how-to-repair-an-application.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 80b08416-ad86-4ed6-966a-b943e3efb951
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-reset-the-filesystem-cache.md b/mdop/appv-v4/how-to-reset-the-filesystem-cache.md
index 7b8656bf7b..f419abda81 100644
--- a/mdop/appv-v4/how-to-reset-the-filesystem-cache.md
+++ b/mdop/appv-v4/how-to-reset-the-filesystem-cache.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7777259d-8c21-4c06-9384-9599b69f9828
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-run-a-reportserver.md b/mdop/appv-v4/how-to-run-a-reportserver.md
index 9776829bd2..989628b502 100644
--- a/mdop/appv-v4/how-to-run-a-reportserver.md
+++ b/mdop/appv-v4/how-to-run-a-reportserver.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 72a5419b-aa65-4e60-b23e-3751186b7aed
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-sequence-a-new-add-on-or-plug-in-application--app-v-46-sp1-.md b/mdop/appv-v4/how-to-sequence-a-new-add-on-or-plug-in-application--app-v-46-sp1-.md
index 03f65fe5e6..71f9b1e3fe 100644
--- a/mdop/appv-v4/how-to-sequence-a-new-add-on-or-plug-in-application--app-v-46-sp1-.md
+++ b/mdop/appv-v4/how-to-sequence-a-new-add-on-or-plug-in-application--app-v-46-sp1-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2c018215-66e5-4301-8481-159891a6b35b
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-sequence-a-new-application--app-v-46-.md b/mdop/appv-v4/how-to-sequence-a-new-application--app-v-46-.md
index 887c4f830f..d519abb772 100644
--- a/mdop/appv-v4/how-to-sequence-a-new-application--app-v-46-.md
+++ b/mdop/appv-v4/how-to-sequence-a-new-application--app-v-46-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f2c398c6-9200-4be3-b502-e00386fcd150
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-sequence-a-new-application-by-using-the-command-line.md b/mdop/appv-v4/how-to-sequence-a-new-application-by-using-the-command-line.md
index f49dd1afd4..493a114518 100644
--- a/mdop/appv-v4/how-to-sequence-a-new-application-by-using-the-command-line.md
+++ b/mdop/appv-v4/how-to-sequence-a-new-application-by-using-the-command-line.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c3b5c842-6a91-4d0a-9a22-c7b8d1aeb09a
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-sequence-a-new-application-package-using-the-command-line.md b/mdop/appv-v4/how-to-sequence-a-new-application-package-using-the-command-line.md
index 1d630165c9..3271202faa 100644
--- a/mdop/appv-v4/how-to-sequence-a-new-application-package-using-the-command-line.md
+++ b/mdop/appv-v4/how-to-sequence-a-new-application-package-using-the-command-line.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: de72912b-d9e7-45b5-a601-12528f1a4cac
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-sequence-a-new-application.md b/mdop/appv-v4/how-to-sequence-a-new-application.md
index c8207ab688..8897653dba 100644
--- a/mdop/appv-v4/how-to-sequence-a-new-application.md
+++ b/mdop/appv-v4/how-to-sequence-a-new-application.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e01e98cd-2378-478f-9739-f72c465bf79a
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-sequence-a-new-middleware-application--app-v-46-sp1-.md b/mdop/appv-v4/how-to-sequence-a-new-middleware-application--app-v-46-sp1-.md
index bfdc11f2aa..70ccc6f38a 100644
--- a/mdop/appv-v4/how-to-sequence-a-new-middleware-application--app-v-46-sp1-.md
+++ b/mdop/appv-v4/how-to-sequence-a-new-middleware-application--app-v-46-sp1-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 304045c2-5e5e-4c91-b59e-a91fdf2500fb
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-sequence-a-new-standard-application--app-v-46-sp1-.md b/mdop/appv-v4/how-to-sequence-a-new-standard-application--app-v-46-sp1-.md
index 626781d04d..91c5c8dae1 100644
--- a/mdop/appv-v4/how-to-sequence-a-new-standard-application--app-v-46-sp1-.md
+++ b/mdop/appv-v4/how-to-sequence-a-new-standard-application--app-v-46-sp1-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c4a2eb33-def8-4535-b93a-3d2de21ce29f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-sequence-an-application.md b/mdop/appv-v4/how-to-sequence-an-application.md
index 0c29bb034a..c920cb5280 100644
--- a/mdop/appv-v4/how-to-sequence-an-application.md
+++ b/mdop/appv-v4/how-to-sequence-an-application.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bd643dd6-dbf6-4469-bc70-c43ad9c69da9
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-set-up-a-concurrent-license-group.md b/mdop/appv-v4/how-to-set-up-a-concurrent-license-group.md
index d04fd52b99..6a4304627f 100644
--- a/mdop/appv-v4/how-to-set-up-a-concurrent-license-group.md
+++ b/mdop/appv-v4/how-to-set-up-a-concurrent-license-group.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 031abcf6-d8ed-49be-bddb-91b2c695d411
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-set-up-a-named-license-group.md b/mdop/appv-v4/how-to-set-up-a-named-license-group.md
index cc23565fe6..4077c745cd 100644
--- a/mdop/appv-v4/how-to-set-up-a-named-license-group.md
+++ b/mdop/appv-v4/how-to-set-up-a-named-license-group.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8ef6716c-0cb7-4706-ad3b-ac6f27b2e7ad
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-set-up-an-unlimited-license-group.md b/mdop/appv-v4/how-to-set-up-an-unlimited-license-group.md
index 5134961bd1..4da9b85aa9 100644
--- a/mdop/appv-v4/how-to-set-up-an-unlimited-license-group.md
+++ b/mdop/appv-v4/how-to-set-up-an-unlimited-license-group.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0c37c7b7-aba9-4c03-9e0e-94c966f874cf
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-set-up-and-enable-or-disable-authentication.md b/mdop/appv-v4/how-to-set-up-and-enable-or-disable-authentication.md
index 153b562d87..66c1796f86 100644
--- a/mdop/appv-v4/how-to-set-up-and-enable-or-disable-authentication.md
+++ b/mdop/appv-v4/how-to-set-up-and-enable-or-disable-authentication.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1e43d0c5-a467-4a8b-b656-93f75d7deb82
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-set-up-or-disable-application-licensing.md b/mdop/appv-v4/how-to-set-up-or-disable-application-licensing.md
index 887f07a118..9e7b1e615b 100644
--- a/mdop/appv-v4/how-to-set-up-or-disable-application-licensing.md
+++ b/mdop/appv-v4/how-to-set-up-or-disable-application-licensing.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7c00b531-ec41-4970-b0fc-d84225ce3bb2
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-set-up-or-disable-database-size.md b/mdop/appv-v4/how-to-set-up-or-disable-database-size.md
index 7c3406d783..f6db631033 100644
--- a/mdop/appv-v4/how-to-set-up-or-disable-database-size.md
+++ b/mdop/appv-v4/how-to-set-up-or-disable-database-size.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4abaf349-132d-4186-8873-a0e515593b93
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-set-up-or-disable-usage-reporting.md b/mdop/appv-v4/how-to-set-up-or-disable-usage-reporting.md
index 3f6ef2f351..1dc1ac12a1 100644
--- a/mdop/appv-v4/how-to-set-up-or-disable-usage-reporting.md
+++ b/mdop/appv-v4/how-to-set-up-or-disable-usage-reporting.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8587003a-128d-4b5d-ac70-5b9eddddd3dc
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-set-up-periodic-publishing-refresh.md b/mdop/appv-v4/how-to-set-up-periodic-publishing-refresh.md
index ca202df73c..4aaf75708f 100644
--- a/mdop/appv-v4/how-to-set-up-periodic-publishing-refresh.md
+++ b/mdop/appv-v4/how-to-set-up-periodic-publishing-refresh.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c358c765-cb88-4881-b4e7-0a2e87304870
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-set-up-publishing-refresh-on-login.md b/mdop/appv-v4/how-to-set-up-publishing-refresh-on-login.md
index cea01e5b73..0c4fc3c8e1 100644
--- a/mdop/appv-v4/how-to-set-up-publishing-refresh-on-login.md
+++ b/mdop/appv-v4/how-to-set-up-publishing-refresh-on-login.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 196448db-7645-4fd5-a854-ef6405b15db4
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-set-up-publishing-servers.md b/mdop/appv-v4/how-to-set-up-publishing-servers.md
index 4765f6ab56..08ed01a0ed 100644
--- a/mdop/appv-v4/how-to-set-up-publishing-servers.md
+++ b/mdop/appv-v4/how-to-set-up-publishing-servers.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2111f079-c202-4c49-b2a6-f4237068b2dc
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-uninstall-the-app-v-client.md b/mdop/appv-v4/how-to-uninstall-the-app-v-client.md
index aa1bd12d54..6a88f59a7d 100644
--- a/mdop/appv-v4/how-to-uninstall-the-app-v-client.md
+++ b/mdop/appv-v4/how-to-uninstall-the-app-v-client.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 07591270-9651-4bb5-a5b3-e0fc009bd9e2
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-upgrade-a-package-using-the-open-package-command.md b/mdop/appv-v4/how-to-upgrade-a-package-using-the-open-package-command.md
index 4bea07a0e4..a5bf655e68 100644
--- a/mdop/appv-v4/how-to-upgrade-a-package-using-the-open-package-command.md
+++ b/mdop/appv-v4/how-to-upgrade-a-package-using-the-open-package-command.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 67c10440-de8a-4547-a34b-f83206d0cc3b
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-upgrade-a-package.md b/mdop/appv-v4/how-to-upgrade-a-package.md
index f30f2b3781..5c88a1bf32 100644
--- a/mdop/appv-v4/how-to-upgrade-a-package.md
+++ b/mdop/appv-v4/how-to-upgrade-a-package.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 831c7556-6f6c-4b3a-aefb-26889094dc1a
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-upgrade-a-sequenced-application-package-using-the-command-line.md b/mdop/appv-v4/how-to-upgrade-a-sequenced-application-package-using-the-command-line.md
index 09b9ef807e..0ac6b50d84 100644
--- a/mdop/appv-v4/how-to-upgrade-a-sequenced-application-package-using-the-command-line.md
+++ b/mdop/appv-v4/how-to-upgrade-a-sequenced-application-package-using-the-command-line.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 682fac46-c71d-4731-831b-81bfd5032764
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-upgrade-a-sequenced-virtual-application-package.md b/mdop/appv-v4/how-to-upgrade-a-sequenced-virtual-application-package.md
index 0c229968ed..131400d266 100644
--- a/mdop/appv-v4/how-to-upgrade-a-sequenced-virtual-application-package.md
+++ b/mdop/appv-v4/how-to-upgrade-a-sequenced-virtual-application-package.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ffa989f3-6621-4c59-9599-e3c3b3332f67
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-upgrade-a-virtual-application-by-using-the-command-line.md b/mdop/appv-v4/how-to-upgrade-a-virtual-application-by-using-the-command-line.md
index 4f1adedf14..8557a608b7 100644
--- a/mdop/appv-v4/how-to-upgrade-a-virtual-application-by-using-the-command-line.md
+++ b/mdop/appv-v4/how-to-upgrade-a-virtual-application-by-using-the-command-line.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 83c97767-6ea1-42aa-b411-ccc9fa61cf81
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-upgrade-a-virtual-application-package--app-v-46-.md b/mdop/appv-v4/how-to-upgrade-a-virtual-application-package--app-v-46-.md
index 7f4721a9e4..043776bf7d 100644
--- a/mdop/appv-v4/how-to-upgrade-a-virtual-application-package--app-v-46-.md
+++ b/mdop/appv-v4/how-to-upgrade-a-virtual-application-package--app-v-46-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3566227e-f3dc-4c32-af1f-e0211588118c
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-upgrade-an-existing-virtual-application.md b/mdop/appv-v4/how-to-upgrade-an-existing-virtual-application.md
index 787c679d5e..f56ab1c22a 100644
--- a/mdop/appv-v4/how-to-upgrade-an-existing-virtual-application.md
+++ b/mdop/appv-v4/how-to-upgrade-an-existing-virtual-application.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ec531576-2423-4c2c-9b9f-da74174a6858
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-upgrade-the-application-virtualization-client.md b/mdop/appv-v4/how-to-upgrade-the-application-virtualization-client.md
index 15ecbedb36..2441e92fe0 100644
--- a/mdop/appv-v4/how-to-upgrade-the-application-virtualization-client.md
+++ b/mdop/appv-v4/how-to-upgrade-the-application-virtualization-client.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2a75d8b5-da88-456c-85bb-f5bd3d470f7f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-upgrade-the-application-virtualization-sequencer.md b/mdop/appv-v4/how-to-upgrade-the-application-virtualization-sequencer.md
index 5a9dfc32f5..2842d352f7 100644
--- a/mdop/appv-v4/how-to-upgrade-the-application-virtualization-sequencer.md
+++ b/mdop/appv-v4/how-to-upgrade-the-application-virtualization-sequencer.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7f85f140-5034-4227-85ef-81f205e722ef
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-upgrade-the-servers-and-system-components.md b/mdop/appv-v4/how-to-upgrade-the-servers-and-system-components.md
index c8e13c8bf9..924c233ee0 100644
--- a/mdop/appv-v4/how-to-upgrade-the-servers-and-system-components.md
+++ b/mdop/appv-v4/how-to-upgrade-the-servers-and-system-components.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7d8374fe-5897-452e-923e-556a854b2024
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-use-dynamic-suite-composition.md b/mdop/appv-v4/how-to-use-dynamic-suite-composition.md
index 61f69a8ddb..e6841ce254 100644
--- a/mdop/appv-v4/how-to-use-dynamic-suite-composition.md
+++ b/mdop/appv-v4/how-to-use-dynamic-suite-composition.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 24147feb-a0a8-4791-a8e5-cbe5fe13c762
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-use-the-cache-space-management-feature.md b/mdop/appv-v4/how-to-use-the-cache-space-management-feature.md
index 76e04ddf2f..a457af6266 100644
--- a/mdop/appv-v4/how-to-use-the-cache-space-management-feature.md
+++ b/mdop/appv-v4/how-to-use-the-cache-space-management-feature.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 60965660-c015-46a8-88ac-54cbc050fe33
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-use-the-desktop-notification-area-for-application-virtualization-client-management.md b/mdop/appv-v4/how-to-use-the-desktop-notification-area-for-application-virtualization-client-management.md
index 6f36531585..a8943af3a2 100644
--- a/mdop/appv-v4/how-to-use-the-desktop-notification-area-for-application-virtualization-client-management.md
+++ b/mdop/appv-v4/how-to-use-the-desktop-notification-area-for-application-virtualization-client-management.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 75b2e636-7669-4e1e-8368-8b9fca567a84
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-use-the-differential-sft-file.md b/mdop/appv-v4/how-to-use-the-differential-sft-file.md
index bb241b99c4..963df8c7b7 100644
--- a/mdop/appv-v4/how-to-use-the-differential-sft-file.md
+++ b/mdop/appv-v4/how-to-use-the-differential-sft-file.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 607e30fd-2f0e-4e2f-b669-0b3f010aebb0
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/how-to-work-offline-or-online-with-application-virtualization.md b/mdop/appv-v4/how-to-work-offline-or-online-with-application-virtualization.md
index 0c4b2711ea..06576c4ec4 100644
--- a/mdop/appv-v4/how-to-work-offline-or-online-with-application-virtualization.md
+++ b/mdop/appv-v4/how-to-work-offline-or-online-with-application-virtualization.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: aa532b37-8a00-4db4-9b51-e1e8354b2495
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/improving-security-during-app-v-sequencing.md b/mdop/appv-v4/improving-security-during-app-v-sequencing.md
index 2b6ac85fe7..2336ea5569 100644
--- a/mdop/appv-v4/improving-security-during-app-v-sequencing.md
+++ b/mdop/appv-v4/improving-security-during-app-v-sequencing.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f30206dd-5749-4a27-bbaf-61fc21b9c663
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/incompatible-installer-dialog-box--app-v-46-sp1-.md b/mdop/appv-v4/incompatible-installer-dialog-box--app-v-46-sp1-.md
index a857bd41a4..fd19796eb2 100644
--- a/mdop/appv-v4/incompatible-installer-dialog-box--app-v-46-sp1-.md
+++ b/mdop/appv-v4/incompatible-installer-dialog-box--app-v-46-sp1-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 45d465b1-ee49-4274-8234-71dd031a07b6
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/installation-files-page.md b/mdop/appv-v4/installation-files-page.md
index 20de615b7d..0825e6eddc 100644
--- a/mdop/appv-v4/installation-files-page.md
+++ b/mdop/appv-v4/installation-files-page.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b0aad26f-b143-4f09-87a1-9f016a23cb62
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/installation-page--learn-more-.md b/mdop/appv-v4/installation-page--learn-more-.md
index e6c8d1d84b..2979a1cb34 100644
--- a/mdop/appv-v4/installation-page--learn-more-.md
+++ b/mdop/appv-v4/installation-page--learn-more-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a53b8330-dfc3-4540-b147-7c10529f403a
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/installation-report-page--learn-more-.md b/mdop/appv-v4/installation-report-page--learn-more-.md
index c84aa0f77a..b35a3f1345 100644
--- a/mdop/appv-v4/installation-report-page--learn-more-.md
+++ b/mdop/appv-v4/installation-report-page--learn-more-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 499cf4db-a39c-4dcf-b1cf-85fd7da11701
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/installing-app-v-management-server-or-streaming-server-securely.md b/mdop/appv-v4/installing-app-v-management-server-or-streaming-server-securely.md
index 98b91fafd4..c7ef697fc2 100644
--- a/mdop/appv-v4/installing-app-v-management-server-or-streaming-server-securely.md
+++ b/mdop/appv-v4/installing-app-v-management-server-or-streaming-server-securely.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d2a51a81-a80f-427c-a727-611e1eb74f02
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/internet-facing-considerations-for-app-v-clients.md b/mdop/appv-v4/internet-facing-considerations-for-app-v-clients.md
index b9d55dbf3c..9821a7ba66 100644
--- a/mdop/appv-v4/internet-facing-considerations-for-app-v-clients.md
+++ b/mdop/appv-v4/internet-facing-considerations-for-app-v-clients.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 261acde3-7112-492e-8b11-934ae45adc5f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/internet-facing-server-scenarios-for-perimeter-networks.md b/mdop/appv-v4/internet-facing-server-scenarios-for-perimeter-networks.md
index 53ac72fe47..5d2b394c68 100644
--- a/mdop/appv-v4/internet-facing-server-scenarios-for-perimeter-networks.md
+++ b/mdop/appv-v4/internet-facing-server-scenarios-for-perimeter-networks.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8a4da6e6-82c7-49e5-b9b1-1666cba02f65
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/introduction-to-the-application-virtualization-security-guide.md b/mdop/appv-v4/introduction-to-the-application-virtualization-security-guide.md
index 3377faf914..b621871cef 100644
--- a/mdop/appv-v4/introduction-to-the-application-virtualization-security-guide.md
+++ b/mdop/appv-v4/introduction-to-the-application-virtualization-security-guide.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 50e1d220-7a95-45b8-933b-3dadddebe26f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/load-app.md b/mdop/appv-v4/load-app.md
index 04554a2477..8b07665623 100644
--- a/mdop/appv-v4/load-app.md
+++ b/mdop/appv-v4/load-app.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7b727d0c-5423-419d-92ef-7ebbc6343e79
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/load-package.md b/mdop/appv-v4/load-package.md
index b466aa1e10..025e980fda 100644
--- a/mdop/appv-v4/load-package.md
+++ b/mdop/appv-v4/load-package.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: eb19116d-e5d0-445c-b2f0-3116a09384d7
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/lock-app.md b/mdop/appv-v4/lock-app.md
index ab1cbe6d65..1032c581d6 100644
--- a/mdop/appv-v4/lock-app.md
+++ b/mdop/appv-v4/lock-app.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 30673433-4364-499f-8116-cb135fe2716f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/log-file-for-the-application-virtualization-client.md b/mdop/appv-v4/log-file-for-the-application-virtualization-client.md
index 7e6cab69e0..1dec527a68 100644
--- a/mdop/appv-v4/log-file-for-the-application-virtualization-client.md
+++ b/mdop/appv-v4/log-file-for-the-application-virtualization-client.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ac4b3e4a-a220-4c06-bd60-af7dc318b3a9
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/log-files-for-the-application-virtualization-sequencer.md b/mdop/appv-v4/log-files-for-the-application-virtualization-sequencer.md
index 3c484c5336..fd8062d829 100644
--- a/mdop/appv-v4/log-files-for-the-application-virtualization-sequencer.md
+++ b/mdop/appv-v4/log-files-for-the-application-virtualization-sequencer.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1a296544-eab4-46f9-82ce-3136f8b578af
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-1-privacy-statement.md b/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-1-privacy-statement.md
index 8b053caac1..fe711b15c3 100644
--- a/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-1-privacy-statement.md
+++ b/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-1-privacy-statement.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e82c57ea-885d-4761-96db-4d80b1c3e1ae
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-2-privacy-statement.md b/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-2-privacy-statement.md
index e22f6404e8..55db6ca874 100644
--- a/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-2-privacy-statement.md
+++ b/mdop/appv-v4/microsoft-application-virtualization-46-service-pack-2-privacy-statement.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4ee569b2-7711-475a-9f17-70247f00b1b7
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/microsoft-application-virtualization-client-management-help.md b/mdop/appv-v4/microsoft-application-virtualization-client-management-help.md
index 7d3ac53771..c0c55aa648 100644
--- a/mdop/appv-v4/microsoft-application-virtualization-client-management-help.md
+++ b/mdop/appv-v4/microsoft-application-virtualization-client-management-help.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 449eebda-70eb-48b7-855a-db965a680923
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/microsoft-application-virtualization-getting-started-guide.md b/mdop/appv-v4/microsoft-application-virtualization-getting-started-guide.md
index e80f51864a..6f19e8f359 100644
--- a/mdop/appv-v4/microsoft-application-virtualization-getting-started-guide.md
+++ b/mdop/appv-v4/microsoft-application-virtualization-getting-started-guide.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6cd9a212-e270-4d7c-bd0a-bd6af9a5c3ba
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes-45-sp1.md b/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes-45-sp1.md
index 6e2ac2c22c..2add0e46ac 100644
--- a/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes-45-sp1.md
+++ b/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes-45-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5d6b11ea-7b87-4084-9a7c-0d831f247aa3
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes.md b/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes.md
index f44ba1b0d9..c97f47acca 100644
--- a/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes.md
+++ b/mdop/appv-v4/microsoft-application-virtualization-management-system-release-notes.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e1a4d5ee-53c7-4b48-814c-a34ce0e698dc
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/microsoft-application-virtualization-security-guide.md b/mdop/appv-v4/microsoft-application-virtualization-security-guide.md
index 001edd2ecd..8b8cf618b5 100644
--- a/mdop/appv-v4/microsoft-application-virtualization-security-guide.md
+++ b/mdop/appv-v4/microsoft-application-virtualization-security-guide.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5e794316-cc4f-459e-90ef-79fc9841ba4e
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/monitoring-application-virtualization-servers.md b/mdop/appv-v4/monitoring-application-virtualization-servers.md
index 86d245cdb9..c778742dcd 100644
--- a/mdop/appv-v4/monitoring-application-virtualization-servers.md
+++ b/mdop/appv-v4/monitoring-application-virtualization-servers.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d84355ae-4fe4-41d9-ac3a-3eaa32d9a61f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/online-help-for-application-virtualization.md b/mdop/appv-v4/online-help-for-application-virtualization.md
index 78f73ff686..91d7d2784f 100644
--- a/mdop/appv-v4/online-help-for-application-virtualization.md
+++ b/mdop/appv-v4/online-help-for-application-virtualization.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 261ede48-976f-473c-84bc-452577efdcdf
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/open-package-wizard---appv-46-sp1-.md b/mdop/appv-v4/open-package-wizard---appv-46-sp1-.md
index 1905d978d9..0bf23f9812 100644
--- a/mdop/appv-v4/open-package-wizard---appv-46-sp1-.md
+++ b/mdop/appv-v4/open-package-wizard---appv-46-sp1-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 26bdef59-2ea3-4e30-9095-0ee0d0085b2d
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/operations-guide-for-the-application-virtualization-system.md b/mdop/appv-v4/operations-guide-for-the-application-virtualization-system.md
index 9c61fc7e12..fa836b09a6 100644
--- a/mdop/appv-v4/operations-guide-for-the-application-virtualization-system.md
+++ b/mdop/appv-v4/operations-guide-for-the-application-virtualization-system.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 686f2b75-7fba-4410-89b2-a539984b6ef2
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/osd-file-elements.md b/mdop/appv-v4/osd-file-elements.md
index 1d0283818c..96422a7568 100644
--- a/mdop/appv-v4/osd-file-elements.md
+++ b/mdop/appv-v4/osd-file-elements.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8211b562-7549-4331-8321-144f52574e99
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/osd-tab-keep.md b/mdop/appv-v4/osd-tab-keep.md
index ccdcfd3633..dd06e42a12 100644
--- a/mdop/appv-v4/osd-tab-keep.md
+++ b/mdop/appv-v4/osd-tab-keep.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e66f1384-1753-4216-b9ee-77e99af93c74
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/oversized-package-dialog-box--app-v-46-sp1-.md b/mdop/appv-v4/oversized-package-dialog-box--app-v-46-sp1-.md
index b29db6ac31..6a802d1959 100644
--- a/mdop/appv-v4/oversized-package-dialog-box--app-v-46-sp1-.md
+++ b/mdop/appv-v4/oversized-package-dialog-box--app-v-46-sp1-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8973a493-6509-4d52-afb6-a9f47d1c5c26
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/overview-of-application-virtualization.md b/mdop/appv-v4/overview-of-application-virtualization.md
index 022d6b07b1..e5ebe91ee2 100644
--- a/mdop/appv-v4/overview-of-application-virtualization.md
+++ b/mdop/appv-v4/overview-of-application-virtualization.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 80545ef4-cf4c-420c-88d6-48e9f226051f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/overview-of-the-application-virtualization-system-components.md b/mdop/appv-v4/overview-of-the-application-virtualization-system-components.md
index eb607d81e1..d0436a2494 100644
--- a/mdop/appv-v4/overview-of-the-application-virtualization-system-components.md
+++ b/mdop/appv-v4/overview-of-the-application-virtualization-system-components.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 75d88ef7-44d8-4fa7-b7f5-9153f37e570d
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/package-name-page---learn-more-.md b/mdop/appv-v4/package-name-page---learn-more-.md
index 3295f947df..5a371c35ca 100644
--- a/mdop/appv-v4/package-name-page---learn-more-.md
+++ b/mdop/appv-v4/package-name-page---learn-more-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ee75b8f0-bd9d-4460-a256-016ff97c2386
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/package-name-page--app-v-46-sp1.md b/mdop/appv-v4/package-name-page--app-v-46-sp1.md
index a8989e3452..18593c1fbe 100644
--- a/mdop/appv-v4/package-name-page--app-v-46-sp1.md
+++ b/mdop/appv-v4/package-name-page--app-v-46-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1cea36b7-737d-4c5e-9294-5feba02a3e7d
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/package-results-pane-columns.md b/mdop/appv-v4/package-results-pane-columns.md
index bc11c1fabe..65f4510c3f 100644
--- a/mdop/appv-v4/package-results-pane-columns.md
+++ b/mdop/appv-v4/package-results-pane-columns.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4ed3a06a-656d-497a-b62d-21684396e2b0
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/package-results-pane.md b/mdop/appv-v4/package-results-pane.md
index 8b8dab1add..ed92ee0b14 100644
--- a/mdop/appv-v4/package-results-pane.md
+++ b/mdop/appv-v4/package-results-pane.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 07b7f737-f26f-4feb-88aa-3d8009c5622d
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/packages-node.md b/mdop/appv-v4/packages-node.md
index a8bcf5560e..b293c3d8b7 100644
--- a/mdop/appv-v4/packages-node.md
+++ b/mdop/appv-v4/packages-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3465168c-012f-4e9f-905d-611418d2975a
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/packaging-method--learn-more-.md b/mdop/appv-v4/packaging-method--learn-more-.md
index 193e825c51..8fd5449b82 100644
--- a/mdop/appv-v4/packaging-method--learn-more-.md
+++ b/mdop/appv-v4/packaging-method--learn-more-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3975a640-1ffd-4b4c-95fd-608469f4c205
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/packaging-method-page--learn-more-.md b/mdop/appv-v4/packaging-method-page--learn-more-.md
index a009435f20..41103433f7 100644
--- a/mdop/appv-v4/packaging-method-page--learn-more-.md
+++ b/mdop/appv-v4/packaging-method-page--learn-more-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f405a293-bcd4-48a1-b4d9-b5e4cf73c5f4
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/parse-items-tab-keep.md b/mdop/appv-v4/parse-items-tab-keep.md
index e2bd550ab2..e4f0a9b72f 100644
--- a/mdop/appv-v4/parse-items-tab-keep.md
+++ b/mdop/appv-v4/parse-items-tab-keep.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bdf3fe0d-404a-4745-af52-f415fa321564
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/planning-and-deployment-guide-for-the-application-virtualization-system.md b/mdop/appv-v4/planning-and-deployment-guide-for-the-application-virtualization-system.md
index 474424a086..e1cbb3ac00 100644
--- a/mdop/appv-v4/planning-and-deployment-guide-for-the-application-virtualization-system.md
+++ b/mdop/appv-v4/planning-and-deployment-guide-for-the-application-virtualization-system.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6c012e33-9ac6-4cd8-84ff-54f40973833f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/planning-for-application-virtualization-client-deployment.md b/mdop/appv-v4/planning-for-application-virtualization-client-deployment.md
index f40e560fdf..4b56a86f3a 100644
--- a/mdop/appv-v4/planning-for-application-virtualization-client-deployment.md
+++ b/mdop/appv-v4/planning-for-application-virtualization-client-deployment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a352f80f-f0f9-4fbf-ac10-24c510b2d6be
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/planning-for-application-virtualization-system-deployment.md b/mdop/appv-v4/planning-for-application-virtualization-system-deployment.md
index acb7830906..7ac4ec4db2 100644
--- a/mdop/appv-v4/planning-for-application-virtualization-system-deployment.md
+++ b/mdop/appv-v4/planning-for-application-virtualization-system-deployment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8215269f-c083-468a-bf0b-886b0d2dd69e
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/planning-for-client-security.md b/mdop/appv-v4/planning-for-client-security.md
index 8b6457f699..e47a871c34 100644
--- a/mdop/appv-v4/planning-for-client-security.md
+++ b/mdop/appv-v4/planning-for-client-security.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4840a60f-4c91-489c-ad0b-6671882abf9b
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/planning-for-migration-from-previous-versions.md b/mdop/appv-v4/planning-for-migration-from-previous-versions.md
index 80ed54ee4b..c324bac3d4 100644
--- a/mdop/appv-v4/planning-for-migration-from-previous-versions.md
+++ b/mdop/appv-v4/planning-for-migration-from-previous-versions.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 62967bf1-542f-41b0-838f-c62f3430ac73
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/planning-for-security-and-protection.md b/mdop/appv-v4/planning-for-security-and-protection.md
index 92ff750703..dd42746a18 100644
--- a/mdop/appv-v4/planning-for-security-and-protection.md
+++ b/mdop/appv-v4/planning-for-security-and-protection.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d0e2ef81-c197-4020-ad85-8d66fe5c178f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/planning-for-sequencer-security.md b/mdop/appv-v4/planning-for-sequencer-security.md
index 9e8655200f..63b4815f06 100644
--- a/mdop/appv-v4/planning-for-sequencer-security.md
+++ b/mdop/appv-v4/planning-for-sequencer-security.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8043cb02-476d-4c28-a850-903a8ac5b2d3
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/planning-for-server-security.md b/mdop/appv-v4/planning-for-server-security.md
index 31f57ecb6d..289d44d508 100644
--- a/mdop/appv-v4/planning-for-server-security.md
+++ b/mdop/appv-v4/planning-for-server-security.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c7cd8227-b359-41e7-a8ae-d0d5718a76a2
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/planning-the-application-virtualization-sequencer-implementation.md b/mdop/appv-v4/planning-the-application-virtualization-sequencer-implementation.md
index 8825c4306e..f330eaca98 100644
--- a/mdop/appv-v4/planning-the-application-virtualization-sequencer-implementation.md
+++ b/mdop/appv-v4/planning-the-application-virtualization-sequencer-implementation.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 052f32fe-ad13-4921-a8ce-4a657eb2b2bf
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/planning-your-streaming-solution-in-an-application-virtualization-server-based-implementation.md b/mdop/appv-v4/planning-your-streaming-solution-in-an-application-virtualization-server-based-implementation.md
index 2fa2f11deb..6a03d508c0 100644
--- a/mdop/appv-v4/planning-your-streaming-solution-in-an-application-virtualization-server-based-implementation.md
+++ b/mdop/appv-v4/planning-your-streaming-solution-in-an-application-virtualization-server-based-implementation.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3a57306e-5c54-4fde-8593-fe3b788f18d3
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/planning-your-streaming-solution-in-an-electronic-software-distribution-implementation.md b/mdop/appv-v4/planning-your-streaming-solution-in-an-electronic-software-distribution-implementation.md
index 885a566c91..f0e61dd69e 100644
--- a/mdop/appv-v4/planning-your-streaming-solution-in-an-electronic-software-distribution-implementation.md
+++ b/mdop/appv-v4/planning-your-streaming-solution-in-an-electronic-software-distribution-implementation.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bc18772a-f169-486f-adb1-7af1a31845aa
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/prepare-computer-page--learn-more-.md b/mdop/appv-v4/prepare-computer-page--learn-more-.md
index 508985a3fb..ae4493a4e7 100644
--- a/mdop/appv-v4/prepare-computer-page--learn-more-.md
+++ b/mdop/appv-v4/prepare-computer-page--learn-more-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a401ce3d-b8f7-4b3f-9be9-ecf6d8b544fd
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/properties-tab-keep.md b/mdop/appv-v4/properties-tab-keep.md
index 8f068996f6..3631579f1f 100644
--- a/mdop/appv-v4/properties-tab-keep.md
+++ b/mdop/appv-v4/properties-tab-keep.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6ff20678-6766-4f0d-8bbb-f19b224682a1
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/provider-policies-node.md b/mdop/appv-v4/provider-policies-node.md
index 68130e6575..bbe803ac9f 100644
--- a/mdop/appv-v4/provider-policies-node.md
+++ b/mdop/appv-v4/provider-policies-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 89b47076-7732-4128-93cc-8e6d5b671c8e
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/provider-policies-results-pane-columns.md b/mdop/appv-v4/provider-policies-results-pane-columns.md
index d570b23283..984d407ee3 100644
--- a/mdop/appv-v4/provider-policies-results-pane-columns.md
+++ b/mdop/appv-v4/provider-policies-results-pane-columns.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f9456f17-3106-4e5a-9a8c-df3af66986e1
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/provider-policies-results-pane.md b/mdop/appv-v4/provider-policies-results-pane.md
index da6df828bd..efb2984428 100644
--- a/mdop/appv-v4/provider-policies-results-pane.md
+++ b/mdop/appv-v4/provider-policies-results-pane.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 17ea0836-bfb5-4966-8778-155444d81e64
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/publish-app.md b/mdop/appv-v4/publish-app.md
index cc0c253c2f..3248daad68 100644
--- a/mdop/appv-v4/publish-app.md
+++ b/mdop/appv-v4/publish-app.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f25f06a8-ca23-435b-a0c2-16a5f39b6b97
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/publish-package.md b/mdop/appv-v4/publish-package.md
index f0fb1da684..facdb61e5c 100644
--- a/mdop/appv-v4/publish-package.md
+++ b/mdop/appv-v4/publish-package.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a33e72dd-194f-4283-8e99-4584ab13de53
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/publishing-servers-node.md b/mdop/appv-v4/publishing-servers-node.md
index 1c6ffd8268..980c07416d 100644
--- a/mdop/appv-v4/publishing-servers-node.md
+++ b/mdop/appv-v4/publishing-servers-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b5823c6c-15bc-4e8d-aeeb-acc366ffedd1
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/publishing-servers-results-pane-columns.md b/mdop/appv-v4/publishing-servers-results-pane-columns.md
index 18c1671c57..42862c4a61 100644
--- a/mdop/appv-v4/publishing-servers-results-pane-columns.md
+++ b/mdop/appv-v4/publishing-servers-results-pane-columns.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ad875715-50b3-4881-a6b3-586238d12527
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/publishing-servers-results-pane.md b/mdop/appv-v4/publishing-servers-results-pane.md
index e812805dd8..27745a94ba 100644
--- a/mdop/appv-v4/publishing-servers-results-pane.md
+++ b/mdop/appv-v4/publishing-servers-results-pane.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ee0662e8-9623-4a7c-b6dc-657fa3f56161
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/publishing-virtual-applications-using-application-virtualization-management-servers.md b/mdop/appv-v4/publishing-virtual-applications-using-application-virtualization-management-servers.md
index f2b259d4e6..53570b3732 100644
--- a/mdop/appv-v4/publishing-virtual-applications-using-application-virtualization-management-servers.md
+++ b/mdop/appv-v4/publishing-virtual-applications-using-application-virtualization-management-servers.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f3d79284-3f82-4ca3-b741-1a80b61490da
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/publishing-virtual-applications-using-electronic-software-distribution.md b/mdop/appv-v4/publishing-virtual-applications-using-electronic-software-distribution.md
index 744cdd05d9..5a56209bc5 100644
--- a/mdop/appv-v4/publishing-virtual-applications-using-electronic-software-distribution.md
+++ b/mdop/appv-v4/publishing-virtual-applications-using-electronic-software-distribution.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 295fbc1d-ed1c-43b4-aeee-0df384d4e630
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/query-obj.md b/mdop/appv-v4/query-obj.md
index 3c9adf095a..a137e1cbda 100644
--- a/mdop/appv-v4/query-obj.md
+++ b/mdop/appv-v4/query-obj.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 55abf0d1-c779-4172-8357-552ab010933b
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/refresh-server.md b/mdop/appv-v4/refresh-server.md
index ae5e986c4f..8cbd8928df 100644
--- a/mdop/appv-v4/refresh-server.md
+++ b/mdop/appv-v4/refresh-server.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 232df842-a160-46cd-b60b-f464cd9a0086
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/repair-app.md b/mdop/appv-v4/repair-app.md
index 65bc1db344..2b9e6f53f2 100644
--- a/mdop/appv-v4/repair-app.md
+++ b/mdop/appv-v4/repair-app.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 892b556b-612d-4531-890e-4cfc2ac88d9f
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/reports-node.md b/mdop/appv-v4/reports-node.md
index c6969fb115..d691eb3d1c 100644
--- a/mdop/appv-v4/reports-node.md
+++ b/mdop/appv-v4/reports-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b7fdc52d-f112-4a65-af25-134398810e9b
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/reports-results-pane-columns.md b/mdop/appv-v4/reports-results-pane-columns.md
index 7c6bc3a0c3..a7abb0ae55 100644
--- a/mdop/appv-v4/reports-results-pane-columns.md
+++ b/mdop/appv-v4/reports-results-pane-columns.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 907360ca-6a55-4e42-88d2-db1a24cd2a28
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/reports-results-pane.md b/mdop/appv-v4/reports-results-pane.md
index 57a5bb2b3e..77e23a88cc 100644
--- a/mdop/appv-v4/reports-results-pane.md
+++ b/mdop/appv-v4/reports-results-pane.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 66beac62-fa55-4ab9-ac19-b9e1772e2d20
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/restart-task-failure-dialog-box--app-v-46-sp1-.md b/mdop/appv-v4/restart-task-failure-dialog-box--app-v-46-sp1-.md
index 2ecb94c6fd..2a2fbe0e8d 100644
--- a/mdop/appv-v4/restart-task-failure-dialog-box--app-v-46-sp1-.md
+++ b/mdop/appv-v4/restart-task-failure-dialog-box--app-v-46-sp1-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1933fe71-8aa0-4e43-b6f7-060050001edd
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/run-each-program-page-app-v-46-sp1.md b/mdop/appv-v4/run-each-program-page-app-v-46-sp1.md
index 7fc9be9f19..2a93fe0947 100644
--- a/mdop/appv-v4/run-each-program-page-app-v-46-sp1.md
+++ b/mdop/appv-v4/run-each-program-page-app-v-46-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4f09a64e-9545-47aa-bc43-fda0089f7adb
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/security-and-protection-overview.md b/mdop/appv-v4/security-and-protection-overview.md
index 6e0554598b..99c0632836 100644
--- a/mdop/appv-v4/security-and-protection-overview.md
+++ b/mdop/appv-v4/security-and-protection-overview.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a43e1c53-7936-4d48-a110-0be26c8e9d97
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/select-files-page.md b/mdop/appv-v4/select-files-page.md
index d4bfc181fb..f68466b525 100644
--- a/mdop/appv-v4/select-files-page.md
+++ b/mdop/appv-v4/select-files-page.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6d1524ca-6306-4a28-b65f-3ded9d487e75
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/select-guidance-page--package-accelerators-.md b/mdop/appv-v4/select-guidance-page--package-accelerators-.md
index 680d508314..387de4bfaf 100644
--- a/mdop/appv-v4/select-guidance-page--package-accelerators-.md
+++ b/mdop/appv-v4/select-guidance-page--package-accelerators-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 608b8823-6eac-40c0-a6dc-2f0bfc0d42a1
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/select-installation-files-page-app-v-46-sp1.md b/mdop/appv-v4/select-installation-files-page-app-v-46-sp1.md
index 0a26f2e4c6..08bd4bf267 100644
--- a/mdop/appv-v4/select-installation-files-page-app-v-46-sp1.md
+++ b/mdop/appv-v4/select-installation-files-page-app-v-46-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4c8cd49e-ba39-4918-9863-5b3c315d14a5
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/select-installer-page--learn-more-.md b/mdop/appv-v4/select-installer-page--learn-more-.md
index ade2d58d1f..6a57a0227a 100644
--- a/mdop/appv-v4/select-installer-page--learn-more-.md
+++ b/mdop/appv-v4/select-installer-page--learn-more-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: da05e756-d23e-4557-8ff6-313d695a78a1
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/select-package--learn-more--page.md b/mdop/appv-v4/select-package--learn-more--page.md
index 2dac258cff..24f631fd1d 100644
--- a/mdop/appv-v4/select-package--learn-more--page.md
+++ b/mdop/appv-v4/select-package--learn-more--page.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0b3d4ca4-ff65-4aa5-87a9-61cbe2ffc8be
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/select-package-accelerator--learn-more--page.md b/mdop/appv-v4/select-package-accelerator--learn-more--page.md
index 887f03367c..18ce0df5a2 100644
--- a/mdop/appv-v4/select-package-accelerator--learn-more--page.md
+++ b/mdop/appv-v4/select-package-accelerator--learn-more--page.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2db51514-8695-4b5e-b3e5-1e96e3ee4cc7
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/select-package-accelerator-page.md b/mdop/appv-v4/select-package-accelerator-page.md
index e455a69f63..b1b04254d7 100644
--- a/mdop/appv-v4/select-package-accelerator-page.md
+++ b/mdop/appv-v4/select-package-accelerator-page.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 865c2702-4dfd-41ae-8cfc-3514d5f41f76
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/select-primary-page--learn-more-.md b/mdop/appv-v4/select-primary-page--learn-more-.md
index 38a6d0748c..cf6a9e41a9 100644
--- a/mdop/appv-v4/select-primary-page--learn-more-.md
+++ b/mdop/appv-v4/select-primary-page--learn-more-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 17c779da-f683-4967-b136-94fe65373c1b
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/select-task-page--learn-more-.md b/mdop/appv-v4/select-task-page--learn-more-.md
index 18b296a24e..60b28a83fa 100644
--- a/mdop/appv-v4/select-task-page--learn-more-.md
+++ b/mdop/appv-v4/select-task-page--learn-more-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 09534c40-bf6c-4b3f-be9a-8624965c9c18
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/sequencer-command-line-error-codes.md b/mdop/appv-v4/sequencer-command-line-error-codes.md
index 3f60bfec5b..73d55eebce 100644
--- a/mdop/appv-v4/sequencer-command-line-error-codes.md
+++ b/mdop/appv-v4/sequencer-command-line-error-codes.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3d491314-4923-45fd-9839-c541c5e620bd
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/sequencer-command-line-parameters.md b/mdop/appv-v4/sequencer-command-line-parameters.md
index 7731e1d5ea..11ecdb06c4 100644
--- a/mdop/appv-v4/sequencer-command-line-parameters.md
+++ b/mdop/appv-v4/sequencer-command-line-parameters.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 28fb875a-c302-4d95-b2e0-8dc0c5dbb0f8
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/sequencer-console.md b/mdop/appv-v4/sequencer-console.md
index 49d86a316d..661a880497 100644
--- a/mdop/appv-v4/sequencer-console.md
+++ b/mdop/appv-v4/sequencer-console.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 69e0202d-be2c-41cc-99cb-2a08a034e804
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/sequencer-dialog-boxes.md b/mdop/appv-v4/sequencer-dialog-boxes.md
index 2f48597aa3..deba694e0e 100644
--- a/mdop/appv-v4/sequencer-dialog-boxes.md
+++ b/mdop/appv-v4/sequencer-dialog-boxes.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f660d56b-0244-4167-b077-96ad482e6b36
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/sequencer-hardware-and-software-requirements.md b/mdop/appv-v4/sequencer-hardware-and-software-requirements.md
index bc08faf80a..40fe62a7a2 100644
--- a/mdop/appv-v4/sequencer-hardware-and-software-requirements.md
+++ b/mdop/appv-v4/sequencer-hardware-and-software-requirements.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 36084e12-831d-452f-a4a4-45f07f9ce471
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/sequencer-wizard---package-accelerator--appv-46-sp1-.md b/mdop/appv-v4/sequencer-wizard---package-accelerator--appv-46-sp1-.md
index 1ef34e3837..6da8f78d45 100644
--- a/mdop/appv-v4/sequencer-wizard---package-accelerator--appv-46-sp1-.md
+++ b/mdop/appv-v4/sequencer-wizard---package-accelerator--appv-46-sp1-.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1f75f5ba-0707-48fb-b0b8-ba94a5159e36
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/sequencing-wizard.md b/mdop/appv-v4/sequencing-wizard.md
index 6d6e869a11..4db54af6bc 100644
--- a/mdop/appv-v4/sequencing-wizard.md
+++ b/mdop/appv-v4/sequencing-wizard.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 81e2f4fa-b06e-4cbe-aeb8-6ceb8f0543a5
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-groups-node.md b/mdop/appv-v4/server-groups-node.md
index 991741f07e..95137d7733 100644
--- a/mdop/appv-v4/server-groups-node.md
+++ b/mdop/appv-v4/server-groups-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6b2ed086-9100-47d0-be7f-0c5fb4fa55c6
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-groups-results-pane-columns.md b/mdop/appv-v4/server-groups-results-pane-columns.md
index 3777434491..9a40ac8e31 100644
--- a/mdop/appv-v4/server-groups-results-pane-columns.md
+++ b/mdop/appv-v4/server-groups-results-pane-columns.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e91b1b9b-e58c-4274-ad18-8b157936b9be
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-groups-results-pane.md b/mdop/appv-v4/server-groups-results-pane.md
index 43aca80bf7..e8558e68c8 100644
--- a/mdop/appv-v4/server-groups-results-pane.md
+++ b/mdop/appv-v4/server-groups-results-pane.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ac7b0525-5946-4728-9cf1-c65007852ebe
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-management-console-about-dialog-boxes.md b/mdop/appv-v4/server-management-console-about-dialog-boxes.md
index 28765cec65..c40139a8da 100644
--- a/mdop/appv-v4/server-management-console-about-dialog-boxes.md
+++ b/mdop/appv-v4/server-management-console-about-dialog-boxes.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b5fdee0b-4269-4a48-98a0-ed3f06cff041
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-management-console-administrators-node.md b/mdop/appv-v4/server-management-console-administrators-node.md
index c8d25650e4..0ed24e294f 100644
--- a/mdop/appv-v4/server-management-console-administrators-node.md
+++ b/mdop/appv-v4/server-management-console-administrators-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ab421454-69d1-4c10-8f58-2a35ae89c8b1
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-management-console-application-licenses-node.md b/mdop/appv-v4/server-management-console-application-licenses-node.md
index 7673a67fdd..9d37dd63fa 100644
--- a/mdop/appv-v4/server-management-console-application-licenses-node.md
+++ b/mdop/appv-v4/server-management-console-application-licenses-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ad3fa486-2b3c-4efd-91f5-507e9c5057d5
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-management-console-application-virtualization-system-node.md b/mdop/appv-v4/server-management-console-application-virtualization-system-node.md
index 2d708a6647..b52204a63d 100644
--- a/mdop/appv-v4/server-management-console-application-virtualization-system-node.md
+++ b/mdop/appv-v4/server-management-console-application-virtualization-system-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9450832e-335c-41e7-af24-fddb8ffc327c
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-management-console-applications-node.md b/mdop/appv-v4/server-management-console-applications-node.md
index b673e056f0..4b72b9cea2 100644
--- a/mdop/appv-v4/server-management-console-applications-node.md
+++ b/mdop/appv-v4/server-management-console-applications-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e465f816-032d-4824-9924-f2dcf30f2a2c
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-management-console-file-type-associations-node.md b/mdop/appv-v4/server-management-console-file-type-associations-node.md
index f3d64be8f3..30911041dd 100644
--- a/mdop/appv-v4/server-management-console-file-type-associations-node.md
+++ b/mdop/appv-v4/server-management-console-file-type-associations-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c22168be-6601-4154-b36b-9ca0fa87e5e0
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-management-console-packages-node.md b/mdop/appv-v4/server-management-console-packages-node.md
index 43d502c939..dc6de0a83f 100644
--- a/mdop/appv-v4/server-management-console-packages-node.md
+++ b/mdop/appv-v4/server-management-console-packages-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 458424f6-d586-4fa8-bf61-44c5028a4490
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-management-console-provider-policies-node.md b/mdop/appv-v4/server-management-console-provider-policies-node.md
index 0b55fe35db..e48e539846 100644
--- a/mdop/appv-v4/server-management-console-provider-policies-node.md
+++ b/mdop/appv-v4/server-management-console-provider-policies-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a5b99158-9af8-45bb-b3b8-61e220529e14
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-management-console-reports-node.md b/mdop/appv-v4/server-management-console-reports-node.md
index 2d44db2032..5cda771115 100644
--- a/mdop/appv-v4/server-management-console-reports-node.md
+++ b/mdop/appv-v4/server-management-console-reports-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9dde6332-5882-40dd-8a8f-857216df80ed
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v4/server-management-console-server-groups-node.md b/mdop/appv-v4/server-management-console-server-groups-node.md
index 73f5c2f80b..4b657466b4 100644
--- a/mdop/appv-v4/server-management-console-server-groups-node.md
+++ b/mdop/appv-v4/server-management-console-server-groups-node.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 83b86fc5-3f77-4470-985a-cf0bb8686067
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md
index d154228918..d8bed1b729 100644
--- a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md
+++ b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-all-users-on-a-specific-computer.md
@@ -1,5 +1,5 @@
---
-title: How to Revert Extension Points from an App-V 5.0 Package to an App-V 4.6 Package For All Users on a Specific Computer
+title: "How to Revert Extension Points from an App-V 5.0 Package to an App-V 4.6 Package For All Users on a Specific Computer"
description: How to Revert Extension Points from an App-V 5.0 Package to an App-V 4.6 Package For All Users on a Specific Computer
ms.assetid: 2a43ca1b-6847-4dd1-ade2-336ac4ac6af0
ms.reviewer:
diff --git a/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-51-application.md b/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-51-application.md
index 51f82f6674..ea81880476 100644
--- a/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-51-application.md
+++ b/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-51-application.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 909b4391-762b-4988-b0cf-32b67f1fcf0e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups.md b/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups.md
index 6ce7d696b3..d8239f46ed 100644
--- a/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups.md
+++ b/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4d08a81b-55e5-471a-91dc-9a684fb3c9a1
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups51.md b/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups51.md
index ed95d88c35..8a87b7ff92 100644
--- a/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups51.md
+++ b/mdop/appv-v5/how-to-use-optional-packages-in-connection-groups51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 67666f18-b704-4852-a1e4-d13633bd2baf
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/how-to-view-and-configure-applications-and-default-virtual-application-extensions-by-using-the-management-console-51.md b/mdop/appv-v5/how-to-view-and-configure-applications-and-default-virtual-application-extensions-by-using-the-management-console-51.md
index a33b56e4c3..808352b5e4 100644
--- a/mdop/appv-v5/how-to-view-and-configure-applications-and-default-virtual-application-extensions-by-using-the-management-console-51.md
+++ b/mdop/appv-v5/how-to-view-and-configure-applications-and-default-virtual-application-extensions-by-using-the-management-console-51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1e1941d3-fb22-4077-8ec6-7a0cb80335d8
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/how-to-view-and-configure-applications-and-default-virtual-application-extensions-by-using-the-management-console-beta.md b/mdop/appv-v5/how-to-view-and-configure-applications-and-default-virtual-application-extensions-by-using-the-management-console-beta.md
index 0c2e254447..96723eea3e 100644
--- a/mdop/appv-v5/how-to-view-and-configure-applications-and-default-virtual-application-extensions-by-using-the-management-console-beta.md
+++ b/mdop/appv-v5/how-to-view-and-configure-applications-and-default-virtual-application-extensions-by-using-the-management-console-beta.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c77e6662-7a18-4da1-8da8-b58068b65fa1
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/maintaining-app-v-50.md b/mdop/appv-v5/maintaining-app-v-50.md
index 44f18c8769..a8cfb7715b 100644
--- a/mdop/appv-v5/maintaining-app-v-50.md
+++ b/mdop/appv-v5/maintaining-app-v-50.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 66851ec3-c674-493b-ad6d-db8fcbf1956c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/maintaining-app-v-51.md b/mdop/appv-v5/maintaining-app-v-51.md
index 5ac415223c..005a024a2b 100644
--- a/mdop/appv-v5/maintaining-app-v-51.md
+++ b/mdop/appv-v5/maintaining-app-v-51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5abd17d3-e8af-4261-b914-741ae116b0e7
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/managing-connection-groups.md b/mdop/appv-v5/managing-connection-groups.md
index 1b293614ae..1c3c341ef5 100644
--- a/mdop/appv-v5/managing-connection-groups.md
+++ b/mdop/appv-v5/managing-connection-groups.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1a9c8f26-f421-4b70-b7e2-da8118e8198c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/managing-connection-groups51.md b/mdop/appv-v5/managing-connection-groups51.md
index f13c732883..43554b1ff9 100644
--- a/mdop/appv-v5/managing-connection-groups51.md
+++ b/mdop/appv-v5/managing-connection-groups51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 22c9d3cb-7246-4173-9742-4ba1c24b0a6a
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/microsoft-application-virtualization-50-administrators-guide.md b/mdop/appv-v5/microsoft-application-virtualization-50-administrators-guide.md
index f6f7a5cd96..fdfc5ef202 100644
--- a/mdop/appv-v5/microsoft-application-virtualization-50-administrators-guide.md
+++ b/mdop/appv-v5/microsoft-application-virtualization-50-administrators-guide.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c46e94b5-32cd-4377-8dc3-8163539be897
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/microsoft-application-virtualization-51-administrators-guide.md b/mdop/appv-v5/microsoft-application-virtualization-51-administrators-guide.md
index ec8eeadee2..b5120b6279 100644
--- a/mdop/appv-v5/microsoft-application-virtualization-51-administrators-guide.md
+++ b/mdop/appv-v5/microsoft-application-virtualization-51-administrators-guide.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3049996a-7253-4599-a29a-1b58f9ab14a4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/migrating-from-a-previous-version-app-v-50.md b/mdop/appv-v5/migrating-from-a-previous-version-app-v-50.md
index a659ae2142..c3d4ae514c 100644
--- a/mdop/appv-v5/migrating-from-a-previous-version-app-v-50.md
+++ b/mdop/appv-v5/migrating-from-a-previous-version-app-v-50.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a13cd353-b22a-48f7-af1e-5d54ede2a7e5
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/migrating-to-app-v-51-from-a-previous-version.md b/mdop/appv-v5/migrating-to-app-v-51-from-a-previous-version.md
index cde64171ab..3692e67c10 100644
--- a/mdop/appv-v5/migrating-to-app-v-51-from-a-previous-version.md
+++ b/mdop/appv-v5/migrating-to-app-v-51-from-a-previous-version.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e7ee0edc-7544-4c0a-aaca-d922a33bc1bb
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/operations-for-app-v-50.md b/mdop/appv-v5/operations-for-app-v-50.md
index ce80cf068a..3df456161b 100644
--- a/mdop/appv-v5/operations-for-app-v-50.md
+++ b/mdop/appv-v5/operations-for-app-v-50.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4d0d41a6-f7da-4a2f-8ac9-2d67cc18ea93
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/operations-for-app-v-51.md b/mdop/appv-v5/operations-for-app-v-51.md
index bbb273612e..8a97413907 100644
--- a/mdop/appv-v5/operations-for-app-v-51.md
+++ b/mdop/appv-v5/operations-for-app-v-51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: dd13b5c9-2d1e-442f-91e4-43dec7f17ea2
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/performance-guidance-for-application-virtualization-50.md b/mdop/appv-v5/performance-guidance-for-application-virtualization-50.md
index 2dfc27c239..d8aa6ae42a 100644
--- a/mdop/appv-v5/performance-guidance-for-application-virtualization-50.md
+++ b/mdop/appv-v5/performance-guidance-for-application-virtualization-50.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6b3a3255-b957-4b9b-8bfc-a93fe8438a81
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/performance-guidance-for-application-virtualization-51.md b/mdop/appv-v5/performance-guidance-for-application-virtualization-51.md
index 03b2a5a2dc..936a78123f 100644
--- a/mdop/appv-v5/performance-guidance-for-application-virtualization-51.md
+++ b/mdop/appv-v5/performance-guidance-for-application-virtualization-51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5f2643c7-5cf7-4a29-adb7-45bf9f5b0364
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-app-v-50-rc.md b/mdop/appv-v5/planning-for-app-v-50-rc.md
index 57f79d8ada..1d4bd7a75c 100644
--- a/mdop/appv-v5/planning-for-app-v-50-rc.md
+++ b/mdop/appv-v5/planning-for-app-v-50-rc.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 69df85b3-06c7-4123-af05-29d537a687ec
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-app-v-51.md b/mdop/appv-v5/planning-for-app-v-51.md
index 4184e228ca..302d550ef0 100644
--- a/mdop/appv-v5/planning-for-app-v-51.md
+++ b/mdop/appv-v5/planning-for-app-v-51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8d84e679-0bd3-4864-976b-a3cbe6eafba6
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-high-availability-with-app-v-50.md b/mdop/appv-v5/planning-for-high-availability-with-app-v-50.md
index 964dd5abc6..d23fc021f8 100644
--- a/mdop/appv-v5/planning-for-high-availability-with-app-v-50.md
+++ b/mdop/appv-v5/planning-for-high-availability-with-app-v-50.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6d9a6492-23f8-465c-82e5-49c863594156
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-high-availability-with-app-v-51.md b/mdop/appv-v5/planning-for-high-availability-with-app-v-51.md
index 39470aa4c7..a0cfecee7c 100644
--- a/mdop/appv-v5/planning-for-high-availability-with-app-v-51.md
+++ b/mdop/appv-v5/planning-for-high-availability-with-app-v-51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1f190a0e-10ee-4fbe-a602-7e807e943033
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v.md b/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v.md
index 1ba223f790..b802e65076 100644
--- a/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v.md
+++ b/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d4ca8f09-86fd-456f-8ec2-242ff94ae9a0
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v51.md b/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v51.md
index 34e606a7ab..583f61a259 100644
--- a/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v51.md
+++ b/mdop/appv-v5/planning-for-migrating-from-a-previous-version-of-app-v51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4a058047-9674-41bc-8050-c58c97a80a9b
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-the-app-v-50-sequencer-and-client-deployment.md b/mdop/appv-v5/planning-for-the-app-v-50-sequencer-and-client-deployment.md
index 03ea39b207..dda2baef42 100644
--- a/mdop/appv-v5/planning-for-the-app-v-50-sequencer-and-client-deployment.md
+++ b/mdop/appv-v5/planning-for-the-app-v-50-sequencer-and-client-deployment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 57a604ad-90e1-4d32-86bb-eafff59aa43a
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-the-app-v-50-server-deployment.md b/mdop/appv-v5/planning-for-the-app-v-50-server-deployment.md
index 4522f9435f..cfbadbc58c 100644
--- a/mdop/appv-v5/planning-for-the-app-v-50-server-deployment.md
+++ b/mdop/appv-v5/planning-for-the-app-v-50-server-deployment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fd89b324-3961-471a-ad90-c8f9ae7a8155
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-the-app-v-51-sequencer-and-client-deployment.md b/mdop/appv-v5/planning-for-the-app-v-51-sequencer-and-client-deployment.md
index 58f53e2c2b..2dc56979b0 100644
--- a/mdop/appv-v5/planning-for-the-app-v-51-sequencer-and-client-deployment.md
+++ b/mdop/appv-v5/planning-for-the-app-v-51-sequencer-and-client-deployment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d92f8773-fa7d-4926-978a-433978f91202
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-the-app-v-51-server-deployment.md b/mdop/appv-v5/planning-for-the-app-v-51-server-deployment.md
index 68c44e65f6..cbba13e491 100644
--- a/mdop/appv-v5/planning-for-the-app-v-51-server-deployment.md
+++ b/mdop/appv-v5/planning-for-the-app-v-51-server-deployment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: eedd97c9-bee0-4749-9d1e-ab9528fba398
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-using-app-v-with-office.md b/mdop/appv-v5/planning-for-using-app-v-with-office.md
index 8ca81ecded..7f570f7070 100644
--- a/mdop/appv-v5/planning-for-using-app-v-with-office.md
+++ b/mdop/appv-v5/planning-for-using-app-v-with-office.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c4371869-4bfc-4d13-9198-ef19f99fc192
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-for-using-app-v-with-office51.md b/mdop/appv-v5/planning-for-using-app-v-with-office51.md
index 5d54fd6311..6564a0e784 100644
--- a/mdop/appv-v5/planning-for-using-app-v-with-office51.md
+++ b/mdop/appv-v5/planning-for-using-app-v-with-office51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e7a19b43-1746-469f-bad6-8e75cf4b3f67
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-to-deploy-app-v-50-with-an-electronic-software-distribution-system.md b/mdop/appv-v5/planning-to-deploy-app-v-50-with-an-electronic-software-distribution-system.md
index 7357c45ff4..0cc8198165 100644
--- a/mdop/appv-v5/planning-to-deploy-app-v-50-with-an-electronic-software-distribution-system.md
+++ b/mdop/appv-v5/planning-to-deploy-app-v-50-with-an-electronic-software-distribution-system.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8cd3f1fb-b84e-4260-9e72-a14d01e7cadf
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-to-deploy-app-v-51-with-an-electronic-software-distribution-system.md b/mdop/appv-v5/planning-to-deploy-app-v-51-with-an-electronic-software-distribution-system.md
index aedb86f2c2..6033a54f5b 100644
--- a/mdop/appv-v5/planning-to-deploy-app-v-51-with-an-electronic-software-distribution-system.md
+++ b/mdop/appv-v5/planning-to-deploy-app-v-51-with-an-electronic-software-distribution-system.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c26602c2-5e8d-44e6-90df-adacc593607e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-to-deploy-app-v.md b/mdop/appv-v5/planning-to-deploy-app-v.md
index a85bcc8922..c12ddb523d 100644
--- a/mdop/appv-v5/planning-to-deploy-app-v.md
+++ b/mdop/appv-v5/planning-to-deploy-app-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 28d3035c-3805-4339-90fc-6c3fd3b1123e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-to-deploy-app-v51.md b/mdop/appv-v5/planning-to-deploy-app-v51.md
index 76d04602d4..dc0bca0071 100644
--- a/mdop/appv-v5/planning-to-deploy-app-v51.md
+++ b/mdop/appv-v5/planning-to-deploy-app-v51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 39cbf981-d9c6-457f-b047-f9046e1a6442
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v.md b/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v.md
index 798a2dac4b..5d2759961a 100644
--- a/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v.md
+++ b/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2a4deeed-fdc0-465c-b88a-3a2fbbf27436
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v51.md b/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v51.md
index e5bc5e526b..adf150f3e1 100644
--- a/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v51.md
+++ b/mdop/appv-v5/planning-to-use-folder-redirection-with-app-v51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6bea9a8f-a915-4d7d-be67-ef1cca1398ed
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/preparing-your-environment-for-app-v-50.md b/mdop/appv-v5/preparing-your-environment-for-app-v-50.md
index 3470db8ec4..aa0bb21af5 100644
--- a/mdop/appv-v5/preparing-your-environment-for-app-v-50.md
+++ b/mdop/appv-v5/preparing-your-environment-for-app-v-50.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 119d990e-a6c6-47b7-a7b0-52f88205e5ec
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/preparing-your-environment-for-app-v-51.md b/mdop/appv-v5/preparing-your-environment-for-app-v-51.md
index 8c2fee5a36..05f376d410 100644
--- a/mdop/appv-v5/preparing-your-environment-for-app-v-51.md
+++ b/mdop/appv-v5/preparing-your-environment-for-app-v-51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 64b2e1ac-1561-4c99-9815-b4688a0ff48a
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/release-notes-for-app-v-50-sp1.md b/mdop/appv-v5/release-notes-for-app-v-50-sp1.md
index 9336bced97..a24b405c96 100644
--- a/mdop/appv-v5/release-notes-for-app-v-50-sp1.md
+++ b/mdop/appv-v5/release-notes-for-app-v-50-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 21a859cd-41b4-4cc4-9c9c-7ba236084bb0
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/release-notes-for-app-v-50-sp2.md b/mdop/appv-v5/release-notes-for-app-v-50-sp2.md
index f7d43521a3..8a8faa9757 100644
--- a/mdop/appv-v5/release-notes-for-app-v-50-sp2.md
+++ b/mdop/appv-v5/release-notes-for-app-v-50-sp2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fe73139d-240c-4ed5-8e59-6ae76ee8e80c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/release-notes-for-app-v-50-sp3.md b/mdop/appv-v5/release-notes-for-app-v-50-sp3.md
index 0f03b6bd95..9eb47a741d 100644
--- a/mdop/appv-v5/release-notes-for-app-v-50-sp3.md
+++ b/mdop/appv-v5/release-notes-for-app-v-50-sp3.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bc4806e0-2aba-4c7b-9ecc-1b2cc54af1d0
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/release-notes-for-app-v-50.md b/mdop/appv-v5/release-notes-for-app-v-50.md
index 56a0e3150d..417148f521 100644
--- a/mdop/appv-v5/release-notes-for-app-v-50.md
+++ b/mdop/appv-v5/release-notes-for-app-v-50.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 68a6a5a1-4b3c-4c09-b00c-9ca4237695d5
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/release-notes-for-app-v-51.md b/mdop/appv-v5/release-notes-for-app-v-51.md
index 5fe16584ad..f96c8ae1d2 100644
--- a/mdop/appv-v5/release-notes-for-app-v-51.md
+++ b/mdop/appv-v5/release-notes-for-app-v-51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 62c5be3b-0a46-4512-93ed-97c23184f343
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications.md b/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications.md
index 34bad73ae5..6a49308d73 100644
--- a/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications.md
+++ b/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a8affa46-f1f7-416c-8125-9595cfbfdbc7
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications51.md b/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications51.md
index 04f3189b55..26f9693b4b 100644
--- a/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications51.md
+++ b/mdop/appv-v5/running-a-locally-installed-application-inside-a-virtual-environment-with-virtualized-applications51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 71baf193-a9e8-4ffa-aa7f-e0bffed2e4b2
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/technical-reference-for-app-v-50.md b/mdop/appv-v5/technical-reference-for-app-v-50.md
index 91d5e9c9db..4edd02b6e7 100644
--- a/mdop/appv-v5/technical-reference-for-app-v-50.md
+++ b/mdop/appv-v5/technical-reference-for-app-v-50.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: aa899158-41e8-47d3-882c-8c5b96018308
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/technical-reference-for-app-v-51.md b/mdop/appv-v5/technical-reference-for-app-v-51.md
index 5b6eb75ac8..4a5b670357 100644
--- a/mdop/appv-v5/technical-reference-for-app-v-51.md
+++ b/mdop/appv-v5/technical-reference-for-app-v-51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2b9e8b2b-4cd1-46f3-ba08-e3bc8d5c6127
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/troubleshooting-app-v-50.md b/mdop/appv-v5/troubleshooting-app-v-50.md
index e8853b459c..7fde4fd864 100644
--- a/mdop/appv-v5/troubleshooting-app-v-50.md
+++ b/mdop/appv-v5/troubleshooting-app-v-50.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a713b345-25b7-4cdf-ba55-66df672a1f3a
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/troubleshooting-app-v-51.md b/mdop/appv-v5/troubleshooting-app-v-51.md
index 81fd93938a..27ce45c67f 100644
--- a/mdop/appv-v5/troubleshooting-app-v-51.md
+++ b/mdop/appv-v5/troubleshooting-app-v-51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 435d0e56-0aa2-4168-b5a7-2f03a1f273d4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/using-the-app-v-50-client-management-console.md b/mdop/appv-v5/using-the-app-v-50-client-management-console.md
index 9789c793bc..2ab6dea613 100644
--- a/mdop/appv-v5/using-the-app-v-50-client-management-console.md
+++ b/mdop/appv-v5/using-the-app-v-50-client-management-console.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 36398307-57dd-40f3-9d4f-b09f44fd37c3
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/using-the-app-v-51-client-management-console.md b/mdop/appv-v5/using-the-app-v-51-client-management-console.md
index 7113c44600..427f3aa60c 100644
--- a/mdop/appv-v5/using-the-app-v-51-client-management-console.md
+++ b/mdop/appv-v5/using-the-app-v-51-client-management-console.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: be6d4e35-5701-4f9a-ba8a-bede12662cf1
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/viewing-app-v-server-publishing-metadata.md b/mdop/appv-v5/viewing-app-v-server-publishing-metadata.md
index 6e3f7208f0..218bac0f4f 100644
--- a/mdop/appv-v5/viewing-app-v-server-publishing-metadata.md
+++ b/mdop/appv-v5/viewing-app-v-server-publishing-metadata.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 048dd42a-24d4-4cc4-81f6-7a919aadd9b2
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/viewing-app-v-server-publishing-metadata51.md b/mdop/appv-v5/viewing-app-v-server-publishing-metadata51.md
index 499324a790..5971f5c937 100644
--- a/mdop/appv-v5/viewing-app-v-server-publishing-metadata51.md
+++ b/mdop/appv-v5/viewing-app-v-server-publishing-metadata51.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d5fa9eb5-647c-478d-8a4d-0ecda018bce6
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/whats-new-in-app-v-50-sp1.md b/mdop/appv-v5/whats-new-in-app-v-50-sp1.md
index 26d07fc5ef..6968160074 100644
--- a/mdop/appv-v5/whats-new-in-app-v-50-sp1.md
+++ b/mdop/appv-v5/whats-new-in-app-v-50-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e97c2dbb-7b40-46a0-8137-9ee4fc2bd071
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/appv-v5/whats-new-in-app-v-50.md b/mdop/appv-v5/whats-new-in-app-v-50.md
index 2db8329b5f..7d5f3286a2 100644
--- a/mdop/appv-v5/whats-new-in-app-v-50.md
+++ b/mdop/appv-v5/whats-new-in-app-v-50.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 79ff6e02-e926-4803-87d8-248a6b28099d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, appcompat, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/dart-v10/about-dart-10.md b/mdop/dart-v10/about-dart-10.md
index 3751028fe6..bc738c6bd9 100644
--- a/mdop/dart-v10/about-dart-10.md
+++ b/mdop/dart-v10/about-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 02378035-58d1-4095-82fe-d60734a746fb
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/accessibility-for-dart-10.md b/mdop/dart-v10/accessibility-for-dart-10.md
index fd19439e04..d6f65c76e7 100644
--- a/mdop/dart-v10/accessibility-for-dart-10.md
+++ b/mdop/dart-v10/accessibility-for-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 61d7a30c-3551-440d-bdcd-36333052c7b4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/administering-dart-10-using-powershell.md b/mdop/dart-v10/administering-dart-10-using-powershell.md
index bfedfe3006..566da0b7e9 100644
--- a/mdop/dart-v10/administering-dart-10-using-powershell.md
+++ b/mdop/dart-v10/administering-dart-10-using-powershell.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: eefe992f-077b-4e4b-8a5d-45b451614d7b
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/creating-the-dart-10-recovery-image.md b/mdop/dart-v10/creating-the-dart-10-recovery-image.md
index 0a8a5f353e..01bc58f01f 100644
--- a/mdop/dart-v10/creating-the-dart-10-recovery-image.md
+++ b/mdop/dart-v10/creating-the-dart-10-recovery-image.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 173556de-2f20-4ea6-9e29-fc5ccc71ebd7
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/dart-10--c--page.md b/mdop/dart-v10/dart-10--c--page.md
index 53300542ed..edbc333edd 100644
--- a/mdop/dart-v10/dart-10--c--page.md
+++ b/mdop/dart-v10/dart-10--c--page.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4f62abe6-d971-44b4-b1e7-9dcaf199ca31
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/dart-10-cover-page.md b/mdop/dart-v10/dart-10-cover-page.md
index 2940b90d99..93162131d7 100644
--- a/mdop/dart-v10/dart-10-cover-page.md
+++ b/mdop/dart-v10/dart-10-cover-page.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 875f6dc4-13f4-4625-8c6a-38215c2daf01
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/dart-10-deployment-checklist.md b/mdop/dart-v10/dart-10-deployment-checklist.md
index d3a741a13f..51c0fb097f 100644
--- a/mdop/dart-v10/dart-10-deployment-checklist.md
+++ b/mdop/dart-v10/dart-10-deployment-checklist.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a6b7ba27-a969-4da9-bef0-d019739413cc
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/dart-10-planning-checklist.md b/mdop/dart-v10/dart-10-planning-checklist.md
index 0a65b1cc0b..5db8a262f5 100644
--- a/mdop/dart-v10/dart-10-planning-checklist.md
+++ b/mdop/dart-v10/dart-10-planning-checklist.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d6482534-cdf3-4997-bec0-33d0edf6924a
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/dart-10-privacy-statement.md b/mdop/dart-v10/dart-10-privacy-statement.md
index c54a9d8d96..ee32260042 100644
--- a/mdop/dart-v10/dart-10-privacy-statement.md
+++ b/mdop/dart-v10/dart-10-privacy-statement.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 27ad36fe-6816-4fe8-8838-500c05b5b184
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/dart-10-supported-configurations.md b/mdop/dart-v10/dart-10-supported-configurations.md
index 8e8e070106..0a20396771 100644
--- a/mdop/dart-v10/dart-10-supported-configurations.md
+++ b/mdop/dart-v10/dart-10-supported-configurations.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a07d6562-1fa9-499f-829c-9cc487ede0b7
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/deploying-dart-10-to-administrator-computers.md b/mdop/dart-v10/deploying-dart-10-to-administrator-computers.md
index 354f2d6320..84b8e13959 100644
--- a/mdop/dart-v10/deploying-dart-10-to-administrator-computers.md
+++ b/mdop/dart-v10/deploying-dart-10-to-administrator-computers.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c1981cbe-10f8-41f6-8989-bcc9d57a2aa8
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/deploying-dart-10.md b/mdop/dart-v10/deploying-dart-10.md
index 4d485fe455..ba270e3a87 100644
--- a/mdop/dart-v10/deploying-dart-10.md
+++ b/mdop/dart-v10/deploying-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 92cf70fd-006f-4fdc-9fb3-78d9d223148d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/deploying-the-dart-recovery-image-dart-10.md b/mdop/dart-v10/deploying-the-dart-recovery-image-dart-10.md
index 4a1bd4540a..8bdf2391c1 100644
--- a/mdop/dart-v10/deploying-the-dart-recovery-image-dart-10.md
+++ b/mdop/dart-v10/deploying-the-dart-recovery-image-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2b859da6-e31a-4240-8868-93a754328cf2
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/diagnosing-system-failures-with-crash-analyzer-dart-10.md b/mdop/dart-v10/diagnosing-system-failures-with-crash-analyzer-dart-10.md
index dee2c4b198..a13df573f8 100644
--- a/mdop/dart-v10/diagnosing-system-failures-with-crash-analyzer-dart-10.md
+++ b/mdop/dart-v10/diagnosing-system-failures-with-crash-analyzer-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7ebef49e-a294-4173-adb1-7e6994aa01ad
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/getting-started-with-dart-10.md b/mdop/dart-v10/getting-started-with-dart-10.md
index 825d83b221..f81b153367 100644
--- a/mdop/dart-v10/getting-started-with-dart-10.md
+++ b/mdop/dart-v10/getting-started-with-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 593dd317-4fba-4d51-8a80-951590acede6
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/how-to-change-repair-or-remove-dart-10.md b/mdop/dart-v10/how-to-change-repair-or-remove-dart-10.md
index c6b364316a..8bc407173f 100644
--- a/mdop/dart-v10/how-to-change-repair-or-remove-dart-10.md
+++ b/mdop/dart-v10/how-to-change-repair-or-remove-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e7718c6f-06a1-48bb-b04b-1a0f659a0337
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/how-to-deploy-dart-10.md b/mdop/dart-v10/how-to-deploy-dart-10.md
index e2a3e044e5..f911f88b74 100644
--- a/mdop/dart-v10/how-to-deploy-dart-10.md
+++ b/mdop/dart-v10/how-to-deploy-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 13e8ba20-21c3-4870-94ed-6d3106d69f21
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-10.md b/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-10.md
index beb89d6265..8d2a4a4426 100644
--- a/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-10.md
+++ b/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 06a5e250-b992-4f6a-ad74-e7715f9e96e7
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-10.md b/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-10.md
index 7bf15bf936..a147d07a7b 100644
--- a/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-10.md
+++ b/mdop/dart-v10/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0d2192c1-4058-49fb-b0b6-baf4699ac7f5
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/how-to-ensure-that-crash-analyzer-can-access-symbol-files-dart-10.md b/mdop/dart-v10/how-to-ensure-that-crash-analyzer-can-access-symbol-files-dart-10.md
index 6d46740189..4d6c8d968c 100644
--- a/mdop/dart-v10/how-to-ensure-that-crash-analyzer-can-access-symbol-files-dart-10.md
+++ b/mdop/dart-v10/how-to-ensure-that-crash-analyzer-can-access-symbol-files-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 39e307bd-5d21-4e44-bed6-bf532f580775
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/how-to-perform-dart-tasks-by-using-powershell-commands-dart-10.md b/mdop/dart-v10/how-to-perform-dart-tasks-by-using-powershell-commands-dart-10.md
index fc0752f99e..f53350ad55 100644
--- a/mdop/dart-v10/how-to-perform-dart-tasks-by-using-powershell-commands-dart-10.md
+++ b/mdop/dart-v10/how-to-perform-dart-tasks-by-using-powershell-commands-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f5a5c5f9-d667-4c85-9e82-7baf0b2aec6e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-10.md b/mdop/dart-v10/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-10.md
index b3bb7236d2..443db6f54f 100644
--- a/mdop/dart-v10/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-10.md
+++ b/mdop/dart-v10/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a6adc717-827c-45e8-b9c3-06d0e919e0bd
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md b/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md
index e67ab0c1a4..90f2db33d1 100644
--- a/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md
+++ b/mdop/dart-v10/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c0062208-39cd-4e01-adf8-36a11386e2ea
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-10.md b/mdop/dart-v10/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-10.md
index 853caccec0..1d01911abd 100644
--- a/mdop/dart-v10/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-10.md
+++ b/mdop/dart-v10/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 27c1e1c6-123a-4f8a-b7d2-5bddc9ca3249
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-10.md b/mdop/dart-v10/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-10.md
index 669547afa0..7f67229645 100644
--- a/mdop/dart-v10/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-10.md
+++ b/mdop/dart-v10/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 10334800-ff8e-43ac-a9c2-d28807473ec2
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/how-to-use-a-powershell-script-to-create-the-recovery-image-dart-10.md b/mdop/dart-v10/how-to-use-a-powershell-script-to-create-the-recovery-image-dart-10.md
index d617ce9d88..0b1feb848a 100644
--- a/mdop/dart-v10/how-to-use-a-powershell-script-to-create-the-recovery-image-dart-10.md
+++ b/mdop/dart-v10/how-to-use-a-powershell-script-to-create-the-recovery-image-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: cf5b0814-71a8-4f0b-b1f1-1ac6d8b51c4f
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/operations-for-dart-10.md b/mdop/dart-v10/operations-for-dart-10.md
index 553e6af77d..6e12927ca8 100644
--- a/mdop/dart-v10/operations-for-dart-10.md
+++ b/mdop/dart-v10/operations-for-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1776d5ed-96c6-4841-a097-721d8cf5c7f7
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/overview-of-the-tools-in-dart-10.md b/mdop/dart-v10/overview-of-the-tools-in-dart-10.md
index badd1ae5d7..d5908052a6 100644
--- a/mdop/dart-v10/overview-of-the-tools-in-dart-10.md
+++ b/mdop/dart-v10/overview-of-the-tools-in-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 752467dd-b646-4335-82ce-9090d4651f65
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/planning-for-dart-10.md b/mdop/dart-v10/planning-for-dart-10.md
index c5d2620d01..d907bb9ecc 100644
--- a/mdop/dart-v10/planning-for-dart-10.md
+++ b/mdop/dart-v10/planning-for-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2ca0249a-6a9f-4b4e-91f1-f1b34be7b16c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/planning-how-to-save-and-deploy-the-dart-10-recovery-image.md b/mdop/dart-v10/planning-how-to-save-and-deploy-the-dart-10-recovery-image.md
index 2d2ba6bfb2..f76a87d4d5 100644
--- a/mdop/dart-v10/planning-how-to-save-and-deploy-the-dart-10-recovery-image.md
+++ b/mdop/dart-v10/planning-how-to-save-and-deploy-the-dart-10-recovery-image.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9a3e5413-2621-49ce-8bd2-992616691703
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/planning-to-create-the-dart-10-recovery-image.md b/mdop/dart-v10/planning-to-create-the-dart-10-recovery-image.md
index f38768416f..6346265cf1 100644
--- a/mdop/dart-v10/planning-to-create-the-dart-10-recovery-image.md
+++ b/mdop/dart-v10/planning-to-create-the-dart-10-recovery-image.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a0087d93-b88f-454b-81b2-3c7ce3718023
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/planning-to-deploy-dart-10.md b/mdop/dart-v10/planning-to-deploy-dart-10.md
index 7b28c7d329..a3f8fabb1c 100644
--- a/mdop/dart-v10/planning-to-deploy-dart-10.md
+++ b/mdop/dart-v10/planning-to-deploy-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 32a39e97-a889-4aae-982c-b85cdc3d9134
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/recovering-computers-using-dart-10.md b/mdop/dart-v10/recovering-computers-using-dart-10.md
index f1a9b0f856..a8d8499941 100644
--- a/mdop/dart-v10/recovering-computers-using-dart-10.md
+++ b/mdop/dart-v10/recovering-computers-using-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2ad7fab0-c22d-4171-8b5a-b2b7d7c0ad2d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/release-notes-for-dart-10.md b/mdop/dart-v10/release-notes-for-dart-10.md
index 7fdf8e3d2f..422e6479b3 100644
--- a/mdop/dart-v10/release-notes-for-dart-10.md
+++ b/mdop/dart-v10/release-notes-for-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: eb996980-f9c4-42cb-bde9-6b3d4b82b58c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/security-and-privacy-for-dart-10.md b/mdop/dart-v10/security-and-privacy-for-dart-10.md
index 1e572fc05f..8a01341fe5 100644
--- a/mdop/dart-v10/security-and-privacy-for-dart-10.md
+++ b/mdop/dart-v10/security-and-privacy-for-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9ce5d555-c4e9-4482-a147-27b26579c935
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/security-considerations-for-dart-10.md b/mdop/dart-v10/security-considerations-for-dart-10.md
index e5738d897d..41712c5ad9 100644
--- a/mdop/dart-v10/security-considerations-for-dart-10.md
+++ b/mdop/dart-v10/security-considerations-for-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c653daf1-f12a-4667-98cc-f0c89fa38e3f
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v10/troubleshooting-dart-10.md b/mdop/dart-v10/troubleshooting-dart-10.md
index 4f7ed7f393..2ba6f1ddfb 100644
--- a/mdop/dart-v10/troubleshooting-dart-10.md
+++ b/mdop/dart-v10/troubleshooting-dart-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 76d42a00-3f6b-4730-8857-39fe49535d37
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v65.md b/mdop/dart-v65.md
index 2ca38d849e..ef08a90758 100644
--- a/mdop/dart-v65.md
+++ b/mdop/dart-v65.md
@@ -9,7 +9,7 @@ ms.prod: w10
ms.date: 04/19/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
---
# Diagnostics and Recovery Toolset 6.5
diff --git a/mdop/dart-v7/about-dart-70-new-ia.md b/mdop/dart-v7/about-dart-70-new-ia.md
index 11e8f7a440..bad11f06bb 100644
--- a/mdop/dart-v7/about-dart-70-new-ia.md
+++ b/mdop/dart-v7/about-dart-70-new-ia.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 217ffafc-6d73-4b80-88d9-71870460d4ab
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/accessibility-for-dart-70.md b/mdop/dart-v7/accessibility-for-dart-70.md
index c85c2ce05f..728b5a9f48 100644
--- a/mdop/dart-v7/accessibility-for-dart-70.md
+++ b/mdop/dart-v7/accessibility-for-dart-70.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 41f7bb72-4f1d-44fb-bc3f-8b66557fec2f
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/creating-the-dart-70-recovery-image-dart-7.md b/mdop/dart-v7/creating-the-dart-70-recovery-image-dart-7.md
index d5b5333691..7158d4abbf 100644
--- a/mdop/dart-v7/creating-the-dart-70-recovery-image-dart-7.md
+++ b/mdop/dart-v7/creating-the-dart-70-recovery-image-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ebb2ec58-0349-469d-a23f-3f944fe4c1fa
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/dart-70-deployment-checklist-dart-7.md b/mdop/dart-v7/dart-70-deployment-checklist-dart-7.md
index c312c985c2..ab0a13cab2 100644
--- a/mdop/dart-v7/dart-70-deployment-checklist-dart-7.md
+++ b/mdop/dart-v7/dart-70-deployment-checklist-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2c68ec15-0624-4a75-8237-05c68b61ad07
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/dart-70-planning-checklist-dart-7.md b/mdop/dart-v7/dart-70-planning-checklist-dart-7.md
index eabf1df737..8c9dbcaa92 100644
--- a/mdop/dart-v7/dart-70-planning-checklist-dart-7.md
+++ b/mdop/dart-v7/dart-70-planning-checklist-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f97a2318-6597-4774-a854-bb546279a8fd
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/dart-70-supported-configurations-dart-7.md b/mdop/dart-v7/dart-70-supported-configurations-dart-7.md
index 19a84f8d6d..790c2e9077 100644
--- a/mdop/dart-v7/dart-70-supported-configurations-dart-7.md
+++ b/mdop/dart-v7/dart-70-supported-configurations-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e9ee87b0-3254-4625-b178-17b2f5b8f8c8
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/deploying-dart-70-new-ia.md b/mdop/dart-v7/deploying-dart-70-new-ia.md
index 7f4c348ffb..4b535951b5 100644
--- a/mdop/dart-v7/deploying-dart-70-new-ia.md
+++ b/mdop/dart-v7/deploying-dart-70-new-ia.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7bc99bce-b94f-4074-ba88-986ed76f8a6c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/deploying-dart-70-to-administrator-computers-dart-7.md b/mdop/dart-v7/deploying-dart-70-to-administrator-computers-dart-7.md
index 36d8f9c3e8..107a1f0256 100644
--- a/mdop/dart-v7/deploying-dart-70-to-administrator-computers-dart-7.md
+++ b/mdop/dart-v7/deploying-dart-70-to-administrator-computers-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8baf26aa-b168-463c-810f-a165918b9d9f
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/deploying-the-dart-70-recovery-image-dart-7.md b/mdop/dart-v7/deploying-the-dart-70-recovery-image-dart-7.md
index aa6254e9df..d5be1d6f03 100644
--- a/mdop/dart-v7/deploying-the-dart-70-recovery-image-dart-7.md
+++ b/mdop/dart-v7/deploying-the-dart-70-recovery-image-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6bba7bff-800f-44e4-bcfc-e143115607ca
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/diagnosing-system-failures-with-crash-analyzer--dart-7.md b/mdop/dart-v7/diagnosing-system-failures-with-crash-analyzer--dart-7.md
index 58e2665ca5..793f1a332e 100644
--- a/mdop/dart-v7/diagnosing-system-failures-with-crash-analyzer--dart-7.md
+++ b/mdop/dart-v7/diagnosing-system-failures-with-crash-analyzer--dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 170d40ef-4edb-4a32-a349-c285c0ea5e56
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/getting-started-with-dart-70-new-ia.md b/mdop/dart-v7/getting-started-with-dart-70-new-ia.md
index 576bc94e50..4a0b5db556 100644
--- a/mdop/dart-v7/getting-started-with-dart-70-new-ia.md
+++ b/mdop/dart-v7/getting-started-with-dart-70-new-ia.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 796f52ce-0935-4d3d-9437-289b4c7b16c3
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-change-repair-or-remove-dart-70.md b/mdop/dart-v7/how-to-change-repair-or-remove-dart-70.md
index efa405245e..07c0c01702 100644
--- a/mdop/dart-v7/how-to-change-repair-or-remove-dart-70.md
+++ b/mdop/dart-v7/how-to-change-repair-or-remove-dart-70.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a65ff4f3-2b6d-4105-a7a0-67c87e8e7300
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-create-a-time-limited-recovery-image-dart-7.md b/mdop/dart-v7/how-to-create-a-time-limited-recovery-image-dart-7.md
index e5172164b5..91c0b79888 100644
--- a/mdop/dart-v7/how-to-create-a-time-limited-recovery-image-dart-7.md
+++ b/mdop/dart-v7/how-to-create-a-time-limited-recovery-image-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d2e29cac-c24c-4239-997f-0320b8a830ae
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-deploy-dart-70.md b/mdop/dart-v7/how-to-deploy-dart-70.md
index 2eaec78452..23d20d5d80 100644
--- a/mdop/dart-v7/how-to-deploy-dart-70.md
+++ b/mdop/dart-v7/how-to-deploy-dart-70.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 30522441-40cb-4eca-99b4-dff758f5c647
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-7.md b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-7.md
index f3c6234fce..39343027eb 100644
--- a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-7.md
+++ b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 757c9340-8eac-42e8-85de-4302e436713a
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-7.md b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-7.md
index 7484daf808..3ec6953ff3 100644
--- a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-7.md
+++ b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 462f2d08-f03b-4a07-b2d3-c69205dc6f70
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-using-a-usb-flash-drive-dart-7.md b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-using-a-usb-flash-drive-dart-7.md
index 6f2b4bfdc4..aebbdbfef1 100644
--- a/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-using-a-usb-flash-drive-dart-7.md
+++ b/mdop/dart-v7/how-to-deploy-the-dart-recovery-image-using-a-usb-flash-drive-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5b7aa843-731e-47e7-b5f9-48d08da732d6
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-ensure-that-crash-analyzer-can-access-symbol-files-dart-7.md b/mdop/dart-v7/how-to-ensure-that-crash-analyzer-can-access-symbol-files-dart-7.md
index 003b9a25dd..a241116de7 100644
--- a/mdop/dart-v7/how-to-ensure-that-crash-analyzer-can-access-symbol-files-dart-7.md
+++ b/mdop/dart-v7/how-to-ensure-that-crash-analyzer-can-access-symbol-files-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 150a2f88-68a5-40eb-8471-e5008488ab6e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-recover-local-computers-using-the-dart-recovery-image-dart-7.md b/mdop/dart-v7/how-to-recover-local-computers-using-the-dart-recovery-image-dart-7.md
index aab5c32455..f7bab54d96 100644
--- a/mdop/dart-v7/how-to-recover-local-computers-using-the-dart-recovery-image-dart-7.md
+++ b/mdop/dart-v7/how-to-recover-local-computers-using-the-dart-recovery-image-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: be29b5a8-be08-4cf2-822e-77a51d3f3b65
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md b/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md
index 42b1d76476..4ed0e0e5ec 100644
--- a/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md
+++ b/mdop/dart-v7/how-to-recover-remote-computers-using-the-dart-recovery-image-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 66bc45fb-dc40-4d47-b583-5bb1ff5c97a7
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-7.md b/mdop/dart-v7/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-7.md
index 1bff3cde3b..943522849f 100644
--- a/mdop/dart-v7/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-7.md
+++ b/mdop/dart-v7/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 881d573f-2f18-4c5f-838e-2f5320179f94
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-7.md b/mdop/dart-v7/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-7.md
index d2fa4e6cfd..857157396c 100644
--- a/mdop/dart-v7/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-7.md
+++ b/mdop/dart-v7/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 40af4ead-6588-4a81-8eaa-3dc00c397e1d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/how-to-use-the-dart-recovery-image-wizard-to-create-the-recovery-image-dart-7.md b/mdop/dart-v7/how-to-use-the-dart-recovery-image-wizard-to-create-the-recovery-image-dart-7.md
index c92cd507c9..28abed205c 100644
--- a/mdop/dart-v7/how-to-use-the-dart-recovery-image-wizard-to-create-the-recovery-image-dart-7.md
+++ b/mdop/dart-v7/how-to-use-the-dart-recovery-image-wizard-to-create-the-recovery-image-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1b8ef983-fff9-4d75-a2f6-53120c5c00c9
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/operations-for-dart-70-new-ia.md b/mdop/dart-v7/operations-for-dart-70-new-ia.md
index 82e9a6262f..1a7b02146b 100644
--- a/mdop/dart-v7/operations-for-dart-70-new-ia.md
+++ b/mdop/dart-v7/operations-for-dart-70-new-ia.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5566d817-fc14-4408-ba01-1d87fbc132d9
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/overview-of-the-tools-in-dart-70-new-ia.md b/mdop/dart-v7/overview-of-the-tools-in-dart-70-new-ia.md
index ca1639268e..30c1b4a4a7 100644
--- a/mdop/dart-v7/overview-of-the-tools-in-dart-70-new-ia.md
+++ b/mdop/dart-v7/overview-of-the-tools-in-dart-70-new-ia.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 67c5991e-cbe6-4ce9-9fe5-f1761369d1fe
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/planning-for-dart-70-new-ia.md b/mdop/dart-v7/planning-for-dart-70-new-ia.md
index 45d4cba004..0e8009edfe 100644
--- a/mdop/dart-v7/planning-for-dart-70-new-ia.md
+++ b/mdop/dart-v7/planning-for-dart-70-new-ia.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9a60cb08-5efb-40fe-b1e3-9ece831f3b43
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/planning-how-to-save-and-deploy-the-dart-70-recovery-image.md b/mdop/dart-v7/planning-how-to-save-and-deploy-the-dart-70-recovery-image.md
index 13a06edae1..ef95afbef5 100644
--- a/mdop/dart-v7/planning-how-to-save-and-deploy-the-dart-70-recovery-image.md
+++ b/mdop/dart-v7/planning-how-to-save-and-deploy-the-dart-70-recovery-image.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d96e9363-6186-4fc3-9b83-ba15ed9694a5
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/planning-to-create-the-dart-70-recovery-image.md b/mdop/dart-v7/planning-to-create-the-dart-70-recovery-image.md
index 76cdbc0311..fb3aeeb596 100644
--- a/mdop/dart-v7/planning-to-create-the-dart-70-recovery-image.md
+++ b/mdop/dart-v7/planning-to-create-the-dart-70-recovery-image.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e5d49bee-ae4e-467b-9976-c1203f6355f9
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/planning-to-deploy-dart-70.md b/mdop/dart-v7/planning-to-deploy-dart-70.md
index 7ba9191fd7..27eb83e0aa 100644
--- a/mdop/dart-v7/planning-to-deploy-dart-70.md
+++ b/mdop/dart-v7/planning-to-deploy-dart-70.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 05e97cdb-a8c2-46e4-9c75-a7d12fe26fe8
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/recovering-computers-using-dart-70-dart-7.md b/mdop/dart-v7/recovering-computers-using-dart-70-dart-7.md
index b88da85ccc..fb6d52dd23 100644
--- a/mdop/dart-v7/recovering-computers-using-dart-70-dart-7.md
+++ b/mdop/dart-v7/recovering-computers-using-dart-70-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bcded7ca-237b-4971-ac34-4394b05cbc50
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/release-notes-for-dart-70-new-ia.md b/mdop/dart-v7/release-notes-for-dart-70-new-ia.md
index 23e9fb82bb..19faaa9de5 100644
--- a/mdop/dart-v7/release-notes-for-dart-70-new-ia.md
+++ b/mdop/dart-v7/release-notes-for-dart-70-new-ia.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fad227d0-5c22-4efd-9187-0e5922f7250b
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/security-considerations-for-dart-70-dart-7.md b/mdop/dart-v7/security-considerations-for-dart-70-dart-7.md
index 25be976fde..bba2b7aa94 100644
--- a/mdop/dart-v7/security-considerations-for-dart-70-dart-7.md
+++ b/mdop/dart-v7/security-considerations-for-dart-70-dart-7.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 52ad7e6c-c169-4ba4-aa76-56335a585eb8
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/technical-reference-for-dart-70-new-ia.md b/mdop/dart-v7/technical-reference-for-dart-70-new-ia.md
index 9858906b24..71ac50f9ae 100644
--- a/mdop/dart-v7/technical-reference-for-dart-70-new-ia.md
+++ b/mdop/dart-v7/technical-reference-for-dart-70-new-ia.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f55c7e5e-713a-42d1-84c9-88370155f934
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v7/troubleshooting-dart-70-new-ia.md b/mdop/dart-v7/troubleshooting-dart-70-new-ia.md
index 5ed44e7e05..6c38d06409 100644
--- a/mdop/dart-v7/troubleshooting-dart-70-new-ia.md
+++ b/mdop/dart-v7/troubleshooting-dart-70-new-ia.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 24c50efa-e9ac-45c4-aca2-b1dcfe834fdd
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/about-dart-80-dart-8.md b/mdop/dart-v8/about-dart-80-dart-8.md
index 5c87367d20..9820c5e742 100644
--- a/mdop/dart-v8/about-dart-80-dart-8.md
+++ b/mdop/dart-v8/about-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ce91efd6-7d78-44cb-bb8f-1f43f768ebaa
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/about-dart-80-sp1.md b/mdop/dart-v8/about-dart-80-sp1.md
index 3ccade84b6..e44c7a09be 100644
--- a/mdop/dart-v8/about-dart-80-sp1.md
+++ b/mdop/dart-v8/about-dart-80-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2e166444-4097-4b23-9f50-d8819f1f4960
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/about-dart-81.md b/mdop/dart-v8/about-dart-81.md
index b91ed2b3f4..b6da659173 100644
--- a/mdop/dart-v8/about-dart-81.md
+++ b/mdop/dart-v8/about-dart-81.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: dcaddc57-0111-4a9d-8be9-f5ada0eefa7d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/accessibility-for-dart-80-dart-8.md b/mdop/dart-v8/accessibility-for-dart-80-dart-8.md
index ce54a3a916..6980d28973 100644
--- a/mdop/dart-v8/accessibility-for-dart-80-dart-8.md
+++ b/mdop/dart-v8/accessibility-for-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 95f426de-222c-4ec0-9b9b-af817c7fff9b
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/administering-dart-80-using-powershell-dart-8.md b/mdop/dart-v8/administering-dart-80-using-powershell-dart-8.md
index 7e837ccffc..49ed66516c 100644
--- a/mdop/dart-v8/administering-dart-80-using-powershell-dart-8.md
+++ b/mdop/dart-v8/administering-dart-80-using-powershell-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 776430e0-d5c9-4919-877a-fab503451b37
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/creating-the-dart-80-recovery-image-dart-8.md b/mdop/dart-v8/creating-the-dart-80-recovery-image-dart-8.md
index be944c9ff8..9284d0c20e 100644
--- a/mdop/dart-v8/creating-the-dart-80-recovery-image-dart-8.md
+++ b/mdop/dart-v8/creating-the-dart-80-recovery-image-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 39001b8e-86c0-45ef-8f34-2d6199f9922d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/dart-80-deployment-checklist-dart-8.md b/mdop/dart-v8/dart-80-deployment-checklist-dart-8.md
index a3ef35e300..b0585c84fc 100644
--- a/mdop/dart-v8/dart-80-deployment-checklist-dart-8.md
+++ b/mdop/dart-v8/dart-80-deployment-checklist-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 74e071fb-697c-463f-adce-d09b8d86495f
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/dart-80-planning-checklist-dart-8.md b/mdop/dart-v8/dart-80-planning-checklist-dart-8.md
index d9994dd3cc..ceb155c30e 100644
--- a/mdop/dart-v8/dart-80-planning-checklist-dart-8.md
+++ b/mdop/dart-v8/dart-80-planning-checklist-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0a0f5a71-b1d6-424c-8174-fc5aad506928
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/dart-80-privacy-statement-dart-8.md b/mdop/dart-v8/dart-80-privacy-statement-dart-8.md
index 1adbc23901..73939a6af0 100644
--- a/mdop/dart-v8/dart-80-privacy-statement-dart-8.md
+++ b/mdop/dart-v8/dart-80-privacy-statement-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: db474241-e44e-4bca-9be4-3557a3614c2a
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/dart-80-supported-configurations-dart-8.md b/mdop/dart-v8/dart-80-supported-configurations-dart-8.md
index f79919bdd4..ba3ca72434 100644
--- a/mdop/dart-v8/dart-80-supported-configurations-dart-8.md
+++ b/mdop/dart-v8/dart-80-supported-configurations-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 95d68e5c-d202-4f4a-adef-d2098328172e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/deploying-dart-80-dart-8.md b/mdop/dart-v8/deploying-dart-80-dart-8.md
index 253b69e28d..0bfff42e41 100644
--- a/mdop/dart-v8/deploying-dart-80-dart-8.md
+++ b/mdop/dart-v8/deploying-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5a976d4e-3372-4ef6-9095-1b48e99af21b
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/deploying-dart-80-to-administrator-computers-dart-8.md b/mdop/dart-v8/deploying-dart-80-to-administrator-computers-dart-8.md
index e29f368dde..9a76b0e3ae 100644
--- a/mdop/dart-v8/deploying-dart-80-to-administrator-computers-dart-8.md
+++ b/mdop/dart-v8/deploying-dart-80-to-administrator-computers-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f918ead8-742e-464a-8bf6-1fcedde66cae
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/deploying-the-dart-recovery-image-dart-8.md b/mdop/dart-v8/deploying-the-dart-recovery-image-dart-8.md
index d06c1d699d..38d53ac43d 100644
--- a/mdop/dart-v8/deploying-the-dart-recovery-image-dart-8.md
+++ b/mdop/dart-v8/deploying-the-dart-recovery-image-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: df5cb54a-be8c-4ed2-89ea-d3c67c2ef4d4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/diagnosing-system-failures-with-crash-analyzer--dart-8.md b/mdop/dart-v8/diagnosing-system-failures-with-crash-analyzer--dart-8.md
index 93d1cee294..4553af5ce2 100644
--- a/mdop/dart-v8/diagnosing-system-failures-with-crash-analyzer--dart-8.md
+++ b/mdop/dart-v8/diagnosing-system-failures-with-crash-analyzer--dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ce3d3186-54fb-45b2-b5ce-9bb7841db28f
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/getting-started-with-dart-80-dart-8.md b/mdop/dart-v8/getting-started-with-dart-80-dart-8.md
index f65f99da45..66f6c6ad7d 100644
--- a/mdop/dart-v8/getting-started-with-dart-80-dart-8.md
+++ b/mdop/dart-v8/getting-started-with-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 579d18c5-7434-4a0e-9725-fb81ca5e3c6d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/how-to-change-repair-or-remove-dart-80-dart-8.md b/mdop/dart-v8/how-to-change-repair-or-remove-dart-80-dart-8.md
index 2ec61410a0..07b0c8b5bf 100644
--- a/mdop/dart-v8/how-to-change-repair-or-remove-dart-80-dart-8.md
+++ b/mdop/dart-v8/how-to-change-repair-or-remove-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a9737635-aaf5-45bd-861f-f9dff4f02336
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/how-to-deploy-dart-80-dart-8.md b/mdop/dart-v8/how-to-deploy-dart-80-dart-8.md
index a569e0ab61..64defad414 100644
--- a/mdop/dart-v8/how-to-deploy-dart-80-dart-8.md
+++ b/mdop/dart-v8/how-to-deploy-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ab772e7a-c02f-4847-acdf-8bd362769a77
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-8.md b/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-8.md
index e9ff959654..db1b6db9c4 100644
--- a/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-8.md
+++ b/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-a-remote-partition-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 58f4a6c6-6193-42bd-a095-0de868711af9
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-8.md b/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-8.md
index e79d234f3a..2f572440c7 100644
--- a/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-8.md
+++ b/mdop/dart-v8/how-to-deploy-the-dart-recovery-image-as-part-of-a-recovery-partition-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 07c5d539-51d9-4759-adc7-72b40d5d7bb3
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/how-to-ensure-that-crash-analyzer-can-access-symbol-files.md b/mdop/dart-v8/how-to-ensure-that-crash-analyzer-can-access-symbol-files.md
index 15135b16d0..e6b4f6ad25 100644
--- a/mdop/dart-v8/how-to-ensure-that-crash-analyzer-can-access-symbol-files.md
+++ b/mdop/dart-v8/how-to-ensure-that-crash-analyzer-can-access-symbol-files.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 99839013-1cd8-44d1-8484-0e15261c5a4b
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/how-to-perform-dart-tasks-by-using-powershell-commands-dart-8.md b/mdop/dart-v8/how-to-perform-dart-tasks-by-using-powershell-commands-dart-8.md
index 7036e2173b..8e49329140 100644
--- a/mdop/dart-v8/how-to-perform-dart-tasks-by-using-powershell-commands-dart-8.md
+++ b/mdop/dart-v8/how-to-perform-dart-tasks-by-using-powershell-commands-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bc788b00-38c7-4f57-a832-916b68264d89
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-8.md b/mdop/dart-v8/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-8.md
index 76ac2f9600..fc95efeecd 100644
--- a/mdop/dart-v8/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-8.md
+++ b/mdop/dart-v8/how-to-recover-local-computers-by-using-the-dart-recovery-image-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f679d522-49ab-429c-93d0-294c3f3e5639
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md b/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md
index da40c73d47..e8ceaf560b 100644
--- a/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md
+++ b/mdop/dart-v8/how-to-recover-remote-computers-by-using-the-dart-recovery-image-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 363ccd48-6820-4b5b-a43a-323c0b208a9d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-8.md b/mdop/dart-v8/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-8.md
index 2f82d060f4..8f3cdb66ed 100644
--- a/mdop/dart-v8/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-8.md
+++ b/mdop/dart-v8/how-to-run-the-crash-analyzer-in-stand-alone-mode-on-a-computer-other-than-an-end-user-computer-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b2f87144-6379-478a-802b-9cfef5242f34
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-8.md b/mdop/dart-v8/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-8.md
index bcd43d11d1..82ae23319c 100644
--- a/mdop/dart-v8/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-8.md
+++ b/mdop/dart-v8/how-to-run-the-crash-analyzer-on-an-end-user-computer-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d36213e5-7719-44d7-be65-971c3ef7df2c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/how-to-use-a-powershell-script-to-create-the-recovery-image-dart-8.md b/mdop/dart-v8/how-to-use-a-powershell-script-to-create-the-recovery-image-dart-8.md
index 5ea2ed4af5..33e32407c5 100644
--- a/mdop/dart-v8/how-to-use-a-powershell-script-to-create-the-recovery-image-dart-8.md
+++ b/mdop/dart-v8/how-to-use-a-powershell-script-to-create-the-recovery-image-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d0c71092-535e-43b1-9b1d-6ac819508348
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/microsoft-diagnostics-and-recovery-toolset--dart--users-should-use-windows-defender-offline--wdo--for-malware-detection.md b/mdop/dart-v8/microsoft-diagnostics-and-recovery-toolset--dart--users-should-use-windows-defender-offline--wdo--for-malware-detection.md
index 8d28155d2c..fe85973fc6 100644
--- a/mdop/dart-v8/microsoft-diagnostics-and-recovery-toolset--dart--users-should-use-windows-defender-offline--wdo--for-malware-detection.md
+++ b/mdop/dart-v8/microsoft-diagnostics-and-recovery-toolset--dart--users-should-use-windows-defender-offline--wdo--for-malware-detection.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 59678283-4b44-4d02-ba8f-0e7315efd5d1
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/operations-for-dart-80-dart-8.md b/mdop/dart-v8/operations-for-dart-80-dart-8.md
index 8b4d4064ac..a629db0966 100644
--- a/mdop/dart-v8/operations-for-dart-80-dart-8.md
+++ b/mdop/dart-v8/operations-for-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a31615de-eb6e-41af-909c-d0b6f3eb3f2f
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/overview-of-the-tools-in-dart-80-dart-8.md b/mdop/dart-v8/overview-of-the-tools-in-dart-80-dart-8.md
index 4939913f2a..0733bc4bef 100644
--- a/mdop/dart-v8/overview-of-the-tools-in-dart-80-dart-8.md
+++ b/mdop/dart-v8/overview-of-the-tools-in-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1766c82e-c099-47d4-b186-4689b026a7e0
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/planning-for-dart-80-dart-8.md b/mdop/dart-v8/planning-for-dart-80-dart-8.md
index 8c62020a06..79fd2ee510 100644
--- a/mdop/dart-v8/planning-for-dart-80-dart-8.md
+++ b/mdop/dart-v8/planning-for-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c8be3ab3-dc54-43b9-b9ff-fbd5e1ef29a7
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/planning-how-to-save-and-deploy-the-dart-80-recovery-image-dart-8.md b/mdop/dart-v8/planning-how-to-save-and-deploy-the-dart-80-recovery-image-dart-8.md
index 4886b9d80d..cebf48b625 100644
--- a/mdop/dart-v8/planning-how-to-save-and-deploy-the-dart-80-recovery-image-dart-8.md
+++ b/mdop/dart-v8/planning-how-to-save-and-deploy-the-dart-80-recovery-image-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 939fbe17-0e30-4c85-8782-5b84d69442a7
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/planning-to-create-the-dart-80-recovery-image-dart-8.md b/mdop/dart-v8/planning-to-create-the-dart-80-recovery-image-dart-8.md
index 4da66bd3aa..c75e4671f5 100644
--- a/mdop/dart-v8/planning-to-create-the-dart-80-recovery-image-dart-8.md
+++ b/mdop/dart-v8/planning-to-create-the-dart-80-recovery-image-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: cfd0e1e2-c379-4460-b545-3f7be9f33583
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/planning-to-deploy-dart-80-dart-8.md b/mdop/dart-v8/planning-to-deploy-dart-80-dart-8.md
index dffa452027..dd46acd8ee 100644
--- a/mdop/dart-v8/planning-to-deploy-dart-80-dart-8.md
+++ b/mdop/dart-v8/planning-to-deploy-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 36f2babb-9ac5-4ea2-932c-12c6211f5be2
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/recovering-computers-using-dart-80-dart-8.md b/mdop/dart-v8/recovering-computers-using-dart-80-dart-8.md
index 3c321dd003..0cec24ac75 100644
--- a/mdop/dart-v8/recovering-computers-using-dart-80-dart-8.md
+++ b/mdop/dart-v8/recovering-computers-using-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0caeb7d9-c1e6-4f32-bc27-157b91630989
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/release-notes-for-dart-80--dart-8.md b/mdop/dart-v8/release-notes-for-dart-80--dart-8.md
index 31b1b71c8c..501dfef1e7 100644
--- a/mdop/dart-v8/release-notes-for-dart-80--dart-8.md
+++ b/mdop/dart-v8/release-notes-for-dart-80--dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e8b373c8-7aa5-4930-a8f9-743d26145dad
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/release-notes-for-dart-80-sp1.md b/mdop/dart-v8/release-notes-for-dart-80-sp1.md
index 15d2ce4009..063f9be979 100644
--- a/mdop/dart-v8/release-notes-for-dart-80-sp1.md
+++ b/mdop/dart-v8/release-notes-for-dart-80-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fa7512d8-fb00-4c27-8f65-c15f3a8ff1cc
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/release-notes-for-dart-81.md b/mdop/dart-v8/release-notes-for-dart-81.md
index 05c3ced9ce..9b8d9d6639 100644
--- a/mdop/dart-v8/release-notes-for-dart-81.md
+++ b/mdop/dart-v8/release-notes-for-dart-81.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 44303107-60f4-485c-848a-7e0529f142d4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/security-and-privacy-for-dart-80-dart-8.md b/mdop/dart-v8/security-and-privacy-for-dart-80-dart-8.md
index 17a4641be1..bb8ae3ba3b 100644
--- a/mdop/dart-v8/security-and-privacy-for-dart-80-dart-8.md
+++ b/mdop/dart-v8/security-and-privacy-for-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 668188fc-d9e9-4607-b90a-9e50bf53bc88
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/security-considerations-for-dart-80--dart-8.md b/mdop/dart-v8/security-considerations-for-dart-80--dart-8.md
index 1899542b1e..918f14acaf 100644
--- a/mdop/dart-v8/security-considerations-for-dart-80--dart-8.md
+++ b/mdop/dart-v8/security-considerations-for-dart-80--dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 45ef8164-fee7-41a1-9a36-de4e3264e7a8
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/technical-reference-for-dart-80-new-ia.md b/mdop/dart-v8/technical-reference-for-dart-80-new-ia.md
index fb98efd9d0..da7f794b85 100644
--- a/mdop/dart-v8/technical-reference-for-dart-80-new-ia.md
+++ b/mdop/dart-v8/technical-reference-for-dart-80-new-ia.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1d0bf98b-b56b-4ce6-ad19-eb85e1ff1287
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/dart-v8/troubleshooting-dart-80-dart-8.md b/mdop/dart-v8/troubleshooting-dart-80-dart-8.md
index 1e1dd715ba..1ad577b12a 100644
--- a/mdop/dart-v8/troubleshooting-dart-80-dart-8.md
+++ b/mdop/dart-v8/troubleshooting-dart-80-dart-8.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0444a390-3251-47f4-b6c8-828d4a2e8af4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: support
ms.sitesec: library
diff --git a/mdop/mbam-v1/about-mbam-10.md b/mdop/mbam-v1/about-mbam-10.md
index ca1ac44277..3d6a3f705f 100644
--- a/mdop/mbam-v1/about-mbam-10.md
+++ b/mdop/mbam-v1/about-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 99254aaa-2b30-4b2e-8365-0d4b67a89a0c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/accessibility-for-mbam-10.md b/mdop/mbam-v1/accessibility-for-mbam-10.md
index d1622daf4f..bfe5549622 100644
--- a/mdop/mbam-v1/accessibility-for-mbam-10.md
+++ b/mdop/mbam-v1/accessibility-for-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5c1bf1a3-76cf-458c-ac4a-cd343aace4de
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/administering-mbam-10-by-using-powershell.md b/mdop/mbam-v1/administering-mbam-10-by-using-powershell.md
index 045a75049c..1609db7fb7 100644
--- a/mdop/mbam-v1/administering-mbam-10-by-using-powershell.md
+++ b/mdop/mbam-v1/administering-mbam-10-by-using-powershell.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3bf2eca5-4ab7-4e84-9e80-c0c7d709647b
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/administering-mbam-10-features.md b/mdop/mbam-v1/administering-mbam-10-features.md
index d4ffc956e4..5f4fbb0244 100644
--- a/mdop/mbam-v1/administering-mbam-10-features.md
+++ b/mdop/mbam-v1/administering-mbam-10-features.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: dd9a9eff-f1ad-4af3-85d9-c19131a4ad22
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/deploying-mbam-10-group-policy-objects.md b/mdop/mbam-v1/deploying-mbam-10-group-policy-objects.md
index 43a045b042..37436151d6 100644
--- a/mdop/mbam-v1/deploying-mbam-10-group-policy-objects.md
+++ b/mdop/mbam-v1/deploying-mbam-10-group-policy-objects.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2129291e-d2b2-41ed-b643-1e311c49fee7
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/deploying-mbam-10.md b/mdop/mbam-v1/deploying-mbam-10.md
index 738c0a8cf5..ab3420e5c6 100644
--- a/mdop/mbam-v1/deploying-mbam-10.md
+++ b/mdop/mbam-v1/deploying-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ff952ed6-08b2-4ed0-97b8-bf89f22cccbc
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/deploying-the-mbam-10-client.md b/mdop/mbam-v1/deploying-the-mbam-10-client.md
index 2ea9421631..cba12f248f 100644
--- a/mdop/mbam-v1/deploying-the-mbam-10-client.md
+++ b/mdop/mbam-v1/deploying-the-mbam-10-client.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f7ca233f-5035-4ff9-ab3a-f2453b4929d1
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/deploying-the-mbam-10-language-release-update.md b/mdop/mbam-v1/deploying-the-mbam-10-language-release-update.md
index e78020f8c7..22cac957e6 100644
--- a/mdop/mbam-v1/deploying-the-mbam-10-language-release-update.md
+++ b/mdop/mbam-v1/deploying-the-mbam-10-language-release-update.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9dbd85c3-e470-4752-a90f-25754dd46dab
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/deploying-the-mbam-10-server-infrastructure.md b/mdop/mbam-v1/deploying-the-mbam-10-server-infrastructure.md
index 271902cccb..22d1fabb5c 100644
--- a/mdop/mbam-v1/deploying-the-mbam-10-server-infrastructure.md
+++ b/mdop/mbam-v1/deploying-the-mbam-10-server-infrastructure.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 90529379-b70e-4c92-b188-3d7aaf1844af
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/evaluating-mbam-10.md b/mdop/mbam-v1/evaluating-mbam-10.md
index fdca62c06c..c7a6729376 100644
--- a/mdop/mbam-v1/evaluating-mbam-10.md
+++ b/mdop/mbam-v1/evaluating-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a1e2b674-eda9-4e1c-9b4c-e748470c71f2
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/getting-started-with-mbam-10.md b/mdop/mbam-v1/getting-started-with-mbam-10.md
index bea99f0a2d..f42751d4d1 100644
--- a/mdop/mbam-v1/getting-started-with-mbam-10.md
+++ b/mdop/mbam-v1/getting-started-with-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4fab4e4a-d25e-4661-b235-2b45bf5ac3e4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/high-availability-for-mbam-10.md b/mdop/mbam-v1/high-availability-for-mbam-10.md
index 5ed4167fde..90c23329c3 100644
--- a/mdop/mbam-v1/high-availability-for-mbam-10.md
+++ b/mdop/mbam-v1/high-availability-for-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5869ecf8-1056-4c32-aecb-838a37e05d39
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/high-level-architecture-for-mbam-10.md b/mdop/mbam-v1/high-level-architecture-for-mbam-10.md
index 0ebd00df60..4b98af6d48 100644
--- a/mdop/mbam-v1/high-level-architecture-for-mbam-10.md
+++ b/mdop/mbam-v1/high-level-architecture-for-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b1349196-88ed-4d6c-8a1d-998f18127b6b
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-configure-network-load-balancing-for-mbam.md b/mdop/mbam-v1/how-to-configure-network-load-balancing-for-mbam.md
index 3d6704eaa2..aa02943b12 100644
--- a/mdop/mbam-v1/how-to-configure-network-load-balancing-for-mbam.md
+++ b/mdop/mbam-v1/how-to-configure-network-load-balancing-for-mbam.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: df2208c3-352b-4a48-9722-237b0c8cd6a5
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-1.md b/mdop/mbam-v1/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-1.md
index 503daa81b3..0653f76736 100644
--- a/mdop/mbam-v1/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-1.md
+++ b/mdop/mbam-v1/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8704bf33-535d-41da-b9b2-45b60754367e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-1.md b/mdop/mbam-v1/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-1.md
index e04dee41a9..be6480250c 100644
--- a/mdop/mbam-v1/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-1.md
+++ b/mdop/mbam-v1/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f32927a2-4c05-4da8-acca-1108d1dfdb7e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-determine-the-bitlocker-encryption-state-of-a-lost-computers-mbam-1.md b/mdop/mbam-v1/how-to-determine-the-bitlocker-encryption-state-of-a-lost-computers-mbam-1.md
index 5b8a997a81..218739fbbf 100644
--- a/mdop/mbam-v1/how-to-determine-the-bitlocker-encryption-state-of-a-lost-computers-mbam-1.md
+++ b/mdop/mbam-v1/how-to-determine-the-bitlocker-encryption-state-of-a-lost-computers-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9440890a-9c63-463b-9113-f46071446388
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-edit-mbam-10-gpo-settings.md b/mdop/mbam-v1/how-to-edit-mbam-10-gpo-settings.md
index 638c95c3ca..96e8628560 100644
--- a/mdop/mbam-v1/how-to-edit-mbam-10-gpo-settings.md
+++ b/mdop/mbam-v1/how-to-edit-mbam-10-gpo-settings.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 03d12fbc-4302-43fc-9b38-440607d778a1
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-generate-mbam-reports-mbam-1.md b/mdop/mbam-v1/how-to-generate-mbam-reports-mbam-1.md
index f8ee9675f3..19ff56c01c 100644
--- a/mdop/mbam-v1/how-to-generate-mbam-reports-mbam-1.md
+++ b/mdop/mbam-v1/how-to-generate-mbam-reports-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: cdf4ae76-040c-447c-8736-c9e57068d221
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-hide-default-bitlocker-encryption-in-the-windows-control-panel.md b/mdop/mbam-v1/how-to-hide-default-bitlocker-encryption-in-the-windows-control-panel.md
index 43b5fda53f..4eab4444f5 100644
--- a/mdop/mbam-v1/how-to-hide-default-bitlocker-encryption-in-the-windows-control-panel.md
+++ b/mdop/mbam-v1/how-to-hide-default-bitlocker-encryption-in-the-windows-control-panel.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c8503743-220c-497c-9785-e2feeca484d6
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-install-and-configure-mbam-on-a-single-server-mbam-1.md b/mdop/mbam-v1/how-to-install-and-configure-mbam-on-a-single-server-mbam-1.md
index 55e383c7ac..b4654bbd91 100644
--- a/mdop/mbam-v1/how-to-install-and-configure-mbam-on-a-single-server-mbam-1.md
+++ b/mdop/mbam-v1/how-to-install-and-configure-mbam-on-a-single-server-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 55841c63-bad9-44e7-b7fd-ea7037febbd7
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-install-and-configure-mbam-on-distributed-servers-mbam-1.md b/mdop/mbam-v1/how-to-install-and-configure-mbam-on-distributed-servers-mbam-1.md
index d58d1a28b7..5801740a1e 100644
--- a/mdop/mbam-v1/how-to-install-and-configure-mbam-on-distributed-servers-mbam-1.md
+++ b/mdop/mbam-v1/how-to-install-and-configure-mbam-on-distributed-servers-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9ee766aa-6339-422a-8d00-4f58e4646a5e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-install-the-mbam-10-group-policy-template.md b/mdop/mbam-v1/how-to-install-the-mbam-10-group-policy-template.md
index 825cfe0c61..47f9d4d6f4 100644
--- a/mdop/mbam-v1/how-to-install-the-mbam-10-group-policy-template.md
+++ b/mdop/mbam-v1/how-to-install-the-mbam-10-group-policy-template.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 451a50b0-939c-47ad-9248-a138deade550
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-a-single-server-mbam-1.md b/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-a-single-server-mbam-1.md
index b425b9d9b2..ae463cffe6 100644
--- a/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-a-single-server-mbam-1.md
+++ b/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-a-single-server-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e6fe59a3-a3e1-455c-a059-1f23ee083cf6
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-distributed-servers-mbam-1.md b/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-distributed-servers-mbam-1.md
index 9c23418768..8a88aa7e8a 100644
--- a/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-distributed-servers-mbam-1.md
+++ b/mdop/mbam-v1/how-to-install-the-mbam-language-update-on-distributed-servers-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5ddc64c6-0417-4a04-843e-b5e18d9f1a52
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-manage-computer-bitlocker-encryption-exemptions.md b/mdop/mbam-v1/how-to-manage-computer-bitlocker-encryption-exemptions.md
index 649d3d3719..15689e60c3 100644
--- a/mdop/mbam-v1/how-to-manage-computer-bitlocker-encryption-exemptions.md
+++ b/mdop/mbam-v1/how-to-manage-computer-bitlocker-encryption-exemptions.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d4400a0d-b36b-4cf5-a294-1f53ec47f9ee
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-manage-hardware-compatibility-mbam-1.md b/mdop/mbam-v1/how-to-manage-hardware-compatibility-mbam-1.md
index b429461024..0072ad71f7 100644
--- a/mdop/mbam-v1/how-to-manage-hardware-compatibility-mbam-1.md
+++ b/mdop/mbam-v1/how-to-manage-hardware-compatibility-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c74b96b9-8161-49bc-b5bb-4838734e7df5
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-manage-mbam-administrator-roles-mbam-1.md b/mdop/mbam-v1/how-to-manage-mbam-administrator-roles-mbam-1.md
index 7b1c2917a9..748fa21f52 100644
--- a/mdop/mbam-v1/how-to-manage-mbam-administrator-roles-mbam-1.md
+++ b/mdop/mbam-v1/how-to-manage-mbam-administrator-roles-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c0f25a42-dbff-418d-a776-4fe23ee07d16
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-1.md b/mdop/mbam-v1/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-1.md
index 40dd467712..0812e74168 100644
--- a/mdop/mbam-v1/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-1.md
+++ b/mdop/mbam-v1/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c08077e1-5529-468f-9370-c3b33fc258f3
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-manage-user-bitlocker-encryption-exemptions-mbam-1.md b/mdop/mbam-v1/how-to-manage-user-bitlocker-encryption-exemptions-mbam-1.md
index e280f83a10..9dee32aef0 100644
--- a/mdop/mbam-v1/how-to-manage-user-bitlocker-encryption-exemptions-mbam-1.md
+++ b/mdop/mbam-v1/how-to-manage-user-bitlocker-encryption-exemptions-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 48d69721-504f-4524-8a04-b9ce213ac9b4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-move-mbam-10-features-to-another-computer.md b/mdop/mbam-v1/how-to-move-mbam-10-features-to-another-computer.md
index 437ed73081..c691779c7b 100644
--- a/mdop/mbam-v1/how-to-move-mbam-10-features-to-another-computer.md
+++ b/mdop/mbam-v1/how-to-move-mbam-10-features-to-another-computer.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e1907d92-6b42-4ba3-b0e4-60a9cc8285cc
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-recover-a-corrupted-drive-mbam-1.md b/mdop/mbam-v1/how-to-recover-a-corrupted-drive-mbam-1.md
index 078be72832..b0dee3080f 100644
--- a/mdop/mbam-v1/how-to-recover-a-corrupted-drive-mbam-1.md
+++ b/mdop/mbam-v1/how-to-recover-a-corrupted-drive-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 715491ae-69c0-4fae-ad3f-3bd19a0db2f2
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-recover-a-drive-in-recovery-mode-mbam-1.md b/mdop/mbam-v1/how-to-recover-a-drive-in-recovery-mode-mbam-1.md
index 4b15fb333a..fe926539db 100644
--- a/mdop/mbam-v1/how-to-recover-a-drive-in-recovery-mode-mbam-1.md
+++ b/mdop/mbam-v1/how-to-recover-a-drive-in-recovery-mode-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 09d27e4b-57fa-47c7-a004-8b876a49f27e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-recover-a-moved-drive-mbam-1.md b/mdop/mbam-v1/how-to-recover-a-moved-drive-mbam-1.md
index 849c17e122..77052fa258 100644
--- a/mdop/mbam-v1/how-to-recover-a-moved-drive-mbam-1.md
+++ b/mdop/mbam-v1/how-to-recover-a-moved-drive-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0c7199d8-9463-4f44-9af3-b70eceeaff1d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/how-to-reset-a-tpm-lockout-mbam-1.md b/mdop/mbam-v1/how-to-reset-a-tpm-lockout-mbam-1.md
index 59b6761eb8..0dd2c800ef 100644
--- a/mdop/mbam-v1/how-to-reset-a-tpm-lockout-mbam-1.md
+++ b/mdop/mbam-v1/how-to-reset-a-tpm-lockout-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 91ec6666-1ae2-4e76-9459-ad65c405f639
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/known-issues-in-the-mbam-international-release-mbam-1.md b/mdop/mbam-v1/known-issues-in-the-mbam-international-release-mbam-1.md
index 60ea674d89..965278e188 100644
--- a/mdop/mbam-v1/known-issues-in-the-mbam-international-release-mbam-1.md
+++ b/mdop/mbam-v1/known-issues-in-the-mbam-international-release-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bbf888dc-93c1-4323-b43c-0ded098e9b93
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/maintaining-mbam-10.md b/mdop/mbam-v1/maintaining-mbam-10.md
index 08d3397021..ed8099b713 100644
--- a/mdop/mbam-v1/maintaining-mbam-10.md
+++ b/mdop/mbam-v1/maintaining-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 02ffb093-c364-4837-bbe8-23d4c09fbd3d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/mbam-10-deployment-checklist.md b/mdop/mbam-v1/mbam-10-deployment-checklist.md
index 78811c5868..8b7b659b06 100644
--- a/mdop/mbam-v1/mbam-10-deployment-checklist.md
+++ b/mdop/mbam-v1/mbam-10-deployment-checklist.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7e00be23-36a0-4b0f-8663-3c4f2c71546d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/mbam-10-deployment-prerequisites.md b/mdop/mbam-v1/mbam-10-deployment-prerequisites.md
index ffa50dd748..0b59eb0f40 100644
--- a/mdop/mbam-v1/mbam-10-deployment-prerequisites.md
+++ b/mdop/mbam-v1/mbam-10-deployment-prerequisites.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bd9e1010-7d25-43e7-8dc6-b521226a659d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/mbam-10-planning-checklist.md b/mdop/mbam-v1/mbam-10-planning-checklist.md
index 9517808983..0324216e06 100644
--- a/mdop/mbam-v1/mbam-10-planning-checklist.md
+++ b/mdop/mbam-v1/mbam-10-planning-checklist.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e9439f16-d68b-48ed-99ce-5949356b180b
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/mbam-10-supported-configurations.md b/mdop/mbam-v1/mbam-10-supported-configurations.md
index 6b5599561b..80ed363018 100644
--- a/mdop/mbam-v1/mbam-10-supported-configurations.md
+++ b/mdop/mbam-v1/mbam-10-supported-configurations.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1f5ac58e-6a3f-47df-8a9b-4b57631ab9ee
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/monitoring-and-reporting-bitlocker-compliance-with-mbam-10.md b/mdop/mbam-v1/monitoring-and-reporting-bitlocker-compliance-with-mbam-10.md
index 1d1aacab0b..beb0deea35 100644
--- a/mdop/mbam-v1/monitoring-and-reporting-bitlocker-compliance-with-mbam-10.md
+++ b/mdop/mbam-v1/monitoring-and-reporting-bitlocker-compliance-with-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fb497d3f-ff33-4747-8e34-366440ee25c2
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/operations-for-mbam-10.md b/mdop/mbam-v1/operations-for-mbam-10.md
index 526fe9bdf5..560b76d3ff 100644
--- a/mdop/mbam-v1/operations-for-mbam-10.md
+++ b/mdop/mbam-v1/operations-for-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2c358fa1-4795-45ab-9316-02db4aaa6d5f
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/performing-bitlocker-management-with-mbam.md b/mdop/mbam-v1/performing-bitlocker-management-with-mbam.md
index b23666e4fb..b37c05e208 100644
--- a/mdop/mbam-v1/performing-bitlocker-management-with-mbam.md
+++ b/mdop/mbam-v1/performing-bitlocker-management-with-mbam.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2d24390a-87bf-48b3-96a9-3882d6f2a15c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/planning-for-mbam-10-administrator-roles.md b/mdop/mbam-v1/planning-for-mbam-10-administrator-roles.md
index 72bae93ade..6ed9a49fe7 100644
--- a/mdop/mbam-v1/planning-for-mbam-10-administrator-roles.md
+++ b/mdop/mbam-v1/planning-for-mbam-10-administrator-roles.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 95be0eb4-25e9-43ca-a8e7-27373d35544d
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/planning-for-mbam-10-client-deployment.md b/mdop/mbam-v1/planning-for-mbam-10-client-deployment.md
index d5195197e8..352f0f8fba 100644
--- a/mdop/mbam-v1/planning-for-mbam-10-client-deployment.md
+++ b/mdop/mbam-v1/planning-for-mbam-10-client-deployment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3af2e7f3-134b-4ab9-9847-b07474ca6ac3
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/planning-for-mbam-10-group-policy-requirements.md b/mdop/mbam-v1/planning-for-mbam-10-group-policy-requirements.md
index 0c384ae2d6..4b825a4bea 100644
--- a/mdop/mbam-v1/planning-for-mbam-10-group-policy-requirements.md
+++ b/mdop/mbam-v1/planning-for-mbam-10-group-policy-requirements.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0fc9c509-7850-4a8e-bb82-b949025bcb02
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/planning-for-mbam-10-server-deployment.md b/mdop/mbam-v1/planning-for-mbam-10-server-deployment.md
index b2e492d53c..fe9b06d826 100644
--- a/mdop/mbam-v1/planning-for-mbam-10-server-deployment.md
+++ b/mdop/mbam-v1/planning-for-mbam-10-server-deployment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3cbef284-3092-4c42-9234-2826b18ddef1
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/planning-for-mbam-10.md b/mdop/mbam-v1/planning-for-mbam-10.md
index 74f3e52c47..53583513c7 100644
--- a/mdop/mbam-v1/planning-for-mbam-10.md
+++ b/mdop/mbam-v1/planning-for-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d4e8a42f-2836-48c8-83c1-40bd58270e19
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/planning-to-deploy-mbam-10.md b/mdop/mbam-v1/planning-to-deploy-mbam-10.md
index a140ac107e..c35e32933a 100644
--- a/mdop/mbam-v1/planning-to-deploy-mbam-10.md
+++ b/mdop/mbam-v1/planning-to-deploy-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 30ad4304-45c6-427d-8e33-ebe8053c7871
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/preparing-your-environment-for-mbam-10.md b/mdop/mbam-v1/preparing-your-environment-for-mbam-10.md
index e6f0d28e17..931b7c9924 100644
--- a/mdop/mbam-v1/preparing-your-environment-for-mbam-10.md
+++ b/mdop/mbam-v1/preparing-your-environment-for-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 915f7c3c-70ad-4a90-a434-73e7fba97ecb
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/privacy-statement-for-mbam-10.md b/mdop/mbam-v1/privacy-statement-for-mbam-10.md
index c270853e2b..f54a72fb5e 100644
--- a/mdop/mbam-v1/privacy-statement-for-mbam-10.md
+++ b/mdop/mbam-v1/privacy-statement-for-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: db18cc93-a1c1-44da-a450-a5399a4427b9
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/release-notes-for-mbam-10.md b/mdop/mbam-v1/release-notes-for-mbam-10.md
index aac64b73a3..61041c666a 100644
--- a/mdop/mbam-v1/release-notes-for-mbam-10.md
+++ b/mdop/mbam-v1/release-notes-for-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d82fddde-c360-48ef-86a0-d9b5fe066861
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/security-and-privacy-for-mbam-10.md b/mdop/mbam-v1/security-and-privacy-for-mbam-10.md
index 77f5bbac35..8ef48ada78 100644
--- a/mdop/mbam-v1/security-and-privacy-for-mbam-10.md
+++ b/mdop/mbam-v1/security-and-privacy-for-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ba4497f1-b9e3-41be-8953-3637d1f83f01
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/security-considerations-for-mbam-10.md b/mdop/mbam-v1/security-considerations-for-mbam-10.md
index eff551a11c..340bd2e376 100644
--- a/mdop/mbam-v1/security-considerations-for-mbam-10.md
+++ b/mdop/mbam-v1/security-considerations-for-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5e1c8b8c-235b-4a92-8b0b-da50dca17353
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/troubleshooting-mbam-10.md b/mdop/mbam-v1/troubleshooting-mbam-10.md
index 8fb6127377..bcf03fa8b3 100644
--- a/mdop/mbam-v1/troubleshooting-mbam-10.md
+++ b/mdop/mbam-v1/troubleshooting-mbam-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7d47fbfe-51c0-4619-bed3-163dfd18cdec
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v1/understanding-mbam-reports-mbam-1.md b/mdop/mbam-v1/understanding-mbam-reports-mbam-1.md
index 022175bb77..eb7557d3a6 100644
--- a/mdop/mbam-v1/understanding-mbam-reports-mbam-1.md
+++ b/mdop/mbam-v1/understanding-mbam-reports-mbam-1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 34e4aaeb-7f89-41a1-b816-c6fe8397b060
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/about-mbam-20-mbam-2.md b/mdop/mbam-v2/about-mbam-20-mbam-2.md
index 397a35cb79..9fb055be15 100644
--- a/mdop/mbam-v2/about-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/about-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b43a0ba9-1c83-4854-a2c5-14eea0070e36
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/about-mbam-20-sp1.md b/mdop/mbam-v2/about-mbam-20-sp1.md
index b0c981921e..ab210f8c1c 100644
--- a/mdop/mbam-v2/about-mbam-20-sp1.md
+++ b/mdop/mbam-v2/about-mbam-20-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5ba89ed8-bb6e-407b-82c2-e2e36dd1078e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/about-the-computer-tpm-chip.md b/mdop/mbam-v2/about-the-computer-tpm-chip.md
index 6c54503317..8c951c73f2 100644
--- a/mdop/mbam-v2/about-the-computer-tpm-chip.md
+++ b/mdop/mbam-v2/about-the-computer-tpm-chip.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6f1cf18c-277a-4932-886d-14202ca8d175
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/accessibility-for-mbam-20-mbam-2.md b/mdop/mbam-v2/accessibility-for-mbam-20-mbam-2.md
index 7add613c67..0103e4791e 100644
--- a/mdop/mbam-v2/accessibility-for-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/accessibility-for-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9cd628f1-f594-43ab-8095-4663272940a9
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/administering-mbam-20-features-mbam-2.md b/mdop/mbam-v2/administering-mbam-20-features-mbam-2.md
index 7ee742c396..fc6335b69f 100644
--- a/mdop/mbam-v2/administering-mbam-20-features-mbam-2.md
+++ b/mdop/mbam-v2/administering-mbam-20-features-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 065e0704-069e-4372-9b86-0b57dd7638dd
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/administering-mbam-20-using-powershell-mbam-2.md b/mdop/mbam-v2/administering-mbam-20-using-powershell-mbam-2.md
index f43d38765a..87d58f9e89 100644
--- a/mdop/mbam-v2/administering-mbam-20-using-powershell-mbam-2.md
+++ b/mdop/mbam-v2/administering-mbam-20-using-powershell-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d785a8df-0a8c-4d70-abd2-93a762b4f3de
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/create-or-edit-the-sms-defmof-file.md b/mdop/mbam-v2/create-or-edit-the-sms-defmof-file.md
index 744345ad5d..9d05e02689 100644
--- a/mdop/mbam-v2/create-or-edit-the-sms-defmof-file.md
+++ b/mdop/mbam-v2/create-or-edit-the-sms-defmof-file.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d1747e43-484e-4031-a63b-6342fe588aa2
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/deploying-mbam-20-group-policy-objects-mbam-2.md b/mdop/mbam-v2/deploying-mbam-20-group-policy-objects-mbam-2.md
index 4b3e88d612..da944127c7 100644
--- a/mdop/mbam-v2/deploying-mbam-20-group-policy-objects-mbam-2.md
+++ b/mdop/mbam-v2/deploying-mbam-20-group-policy-objects-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f17f3897-73ab-431b-a6ec-5a6cff9f279a
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/deploying-mbam-20-mbam-2.md b/mdop/mbam-v2/deploying-mbam-20-mbam-2.md
index 80dc366d32..6f40b9722f 100644
--- a/mdop/mbam-v2/deploying-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/deploying-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4b0eaf10-81b4-427e-9d43-eb833de935a3
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/deploying-mbam-with-configuration-manager-mbam2.md b/mdop/mbam-v2/deploying-mbam-with-configuration-manager-mbam2.md
index 1c67a9c241..ae87ad3b57 100644
--- a/mdop/mbam-v2/deploying-mbam-with-configuration-manager-mbam2.md
+++ b/mdop/mbam-v2/deploying-mbam-with-configuration-manager-mbam2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 89d03e29-457a-471d-b893-e0b74a83ec50
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/deploying-the-mbam-20-client-mbam-2.md b/mdop/mbam-v2/deploying-the-mbam-20-client-mbam-2.md
index aec7e23b95..66a8831e05 100644
--- a/mdop/mbam-v2/deploying-the-mbam-20-client-mbam-2.md
+++ b/mdop/mbam-v2/deploying-the-mbam-20-client-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3dd584fe-2a54-40f0-9bab-13ea74040b01
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/deploying-the-mbam-20-server-infrastructure-mbam-2.md b/mdop/mbam-v2/deploying-the-mbam-20-server-infrastructure-mbam-2.md
index 92009c59e2..ba8831debe 100644
--- a/mdop/mbam-v2/deploying-the-mbam-20-server-infrastructure-mbam-2.md
+++ b/mdop/mbam-v2/deploying-the-mbam-20-server-infrastructure-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 52e68d94-e2b4-4b06-ae55-f900ea6cc59f
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/edit-the-configurationmof-file.md b/mdop/mbam-v2/edit-the-configurationmof-file.md
index ac93e6c000..d1b6c423a7 100644
--- a/mdop/mbam-v2/edit-the-configurationmof-file.md
+++ b/mdop/mbam-v2/edit-the-configurationmof-file.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 23e50ec9-4083-4b12-ad96-626cf30960bb
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/evaluating-mbam-20-mbam-2.md b/mdop/mbam-v2/evaluating-mbam-20-mbam-2.md
index 40d947f55d..9381657ebb 100644
--- a/mdop/mbam-v2/evaluating-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/evaluating-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bfc77eec-0fd7-4fec-9c78-6870afa87152
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/getting-started---using-mbam-with-configuration-manager.md b/mdop/mbam-v2/getting-started---using-mbam-with-configuration-manager.md
index 5b542f196a..a2a80d1262 100644
--- a/mdop/mbam-v2/getting-started---using-mbam-with-configuration-manager.md
+++ b/mdop/mbam-v2/getting-started---using-mbam-with-configuration-manager.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b0a1d3cc-0b01-4b69-a2cd-fd09fb3beda4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/getting-started-with-mbam-20-mbam-2.md b/mdop/mbam-v2/getting-started-with-mbam-20-mbam-2.md
index 625e1ee26f..0183c9e902 100644
--- a/mdop/mbam-v2/getting-started-with-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/getting-started-with-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 29f5c9af-5bbf-4d37-aa0f-0716046904af
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/helping-end-users-manage-bitlocker.md b/mdop/mbam-v2/helping-end-users-manage-bitlocker.md
index b3623cb9aa..b3c0e338c5 100644
--- a/mdop/mbam-v2/helping-end-users-manage-bitlocker.md
+++ b/mdop/mbam-v2/helping-end-users-manage-bitlocker.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 47776fb3-2d94-4970-b687-c35ec3dd6c64
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/high-availability-for-mbam-20-mbam-2.md b/mdop/mbam-v2/high-availability-for-mbam-20-mbam-2.md
index a4caa36571..810ca0e569 100644
--- a/mdop/mbam-v2/high-availability-for-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/high-availability-for-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 244ee013-9e2a-48d2-b842-4e10594fd74f
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/high-level-architecture-for-mbam-20-mbam-2.md b/mdop/mbam-v2/high-level-architecture-for-mbam-20-mbam-2.md
index 27e1c2e644..99d1616b22 100644
--- a/mdop/mbam-v2/high-level-architecture-for-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/high-level-architecture-for-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7f73dd3a-0b1f-4af6-a2f0-d0c5bc5d183a
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-brand-the-self-service-portal.md b/mdop/mbam-v2/how-to-brand-the-self-service-portal.md
index f43a97e8c6..e7b09a94a5 100644
--- a/mdop/mbam-v2/how-to-brand-the-self-service-portal.md
+++ b/mdop/mbam-v2/how-to-brand-the-self-service-portal.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3ef9e951-7c42-4f7f-b131-3765d39b3207
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-create-or-edit-the-mof-files.md b/mdop/mbam-v2/how-to-create-or-edit-the-mof-files.md
index b47d44cf1c..c74822c16c 100644
--- a/mdop/mbam-v2/how-to-create-or-edit-the-mof-files.md
+++ b/mdop/mbam-v2/how-to-create-or-edit-the-mof-files.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4d19d707-b90f-4057-a6e9-e4221a607190
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-2.md b/mdop/mbam-v2/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-2.md
index 10910254bf..59996d8297 100644
--- a/mdop/mbam-v2/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-2.md
+++ b/mdop/mbam-v2/how-to-deploy-the-mbam-client-as-part-of-a-windows-deployment-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 67387de7-8b02-4412-9850-3b8d8e5c18af
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-2.md b/mdop/mbam-v2/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-2.md
index 47593de55a..c7b5c03238 100644
--- a/mdop/mbam-v2/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-2.md
+++ b/mdop/mbam-v2/how-to-deploy-the-mbam-client-to-desktop-or-laptop-computers-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 56744922-bfdd-48f6-ae01-645ff53b64a8
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-2.md b/mdop/mbam-v2/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-2.md
index bb42e53b57..46c10f9c67 100644
--- a/mdop/mbam-v2/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-2.md
+++ b/mdop/mbam-v2/how-to-determine-bitlocker-encryption-state-of-lost-computers-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: dbd23b64-dff3-4913-9acd-affe67b9462e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-edit-mbam-20-gpo-settings-mbam-2.md b/mdop/mbam-v2/how-to-edit-mbam-20-gpo-settings-mbam-2.md
index 6e2e8a86b9..457d479a15 100644
--- a/mdop/mbam-v2/how-to-edit-mbam-20-gpo-settings-mbam-2.md
+++ b/mdop/mbam-v2/how-to-edit-mbam-20-gpo-settings-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f5ffa93d-b4d2-4317-8a1c-7d2be0264fe3
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-generate-mbam-reports-mbam-2.md b/mdop/mbam-v2/how-to-generate-mbam-reports-mbam-2.md
index f316734c05..601184d6e5 100644
--- a/mdop/mbam-v2/how-to-generate-mbam-reports-mbam-2.md
+++ b/mdop/mbam-v2/how-to-generate-mbam-reports-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 083550cb-8c3f-49b3-a30e-97d85374d2f4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-hide-default-bitlocker-encryption-in-the-windows-control-panel-mbam-2.md b/mdop/mbam-v2/how-to-hide-default-bitlocker-encryption-in-the-windows-control-panel-mbam-2.md
index 38f047024f..73915791b9 100644
--- a/mdop/mbam-v2/how-to-hide-default-bitlocker-encryption-in-the-windows-control-panel-mbam-2.md
+++ b/mdop/mbam-v2/how-to-hide-default-bitlocker-encryption-in-the-windows-control-panel-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6674aa51-2b5d-4e4a-8b43-2cc18d008285
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-install-and-configure-mbam-on-a-single-server-mbam-2.md b/mdop/mbam-v2/how-to-install-and-configure-mbam-on-a-single-server-mbam-2.md
index 27958ae9ea..593e8d34e5 100644
--- a/mdop/mbam-v2/how-to-install-and-configure-mbam-on-a-single-server-mbam-2.md
+++ b/mdop/mbam-v2/how-to-install-and-configure-mbam-on-a-single-server-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 45e6a012-6c8c-4d90-902c-d09de9a0cbea
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-install-and-configure-mbam-on-distributed-servers-mbam-2.md b/mdop/mbam-v2/how-to-install-and-configure-mbam-on-distributed-servers-mbam-2.md
index 1d8a7e2c2f..c4e74fd53a 100644
--- a/mdop/mbam-v2/how-to-install-and-configure-mbam-on-distributed-servers-mbam-2.md
+++ b/mdop/mbam-v2/how-to-install-and-configure-mbam-on-distributed-servers-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 67b91e6b-ae2e-4e47-9ef2-6819aba95976
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-install-mbam-with-configuration-manager.md b/mdop/mbam-v2/how-to-install-mbam-with-configuration-manager.md
index c68683c237..ef5c19da6f 100644
--- a/mdop/mbam-v2/how-to-install-mbam-with-configuration-manager.md
+++ b/mdop/mbam-v2/how-to-install-mbam-with-configuration-manager.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fd0832e4-3b79-4e56-9550-d2f396be6d09
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-install-the-mbam-20-group-policy-template-mbam-2.md b/mdop/mbam-v2/how-to-install-the-mbam-20-group-policy-template-mbam-2.md
index d8632fcd91..88d1e84dc4 100644
--- a/mdop/mbam-v2/how-to-install-the-mbam-20-group-policy-template-mbam-2.md
+++ b/mdop/mbam-v2/how-to-install-the-mbam-20-group-policy-template-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bc193232-d060-4285-842e-d194a74dd3c9
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-manage-mbam-administrator-roles-mbam-2.md b/mdop/mbam-v2/how-to-manage-mbam-administrator-roles-mbam-2.md
index a7e9b0e7ac..4f2389ef54 100644
--- a/mdop/mbam-v2/how-to-manage-mbam-administrator-roles-mbam-2.md
+++ b/mdop/mbam-v2/how-to-manage-mbam-administrator-roles-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 813ac0c4-3cf9-47af-b4cb-9395fd915e5c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-2.md b/mdop/mbam-v2/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-2.md
index 5f83c9dd0d..fafcf4f205 100644
--- a/mdop/mbam-v2/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-2.md
+++ b/mdop/mbam-v2/how-to-manage-mbam-client-bitlocker-encryption-options-by-using-the-control-panel-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e2ff153e-5770-4a12-b79d-cda998b8a8ab
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-manage-user-bitlocker-encryption-exemptions-mbam-2.md b/mdop/mbam-v2/how-to-manage-user-bitlocker-encryption-exemptions-mbam-2.md
index e518a674e4..a19aea482c 100644
--- a/mdop/mbam-v2/how-to-manage-user-bitlocker-encryption-exemptions-mbam-2.md
+++ b/mdop/mbam-v2/how-to-manage-user-bitlocker-encryption-exemptions-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1bfd9d66-6a9a-4d0e-b54a-e5a6627f5ada
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-move-mbam-20-features-to-another-computer-mbam-2.md b/mdop/mbam-v2/how-to-move-mbam-20-features-to-another-computer-mbam-2.md
index ed20b6e810..353753ffd1 100644
--- a/mdop/mbam-v2/how-to-move-mbam-20-features-to-another-computer-mbam-2.md
+++ b/mdop/mbam-v2/how-to-move-mbam-20-features-to-another-computer-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 49bc0792-60a4-473f-89cc-ada30191e04a
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-recover-a-corrupted-drive-mbam-2.md b/mdop/mbam-v2/how-to-recover-a-corrupted-drive-mbam-2.md
index 127ccb9fb5..0bc49581fa 100644
--- a/mdop/mbam-v2/how-to-recover-a-corrupted-drive-mbam-2.md
+++ b/mdop/mbam-v2/how-to-recover-a-corrupted-drive-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b0457a00-f72e-4ad8-ab3b-7701851ca87e
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-recover-a-drive-in-recovery-mode-mbam-2.md b/mdop/mbam-v2/how-to-recover-a-drive-in-recovery-mode-mbam-2.md
index 829e609d9a..a4e2df88a3 100644
--- a/mdop/mbam-v2/how-to-recover-a-drive-in-recovery-mode-mbam-2.md
+++ b/mdop/mbam-v2/how-to-recover-a-drive-in-recovery-mode-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8b792bc8-b671-4345-9d37-0208db3e5b03
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-recover-a-moved-drive-mbam-2.md b/mdop/mbam-v2/how-to-recover-a-moved-drive-mbam-2.md
index ca34602795..8c02d3e434 100644
--- a/mdop/mbam-v2/how-to-recover-a-moved-drive-mbam-2.md
+++ b/mdop/mbam-v2/how-to-recover-a-moved-drive-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 697cd78d-962c-411e-901a-2e9220ba6552
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-reset-a-tpm-lockout-mbam-2.md b/mdop/mbam-v2/how-to-reset-a-tpm-lockout-mbam-2.md
index 2cbe850d58..b41efb0bd6 100644
--- a/mdop/mbam-v2/how-to-reset-a-tpm-lockout-mbam-2.md
+++ b/mdop/mbam-v2/how-to-reset-a-tpm-lockout-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 20719ab2-18ae-4d3b-989a-539341909816
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-client.md b/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-client.md
index a0f768a971..b28772f06b 100644
--- a/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-client.md
+++ b/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-client.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4dc8f944-c2fd-4d89-aed6-e9dc77de3ae4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-server.md b/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-server.md
index 3382609997..856a5c7584 100644
--- a/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-server.md
+++ b/mdop/mbam-v2/how-to-use-a-command-line-to-install-the-mbam-server.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6ffc6d41-a793-42c2-b997-95ba47550648
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-use-the-help-desk-portal.md b/mdop/mbam-v2/how-to-use-the-help-desk-portal.md
index f072447022..4b4a4b1d73 100644
--- a/mdop/mbam-v2/how-to-use-the-help-desk-portal.md
+++ b/mdop/mbam-v2/how-to-use-the-help-desk-portal.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c27f7737-10c8-4164-9de8-57987292c89c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-use-the-self-service-portal-to-regain-access-to-a-computer.md b/mdop/mbam-v2/how-to-use-the-self-service-portal-to-regain-access-to-a-computer.md
index 26c119c021..bb6cf70424 100644
--- a/mdop/mbam-v2/how-to-use-the-self-service-portal-to-regain-access-to-a-computer.md
+++ b/mdop/mbam-v2/how-to-use-the-self-service-portal-to-regain-access-to-a-computer.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bcf095de-0237-4bb0-b450-da8fb6d6f3d0
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/how-to-validate-the-mbam-installation-with-configuration-manager.md b/mdop/mbam-v2/how-to-validate-the-mbam-installation-with-configuration-manager.md
index 841a83a734..ad2f0f4528 100644
--- a/mdop/mbam-v2/how-to-validate-the-mbam-installation-with-configuration-manager.md
+++ b/mdop/mbam-v2/how-to-validate-the-mbam-installation-with-configuration-manager.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8e268539-91c3-4e8a-baae-faf3605da818
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/maintaining-mbam-20-mbam-2.md b/mdop/mbam-v2/maintaining-mbam-20-mbam-2.md
index aa1bef762a..d83b165ded 100644
--- a/mdop/mbam-v2/maintaining-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/maintaining-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6479e093-840d-45d5-b759-1179aeeeefeb
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/mbam-20-deployment-checklist-mbam-2.md b/mdop/mbam-v2/mbam-20-deployment-checklist-mbam-2.md
index 8741f7ce42..74f3cbeaca 100644
--- a/mdop/mbam-v2/mbam-20-deployment-checklist-mbam-2.md
+++ b/mdop/mbam-v2/mbam-20-deployment-checklist-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7905d31d-f21c-4683-b9c4-95b815e08fab
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/mbam-20-deployment-prerequisites-mbam-2.md b/mdop/mbam-v2/mbam-20-deployment-prerequisites-mbam-2.md
index ed8e98f02c..4901f54cfe 100644
--- a/mdop/mbam-v2/mbam-20-deployment-prerequisites-mbam-2.md
+++ b/mdop/mbam-v2/mbam-20-deployment-prerequisites-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 57d1c2bb-5ea3-457e-badd-dd9206ff0f20
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/mbam-20-planning-checklist-mbam-2.md b/mdop/mbam-v2/mbam-20-planning-checklist-mbam-2.md
index 15ae83bc2e..dd323a9429 100644
--- a/mdop/mbam-v2/mbam-20-planning-checklist-mbam-2.md
+++ b/mdop/mbam-v2/mbam-20-planning-checklist-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 16b27c27-5f5e-41e2-b526-89a036672fb8
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/mbam-20-privacy-statement-mbam-2.md b/mdop/mbam-v2/mbam-20-privacy-statement-mbam-2.md
index 85ede65e94..2c93b51293 100644
--- a/mdop/mbam-v2/mbam-20-privacy-statement-mbam-2.md
+++ b/mdop/mbam-v2/mbam-20-privacy-statement-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fce72ad4-a837-4d17-8d3b-4d93f1a399be
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/mbam-20-security-considerations-mbam-2.md b/mdop/mbam-v2/mbam-20-security-considerations-mbam-2.md
index a6dcc8f87e..74670be60b 100644
--- a/mdop/mbam-v2/mbam-20-security-considerations-mbam-2.md
+++ b/mdop/mbam-v2/mbam-20-security-considerations-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0aa5c6e2-d92c-4e30-9f6a-b48abb667ae5
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/mbam-20-supported-configurations-mbam-2.md b/mdop/mbam-v2/mbam-20-supported-configurations-mbam-2.md
index 8d160e3e80..43687475bb 100644
--- a/mdop/mbam-v2/mbam-20-supported-configurations-mbam-2.md
+++ b/mdop/mbam-v2/mbam-20-supported-configurations-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: dca63391-39fe-4273-a570-76d0a2f8a0fd
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/monitoring-and-reporting-bitlocker-compliance-with-mbam-20-mbam-2.md b/mdop/mbam-v2/monitoring-and-reporting-bitlocker-compliance-with-mbam-20-mbam-2.md
index 5e116a6f1f..be5f19b3a8 100644
--- a/mdop/mbam-v2/monitoring-and-reporting-bitlocker-compliance-with-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/monitoring-and-reporting-bitlocker-compliance-with-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0b9ba701-0aad-4e16-9b32-73d358047ccc
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/operations-for-mbam-20-mbam-2.md b/mdop/mbam-v2/operations-for-mbam-20-mbam-2.md
index 1e1be481f3..5de22fee46 100644
--- a/mdop/mbam-v2/operations-for-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/operations-for-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ece72016-4ffa-48df-8c12-1e442ee9e980
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/performing-bitlocker-management-with-mbam-mbam-2.md b/mdop/mbam-v2/performing-bitlocker-management-with-mbam-mbam-2.md
index 11954b890c..c132428d23 100644
--- a/mdop/mbam-v2/performing-bitlocker-management-with-mbam-mbam-2.md
+++ b/mdop/mbam-v2/performing-bitlocker-management-with-mbam-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9bfc6c67-f12c-4daa-8f08-5884fb47443c
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/planning-for-mbam-20-administrator-roles-mbam-2.md b/mdop/mbam-v2/planning-for-mbam-20-administrator-roles-mbam-2.md
index 1e07104cc4..dcc4dfb344 100644
--- a/mdop/mbam-v2/planning-for-mbam-20-administrator-roles-mbam-2.md
+++ b/mdop/mbam-v2/planning-for-mbam-20-administrator-roles-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6f813297-6479-42d3-a21b-896d54466b5b
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/planning-for-mbam-20-client-deployment-mbam-2.md b/mdop/mbam-v2/planning-for-mbam-20-client-deployment-mbam-2.md
index b2cf23cc63..cc8dfa17dc 100644
--- a/mdop/mbam-v2/planning-for-mbam-20-client-deployment-mbam-2.md
+++ b/mdop/mbam-v2/planning-for-mbam-20-client-deployment-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3a92cf29-092f-4cad-bdfa-d5f6aafe554b
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/planning-for-mbam-20-group-policy-requirements-mbam-2.md b/mdop/mbam-v2/planning-for-mbam-20-group-policy-requirements-mbam-2.md
index ab9342bf18..d5311487bf 100644
--- a/mdop/mbam-v2/planning-for-mbam-20-group-policy-requirements-mbam-2.md
+++ b/mdop/mbam-v2/planning-for-mbam-20-group-policy-requirements-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f5e19dcb-eb15-4722-bb71-0734b3799eb8
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/planning-for-mbam-20-mbam-2.md b/mdop/mbam-v2/planning-for-mbam-20-mbam-2.md
index db0c53f609..32ad03c576 100644
--- a/mdop/mbam-v2/planning-for-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/planning-for-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1206bd18-05ea-4ca8-9362-07e512503c3f
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/planning-for-mbam-20-server-deployment-mbam-2.md b/mdop/mbam-v2/planning-for-mbam-20-server-deployment-mbam-2.md
index 70970945e1..c345da750c 100644
--- a/mdop/mbam-v2/planning-for-mbam-20-server-deployment-mbam-2.md
+++ b/mdop/mbam-v2/planning-for-mbam-20-server-deployment-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b57f1a42-134f-4997-8697-7fbed08e2fc4
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/planning-to-deploy-mbam-20-mbam-2.md b/mdop/mbam-v2/planning-to-deploy-mbam-20-mbam-2.md
index e580efcc33..118968c502 100644
--- a/mdop/mbam-v2/planning-to-deploy-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/planning-to-deploy-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2dc05fcd-aed9-4315-aeaf-92aaa9e0e955
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/planning-to-deploy-mbam-with-configuration-manager-2.md b/mdop/mbam-v2/planning-to-deploy-mbam-with-configuration-manager-2.md
index 60833f65dd..59aa487003 100644
--- a/mdop/mbam-v2/planning-to-deploy-mbam-with-configuration-manager-2.md
+++ b/mdop/mbam-v2/planning-to-deploy-mbam-with-configuration-manager-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fb768306-48c2-40b4-ac4e-c279db987391
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v2/preparing-your-environment-for-mbam-20-mbam-2.md b/mdop/mbam-v2/preparing-your-environment-for-mbam-20-mbam-2.md
index 287db04f99..c726106add 100644
--- a/mdop/mbam-v2/preparing-your-environment-for-mbam-20-mbam-2.md
+++ b/mdop/mbam-v2/preparing-your-environment-for-mbam-20-mbam-2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5fb01da9-620e-4992-9e54-2ed3fb69e6af
ms.reviewer:
manager: dansimp
-ms.author: tracyp
+ms.author: dansimp
ms.pagetype: mdop, security
ms.mktglfcycl: manage
ms.sitesec: library
diff --git a/mdop/mbam-v25/upgrade-mbam2.5-sp1.md b/mdop/mbam-v25/upgrade-mbam2.5-sp1.md
index cd80095b3e..c9f0e46454 100644
--- a/mdop/mbam-v25/upgrade-mbam2.5-sp1.md
+++ b/mdop/mbam-v25/upgrade-mbam2.5-sp1.md
@@ -7,7 +7,7 @@ audience: ITPro
ms.topic: article
ms.prod: w10
manager: miaposto
-localization_priority: Normal
+ms.localizationpriority: Normal
---
# Upgrade from MBAM 2.5 to MBAM 2.5 SP1 Servicing Release Update
diff --git a/mdop/medv-v2/configuring-a-windows-virtual-pc-image-for-med-v.md b/mdop/medv-v2/configuring-a-windows-virtual-pc-image-for-med-v.md
index eda6a8ccf3..93373c0249 100644
--- a/mdop/medv-v2/configuring-a-windows-virtual-pc-image-for-med-v.md
+++ b/mdop/medv-v2/configuring-a-windows-virtual-pc-image-for-med-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d87a0df8-9e08-4d1e-bfb0-9dc3cebf0d28
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/configuring-advanced-settings-by-using-windows-powershell.md b/mdop/medv-v2/configuring-advanced-settings-by-using-windows-powershell.md
index b3ae9f4dfb..36f93794e4 100644
--- a/mdop/medv-v2/configuring-advanced-settings-by-using-windows-powershell.md
+++ b/mdop/medv-v2/configuring-advanced-settings-by-using-windows-powershell.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 437a31cc-2a11-456f-b448-b0b869fb53f7
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/create-a-med-v-workspace-package.md b/mdop/medv-v2/create-a-med-v-workspace-package.md
index 246603d1cd..900ad453d6 100644
--- a/mdop/medv-v2/create-a-med-v-workspace-package.md
+++ b/mdop/medv-v2/create-a-med-v-workspace-package.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3f75fe73-41ac-4389-ae21-5efb2d437f4d
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/creating-a-windows-virtual-pc-image-for-med-v.md b/mdop/medv-v2/creating-a-windows-virtual-pc-image-for-med-v.md
index fbc30d458a..665b8f08a0 100644
--- a/mdop/medv-v2/creating-a-windows-virtual-pc-image-for-med-v.md
+++ b/mdop/medv-v2/creating-a-windows-virtual-pc-image-for-med-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fd7c0b1a-0769-4e7b-ad1a-dad19cca081f
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/define-and-plan-your-med-v-deployment.md b/mdop/medv-v2/define-and-plan-your-med-v-deployment.md
index a45e18f101..6c0b8e2772 100644
--- a/mdop/medv-v2/define-and-plan-your-med-v-deployment.md
+++ b/mdop/medv-v2/define-and-plan-your-med-v-deployment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a90945cc-dc37-4548-963d-e0c6f8ba0467
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/deploy-the-med-v-components.md b/mdop/medv-v2/deploy-the-med-v-components.md
index 59af8e81b0..103992785c 100644
--- a/mdop/medv-v2/deploy-the-med-v-components.md
+++ b/mdop/medv-v2/deploy-the-med-v-components.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fc2c5ef2-9c71-412a-8f6c-93df248f77d6
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/deploying-the-med-v-workspace-package.md b/mdop/medv-v2/deploying-the-med-v-workspace-package.md
index 9db9c7a967..b75d781a80 100644
--- a/mdop/medv-v2/deploying-the-med-v-workspace-package.md
+++ b/mdop/medv-v2/deploying-the-med-v-workspace-package.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f314425a-d60f-4b8d-b71f-d13d1da9297f
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/deployment-of-med-v.md b/mdop/medv-v2/deployment-of-med-v.md
index 76cbc0aeff..40216dcce3 100644
--- a/mdop/medv-v2/deployment-of-med-v.md
+++ b/mdop/medv-v2/deployment-of-med-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 52ea8ae4-ec2e-4cb8-ab38-e6400f47d3ba
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/deployment-troubleshooting.md b/mdop/medv-v2/deployment-troubleshooting.md
index 5d411f2928..3fafc1ed70 100644
--- a/mdop/medv-v2/deployment-troubleshooting.md
+++ b/mdop/medv-v2/deployment-troubleshooting.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9ee980f2-4e77-4020-9f0e-8c2ffdc390ad
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/detecting-network-changes-that-affect-med-v.md b/mdop/medv-v2/detecting-network-changes-that-affect-med-v.md
index d5a05dd4ef..41e3e7e9ff 100644
--- a/mdop/medv-v2/detecting-network-changes-that-affect-med-v.md
+++ b/mdop/medv-v2/detecting-network-changes-that-affect-med-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fd29b95a-cda2-464d-b86d-50b6bd64b4ca
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/determining-how-med-v-will-be-deployed.md b/mdop/medv-v2/determining-how-med-v-will-be-deployed.md
index 3c8e2d21f2..c618873c30 100644
--- a/mdop/medv-v2/determining-how-med-v-will-be-deployed.md
+++ b/mdop/medv-v2/determining-how-med-v-will-be-deployed.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: addbfef6-799e-4fe7-87d2-7e096a5ef5a5
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/end-to-end-deployment-scenario-for-med-v-20.md b/mdop/medv-v2/end-to-end-deployment-scenario-for-med-v-20.md
index 4daddcb6d0..7f0d4b42e8 100644
--- a/mdop/medv-v2/end-to-end-deployment-scenario-for-med-v-20.md
+++ b/mdop/medv-v2/end-to-end-deployment-scenario-for-med-v-20.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 91bb5a9a-5fb1-4743-8494-9d4dee2ec222
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/end-to-end-operations-scenario-for-med-v-20.md b/mdop/medv-v2/end-to-end-operations-scenario-for-med-v-20.md
index 65d35893fa..526c5d24da 100644
--- a/mdop/medv-v2/end-to-end-operations-scenario-for-med-v-20.md
+++ b/mdop/medv-v2/end-to-end-operations-scenario-for-med-v-20.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1d87f5f3-9fc5-4731-8bd1-c155714f34ee
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/end-to-end-planning-scenario-for-med-v-20.md b/mdop/medv-v2/end-to-end-planning-scenario-for-med-v-20.md
index f307f40682..f266500d1b 100644
--- a/mdop/medv-v2/end-to-end-planning-scenario-for-med-v-20.md
+++ b/mdop/medv-v2/end-to-end-planning-scenario-for-med-v-20.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e7833883-be93-4b42-9fa3-5c4d9a919058
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/example-med-v-checklists.md b/mdop/medv-v2/example-med-v-checklists.md
index 49b270971b..1e439600b8 100644
--- a/mdop/medv-v2/example-med-v-checklists.md
+++ b/mdop/medv-v2/example-med-v-checklists.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: cf9c33e8-1b7a-4306-92f6-edbb70ab23b5
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/example-med-v-environment-planning-checklist.md b/mdop/medv-v2/example-med-v-environment-planning-checklist.md
index 41281617c0..088faff234 100644
--- a/mdop/medv-v2/example-med-v-environment-planning-checklist.md
+++ b/mdop/medv-v2/example-med-v-environment-planning-checklist.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 877d1660-abef-4e81-ab3a-a8a3ec181d26
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/example-med-v-image-preparation-checklist.md b/mdop/medv-v2/example-med-v-image-preparation-checklist.md
index c9b913604f..2a7a612cb8 100644
--- a/mdop/medv-v2/example-med-v-image-preparation-checklist.md
+++ b/mdop/medv-v2/example-med-v-image-preparation-checklist.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d69f252f-624b-439e-814b-b68cdaf7d582
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/example-med-v-project-planning-checklist.md b/mdop/medv-v2/example-med-v-project-planning-checklist.md
index 30003b57dd..f89d1d89ea 100644
--- a/mdop/medv-v2/example-med-v-project-planning-checklist.md
+++ b/mdop/medv-v2/example-med-v-project-planning-checklist.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2b599bcb-1808-43ba-a689-1642bda24511
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/example-med-v-system-installation-checklist.md b/mdop/medv-v2/example-med-v-system-installation-checklist.md
index 1ca51ad940..e5a0c45347 100644
--- a/mdop/medv-v2/example-med-v-system-installation-checklist.md
+++ b/mdop/medv-v2/example-med-v-system-installation-checklist.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9e5673ba-dee4-4680-9c57-a149beab14d3
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/example-med-v-workspace-deployment-checklist.md b/mdop/medv-v2/example-med-v-workspace-deployment-checklist.md
index d8328a1021..67505667a8 100644
--- a/mdop/medv-v2/example-med-v-workspace-deployment-checklist.md
+++ b/mdop/medv-v2/example-med-v-workspace-deployment-checklist.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d8857883-9b2d-40ac-9136-59e4e20e02fe
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/getting-started-with-med-vmedv2.md b/mdop/medv-v2/getting-started-with-med-vmedv2.md
index e1cc6d20f7..a6a566459a 100644
--- a/mdop/medv-v2/getting-started-with-med-vmedv2.md
+++ b/mdop/medv-v2/getting-started-with-med-vmedv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 283734d7-231c-45b6-92c9-c95a46ec3628
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/high-level-architecturemedv2.md b/mdop/medv-v2/high-level-architecturemedv2.md
index 0349fc5e99..d4ad41a552 100644
--- a/mdop/medv-v2/high-level-architecturemedv2.md
+++ b/mdop/medv-v2/high-level-architecturemedv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a00edb9f-207b-4f32-9e8f-522ea2739d2f
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-add-or-remove-url-redirection-information-in-a-deployed-med-v-workspace.md b/mdop/medv-v2/how-to-add-or-remove-url-redirection-information-in-a-deployed-med-v-workspace.md
index f6f51a257c..231cef0574 100644
--- a/mdop/medv-v2/how-to-add-or-remove-url-redirection-information-in-a-deployed-med-v-workspace.md
+++ b/mdop/medv-v2/how-to-add-or-remove-url-redirection-information-in-a-deployed-med-v-workspace.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bf55848d-bf77-452e-aaa5-4dd4868ff5bd
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-create-a-test-environment.md b/mdop/medv-v2/how-to-create-a-test-environment.md
index 2e3bdbf84b..fd2ddea698 100644
--- a/mdop/medv-v2/how-to-create-a-test-environment.md
+++ b/mdop/medv-v2/how-to-create-a-test-environment.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a0db2299-16f3-4516-8769-7d55ca4a1e98
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-in-a-windows-7-image.md b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-in-a-windows-7-image.md
index 1d02488513..c7f27598d2 100644
--- a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-in-a-windows-7-image.md
+++ b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-in-a-windows-7-image.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a83aba4e-8681-4906-9872-f431c0bb15f9
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-manually.md b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-manually.md
index f9f754df22..71bc439a8b 100644
--- a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-manually.md
+++ b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-manually.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 94bfb209-2230-49b6-bb40-9c6ab088dbf4
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-through-an-electronic-software-distribution-system.md b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-through-an-electronic-software-distribution-system.md
index b272e8779c..06b7cfbe45 100644
--- a/mdop/medv-v2/how-to-deploy-a-med-v-workspace-through-an-electronic-software-distribution-system.md
+++ b/mdop/medv-v2/how-to-deploy-a-med-v-workspace-through-an-electronic-software-distribution-system.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b5134c35-e1de-470c-93f8-ead6218d9dce
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-deploy-the-med-v-components-through-an-electronic-software-distribution-system.md b/mdop/medv-v2/how-to-deploy-the-med-v-components-through-an-electronic-software-distribution-system.md
index 715d961e5b..0ec14a0a96 100644
--- a/mdop/medv-v2/how-to-deploy-the-med-v-components-through-an-electronic-software-distribution-system.md
+++ b/mdop/medv-v2/how-to-deploy-the-med-v-components-through-an-electronic-software-distribution-system.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8a800bdf-6fa4-47b4-b417-df053289d4e8
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-install-the-med-v-workspace-packager.md b/mdop/medv-v2/how-to-install-the-med-v-workspace-packager.md
index dfbd8cf0b3..3411624601 100644
--- a/mdop/medv-v2/how-to-install-the-med-v-workspace-packager.md
+++ b/mdop/medv-v2/how-to-install-the-med-v-workspace-packager.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 627478e9-6798-4b32-9a50-7a1b72bea295
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-manage-url-redirection-by-using-the-med-v-workspace-packager.md b/mdop/medv-v2/how-to-manage-url-redirection-by-using-the-med-v-workspace-packager.md
index 6bb5aea367..017ed271d8 100644
--- a/mdop/medv-v2/how-to-manage-url-redirection-by-using-the-med-v-workspace-packager.md
+++ b/mdop/medv-v2/how-to-manage-url-redirection-by-using-the-med-v-workspace-packager.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1a8d25af-479f-42d3-bf5f-c7fd974bbf8c
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-manually-install-the-med-v-host-agent.md b/mdop/medv-v2/how-to-manually-install-the-med-v-host-agent.md
index f307753ca2..7f5beda9c6 100644
--- a/mdop/medv-v2/how-to-manually-install-the-med-v-host-agent.md
+++ b/mdop/medv-v2/how-to-manually-install-the-med-v-host-agent.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4becc90b-6481-4e1f-a4d3-aec74c8821ec
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md b/mdop/medv-v2/how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md
index b586bdbc0c..828340b98c 100644
--- a/mdop/medv-v2/how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md
+++ b/mdop/medv-v2/how-to-publish-and-unpublish-an-application-on-the-med-v-workspace.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fd5a62e9-0577-44d2-ae17-61c0aef78ce8
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-test-application-publishing.md b/mdop/medv-v2/how-to-test-application-publishing.md
index 40a15dfa19..2270008b6e 100644
--- a/mdop/medv-v2/how-to-test-application-publishing.md
+++ b/mdop/medv-v2/how-to-test-application-publishing.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 17ba2e12-50a0-4f41-8300-f61f09db9f6c
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-test-url-redirection.md b/mdop/medv-v2/how-to-test-url-redirection.md
index fd02148316..3a46ee7100 100644
--- a/mdop/medv-v2/how-to-test-url-redirection.md
+++ b/mdop/medv-v2/how-to-test-url-redirection.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 38d80088-da1d-4098-b27e-76f9e78f81dc
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-uninstall-the-med-v-components.md b/mdop/medv-v2/how-to-uninstall-the-med-v-components.md
index ec1b2c9d2d..f1eeaa5b43 100644
--- a/mdop/medv-v2/how-to-uninstall-the-med-v-components.md
+++ b/mdop/medv-v2/how-to-uninstall-the-med-v-components.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c121dd27-6b2f-4d41-a21a-c6e8608c5c41
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/how-to-verify-first-time-setup-settings.md b/mdop/medv-v2/how-to-verify-first-time-setup-settings.md
index 47c2626a8b..4be201579a 100644
--- a/mdop/medv-v2/how-to-verify-first-time-setup-settings.md
+++ b/mdop/medv-v2/how-to-verify-first-time-setup-settings.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e8a07d4c-5786-4455-ac43-2deac4042efd
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/identifying-the-number-and-types-of-med-v-workspaces.md b/mdop/medv-v2/identifying-the-number-and-types-of-med-v-workspaces.md
index 31c02591be..0b5b8bf849 100644
--- a/mdop/medv-v2/identifying-the-number-and-types-of-med-v-workspaces.md
+++ b/mdop/medv-v2/identifying-the-number-and-types-of-med-v-workspaces.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 11642253-6b1f-4c4a-a11e-48d8a360e1ea
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/installing-and-removing-an-application-on-the-med-v-workspace.md b/mdop/medv-v2/installing-and-removing-an-application-on-the-med-v-workspace.md
index 6c12965962..211567c714 100644
--- a/mdop/medv-v2/installing-and-removing-an-application-on-the-med-v-workspace.md
+++ b/mdop/medv-v2/installing-and-removing-an-application-on-the-med-v-workspace.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 24f32720-51ab-4385-adfe-4f5a65e45fdf
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/installing-applications-on-a-windows-virtual-pc-image.md b/mdop/medv-v2/installing-applications-on-a-windows-virtual-pc-image.md
index e98aa04fb2..79b0dac9fd 100644
--- a/mdop/medv-v2/installing-applications-on-a-windows-virtual-pc-image.md
+++ b/mdop/medv-v2/installing-applications-on-a-windows-virtual-pc-image.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 32651eff-e3c6-4ef4-947d-2beddc695eac
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/manage-med-v-url-redirection.md b/mdop/medv-v2/manage-med-v-url-redirection.md
index e5c040b671..e96d3304dc 100644
--- a/mdop/medv-v2/manage-med-v-url-redirection.md
+++ b/mdop/medv-v2/manage-med-v-url-redirection.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 274161c0-b54a-4364-bb63-89996afccd04
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/manage-med-v-workspace-applications.md b/mdop/medv-v2/manage-med-v-workspace-applications.md
index 0763341fda..99114c8379 100644
--- a/mdop/medv-v2/manage-med-v-workspace-applications.md
+++ b/mdop/medv-v2/manage-med-v-workspace-applications.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f58c7504-a77a-41a8-ac38-7e618da131fb
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/manage-med-v-workspace-settings.md b/mdop/medv-v2/manage-med-v-workspace-settings.md
index 525cda4fc4..4710c68f25 100644
--- a/mdop/medv-v2/manage-med-v-workspace-settings.md
+++ b/mdop/medv-v2/manage-med-v-workspace-settings.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 35ebd16e-31c7-4996-81be-af1d56346803
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/managing-applications-deployed-to-med-v-workspaces.md b/mdop/medv-v2/managing-applications-deployed-to-med-v-workspaces.md
index b0f0205aff..4b652b29fc 100644
--- a/mdop/medv-v2/managing-applications-deployed-to-med-v-workspaces.md
+++ b/mdop/medv-v2/managing-applications-deployed-to-med-v-workspaces.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9a9bcdf5-0aa7-42a3-b6f0-6065adb01bcb
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/managing-automatic-updates-for-med-v-workspaces.md b/mdop/medv-v2/managing-automatic-updates-for-med-v-workspaces.md
index 0faa8153bc..9cd51b0d7b 100644
--- a/mdop/medv-v2/managing-automatic-updates-for-med-v-workspaces.md
+++ b/mdop/medv-v2/managing-automatic-updates-for-med-v-workspaces.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 306f28a2-d653-480d-b737-4b8b3132de5d
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/managing-med-v-workspace-configuration-settings.md b/mdop/medv-v2/managing-med-v-workspace-configuration-settings.md
index 8fec90798f..fb482d47b6 100644
--- a/mdop/medv-v2/managing-med-v-workspace-configuration-settings.md
+++ b/mdop/medv-v2/managing-med-v-workspace-configuration-settings.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 517d04de-c31f-4b50-b2b3-5f8c312ed37b
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/managing-med-v-workspace-settings-by-using-a-wmi.md b/mdop/medv-v2/managing-med-v-workspace-settings-by-using-a-wmi.md
index c20db2b59c..b27daa2e6f 100644
--- a/mdop/medv-v2/managing-med-v-workspace-settings-by-using-a-wmi.md
+++ b/mdop/medv-v2/managing-med-v-workspace-settings-by-using-a-wmi.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 05a665a3-2309-46c1-babb-a3e3bbb0b1f9
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/managing-med-v-workspace-settings-by-using-the-med-v-workspace-packager.md b/mdop/medv-v2/managing-med-v-workspace-settings-by-using-the-med-v-workspace-packager.md
index 561bba1d57..335fa404ed 100644
--- a/mdop/medv-v2/managing-med-v-workspace-settings-by-using-the-med-v-workspace-packager.md
+++ b/mdop/medv-v2/managing-med-v-workspace-settings-by-using-the-med-v-workspace-packager.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e4b2c516-b9f8-44f9-9eae-caac6c2af3e7
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/managing-printers-on-a-med-v-workspace.md b/mdop/medv-v2/managing-printers-on-a-med-v-workspace.md
index 31618c4d43..16d9be517a 100644
--- a/mdop/medv-v2/managing-printers-on-a-med-v-workspace.md
+++ b/mdop/medv-v2/managing-printers-on-a-med-v-workspace.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ba0a65ad-444f-4d18-95eb-8b9fa1a3ffba
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/managing-software-updates-for-med-v-workspaces.md b/mdop/medv-v2/managing-software-updates-for-med-v-workspaces.md
index 39d497dd06..adef226385 100644
--- a/mdop/medv-v2/managing-software-updates-for-med-v-workspaces.md
+++ b/mdop/medv-v2/managing-software-updates-for-med-v-workspaces.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a28d6dcd-cb9f-46ba-8dac-1d990837a3a3
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/med-v-20-best-practices.md b/mdop/medv-v2/med-v-20-best-practices.md
index abdc959702..f9b4db8492 100644
--- a/mdop/medv-v2/med-v-20-best-practices.md
+++ b/mdop/medv-v2/med-v-20-best-practices.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 47ba2dd1-6c6e-4d6e-8e18-b42291f8e02a
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/med-v-20-deployment-overview.md b/mdop/medv-v2/med-v-20-deployment-overview.md
index 0d86bae8b1..fc6e77f812 100644
--- a/mdop/medv-v2/med-v-20-deployment-overview.md
+++ b/mdop/medv-v2/med-v-20-deployment-overview.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0b8998ea-c46f-4c81-a304-f380b2ed7cf8
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/med-v-20-release-notes.md b/mdop/medv-v2/med-v-20-release-notes.md
index aaca3dffee..e4db87aed9 100644
--- a/mdop/medv-v2/med-v-20-release-notes.md
+++ b/mdop/medv-v2/med-v-20-release-notes.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b8f7d938-566e-434c-b4b8-28b67cdfd0b1
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/med-v-20-supported-configurations.md b/mdop/medv-v2/med-v-20-supported-configurations.md
index c5c082066d..0f1b6b5b06 100644
--- a/mdop/medv-v2/med-v-20-supported-configurations.md
+++ b/mdop/medv-v2/med-v-20-supported-configurations.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 88f1d232-aa01-45ab-8da7-d086269250b5
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/med-v-event-log-messages.md b/mdop/medv-v2/med-v-event-log-messages.md
index 03c64897de..1dac7a402f 100644
--- a/mdop/medv-v2/med-v-event-log-messages.md
+++ b/mdop/medv-v2/med-v-event-log-messages.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7ba7344d-153b-4cc4-a00a-5d42aee9986b
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/monitor-med-v-workspaces.md b/mdop/medv-v2/monitor-med-v-workspaces.md
index 127f1a75a5..9d0f3f1006 100644
--- a/mdop/medv-v2/monitor-med-v-workspaces.md
+++ b/mdop/medv-v2/monitor-med-v-workspaces.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f514afe2-8add-4105-9520-1a491733fa79
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/monitoring-med-v-workspace-deployments.md b/mdop/medv-v2/monitoring-med-v-workspace-deployments.md
index c34b7c9663..dcdb458c8a 100644
--- a/mdop/medv-v2/monitoring-med-v-workspace-deployments.md
+++ b/mdop/medv-v2/monitoring-med-v-workspace-deployments.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5de0cb06-b8a9-48a5-b8b3-836954295765
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/operations-for-med-v.md b/mdop/medv-v2/operations-for-med-v.md
index b123f6ab79..700f62afaa 100644
--- a/mdop/medv-v2/operations-for-med-v.md
+++ b/mdop/medv-v2/operations-for-med-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8f3f367d-fa9d-4468-814a-f0495adfaea4
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/operations-troubleshooting-medv2.md b/mdop/medv-v2/operations-troubleshooting-medv2.md
index 9d937f3ad8..dca90ef2ec 100644
--- a/mdop/medv-v2/operations-troubleshooting-medv2.md
+++ b/mdop/medv-v2/operations-troubleshooting-medv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 948d7869-accd-44da-974f-93409234dee7
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/overview-of-med-vmedv2.md b/mdop/medv-v2/overview-of-med-vmedv2.md
index 284394fac4..325b6c6151 100644
--- a/mdop/medv-v2/overview-of-med-vmedv2.md
+++ b/mdop/medv-v2/overview-of-med-vmedv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 393daa9b-2d76-43e1-861a-9d8c00f68cf6
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/planning-for-application-operating-system-compatibility.md b/mdop/medv-v2/planning-for-application-operating-system-compatibility.md
index cd729437ec..459c9b83f8 100644
--- a/mdop/medv-v2/planning-for-application-operating-system-compatibility.md
+++ b/mdop/medv-v2/planning-for-application-operating-system-compatibility.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: cdb0a7f0-9da4-4562-8277-12972eb0fea8
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/planning-for-med-v.md b/mdop/medv-v2/planning-for-med-v.md
index ec8790d025..98c665b7e8 100644
--- a/mdop/medv-v2/planning-for-med-v.md
+++ b/mdop/medv-v2/planning-for-med-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 8124b765-6930-4607-8bd9-93068403c7a2
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/prepare-a-med-v-image.md b/mdop/medv-v2/prepare-a-med-v-image.md
index e5b50af281..2746ab886a 100644
--- a/mdop/medv-v2/prepare-a-med-v-image.md
+++ b/mdop/medv-v2/prepare-a-med-v-image.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 1bc757e5-8aef-4163-8542-1bdccc028961
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/prepare-the-deployment-environment-for-med-v.md b/mdop/medv-v2/prepare-the-deployment-environment-for-med-v.md
index 3aa06de98d..73bc76772a 100644
--- a/mdop/medv-v2/prepare-the-deployment-environment-for-med-v.md
+++ b/mdop/medv-v2/prepare-the-deployment-environment-for-med-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d15ea370-7fdb-4852-a1ba-730ec7568e3e
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/restarting-and-resetting-a-med-v-workspace.md b/mdop/medv-v2/restarting-and-resetting-a-med-v-workspace.md
index 3b78792e33..a97672a4dc 100644
--- a/mdop/medv-v2/restarting-and-resetting-a-med-v-workspace.md
+++ b/mdop/medv-v2/restarting-and-resetting-a-med-v-workspace.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a959cdb3-a727-47c7-967e-e58f224e74de
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/security-and-protection-for-med-v.md b/mdop/medv-v2/security-and-protection-for-med-v.md
index 8f046a1720..5424443a54 100644
--- a/mdop/medv-v2/security-and-protection-for-med-v.md
+++ b/mdop/medv-v2/security-and-protection-for-med-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5db66d56-eb65-4bff-a9e4-3d52de4256bd
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/security-best-practices-for-med-v-operations.md b/mdop/medv-v2/security-best-practices-for-med-v-operations.md
index 7dbb08a888..26401fc3ba 100644
--- a/mdop/medv-v2/security-best-practices-for-med-v-operations.md
+++ b/mdop/medv-v2/security-best-practices-for-med-v-operations.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 231e2b9a-8b49-42fe-93b5-2ef12fe17bac
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/technical-reference-for-med-v.md b/mdop/medv-v2/technical-reference-for-med-v.md
index bf11849a4e..3b1d052a9b 100644
--- a/mdop/medv-v2/technical-reference-for-med-v.md
+++ b/mdop/medv-v2/technical-reference-for-med-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 52aa15ae-6ca8-4494-8660-313c7b723406
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/test-and-deploy-the-med-v-workspace-package.md b/mdop/medv-v2/test-and-deploy-the-med-v-workspace-package.md
index 7952fd2f90..df04230dd8 100644
--- a/mdop/medv-v2/test-and-deploy-the-med-v-workspace-package.md
+++ b/mdop/medv-v2/test-and-deploy-the-med-v-workspace-package.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0238dea7-a08c-4859-b8b1-2b52bc63fda6
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/testing-the-med-v-workspace-package.md b/mdop/medv-v2/testing-the-med-v-workspace-package.md
index 3297a9e056..c854d25c0e 100644
--- a/mdop/medv-v2/testing-the-med-v-workspace-package.md
+++ b/mdop/medv-v2/testing-the-med-v-workspace-package.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 83edcb6e-9615-4d18-96b8-f085a647294e
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/troubleshooting-med-v-by-using-the-administration-toolkit.md b/mdop/medv-v2/troubleshooting-med-v-by-using-the-administration-toolkit.md
index 3133cf4586..202763a51f 100644
--- a/mdop/medv-v2/troubleshooting-med-v-by-using-the-administration-toolkit.md
+++ b/mdop/medv-v2/troubleshooting-med-v-by-using-the-administration-toolkit.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6c096a1c-b9ce-4ec7-8dfd-5286e3b9a617
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/troubleshooting-med-vmedv2.md b/mdop/medv-v2/troubleshooting-med-vmedv2.md
index fb9c8989f9..64042f1f8f 100644
--- a/mdop/medv-v2/troubleshooting-med-vmedv2.md
+++ b/mdop/medv-v2/troubleshooting-med-vmedv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4502d62b-a7db-4f83-81e2-23fd8b0820e1
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/updating-med-v-20.md b/mdop/medv-v2/updating-med-v-20.md
index 6ba790263a..0d1f80a70b 100644
--- a/mdop/medv-v2/updating-med-v-20.md
+++ b/mdop/medv-v2/updating-med-v-20.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: beea2f54-42d7-4a17-98e0-d243a8562265
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/viewing-and-configuring-med-v-logs.md b/mdop/medv-v2/viewing-and-configuring-med-v-logs.md
index 25dbdb5885..35d8f398a0 100644
--- a/mdop/medv-v2/viewing-and-configuring-med-v-logs.md
+++ b/mdop/medv-v2/viewing-and-configuring-med-v-logs.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a15537ce-981d-4f55-9c3c-e7fbf94b8fe5
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/viewing-med-v-workspace-configurations.md b/mdop/medv-v2/viewing-med-v-workspace-configurations.md
index 94f19acf18..c009bcb559 100644
--- a/mdop/medv-v2/viewing-med-v-workspace-configurations.md
+++ b/mdop/medv-v2/viewing-med-v-workspace-configurations.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5de6cf04-6beb-4ac9-ad52-26ac8c0c8ce6
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/whats-new-in-med-v-20.md b/mdop/medv-v2/whats-new-in-med-v-20.md
index 74b4b120b7..0024381a3d 100644
--- a/mdop/medv-v2/whats-new-in-med-v-20.md
+++ b/mdop/medv-v2/whats-new-in-med-v-20.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 53b10bff-2b6f-463b-bdc2-5edc56526792
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/medv-v2/windows-virtual-pc-application-exclude-list.md b/mdop/medv-v2/windows-virtual-pc-application-exclude-list.md
index 17d50062b8..34ca784d07 100644
--- a/mdop/medv-v2/windows-virtual-pc-application-exclude-list.md
+++ b/mdop/medv-v2/windows-virtual-pc-application-exclude-list.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7715f198-f5ed-421e-8740-0cec2ca4ece3
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/softgrid-application-virtualization.md b/mdop/softgrid-application-virtualization.md
index 77aeb74b9c..9951bcd5f1 100644
--- a/mdop/softgrid-application-virtualization.md
+++ b/mdop/softgrid-application-virtualization.md
@@ -9,7 +9,7 @@ ms.prod: w10
ms.date: 04/19/2017
ms.reviewer:
manager: dansimp
-ms.author: eravena
+ms.author: dansimp
---
# SoftGrid Application Virtualization
diff --git a/mdop/solutions/application-publishing-and-client-interaction-for-app-v-5-solutions.md b/mdop/solutions/application-publishing-and-client-interaction-for-app-v-5-solutions.md
index b5c114dda1..93e2506108 100644
--- a/mdop/solutions/application-publishing-and-client-interaction-for-app-v-5-solutions.md
+++ b/mdop/solutions/application-publishing-and-client-interaction-for-app-v-5-solutions.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9854afdc-00f9-40ec-8275-d168e5151286
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/solutions/creating-app-v-45-databases-using-sql-scripting.md b/mdop/solutions/creating-app-v-45-databases-using-sql-scripting.md
index 481320f97b..860cc5c118 100644
--- a/mdop/solutions/creating-app-v-45-databases-using-sql-scripting.md
+++ b/mdop/solutions/creating-app-v-45-databases-using-sql-scripting.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 6cd0b180-163e-463f-a658-939ab9a7cfa1
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/solutions/how-to-download-and-deploy-mdop-group-policy--admx--templates.md b/mdop/solutions/how-to-download-and-deploy-mdop-group-policy--admx--templates.md
index f59bc0582f..5be26f09e4 100644
--- a/mdop/solutions/how-to-download-and-deploy-mdop-group-policy--admx--templates.md
+++ b/mdop/solutions/how-to-download-and-deploy-mdop-group-policy--admx--templates.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fdb64505-6c66-4fdf-ad74-a6a161191e3f
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/solutions/virtualizing-microsoft-office-2010-for-application-virtualization--app-v--50-solutions.md b/mdop/solutions/virtualizing-microsoft-office-2010-for-application-virtualization--app-v--50-solutions.md
index 14aadfc522..ac39025c59 100644
--- a/mdop/solutions/virtualizing-microsoft-office-2010-for-application-virtualization--app-v--50-solutions.md
+++ b/mdop/solutions/virtualizing-microsoft-office-2010-for-application-virtualization--app-v--50-solutions.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: bd16c20f-cc47-4172-ae16-47b23c9b7f5c
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/solutions/virtualizing-microsoft-office-2013-for-application-virtualization--app-v--50-solutions.md b/mdop/solutions/virtualizing-microsoft-office-2013-for-application-virtualization--app-v--50-solutions.md
index ec76232e3c..83c7defae3 100644
--- a/mdop/solutions/virtualizing-microsoft-office-2013-for-application-virtualization--app-v--50-solutions.md
+++ b/mdop/solutions/virtualizing-microsoft-office-2013-for-application-virtualization--app-v--50-solutions.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 742e64de-6ace-4eb4-901a-7a282ca7ae85
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/about-user-experience-virtualization-10-sp1.md b/mdop/uev-v1/about-user-experience-virtualization-10-sp1.md
index 588f1412b9..dbed7e3471 100644
--- a/mdop/uev-v1/about-user-experience-virtualization-10-sp1.md
+++ b/mdop/uev-v1/about-user-experience-virtualization-10-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0212d3fb-e882-476c-9496-9eb52301703d
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/about-user-experience-virtualization-10.md b/mdop/uev-v1/about-user-experience-virtualization-10.md
index 912a597260..30ca82aab4 100644
--- a/mdop/uev-v1/about-user-experience-virtualization-10.md
+++ b/mdop/uev-v1/about-user-experience-virtualization-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3758b100-35a8-4e10-ac08-f583fb8ddbd9
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/accessibility-for-ue-v.md b/mdop/uev-v1/accessibility-for-ue-v.md
index 569e811568..25be013a5c 100644
--- a/mdop/uev-v1/accessibility-for-ue-v.md
+++ b/mdop/uev-v1/accessibility-for-ue-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 059a76e5-bcf0-4459-b5d2-8b71ff2ef433
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/administering-ue-v-10.md b/mdop/uev-v1/administering-ue-v-10.md
index fcdd94b61b..d0cfef26e9 100644
--- a/mdop/uev-v1/administering-ue-v-10.md
+++ b/mdop/uev-v1/administering-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c399ae8d-c839-4f84-9bfc-adacd8f89f34
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/administering-ue-v-with-powershell-and-wmi.md b/mdop/uev-v1/administering-ue-v-with-powershell-and-wmi.md
index 7ad504a085..1c64c98eb7 100644
--- a/mdop/uev-v1/administering-ue-v-with-powershell-and-wmi.md
+++ b/mdop/uev-v1/administering-ue-v-with-powershell-and-wmi.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 26cc864f-c628-4c04-a18c-dd60fce8187c
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/changing-the-frequency-of-ue-v-scheduled-tasks.md b/mdop/uev-v1/changing-the-frequency-of-ue-v-scheduled-tasks.md
index b7764e7db1..d063140038 100644
--- a/mdop/uev-v1/changing-the-frequency-of-ue-v-scheduled-tasks.md
+++ b/mdop/uev-v1/changing-the-frequency-of-ue-v-scheduled-tasks.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 33c2674e-0df4-4717-9c3d-820a90b16e19
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/checklist-for-evaluating-line-of-business-applications-for-ue-v-10.md b/mdop/uev-v1/checklist-for-evaluating-line-of-business-applications-for-ue-v-10.md
index 251f7b2906..350d61d863 100644
--- a/mdop/uev-v1/checklist-for-evaluating-line-of-business-applications-for-ue-v-10.md
+++ b/mdop/uev-v1/checklist-for-evaluating-line-of-business-applications-for-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3bfaab30-59f7-4099-abb1-d248ce0086b8
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/configuring-ue-v-with-group-policy-objects.md b/mdop/uev-v1/configuring-ue-v-with-group-policy-objects.md
index 16fe74b419..37690af84f 100644
--- a/mdop/uev-v1/configuring-ue-v-with-group-policy-objects.md
+++ b/mdop/uev-v1/configuring-ue-v-with-group-policy-objects.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5c9be706-a05f-4397-9a38-e6b73ebff1e5
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/create-ue-v-settings-location-templates-with-the-ue-v-generator.md b/mdop/uev-v1/create-ue-v-settings-location-templates-with-the-ue-v-generator.md
index 3744085adf..7c342a42af 100644
--- a/mdop/uev-v1/create-ue-v-settings-location-templates-with-the-ue-v-generator.md
+++ b/mdop/uev-v1/create-ue-v-settings-location-templates-with-the-ue-v-generator.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b8e50e2f-0cc6-4f74-bb48-c471fefdc7d8
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/deploying-the-settings-storage-location-for-ue-v-10.md b/mdop/uev-v1/deploying-the-settings-storage-location-for-ue-v-10.md
index 79255766c6..485a0704eb 100644
--- a/mdop/uev-v1/deploying-the-settings-storage-location-for-ue-v-10.md
+++ b/mdop/uev-v1/deploying-the-settings-storage-location-for-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b187d44d-649b-487e-98d3-a61ee2be8c2f
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/deploying-the-settings-template-catalog-for-ue-v-10.md b/mdop/uev-v1/deploying-the-settings-template-catalog-for-ue-v-10.md
index 11fca5f564..c178943956 100644
--- a/mdop/uev-v1/deploying-the-settings-template-catalog-for-ue-v-10.md
+++ b/mdop/uev-v1/deploying-the-settings-template-catalog-for-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0e6ab5ef-8eeb-40b4-be7b-a841bd83be96
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/deploying-the-ue-v-agent.md b/mdop/uev-v1/deploying-the-ue-v-agent.md
index 8e28076181..ced4f1d88b 100644
--- a/mdop/uev-v1/deploying-the-ue-v-agent.md
+++ b/mdop/uev-v1/deploying-the-ue-v-agent.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ec1c16c4-4be0-41ff-93bc-3e2b1afb5832
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/deploying-ue-v-10.md b/mdop/uev-v1/deploying-ue-v-10.md
index 93606fd806..27e673050d 100644
--- a/mdop/uev-v1/deploying-ue-v-10.md
+++ b/mdop/uev-v1/deploying-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 519598bb-8c81-4af7-bee7-357696bff880
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/deploying-ue-v-settings-location-templates-for-ue-v-10.md b/mdop/uev-v1/deploying-ue-v-settings-location-templates-for-ue-v-10.md
index 4cc3825fa1..b0afb56983 100644
--- a/mdop/uev-v1/deploying-ue-v-settings-location-templates-for-ue-v-10.md
+++ b/mdop/uev-v1/deploying-ue-v-settings-location-templates-for-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7e0cc553-14f7-40fa-828a-281c8d2d1934
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/edit-ue-v-settings-location-templates-with-the-ue-v-generator.md b/mdop/uev-v1/edit-ue-v-settings-location-templates-with-the-ue-v-generator.md
index 6d30dee877..3b8b828a43 100644
--- a/mdop/uev-v1/edit-ue-v-settings-location-templates-with-the-ue-v-generator.md
+++ b/mdop/uev-v1/edit-ue-v-settings-location-templates-with-the-ue-v-generator.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: da78f9c8-1624-4111-8c96-79db7224bd0b
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/getting-started-with-user-experience-virtualization-10.md b/mdop/uev-v1/getting-started-with-user-experience-virtualization-10.md
index 0f030abcb9..f7d00db09e 100644
--- a/mdop/uev-v1/getting-started-with-user-experience-virtualization-10.md
+++ b/mdop/uev-v1/getting-started-with-user-experience-virtualization-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 74a068dc-4f87-4cb4-b114-8ca2a37149f7
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/high-level-architecture-for-ue-v-10.md b/mdop/uev-v1/high-level-architecture-for-ue-v-10.md
index 99ba96d4f9..fc68a953dd 100644
--- a/mdop/uev-v1/high-level-architecture-for-ue-v-10.md
+++ b/mdop/uev-v1/high-level-architecture-for-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d54f9f10-1a4d-4e56-802d-22d51646e1cc
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/installing-the-ue-v-generator.md b/mdop/uev-v1/installing-the-ue-v-generator.md
index d147ad6687..90bba89eb5 100644
--- a/mdop/uev-v1/installing-the-ue-v-generator.md
+++ b/mdop/uev-v1/installing-the-ue-v-generator.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 198b9a5f-3dfc-46be-9005-d33451914f87
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/installing-the-ue-v-group-policy-admx-templates.md b/mdop/uev-v1/installing-the-ue-v-group-policy-admx-templates.md
index 556cd9af45..81dc8f85cc 100644
--- a/mdop/uev-v1/installing-the-ue-v-group-policy-admx-templates.md
+++ b/mdop/uev-v1/installing-the-ue-v-group-policy-admx-templates.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7bd1f12e-7ba6-49f9-af9c-22c496b13b39
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/managing-the-ue-v-10-agent-and-packages-with-powershell-and-wmi.md b/mdop/uev-v1/managing-the-ue-v-10-agent-and-packages-with-powershell-and-wmi.md
index e00683076e..317975228c 100644
--- a/mdop/uev-v1/managing-the-ue-v-10-agent-and-packages-with-powershell-and-wmi.md
+++ b/mdop/uev-v1/managing-the-ue-v-10-agent-and-packages-with-powershell-and-wmi.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c8989b01-1769-4e69-82b1-4aadb261d2d5
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/managing-ue-v-10-settings-location-templates-using-powershell-and-wmi.md b/mdop/uev-v1/managing-ue-v-10-settings-location-templates-using-powershell-and-wmi.md
index 086461286d..be26ce0c20 100644
--- a/mdop/uev-v1/managing-ue-v-10-settings-location-templates-using-powershell-and-wmi.md
+++ b/mdop/uev-v1/managing-ue-v-10-settings-location-templates-using-powershell-and-wmi.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4b911c78-a5e9-4199-bfeb-72ab764d47c1
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-release-notes.md b/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-release-notes.md
index 36b60931b3..b16ae11350 100644
--- a/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-release-notes.md
+++ b/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-release-notes.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 920f3fae-e9b5-4b94-beda-32c19d31e94b
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-sp1-release-notes.md b/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-sp1-release-notes.md
index 799871bc65..e95de8309a 100644
--- a/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-sp1-release-notes.md
+++ b/mdop/uev-v1/microsoft-user-experience-virtualization--ue-v--10-sp1-release-notes.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 447fae0c-fe87-4d1c-b616-6f92fbdaf6d5
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/migrating-ue-v-settings-packages.md b/mdop/uev-v1/migrating-ue-v-settings-packages.md
index 15490e0ee1..0b4de51c02 100644
--- a/mdop/uev-v1/migrating-ue-v-settings-packages.md
+++ b/mdop/uev-v1/migrating-ue-v-settings-packages.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 93d99254-3e17-4e96-92ad-87059d8554a7
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/operations-for-ue-v-10.md b/mdop/uev-v1/operations-for-ue-v-10.md
index 8d9b7950e8..9026d54de9 100644
--- a/mdop/uev-v1/operations-for-ue-v-10.md
+++ b/mdop/uev-v1/operations-for-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5b4a82fd-3145-49e8-ac06-f9cc583abe5f
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/planning-for-custom-template-deployment-for-ue-v-10.md b/mdop/uev-v1/planning-for-custom-template-deployment-for-ue-v-10.md
index d1bbb9560a..a6a104caaa 100644
--- a/mdop/uev-v1/planning-for-custom-template-deployment-for-ue-v-10.md
+++ b/mdop/uev-v1/planning-for-custom-template-deployment-for-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: be76fc9a-31ca-4290-af11-7640dcb87d50
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/planning-for-ue-v-10.md b/mdop/uev-v1/planning-for-ue-v-10.md
index 01cf6db269..5f62386c65 100644
--- a/mdop/uev-v1/planning-for-ue-v-10.md
+++ b/mdop/uev-v1/planning-for-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: fc44aa5f-1d4f-4c03-b326-37ecd6bd913f
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/planning-for-ue-v-configuration-methods.md b/mdop/uev-v1/planning-for-ue-v-configuration-methods.md
index 1e9805546f..52a0686c4c 100644
--- a/mdop/uev-v1/planning-for-ue-v-configuration-methods.md
+++ b/mdop/uev-v1/planning-for-ue-v-configuration-methods.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 57bce7ab-1be5-434b-9ee5-c96026bbe010
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/planning-for-ue-v-configuration.md b/mdop/uev-v1/planning-for-ue-v-configuration.md
index 6559c6b1eb..f30fd8a640 100644
--- a/mdop/uev-v1/planning-for-ue-v-configuration.md
+++ b/mdop/uev-v1/planning-for-ue-v-configuration.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: db78dad4-78e0-45d6-a235-8b7345cb79f8
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/planning-which-applications-to-synchronize-with-ue-v-10.md b/mdop/uev-v1/planning-which-applications-to-synchronize-with-ue-v-10.md
index d6f2e16c4d..d666e1873b 100644
--- a/mdop/uev-v1/planning-which-applications-to-synchronize-with-ue-v-10.md
+++ b/mdop/uev-v1/planning-which-applications-to-synchronize-with-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c718274f-87b4-47f3-8ef7-5e1bd5557a9d
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/preparing-your-environment-for-ue-v.md b/mdop/uev-v1/preparing-your-environment-for-ue-v.md
index d1bf14f1a1..d6c66d49ac 100644
--- a/mdop/uev-v1/preparing-your-environment-for-ue-v.md
+++ b/mdop/uev-v1/preparing-your-environment-for-ue-v.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c93d3b33-e032-451a-9e1b-8534e1625396
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/restoring-application-and-windows-settings-synchronized-with-ue-v-10.md b/mdop/uev-v1/restoring-application-and-windows-settings-synchronized-with-ue-v-10.md
index cc3551aa20..411cb7cc83 100644
--- a/mdop/uev-v1/restoring-application-and-windows-settings-synchronized-with-ue-v-10.md
+++ b/mdop/uev-v1/restoring-application-and-windows-settings-synchronized-with-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 254a16b1-f186-44a4-8e22-49a4ee87c734
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/security-and-privacy-for-ue-v-10.md b/mdop/uev-v1/security-and-privacy-for-ue-v-10.md
index 6ea8dd1e7c..aadcb96e82 100644
--- a/mdop/uev-v1/security-and-privacy-for-ue-v-10.md
+++ b/mdop/uev-v1/security-and-privacy-for-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c23d867d-7991-4c78-a123-a8a92758e5ba
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/sharing-settings-location-templates-with-the-ue-v-template-gallery.md b/mdop/uev-v1/sharing-settings-location-templates-with-the-ue-v-template-gallery.md
index 9a39c6eac9..ebf7bc2cac 100644
--- a/mdop/uev-v1/sharing-settings-location-templates-with-the-ue-v-template-gallery.md
+++ b/mdop/uev-v1/sharing-settings-location-templates-with-the-ue-v-template-gallery.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 3830ae0c-96dd-4a8d-96a2-df87aea81b27
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/supported-configurations-for-ue-v-10.md b/mdop/uev-v1/supported-configurations-for-ue-v-10.md
index efcce87df5..b03acac6d8 100644
--- a/mdop/uev-v1/supported-configurations-for-ue-v-10.md
+++ b/mdop/uev-v1/supported-configurations-for-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: d90ab83e-741f-48eb-b1d8-a64cb9259f7a
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/troubleshooting-ue-v-10.md b/mdop/uev-v1/troubleshooting-ue-v-10.md
index 0febbf92ca..2efd5fe123 100644
--- a/mdop/uev-v1/troubleshooting-ue-v-10.md
+++ b/mdop/uev-v1/troubleshooting-ue-v-10.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e40f46a9-34f6-40ee-801b-9bf91f65c0e1
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/ue-v-10-security-considerations.md b/mdop/uev-v1/ue-v-10-security-considerations.md
index 3f9092994d..ce833afd9f 100644
--- a/mdop/uev-v1/ue-v-10-security-considerations.md
+++ b/mdop/uev-v1/ue-v-10-security-considerations.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c5cdf9ff-dc96-4491-98e9-0eada898ffe0
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/ue-v-checklist.md b/mdop/uev-v1/ue-v-checklist.md
index 867fbf837b..6cba1a8c57 100644
--- a/mdop/uev-v1/ue-v-checklist.md
+++ b/mdop/uev-v1/ue-v-checklist.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 0e4b9bd5-4e60-4673-b698-90612008fc2b
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/user-experience-virtualization-privacy-statement.md b/mdop/uev-v1/user-experience-virtualization-privacy-statement.md
index d3b329d5b9..32718bfa04 100644
--- a/mdop/uev-v1/user-experience-virtualization-privacy-statement.md
+++ b/mdop/uev-v1/user-experience-virtualization-privacy-statement.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c2919034-f2cf-48d6-b18e-4dd318252426
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/validate-ue-v-settings-location-templates-with-ue-v-generator.md b/mdop/uev-v1/validate-ue-v-settings-location-templates-with-ue-v-generator.md
index 0dd3e58ddb..c94f45ff95 100644
--- a/mdop/uev-v1/validate-ue-v-settings-location-templates-with-ue-v-generator.md
+++ b/mdop/uev-v1/validate-ue-v-settings-location-templates-with-ue-v-generator.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 131c636c-173a-4b41-af5d-9a75b453b9d8
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v1/working-with-custom-ue-v-templates-and-the-ue-v-generator.md b/mdop/uev-v1/working-with-custom-ue-v-templates-and-the-ue-v-generator.md
index 94eb7e9741..4447b5f189 100644
--- a/mdop/uev-v1/working-with-custom-ue-v-templates-and-the-ue-v-generator.md
+++ b/mdop/uev-v1/working-with-custom-ue-v-templates-and-the-ue-v-generator.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7bb2583a-b032-4800-9bf9-eb33528e1d0d
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/accessibility-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/accessibility-for-ue-v-2x-both-uevv2.md
index ad27b863c5..e27695620c 100644
--- a/mdop/uev-v2/accessibility-for-ue-v-2x-both-uevv2.md
+++ b/mdop/uev-v2/accessibility-for-ue-v-2x-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ec05da5f-4558-4d4d-9b58-3b8ed68cf2fe
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/administering-ue-v-2x-new-uevv2.md b/mdop/uev-v2/administering-ue-v-2x-new-uevv2.md
index 4400c57d74..67f7c914ec 100644
--- a/mdop/uev-v2/administering-ue-v-2x-new-uevv2.md
+++ b/mdop/uev-v2/administering-ue-v-2x-new-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 996e4797-8383-4627-b714-24a84c907798
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/administering-ue-v-2x-with-windows-powershell-and-wmi-both-uevv2.md b/mdop/uev-v2/administering-ue-v-2x-with-windows-powershell-and-wmi-both-uevv2.md
index 02104c5466..a34f4ed131 100644
--- a/mdop/uev-v2/administering-ue-v-2x-with-windows-powershell-and-wmi-both-uevv2.md
+++ b/mdop/uev-v2/administering-ue-v-2x-with-windows-powershell-and-wmi-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e749ac03-0adf-475a-a4f2-5cc023549b12
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/application-template-schema-reference-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/application-template-schema-reference-for-ue-v-2x-both-uevv2.md
index e39853513d..b821b00937 100644
--- a/mdop/uev-v2/application-template-schema-reference-for-ue-v-2x-both-uevv2.md
+++ b/mdop/uev-v2/application-template-schema-reference-for-ue-v-2x-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: be8735a5-6a3e-4b1f-ba14-2a3bc3e5a8b6
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/changing-the-frequency-of-ue-v-2x-scheduled-tasks-both-uevv2.md b/mdop/uev-v2/changing-the-frequency-of-ue-v-2x-scheduled-tasks-both-uevv2.md
index 62759777cc..f5e5b49ddb 100644
--- a/mdop/uev-v2/changing-the-frequency-of-ue-v-2x-scheduled-tasks-both-uevv2.md
+++ b/mdop/uev-v2/changing-the-frequency-of-ue-v-2x-scheduled-tasks-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: ee486570-c6cf-4fd9-ba48-0059ba877c10
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/configuring-the-company-settings-center-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/configuring-the-company-settings-center-for-ue-v-2x-both-uevv2.md
index d7a037fae6..ae34b00c58 100644
--- a/mdop/uev-v2/configuring-the-company-settings-center-for-ue-v-2x-both-uevv2.md
+++ b/mdop/uev-v2/configuring-the-company-settings-center-for-ue-v-2x-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 48fadb0a-c0dc-4287-9474-f94ce1417003
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/configuring-ue-v-2x-with-group-policy-objects-both-uevv2.md b/mdop/uev-v2/configuring-ue-v-2x-with-group-policy-objects-both-uevv2.md
index 95c3a06d9c..b55e44d53b 100644
--- a/mdop/uev-v2/configuring-ue-v-2x-with-group-policy-objects-both-uevv2.md
+++ b/mdop/uev-v2/configuring-ue-v-2x-with-group-policy-objects-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2bb55834-26ee-4f19-9860-dfdf3c797143
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/configuring-ue-v-2x-with-system-center-configuration-manager-2012-both-uevv2.md b/mdop/uev-v2/configuring-ue-v-2x-with-system-center-configuration-manager-2012-both-uevv2.md
index 271e7c2304..713779f789 100644
--- a/mdop/uev-v2/configuring-ue-v-2x-with-system-center-configuration-manager-2012-both-uevv2.md
+++ b/mdop/uev-v2/configuring-ue-v-2x-with-system-center-configuration-manager-2012-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9a4e2a74-7646-4a77-b58f-2b4456487295
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/deploy-required-features-for-ue-v-2x-new-uevv2.md b/mdop/uev-v2/deploy-required-features-for-ue-v-2x-new-uevv2.md
index 33bef01f40..ba9af1726e 100644
--- a/mdop/uev-v2/deploy-required-features-for-ue-v-2x-new-uevv2.md
+++ b/mdop/uev-v2/deploy-required-features-for-ue-v-2x-new-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 10399bb3-cc7b-4578-bc0c-2f6b597abe4d
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/deploy-ue-v-2x-for-custom-applications-new-uevv2.md b/mdop/uev-v2/deploy-ue-v-2x-for-custom-applications-new-uevv2.md
index 5ea364d361..8362ffa04c 100644
--- a/mdop/uev-v2/deploy-ue-v-2x-for-custom-applications-new-uevv2.md
+++ b/mdop/uev-v2/deploy-ue-v-2x-for-custom-applications-new-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f7cb089f-d764-4a93-82b6-926fe0385a23
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/get-started-with-ue-v-2x-new-uevv2.md b/mdop/uev-v2/get-started-with-ue-v-2x-new-uevv2.md
index bfbca01322..70de32e73b 100644
--- a/mdop/uev-v2/get-started-with-ue-v-2x-new-uevv2.md
+++ b/mdop/uev-v2/get-started-with-ue-v-2x-new-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 526ecbf0-0dee-4f0b-b017-8f8d25357b14
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/manage-administrative-backup-and-restore-in-ue-v-2x-new-topic-for-21.md b/mdop/uev-v2/manage-administrative-backup-and-restore-in-ue-v-2x-new-topic-for-21.md
index 850ec9ab0d..2bee981420 100644
--- a/mdop/uev-v2/manage-administrative-backup-and-restore-in-ue-v-2x-new-topic-for-21.md
+++ b/mdop/uev-v2/manage-administrative-backup-and-restore-in-ue-v-2x-new-topic-for-21.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 2eb5ae75-65e5-4afc-adb6-4e83cf4364ae
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/manage-configurations-for-ue-v-2x-new-uevv2.md b/mdop/uev-v2/manage-configurations-for-ue-v-2x-new-uevv2.md
index d633e2bf7c..0a0c3a72bf 100644
--- a/mdop/uev-v2/manage-configurations-for-ue-v-2x-new-uevv2.md
+++ b/mdop/uev-v2/manage-configurations-for-ue-v-2x-new-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: e2332eca-a9cd-4446-8f7c-d17058b03466
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/managing-the-ue-v-2x-agent-and-packages-with-windows-powershell-and-wmi-both-uevv2.md b/mdop/uev-v2/managing-the-ue-v-2x-agent-and-packages-with-windows-powershell-and-wmi-both-uevv2.md
index 1a0b9037e8..1b9749d6ca 100644
--- a/mdop/uev-v2/managing-the-ue-v-2x-agent-and-packages-with-windows-powershell-and-wmi-both-uevv2.md
+++ b/mdop/uev-v2/managing-the-ue-v-2x-agent-and-packages-with-windows-powershell-and-wmi-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 56e6780b-8b2c-4717-91c8-2af63062ab75
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/managing-ue-v-2x-settings-location-templates-using-windows-powershell-and-wmi-both-uevv2.md b/mdop/uev-v2/managing-ue-v-2x-settings-location-templates-using-windows-powershell-and-wmi-both-uevv2.md
index 92a9f13cc8..d1c3e2c0aa 100644
--- a/mdop/uev-v2/managing-ue-v-2x-settings-location-templates-using-windows-powershell-and-wmi-both-uevv2.md
+++ b/mdop/uev-v2/managing-ue-v-2x-settings-location-templates-using-windows-powershell-and-wmi-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: b5253050-acc3-4274-90d0-1fa4c480331d
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--20-release-notesuevv2.md b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--20-release-notesuevv2.md
index 64cd5462a4..66a3f0adb8 100644
--- a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--20-release-notesuevv2.md
+++ b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--20-release-notesuevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5ef66cd1-ba2b-4383-9f45-e7cde41f1ba1
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-release-notesuevv21.md b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-release-notesuevv21.md
index 6ce7711f88..4da60e1c20 100644
--- a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-release-notesuevv21.md
+++ b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-release-notesuevv21.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 79a36c77-fa0c-4651-8028-4a79763a2fd2
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-sp1-release-notes.md b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-sp1-release-notes.md
index f1f230b1c4..0a0b7124ef 100644
--- a/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-sp1-release-notes.md
+++ b/mdop/uev-v2/microsoft-user-experience-virtualization--ue-v--21-sp1-release-notes.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 561988c4-cc5c-4e15-970b-16e942c8f2ef
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/migrating-ue-v-2x-settings-packages-both-uevv2.md b/mdop/uev-v2/migrating-ue-v-2x-settings-packages-both-uevv2.md
index d94337ff73..d87870c3ad 100644
--- a/mdop/uev-v2/migrating-ue-v-2x-settings-packages-both-uevv2.md
+++ b/mdop/uev-v2/migrating-ue-v-2x-settings-packages-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f79381f4-e142-405c-b728-5c048502aa70
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/prepare-a-ue-v-2x-deployment-new-uevv2.md b/mdop/uev-v2/prepare-a-ue-v-2x-deployment-new-uevv2.md
index a2b3332a55..80cc0caffa 100644
--- a/mdop/uev-v2/prepare-a-ue-v-2x-deployment-new-uevv2.md
+++ b/mdop/uev-v2/prepare-a-ue-v-2x-deployment-new-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c429fd06-13ff-48c5-b9c9-fa1ec01ab800
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/security-considerations-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/security-considerations-for-ue-v-2x-both-uevv2.md
index add6d7f5cd..f9c72070dc 100644
--- a/mdop/uev-v2/security-considerations-for-ue-v-2x-both-uevv2.md
+++ b/mdop/uev-v2/security-considerations-for-ue-v-2x-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9d5c3cae-9fcb-4dea-bd67-741b3dea63be
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/sync-methods-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/sync-methods-for-ue-v-2x-both-uevv2.md
index ab07885a9b..b18eef56fe 100644
--- a/mdop/uev-v2/sync-methods-for-ue-v-2x-both-uevv2.md
+++ b/mdop/uev-v2/sync-methods-for-ue-v-2x-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: af0ae894-dfdc-41d2-927b-c2ab1b355ffe
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/sync-trigger-events-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/sync-trigger-events-for-ue-v-2x-both-uevv2.md
index 0056d7a17a..acfdf37a3e 100644
--- a/mdop/uev-v2/sync-trigger-events-for-ue-v-2x-both-uevv2.md
+++ b/mdop/uev-v2/sync-trigger-events-for-ue-v-2x-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4ed71a13-6a4f-4376-996f-74b126536bbc
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/synchronizing-office-2013-with-ue-v-20-both-uevv2.md b/mdop/uev-v2/synchronizing-office-2013-with-ue-v-20-both-uevv2.md
index e145aa7852..880b23d11f 100644
--- a/mdop/uev-v2/synchronizing-office-2013-with-ue-v-20-both-uevv2.md
+++ b/mdop/uev-v2/synchronizing-office-2013-with-ue-v-20-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: c46feb6d-28a8-4799-888d-053531dc5842
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/technical-reference-for-ue-v-2x-both-uevv2.md b/mdop/uev-v2/technical-reference-for-ue-v-2x-both-uevv2.md
index f4ce714825..44d264f0d9 100644
--- a/mdop/uev-v2/technical-reference-for-ue-v-2x-both-uevv2.md
+++ b/mdop/uev-v2/technical-reference-for-ue-v-2x-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 303cff9a-a96d-4e83-9e94-19b0d3744e1e
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/troubleshooting-ue-v-2x-both-uevv2.md b/mdop/uev-v2/troubleshooting-ue-v-2x-both-uevv2.md
index 1f176a44b3..a431995b0b 100644
--- a/mdop/uev-v2/troubleshooting-ue-v-2x-both-uevv2.md
+++ b/mdop/uev-v2/troubleshooting-ue-v-2x-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: a02847f8-6986-4612-8307-ba1b72d7919b
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/using-ue-v-2x-with-application-virtualization-applications-both-uevv2.md b/mdop/uev-v2/using-ue-v-2x-with-application-virtualization-applications-both-uevv2.md
index 8a0b0cd6db..9e9871e1c9 100644
--- a/mdop/uev-v2/using-ue-v-2x-with-application-virtualization-applications-both-uevv2.md
+++ b/mdop/uev-v2/using-ue-v-2x-with-application-virtualization-applications-both-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 4644b810-fc48-4fd0-96e4-2fc6cd64d8ad
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/whats-new-in-ue-v-20-new-uevv2.md b/mdop/uev-v2/whats-new-in-ue-v-20-new-uevv2.md
index 99c2fdbf22..873c05ac3b 100644
--- a/mdop/uev-v2/whats-new-in-ue-v-20-new-uevv2.md
+++ b/mdop/uev-v2/whats-new-in-ue-v-20-new-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 5d852beb-f293-4e3a-a33b-c40df59a7515
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/whats-new-in-ue-v-21-new-uevv2.md b/mdop/uev-v2/whats-new-in-ue-v-21-new-uevv2.md
index 5d8c70b598..3951f6c67a 100644
--- a/mdop/uev-v2/whats-new-in-ue-v-21-new-uevv2.md
+++ b/mdop/uev-v2/whats-new-in-ue-v-21-new-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 7f385183-7d97-4602-b19a-baa710334ade
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/whats-new-in-ue-v-21-sp1uevv21-sp1.md b/mdop/uev-v2/whats-new-in-ue-v-21-sp1uevv21-sp1.md
index bdde3b117e..c58430ce8b 100644
--- a/mdop/uev-v2/whats-new-in-ue-v-21-sp1uevv21-sp1.md
+++ b/mdop/uev-v2/whats-new-in-ue-v-21-sp1uevv21-sp1.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: 9a40c737-ad9a-4ec1-b42b-31bfabe0f170
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/mdop/uev-v2/working-with-custom-ue-v-2x-templates-and-the-ue-v-2x-generator-new-uevv2.md b/mdop/uev-v2/working-with-custom-ue-v-2x-templates-and-the-ue-v-2x-generator-new-uevv2.md
index bce863091a..d39f7e4f80 100644
--- a/mdop/uev-v2/working-with-custom-ue-v-2x-templates-and-the-ue-v-2x-generator-new-uevv2.md
+++ b/mdop/uev-v2/working-with-custom-ue-v-2x-templates-and-the-ue-v-2x-generator-new-uevv2.md
@@ -5,7 +5,7 @@ author: dansimp
ms.assetid: f0bb4920-0132-472c-a564-abf06a884275
ms.reviewer:
manager: dansimp
-ms.author: ellevin
+ms.author: dansimp
ms.pagetype: mdop, virtualization
ms.mktglfcycl: deploy
ms.sitesec: library
diff --git a/windows/client-management/mandatory-user-profile.md b/windows/client-management/mandatory-user-profile.md
index 9197370e84..b2e9438fba 100644
--- a/windows/client-management/mandatory-user-profile.md
+++ b/windows/client-management/mandatory-user-profile.md
@@ -38,7 +38,7 @@ The name of the folder in which you store the mandatory profile must use the cor
| Client operating system version | Server operating system version | Profile extension |
| --- | --- | --- |
| Windows XP | Windows Server 2003 Windows Server 2003 R2 | none |
-| Windows VistaWindows 7 | Windows Server 2008Windows Server 2008 R2 | v2 |
+| Windows VistaWindows 7 | Windows Server 2008 Windows Server 2008 R2 | v2 |
| Windows 8 | Windows Server 2012 | v3 |
| Windows 8.1 | Windows Server 2012 R2 | v4 |
| Windows 10, versions 1507 and 1511 | N/A | v5 |
@@ -67,10 +67,8 @@ First, you create a default user profile with the customizations that you want,
3. Uninstall any application you do not need or want from the PC. For examples on how to uninstall Windows 10 Application see [Remove-AppxProvisionedPackage](https://docs.microsoft.com/powershell/module/dism/remove-appxprovisionedpackage?view=winserver2012-ps). For a list of uninstallable applications, see [Understand the different apps included in Windows 10](https://docs.microsoft.com/windows/application-management/apps-in-windows-10).
-~~~
>[!NOTE]
>It is highly recommended to uninstall unwanted or unneeded apps as it will speed up user sign-in times.
-~~~
3. At a command prompt, type the following command and press **ENTER**.
diff --git a/windows/client-management/mdm/TOC.md b/windows/client-management/mdm/TOC.md
index d77896805e..c90eee3566 100644
--- a/windows/client-management/mdm/TOC.md
+++ b/windows/client-management/mdm/TOC.md
@@ -168,6 +168,7 @@
#### [AppRuntime](policy-csp-appruntime.md)
#### [AppVirtualization](policy-csp-appvirtualization.md)
#### [AttachmentManager](policy-csp-attachmentmanager.md)
+#### [Audit](policy-csp-audit.md)
#### [Authentication](policy-csp-authentication.md)
#### [Autoplay](policy-csp-autoplay.md)
#### [Bitlocker](policy-csp-bitlocker.md)
diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md
index 6889f31898..922ed015a1 100644
--- a/windows/client-management/mdm/configuration-service-provider-reference.md
+++ b/windows/client-management/mdm/configuration-service-provider-reference.md
@@ -2552,8 +2552,6 @@ Additional lists:
-
-
[WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md)
diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
index 6360bcb775..dcf00c86b8 100644
--- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
+++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
@@ -68,7 +68,7 @@ Also verify that the **MAM user scope** is set to **None**. Otherwise, it will h

-5. Verify that the MDM discovery URL during auto-enrollment is https://enrollment.manage.microsoft.com/enrollmentserver/discovery.
+5. Verify that the MDM discovery URL during auto-enrollment is https://enrollment.manage.microsoft.com/enrollmentserver/discovery.svc

diff --git a/windows/client-management/mdm/images/provisioning-csp-supl-dmandcp.png b/windows/client-management/mdm/images/provisioning-csp-supl-dmandcp.png
index 6c4c961a58..498ce66f47 100644
Binary files a/windows/client-management/mdm/images/provisioning-csp-supl-dmandcp.png and b/windows/client-management/mdm/images/provisioning-csp-supl-dmandcp.png differ
diff --git a/windows/client-management/mdm/networkproxy-csp.md b/windows/client-management/mdm/networkproxy-csp.md
index 12cc7ab347..8d7aa80999 100644
--- a/windows/client-management/mdm/networkproxy-csp.md
+++ b/windows/client-management/mdm/networkproxy-csp.md
@@ -40,10 +40,10 @@ Added in Windows 10, version 1803. When set to 0, it enables proxy configuration
Supported operations are Add, Get, Replace, and Delete.
-> [!NOTE]
-> Per user proxy configuration setting is not supported.
+> [!Note]
+> Per user proxy configuration setting is not supported using a configuration file, only modifying registry settings on a local machine.
-
**AutoDetect**
+
**AutoDetect**
Automatically detect settings. If enabled, the system tries to find the path to a PAC script.
Valid values:
@@ -52,9 +52,9 @@ Valid values:
- 1 (default) - Enabled
-The data type is int. Supported operations are Get and Replace. Starting in Windows 10, version 1803, the Delete operation is also supported.
+The data type is integer. Supported operations are Get and Replace. Starting in Windows 10, version 1803, the Delete operation is also supported.
-
**SetupScriptUrl**
+
**SetupScriptUrl**
Address to the PAC script you want to use.
The data type is string. Supported operations are Get and Replace. Starting in Windows 10, version 1803, the Delete operation is also supported.
@@ -82,4 +82,55 @@ Valid values:
- 1 - Do not use proxy server for local addresses
-The data type is int. Supported operations are Get and Replace. Starting in Windows 10, version 1803, the Delete operation is also supported.
+The data type is integer. Supported operations are Get and Replace. Starting in Windows 10, version 1803, the Delete operation is also supported.
+
+# Configuration Example
+
+These generic code portions for the options **ProxySettingsPerUser**, **Autodetect**, and **SetupScriptURL** can be used for a specific operation, for example Replace. Only enter the portion of code needed in the **Replace** section.
+```xml
+
+ 1
+ -
+
+ ./Vendor/MSFT/NetworkProxy/ProxySettingsPerUser
+
+
+ int
+ text/plain
+
+ 0
+
+
+```
+
+```xml
+
+ 2
+ -
+
+ ./Vendor/MSFT/NetworkProxy/AutoDetect
+
+
+ int
+ text/plain
+
+ 1
+
+
+```
+
+```xml
+
+ 3
+ -
+
+ ./Vendor/MSFT/NetworkProxy/SetupScriptUrl
+
+
+ chr
+ text/plain
+
+ Insert the proxy PAC URL location here:
+
+
+```
diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md
index b1f388fa4a..44dde5c9c9 100644
--- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md
+++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md
@@ -57,6 +57,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
- [What is dmwappushsvc?](#what-is-dmwappushsvc)
- **Change history in MDM documentation**
+ - [September 2019](#september-2019)
- [August 2019](#august-2019)
- [July 2019](#july-2019)
- [June 2019](#june-2019)
@@ -124,6 +125,8 @@ For details about Microsoft mobile device management protocols for Windows 10 s
- DeviceHealthMonitoring/AllowDeviceHealthMonitoring
- DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope
- DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination
+
- DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs
+
- DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs
- Experience/ShowLockOnUserTile
- InternetExplorer/AllowEnhancedSuggestionsInAddressBar
- InternetExplorer/DisableActiveXVersionListAutoDownload
@@ -159,7 +162,11 @@ For details about Microsoft mobile device management protocols for Windows 10 s
- WindowsLogon/AllowAutomaticRestartSignOn
- WindowsLogon/ConfigAutomaticRestartSignOn
- WindowsLogon/EnableFirstLogonAnimation
-
+
+Policy CSP - Audit |
+Added new Audit policies in Windows 10, version 1903.
+ |
+
ApplicationControl CSP |
@@ -492,7 +499,7 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
- ShellLauncher
- StatusConfiguration
-Updated the AssigneAccessConfiguration schema. Starting in Windows 10, version 1803 AssignedAccess CSP is supported in Windows Holographic for Business edition. Added example for Windows Holographic for Business edition.
+Updated the AssigneAccessConfiguration schema. Starting in Windows 10, version 1803 AssignedAccess CSP is supported in HoloLens (1st gen) Commercial Suite. Added example for HoloLens (1st gen) Commercial Suite.
MultiSIM CSP |
@@ -852,7 +859,7 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
Messaging CSP |
-Added new CSP. This CSP is only supported in Windows 10 Mobile and Mobile Enteprise editions.
+ | Added new CSP. This CSP is only supported in Windows 10 Mobile and Mobile Enterprise editions.
|
@@ -962,7 +969,7 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
- WirelessDisplay/AllowProjectionToPCOverInfrastructure
- WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver
Removed TextInput/AllowLinguisticDataCollection
-Starting in Windows 10, version 1703, Update/UpdateServiceUrl is not supported in Windows 10 Mobile Enteprise and IoT Enterprise
+Starting in Windows 10, version 1703, Update/UpdateServiceUrl is not supported in Windows 10 Mobile Enterprise and IoT Enterprise
Starting in Windows 10, version 1703, the maximum value of Update/DeferFeatureUpdatesPeriodInDays has been increased from 180 days, to 365 days.
Starting in Windows 10, version 1703, in Browser/HomePages you can use the "<about:blank>" value if you don’t want to send traffic to Microsoft.
Starting in Windows 10, version 1703, Start/StartLayout can now be set on a per-device basis in addition to the pre-existing per-user basis.
@@ -1551,7 +1558,7 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
-Management tool for the Micosoft Store for Business |
+Management tool for the Microsoft Store for Business |
New topics. The Store for Business has a new web service designed for the enterprise to acquire, manage, and distribute applications in bulk. It enables several capabilities that are required for the enterprise to manage the lifecycle of applications from acquisition to updates. |
@@ -1921,6 +1928,13 @@ How do I turn if off? | The service can be stopped from the "Services" console o
## Change history in MDM documentation
+### September 2019
+
+|New or updated topic | Description|
+|--- | ---|
+|[Policy CSP - Defender](policy-csp-defender.md)|Updated the supported value list for Defender/ScheduleScanDay policy.|
+|[Policy CSP - DeviceInstallation](policy-csp-deviceinstallation.md)|Added the following new policies:
DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs, DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs.|
+
### August 2019
|New or updated topic | Description|
@@ -2211,8 +2225,8 @@ How do I turn if off? | The service can be stopped from the "Services" console o
- AccountPoliciesAccountLockoutPolicy/AccountLockoutThreshold - removed from docs. Not supported.
- AccountPoliciesAccountLockoutPolicy/ResetAccountLockoutCounterAfter - removed from docs. Not supported.
- LocalPoliciesSecurityOptions/NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers - removed from docs. Not supported.
-- System/AllowFontProviders is not supported in Windows Holographic for Business.
-- Security/RequireDeviceEncryption is suported in the Home SKU.
+- System/AllowFontProviders is not supported in HoloLens (1st gen) Commercial Suite.
+- Security/RequireDeviceEncryption is supported in the Home SKU.
- Start/StartLayout - added a table of SKU support information.
- Start/ImportEdgeAssets - added a table of SKU support information.
@@ -2446,7 +2460,7 @@ How do I turn if off? | The service can be stopped from the "Services" console o
- ShellLauncher
- StatusConfiguration
-Updated the AssigneAccessConfiguration schema. Starting in Windows 10, version 1803 AssignedAccess CSP is supported in Windows Holographic for Business edition. Added example for Windows Holographic for Business edition.
+Updated the AssigneAccessConfiguration schema. Starting in Windows 10, version 1803 AssignedAccess CSP is supported in HoloLens (1st gen) Commercial Suite. Added example for HoloLens (1st gen) Commercial Suite.
MultiSIM CSP |
@@ -2761,7 +2775,7 @@ How do I turn if off? | The service can be stopped from the "Services" console o
For examples, see section 4.3.1 RequestSecurityToken of the MS-MDE2 protocol documentation.
-EntepriseAPN CSP |
+EnterpriseAPN CSP |
Added a SyncML example.
|
diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md
index 05ec05440b..276d195179 100644
--- a/windows/client-management/mdm/policy-configuration-service-provider.md
+++ b/windows/client-management/mdm/policy-configuration-service-provider.md
@@ -343,6 +343,188 @@ The following diagram shows the Policy configuration service provider in tree fo
+### Audit policies
+
+
+ -
+ Audit/AccountLogonLogoff_AuditAccountLockout
+
+ -
+ Audit/AccountLogonLogoff_AuditGroupMembership
+
+ -
+ Audit/AccountLogonLogoff_AuditIPsecExtendedMode
+
+ -
+ Audit/AccountLogonLogoff_AuditIPsecMainMode
+
+ -
+ Audit/AccountLogonLogoff_AuditIPsecQuickMode
+
+ -
+ Audit/AccountLogonLogoff_AuditLogoff
+
+ -
+ Audit/AccountLogonLogoff_AuditLogon
+
+ -
+ Audit/AccountLogonLogoff_AuditNetworkPolicyServer
+
+ -
+ Audit/AccountLogonLogoff_AuditOtherLogonLogoffEvents
+
+ -
+ Audit/AccountLogonLogoff_AuditSpecialLogon
+
+ -
+ Audit/AccountLogonLogoff_AuditUserDeviceClaims
+
+ -
+ Audit/AccountLogon_AuditCredentialValidation
+
+ -
+ Audit/AccountLogon_AuditKerberosAuthenticationService
+
+ -
+ Audit/AccountLogon_AuditKerberosServiceTicketOperations
+
+ -
+ Audit/AccountLogon_AuditOtherAccountLogonEvents
+
+ -
+ Audit/AccountManagement_AuditApplicationGroupManagement
+
+ -
+ Audit/AccountManagement_AuditComputerAccountManagement
+
+ -
+ Audit/AccountManagement_AuditDistributionGroupManagement
+
+ -
+ Audit/AccountManagement_AuditOtherAccountManagementEvents
+
+ -
+ Audit/AccountManagement_AuditSecurityGroupManagement
+
+ -
+ Audit/AccountManagement_AuditUserAccountManagement
+
+ -
+ Audit/DSAccess_AuditDetailedDirectoryServiceReplication
+
+ -
+ Audit/DSAccess_AuditDirectoryServiceAccess
+
+ -
+ Audit/DSAccess_AuditDirectoryServiceChanges
+
+ -
+ Audit/DSAccess_AuditDirectoryServiceReplication
+
+ -
+ Audit/DetailedTracking_AuditDPAPIActivity
+
+ -
+ Audit/DetailedTracking_AuditPNPActivity
+
+ -
+ Audit/DetailedTracking_AuditProcessCreation
+
+ -
+ Audit/DetailedTracking_AuditProcessTermination
+
+ -
+ Audit/DetailedTracking_AuditRPCEvents
+
+ -
+ Audit/DetailedTracking_AuditTokenRightAdjusted
+
+ -
+ Audit/ObjectAccess_AuditApplicationGenerated
+
+ -
+ Audit/ObjectAccess_AuditCentralAccessPolicyStaging
+
+ -
+ Audit/ObjectAccess_AuditCertificationServices
+
+ -
+ Audit/ObjectAccess_AuditDetailedFileShare
+
+ -
+ Audit/ObjectAccess_AuditFileShare
+
+ -
+ Audit/ObjectAccess_AuditFileSystem
+
+ -
+ Audit/ObjectAccess_AuditFilteringPlatformConnection
+
+ -
+ Audit/ObjectAccess_AuditFilteringPlatformPacketDrop
+
+ -
+ Audit/ObjectAccess_AuditHandleManipulation
+
+ -
+ Audit/ObjectAccess_AuditKernelObject
+
+ -
+ Audit/ObjectAccess_AuditOtherObjectAccessEvents
+
+ -
+ Audit/ObjectAccess_AuditRegistry
+
+ -
+ Audit/ObjectAccess_AuditRemovableStorage
+
+ -
+ Audit/ObjectAccess_AuditSAM
+
+ -
+ Audit/PolicyChange_AuditAuthenticationPolicyChange
+
+ -
+ Audit/PolicyChange_AuditAuthorizationPolicyChange
+
+ -
+ Audit/PolicyChange_AuditFilteringPlatformPolicyChange
+
+ -
+ Audit/PolicyChange_AuditMPSSVCRuleLevelPolicyChange
+
+ -
+ Audit/PolicyChange_AuditOtherPolicyChangeEvents
+
+ -
+ Audit/PolicyChange_AuditPolicyChange
+
+ -
+ Audit/PrivilegeUse_AuditNonSensitivePrivilegeUse
+
+ -
+ Audit/PrivilegeUse_AuditOtherPrivilegeUseEvents
+
+ -
+ Audit/PrivilegeUse_AuditSensitivePrivilegeUse
+
+ -
+ Audit/System_AuditIPsecDriver
+
+ -
+ Audit/System_AuditOtherSystemEvents
+
+ -
+ Audit/System_AuditSecurityStateChange
+
+ -
+ Audit/System_AuditSecuritySystemExtension
+
+ -
+ Audit/System_AuditSystemIntegrity
+
+
+
### Authentication policies
@@ -1027,6 +1209,9 @@ The following diagram shows the Policy configuration service provider in tree fo
-
DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses
+ -
+ DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs
+
-
DeviceInstallation/PreventDeviceMetadataFromNetwork
@@ -1036,6 +1221,9 @@ The following diagram shows the Policy configuration service provider in tree fo
-
DeviceInstallation/PreventInstallationOfMatchingDeviceIDs
+ -
+ DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs
+
-
DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses
@@ -1131,6 +1319,9 @@ The following diagram shows the Policy configuration service provider in tree fo
### Education policies
+ -
+ Education/AllowGraphingCalculator
+
-
Education/DefaultPrinterName
@@ -3368,6 +3559,15 @@ The following diagram shows the Policy configuration service provider in tree fo
-
TextInput/AllowLinguisticDataCollection
+ -
+ TextInput/ConfigureJapaneseIMEVersion
+
+ -
+ TextInput/ConfigureSimplifiedChineseIMEVersion
+
+ -
+ TextInput/ConfigureTraditionalChineseIMEVersion
+
-
TextInput/EnableTouchKeyboardAutoInvokeInDesktopMode
diff --git a/windows/client-management/mdm/policy-csp-audit.md b/windows/client-management/mdm/policy-csp-audit.md
new file mode 100644
index 0000000000..5d46a69134
--- /dev/null
+++ b/windows/client-management/mdm/policy-csp-audit.md
@@ -0,0 +1,4334 @@
+---
+title: Policy CSP - Audit
+description: Policy CSP - Audit
+ms.author: dansimp
+ms.topic: article
+ms.prod: w10
+ms.technology: windows
+author: manikadhiman
+ms.date: 09/24/2019
+---
+
+# Policy CSP - Audit
+
+> [!WARNING]
+> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
+
+
+
+
+## Audit policies
+
+
+ -
+ Audit/AccountLogonLogoff_AuditAccountLockout
+
+ -
+ Audit/AccountLogonLogoff_AuditGroupMembership
+
+ -
+ Audit/AccountLogonLogoff_AuditIPsecExtendedMode
+
+ -
+ Audit/AccountLogonLogoff_AuditIPsecMainMode
+
+ -
+ Audit/AccountLogonLogoff_AuditIPsecQuickMode
+
+ -
+ Audit/AccountLogonLogoff_AuditLogoff
+
+ -
+ Audit/AccountLogonLogoff_AuditLogon
+
+ -
+ Audit/AccountLogonLogoff_AuditNetworkPolicyServer
+
+ -
+ Audit/AccountLogonLogoff_AuditOtherLogonLogoffEvents
+
+ -
+ Audit/AccountLogonLogoff_AuditSpecialLogon
+
+ -
+ Audit/AccountLogonLogoff_AuditUserDeviceClaims
+
+ -
+ Audit/AccountLogon_AuditCredentialValidation
+
+ -
+ Audit/AccountLogon_AuditKerberosAuthenticationService
+
+ -
+ Audit/AccountLogon_AuditKerberosServiceTicketOperations
+
+ -
+ Audit/AccountLogon_AuditOtherAccountLogonEvents
+
+ -
+ Audit/AccountManagement_AuditApplicationGroupManagement
+
+ -
+ Audit/AccountManagement_AuditComputerAccountManagement
+
+ -
+ Audit/AccountManagement_AuditDistributionGroupManagement
+
+ -
+ Audit/AccountManagement_AuditOtherAccountManagementEvents
+
+ -
+ Audit/AccountManagement_AuditSecurityGroupManagement
+
+ -
+ Audit/AccountManagement_AuditUserAccountManagement
+
+ -
+ Audit/DSAccess_AuditDetailedDirectoryServiceReplication
+
+ -
+ Audit/DSAccess_AuditDirectoryServiceAccess
+
+ -
+ Audit/DSAccess_AuditDirectoryServiceChanges
+
+ -
+ Audit/DSAccess_AuditDirectoryServiceReplication
+
+ -
+ Audit/DetailedTracking_AuditDPAPIActivity
+
+ -
+ Audit/DetailedTracking_AuditPNPActivity
+
+ -
+ Audit/DetailedTracking_AuditProcessCreation
+
+ -
+ Audit/DetailedTracking_AuditProcessTermination
+
+ -
+ Audit/DetailedTracking_AuditRPCEvents
+
+ -
+ Audit/DetailedTracking_AuditTokenRightAdjusted
+
+ -
+ Audit/ObjectAccess_AuditApplicationGenerated
+
+ -
+ Audit/ObjectAccess_AuditCentralAccessPolicyStaging
+
+ -
+ Audit/ObjectAccess_AuditCertificationServices
+
+ -
+ Audit/ObjectAccess_AuditDetailedFileShare
+
+ -
+ Audit/ObjectAccess_AuditFileShare
+
+ -
+ Audit/ObjectAccess_AuditFileSystem
+
+ -
+ Audit/ObjectAccess_AuditFilteringPlatformConnection
+
+ -
+ Audit/ObjectAccess_AuditFilteringPlatformPacketDrop
+
+ -
+ Audit/ObjectAccess_AuditHandleManipulation
+
+ -
+ Audit/ObjectAccess_AuditKernelObject
+
+ -
+ Audit/ObjectAccess_AuditOtherObjectAccessEvents
+
+ -
+ Audit/ObjectAccess_AuditRegistry
+
+ -
+ Audit/ObjectAccess_AuditRemovableStorage
+
+ -
+ Audit/ObjectAccess_AuditSAM
+
+ -
+ Audit/PolicyChange_AuditAuthenticationPolicyChange
+
+ -
+ Audit/PolicyChange_AuditAuthorizationPolicyChange
+
+ -
+ Audit/PolicyChange_AuditFilteringPlatformPolicyChange
+
+ -
+ Audit/PolicyChange_AuditMPSSVCRuleLevelPolicyChange
+
+ -
+ Audit/PolicyChange_AuditOtherPolicyChangeEvents
+
+ -
+ Audit/PolicyChange_AuditPolicyChange
+
+ -
+ Audit/PrivilegeUse_AuditNonSensitivePrivilegeUse
+
+ -
+ Audit/PrivilegeUse_AuditOtherPrivilegeUseEvents
+
+ -
+ Audit/PrivilegeUse_AuditSensitivePrivilegeUse
+
+ -
+ Audit/System_AuditIPsecDriver
+
+ -
+ Audit/System_AuditOtherSystemEvents
+
+ -
+ Audit/System_AuditSecurityStateChange
+
+ -
+ Audit/System_AuditSecuritySystemExtension
+
+ -
+ Audit/System_AuditSystemIntegrity
+
+
+
+
+
+
+
+**Audit/AccountLogonLogoff_AuditAccountLockout**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by a failed attempt to log on to an account that is locked out.
+
+If you configure this policy setting, an audit event is generated when an account cannot log on to a computer because the account is locked out. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+
+Logon events are essential for understanding user activity and to detect potential attacks.
+
+Volume: Low.
+
+
+
+GP Info:
+- GP English name: *Audit Account Lockout*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Logon/Logoff*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 (default) — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogonLogoff_AuditGroupMembership**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy allows you to audit the group membership information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
+
+When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the group membership information cannot fit in a single security audit event.
+
+Volume: Low on a client computer. Medium on a domain controller or a network server.
+
+
+GP Info:
+- GP English name: *Audit Group Membership*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Logon/Logoff*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogonLogoff_AuditIPsecExtendedMode**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations.
+
+If you configure this policy setting, an audit event is generated during an IPsec Extended Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated during an IPsec Extended Mode negotiation.
+
+Volume: High.
+
+
+
+GP Info:
+- GP English name: *Audit IPsec Extended Mode*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Logon/Logoff*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogonLogoff_AuditIPsecMainMode**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations.
+
+If you configure this policy setting, an audit event is generated during an IPsec Main Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated during an IPsec Main Mode negotiation.
+
+Volume: High.
+
+
+GP Info:
+- GP English name: *Audit IPsec Main Mode*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Logon/Logoff*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogonLogoff_AuditIPsecQuickMode**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations.
+
+If you configure this policy setting, an audit event is generated during an IPsec Quick Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts. If you do not configure this policy setting, no audit event is generated during an IPsec Quick Mode negotiation.
+
+Volume: High.
+
+
+GP Info:
+- GP English name: *Audit IPsec Quick Mode*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Logon/Logoff*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogonLogoff_AuditLogoff**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by the closing of a logon session. These events occur on the computer that was accessed. For an interactive logoff the security audit event is generated on the computer that the user account logged on to.
+
+If you configure this policy setting, an audit event is generated when a logon session is closed. Success audits record successful attempts to close sessions and Failure audits record unsuccessful attempts to close sessions.
+If you do not configure this policy setting, no audit event is generated when a logon session is closed.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Logoff*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Logon/Logoff*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 (default) — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogonLogoff_AuditLogon**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by user account logon attempts on the computer.
+Events in this subcategory are related to the creation of logon sessions and occur on the computer which was accessed. For an interactive logon, the security audit event is generated on the computer that the user account logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
+The following events are included:
+- Successful logon attempts.
+- Failed logon attempts.
+- Logon attempts using explicit credentials. This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch logon configurations, such as scheduled tasks or when using the RUNAS command.
+- Security identifiers (SIDs) were filtered and not allowed to log on.
+
+Volume: Low on a client computer. Medium on a domain controller or a network server.
+
+
+GP Info:
+- GP English name: *Audit Logon*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Logon/Logoff*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 (default) — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogonLogoff_AuditNetworkPolicyServer**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by RADIUS (IAS) and Network Access Protection (NAP) user access requests. These requests can be Grant, Deny, Discard, Quarantine, Lock, and Unlock.
+If you configure this policy setting, an audit event is generated for each IAS and NAP user access request. Success audits record successful user access requests and Failure audits record unsuccessful attempts.
+If you do not configure this policy settings, IAS and NAP user access requests are not audited.
+
+Volume: Medium or High on NPS and IAS server. No volume on other computers.
+
+
+GP Info:
+- GP English name: *Audit Network Policy Server*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Logon/Logoff*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 (default) — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogonLogoff_AuditOtherLogonLogoffEvents**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit other logon/logoff-related events that are not covered in the “Logon/Logoff” policy setting, such as the following:
+- Terminal Services session disconnections.
+- New Terminal Services sessions.
+- Locking and unlocking a workstation.
+- Invoking a screen saver.
+- Dismissal of a screen saver.
+- Detection of a Kerberos replay attack, in which a Kerberos request was received twice with identical information. This condition could be caused by network misconfiguration.
+- Access to a wireless network granted to a user or computer account.
+- Access to a wired 802.1x network granted to a user or computer account.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Other Logon Logoff Events*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Logon/Logoff*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogonLogoff_AuditSpecialLogon**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by special logons, such as the following:
+- The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level.
+- A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged. For more information about this feature, see [Audit Special Logon](https://docs.microsoft.com/windows/security/threat-protection/auditing/audit-special-logon).
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Special Logon*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Logon/Logoff*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 (default) — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogonLogoff_AuditUserDeviceClaims**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy allows you to audit user and device claims information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
+
+User claims are added to a logon token when claims are included with a user's account attributes in Active Directory. Device claims are added to the logon token when claims are included with a device's computer account attributes in Active Directory. In addition, compound identity must be enabled for the domain and on the computer where the user logged on.
+
+When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the user and device claims information cannot fit in a single security audit event.
+
+Volume: Low on a client computer. Medium on a domain controller or a network server.
+
+
+GP Info:
+- GP English name: *Audit User Device Claims*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Logon/Logoff*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogon_AuditCredentialValidation**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by validation tests on user account logon credentials.
+
+Events in this subcategory occur only on the computer that is authoritative for those credentials. For domain accounts, the domain controller is authoritative. For local accounts, the local computer is authoritative.
+
+Volume: High on domain controllers.
+
+
+GP Info:
+- GP English name: *Audit Credential Validation*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Account Logon*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogon_AuditKerberosAuthenticationService**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests.
+
+If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT request. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT request.
+
+Volume: High on Kerberos Key Distribution Center servers.
+
+
+GP Info:
+- GP English name: *Audit Kerberos Authentication Service*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Account Logon*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogon_AuditKerberosServiceTicketOperations**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests submitted for user accounts.
+
+If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT is requested for a user account. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT is request for a user account.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Kerberos Service Ticket Operations*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Account Logon*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountLogon_AuditOtherAccountLogonEvents**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets.
+
+Currently, there are no events in this subcategory.
+
+
+
+GP Info:
+- GP English name: *Audit Other Account Logon Events*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Account Logon*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountManagement_AuditApplicationGroupManagement**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by changes to application groups, such as the following:
+- Application group is created, changed, or deleted.
+- Member is added or removed from an application group.
+
+If you configure this policy setting, an audit event is generated when an attempt to change an application group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an application group changes.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Application Group Management*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Account Management*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountManagement_AuditComputerAccountManagement**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by changes to computer accounts such as when a computer account is created, changed, or deleted.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a computer account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a computer account changes.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Computer Account Management*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Account Management*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountManagement_AuditDistributionGroupManagement**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by changes to distribution groups, such as the following:
+- Distribution group is created, changed, or deleted.
+- Member is added or removed from a distribution group.
+- Distribution group type is changed.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a distribution group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a distribution group changes.
+
+> [!Note]
+> Events in this subcategory are logged only on domain controllers.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Distribution Group Management*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Account Management*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountManagement_AuditOtherAccountManagementEvents**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by other user account changes that are not covered in this category, such as the following:
+- The password hash of a user account was accessed. This typically happens during an Active Directory Management Tool password migration.
+- The Password Policy Checking API was called. Calls to this function can be part of an attack when a malicious application tests the policy to reduce the number of attempts during a password dictionary attack.
+- Changes to the Default Domain Group Policy under the following Group Policy paths:
+Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy
+Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy.
+
+> [!Note]
+> The security audit event is logged when the policy setting is applied. It does not occur at the time when the settings are modified.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Other Account Management Events*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Account Management*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountManagement_AuditSecurityGroupManagement**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by changes to security groups, such as the following:
+- Security group is created, changed, or deleted.
+- Member is added or removed from a security group.
+- Group type is changed.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a security group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a security group changes.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Security Group Management*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Account Management*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 (default) — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/AccountManagement_AuditUserAccountManagement**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit changes to user accounts.
+Events include the following:
+- A user account is created, changed, deleted; renamed, disabled, enabled, locked out, or unlocked.
+- A user account’s password is set or changed.
+- A security identifier (SID) is added to the SID History of a user account.
+- The Directory Services Restore Mode password is configured.
+- Permissions on administrative user accounts are changed.
+- Credential Manager credentials are backed up or restored.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a user account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a user account changes.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit User Account Management*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Account Management*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 (default) — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/DSAccess_AuditDetailedDirectoryServiceReplication**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by detailed Active Directory Domain Services (AD DS) replication between domain controllers.
+
+Volume: High.
+
+
+
+GP Info:
+- GP English name: *Audit Detailed Directory Service Replication*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/DS Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/DSAccess_AuditDirectoryServiceAccess**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated when an Active Directory Domain Services (AD DS) object is accessed.
+
+Only AD DS objects with a matching system access control list (SACL) are logged.
+
+Events in this subcategory are similar to the Directory Service Access events available in previous versions of Windows.
+
+Volume: High on domain controllers. None on client computers.
+
+
+GP Info:
+- GP English name: *Audit Directory Service Access*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/DS Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/DSAccess_AuditDirectoryServiceChanges**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by changes to objects in Active Directory Domain Services (AD DS). Events are logged when an object is created, deleted, modified, moved, or undeleted.
+
+When possible, events logged in this subcategory indicate the old and new values of the object’s properties.
+
+Events in this subcategory are logged only on domain controllers, and only objects in AD DS with a matching system access control list (SACL) are logged.
+
+> [!Note]
+> Actions on some objects and properties do not cause audit events to be generated due to settings on the object class in the schema.
+
+If you configure this policy setting, an audit event is generated when an attempt to change an object in AD DS is made. Success audits record successful attempts, however unsuccessful attempts are NOT recorded.
+If you do not configure this policy setting, no audit event is generated when an attempt to change an object in AD DS object is made.
+
+Volume: High on domain controllers only.
+
+
+GP Info:
+- GP English name: *Audit Directory Service Changes*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/DS Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/DSAccess_AuditDirectoryServiceReplication**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit replication between two Active Directory Domain Services (AD DS) domain controllers.
+
+If you configure this policy setting, an audit event is generated during AD DS replication. Success audits record successful replication and Failure audits record unsuccessful replication.
+If you do not configure this policy setting, no audit event is generated during AD DS replication.
+
+>[!Note]
+> Events in this subcategory are logged only on domain controllers.
+
+Volume: Medium on domain controllers. None on client computers.
+
+
+GP Info:
+- GP English name: *Audit Directory Service Replication*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/DS Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/DetailedTracking_AuditDPAPIActivity**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated when encryption or decryption requests are made to the Data Protection application interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. For more information about DPAPI, see https://go.microsoft.com/fwlink/?LinkId=121720.
+
+If you configure this policy setting, an audit event is generated when an encryption or decryption request is made to DPAPI. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated when an encryption or decryption request is made to DPAPI.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit DPAPI Activity*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Detailed Tracking*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/DetailedTracking_AuditPNPActivity**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit when plug and play detects an external device.
+
+If you configure this policy setting, an audit event is generated whenever plug and play detects an external device. Only Success audits are recorded for this category.
+If you do not configure this policy setting, no audit event is generated when an external device is detected by plug and play.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit PNP Activity*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Detailed Tracking*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/DetailedTracking_AuditProcessCreation**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated when a process is created or starts. The name of the application or user that created the process is also audited.
+
+If you configure this policy setting, an audit event is generated when a process is created. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a process is created.
+
+Volume: Depends on how the computer is used.
+
+
+GP Info:
+- GP English name: *Audit Process Creation*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Detailed Tracking*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/DetailedTracking_AuditProcessTermination**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated when a process ends.
+
+If you configure this policy setting, an audit event is generated when a process ends. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a process ends.
+
+Volume: Depends on how the computer is used.
+
+
+GP Info:
+- GP English name: *Audit Process Termination*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Detailed Tracking*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/DetailedTracking_AuditRPCEvents**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit inbound remote procedure call (RPC) connections.
+
+If you configure this policy setting, an audit event is generated when a remote RPC connection is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a remote RPC connection is attempted.
+
+Volume: High on RPC servers.
+
+
+GP Info:
+- GP English name: *Audit RPC Events*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Detailed Tracking*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/DetailedTracking_AuditTokenRightAdjusted**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by adjusting the privileges of a token.
+
+Volume: High.
+
+
+GP Info:
+- GP English name: *Audit Token Right Adjusted*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Detailed Tracking*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditApplicationGenerated**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit applications that generate events using the Windows Auditing application programming interfaces (APIs). Applications designed to use the Windows Auditing API use this subcategory to log auditing events related to their function.
+Events in this subcategory include:
+- Creation of an application client context.
+- Deletion of an application client context.
+- Initialization of an application client context.
+- Other application operations using the Windows Auditing APIs.
+
+Volume: Depends on the applications that are generating them.
+
+
+GP Info:
+- GP English name: *Audit Application Generated*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditCentralAccessPolicyStaging**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit access requests where the permission granted or denied by a proposed policy differs from the current central access policy on an object.
+
+If you configure this policy setting, an audit event is generated each time a user accesses an object and the permission granted by the current central access policy on the object differs from that granted by the proposed policy. The resulting audit event will be generated as follows:
+1. Success audits, when configured, records access attempts when the current central access policy grants access but the proposed policy denies access.
+2. Failure audits when configured records access attempts when:
+ - The current central access policy does not grant access but the proposed policy grants access.
+ - A principal requests the maximum access rights they are allowed and the access rights granted by the current central access policy are different than the access rights granted by the proposed policy.
+
+Volume: Potentially high on a file server when the proposed policy differs significantly from the current central access policy.
+
+
+
+GP Info:
+- GP English name: *Audit Central Access Policy Staging*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditCertificationServices**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit Active Directory Certificate Services (AD CS) operations.
+AD CS operations include the following:
+
+- AD CS startup/shutdown/backup/restore.
+- Changes to the certificate revocation list (CRL).
+- New certificate requests.
+- Issuing of a certificate.
+- Revocation of a certificate.
+- Changes to the Certificate Manager settings for AD CS.
+- Changes in the configuration of AD CS.
+- Changes to a Certificate Services template.
+- Importing of a certificate.
+- Publishing of a certification authority certificate is to Active Directory Domain Services.
+- Changes to the security permissions for AD CS.
+- Archival of a key.
+- Importing of a key.
+- Retrieval of a key.
+- Starting of Online Certificate Status Protocol (OCSP) Responder Service.
+- Stopping of Online Certificate Status Protocol (OCSP) Responder Service.
+
+Volume: Medium or Low on computers running Active Directory Certificate Services.
+
+
+GP Info:
+- GP English name: *Audit Certification Services*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditDetailedFileShare**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit attempts to access files and folders on a shared folder. The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access.
+
+If you configure this policy setting, an audit event is generated when an attempt is made to access a file or folder on a share. The administrator can specify whether to audit only successes, only failures, or both successes and failures.
+
+> [!Note]
+> There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared files and folders on the system is audited.
+
+Volume: High on a file server or domain controller because of SYSVOL network access required by Group Policy.
+
+
+GP Info:
+- GP English name: *Audit Detailed File Share*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditFileShare**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit attempts to access a shared folder.
+
+If you configure this policy setting, an audit event is generated when an attempt is made to access a shared folder. If this policy setting is defined, the administrator can specify whether to audit only successes, only failures, or both successes and failures.
+
+> [!Note]
+> There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared folders on the system is audited.
+
+Volume: High on a file server or domain controller because of SYSVOL network access required by Group Policy.
+
+
+GP Info:
+- GP English name: *Audit File Share*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditFileSystem**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit user attempts to access file system objects. A security audit event is generated only for objects that have system access control lists (SACL) specified, and only if the type of access requested, such as Write, Read, or Modify and the account making the request match the settings in the SACL. For more information about enabling object access auditing, see [Apply a basic audit policy on a file or folder](https://docs.microsoft.com/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder).
+
+If you configure this policy setting, an audit event is generated each time an account accesses a file system object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an account accesses a file system object with a matching SACL.
+
+> [!Note]
+> You can set a SACL on a file system object using the Security tab in that object's Properties dialog box.
+
+Volume: Depends on how the file system SACLs are configured.
+
+
+GP Info:
+- GP English name: *Audit File System*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditFilteringPlatformConnection**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit connections that are allowed or blocked by the Windows Filtering Platform (WFP).
+The following events are included:
+- The Windows Firewall Service blocks an application from accepting incoming connections on the network.
+- The WFP allows a connection.
+- The WFP blocks a connection.
+- The WFP permits a bind to a local port.
+- The WFP blocks a bind to a local port.
+- The WFP allows a connection.
+- The WFP blocks a connection.
+- The WFP permits an application or service to listen on a port for incoming connections.
+- The WFP blocks an application or service to listen on a port for incoming connections.
+
+If you configure this policy setting, an audit event is generated when connections are allowed or blocked by the WFP. Success audits record events generated when connections are allowed and Failure audits record events generated when connections are blocked.
+
+If you do not configure this policy setting, no audit event is generated when connected are allowed or blocked by the WFP.
+
+Volume: High.
+
+
+GP Info:
+- GP English name: *Audit Filtering Platform Connection*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditFilteringPlatformPacketDrop**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit packets that are dropped by Windows Filtering Platform (WFP).
+
+Volume: High.
+
+
+
+GP Info:
+- GP English name: *Audit Filtering Platform Packet Drop*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditHandleManipulation**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated when a handle to an object is opened or closed. Only objects with a matching system access control list (SACL) generate security audit events.
+
+If you configure this policy setting, an audit event is generated when a handle is manipulated. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a handle is manipulated.
+
+> [!Note]
+> Events in this subcategory generate events only for object types where the corresponding Object Access subcategory is enabled. For example, if File system object access is enabled, handle manipulation security audit events are generated. If Registry object access is not enabled, handle manipulation security audit events will not be generated.
+
+Volume: Depends on how SACLs are configured.
+
+
+GP Info:
+- GP English name: *Audit Handle Manipulation*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditKernelObject**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit attempts to access the kernel, which includes mutexes and semaphores.
+Only kernel objects with a matching system access control list (SACL) generate security audit events.
+
+> [!Note]
+> The Audit: Audit the access of global system objects policy setting controls the default SACL of kernel objects.
+
+Volume: High if auditing access of global system objects is enabled.
+
+
+GP Info:
+- GP English name: *Audit Kernel Object*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditOtherObjectAccessEvents**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by the management of task scheduler jobs or COM+ objects.
+For scheduler jobs, the following are audited:
+- Job created.
+- Job deleted.
+- Job enabled.
+- Job disabled.
+- Job updated.
+
+For COM+ objects, the following are audited:
+- Catalog object added.
+- Catalog object updated.
+- Catalog object deleted.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Other Object Access Events*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditRegistry**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit attempts to access registry objects. A security audit event is generated only for objects that have system access control lists (SACLs) specified, and only if the type of access requested, such as Read, Write, or Modify, and the account making the request match the settings in the SACL.
+
+If you configure this policy setting, an audit event is generated each time an account accesses a registry object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an account accesses a registry object with a matching SACL.
+
+> [!Note]
+> You can set a SACL on a registry object using the Permissions dialog box.
+
+Volume: Depends on how registry SACLs are configured.
+
+
+GP Info:
+- GP English name: *Audit Registry*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditRemovableStorage**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit user attempts to access file system objects on a removable storage device. A security audit event is generated only for all objects for all types of access requested.
+
+If you configure this policy setting, an audit event is generated each time an account accesses a file system object on a removable storage. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+
+If you do not configure this policy setting, no audit event is generated when an account accesses a file system object on a removable storage.
+
+
+
+GP Info:
+- GP English name: *Audit Removable Storage*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/ObjectAccess_AuditSAM**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by attempts to access to Security Accounts Manager (SAM) objects.
+SAM objects include the following:
+- SAM_ALIAS -- A local group.
+- SAM_GROUP -- A group that is not a local group.
+- SAM_USER – A user account.
+- SAM_DOMAIN – A domain.
+- SAM_SERVER – A computer account.
+
+If you configure this policy setting, an audit event is generated when an attempt to access a kernel object is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an attempt to access a kernel object is made.
+
+> [!Note]
+> Only the System Access Control List (SACL) for SAM_SERVER can be modified.
+
+Volume: High on domain controllers. For information about reducing the amount of events generated in this subcategory, see [article 841001 in the Microsoft Knowledge Base](https://go.microsoft.com/fwlink/?LinkId=121698).
+
+
+
+GP Info:
+- GP English name: *Audit SAM*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Object Access*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/PolicyChange_AuditAuthenticationPolicyChange**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by changes to the authentication policy, such as the following:
+- Creation of forest and domain trusts.
+- Modification of forest and domain trusts.
+- Removal of forest and domain trusts.
+- Changes to Kerberos policy under Computer Configuration\Windows Settings\Security Settings\Account Policies\Kerberos Policy.
+- Granting of any of the following user rights to a user or group:
+ - Access This Computer From the Network.
+ - Allow Logon Locally.
+ - Allow Logon Through Terminal Services.
+ - Logon as a Batch Job.
+ - Logon a Service.
+- Namespace collision. For example, when a new trust has the same name as an existing namespace name.
+
+If you configure this policy setting, an audit event is generated when an attempt to change the authentication policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when the authentication policy is changed.
+
+> [!Note]
+> The security audit event is logged when the group policy is applied. It does not occur at the time when the settings are modified.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Authentication Policy Change*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Policy Change*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 (default) — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/PolicyChange_AuditAuthorizationPolicyChange**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by changes to the authorization policy, such as the following:
+- Assignment of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the “Authentication Policy Change” subcategory.
+- Removal of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the “Authentication Policy Change” subcategory.
+- Changes in the Encrypted File System (EFS) policy.
+- Changes to the Resource attributes of an object.
+- Changes to the Central Access Policy (CAP) applied to an object.
+
+If you configure this policy setting, an audit event is generated when an attempt to change the authorization policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when the authorization policy changes.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Authorization Policy Change*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Policy Change*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/PolicyChange_AuditFilteringPlatformPolicyChange**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by changes to the Windows Filtering Platform (WFP), such as the following:
+- IPsec services status.
+- Changes to IPsec policy settings.
+- Changes to Windows Firewall policy settings.
+- Changes to WFP providers and engine.
+
+If you configure this policy setting, an audit event is generated when a change to the WFP is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a change occurs to the WFP.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Filtering Platform Policy Change*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Policy Change*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/PolicyChange_AuditMPSSVCRuleLevelPolicyChange**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by changes in policy rules used by the Microsoft Protection Service (MPSSVC). This service is used by Windows Firewall.
+Events include the following:
+- Reporting of active policies when Windows Firewall service starts.
+- Changes to Windows Firewall rules.
+- Changes to Windows Firewall exception list.
+- Changes to Windows Firewall settings.
+- Rules ignored or not applied by Windows Firewall Service.
+- Changes to Windows Firewall Group Policy settings.
+
+If you configure this policy setting, an audit event is generated by attempts to change policy rules used by the MPSSVC. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated by changes in policy rules used by the MPSSVC.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit MPSSVC Rule Level Policy Change*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Policy Change*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/PolicyChange_AuditOtherPolicyChangeEvents**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by other security policy changes that are not audited in the policy change category, such as the following:
+- Trusted Platform Module (TPM) configuration changes.
+- Kernel-mode cryptographic self tests.
+- Cryptographic provider operations.
+- Cryptographic context operations or modifications.
+- Applied Central Access Policies (CAPs) changes.
+- Boot Configuration Data (BCD) modifications.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Other Policy Change Events*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Policy Change*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/PolicyChange_AuditPolicyChange**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit changes in the security audit policy settings, such as the following:
+- Settings permissions and audit settings on the Audit Policy object.
+- Changes to the system audit policy.
+- Registration of security event sources.
+- De-registration of security event sources.
+- Changes to the per-user audit settings.
+- Changes to the value of CrashOnAuditFail.
+- Changes to the system access control list on a file system or registry object.
+- Changes to the Special Groups list.
+
+> [!Note]
+> System access control list (SACL) change auditing is done when a SACL for an object changes and the policy change category is enabled. Discretionary access control list (DACL) and ownership changes are audited when object access auditing is enabled and the object's SACL is configured for auditing of DACL/Owner change.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Policy Change*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Policy Change*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 (default) — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/PrivilegeUse_AuditNonSensitivePrivilegeUse**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by the use of non-sensitive privileges (user rights).
+The following privileges are non-sensitive:
+- Access Credential Manager as a trusted caller.
+- Access this computer from the network.
+- Add workstations to domain.
+- Adjust memory quotas for a process.
+- Allow log on locally.
+- Allow log on through Terminal Services.
+- Bypass traverse checking.
+- Change the system time.
+- Create a pagefile.
+- Create global objects.
+- Create permanent shared objects.
+- Create symbolic links.
+- Deny access this computer from the network.
+- Deny log on as a batch job.
+- Deny log on as a service.
+- Deny log on locally.
+- Deny log on through Terminal Services.
+- Force shutdown from a remote system.
+- Increase a process working set.
+- Increase scheduling priority.
+- Lock pages in memory.
+- Log on as a batch job.
+- Log on as a service.
+- Modify an object label.
+- Perform volume maintenance tasks.
+- Profile single process.
+- Profile system performance.
+- Remove computer from docking station.
+- Shut down the system.
+- Synchronize directory service data.
+
+If you configure this policy setting, an audit event is generated when a non-sensitive privilege is called. Success audits record successful calls and Failure audits record unsuccessful calls.
+If you do not configure this policy setting, no audit event is generated when a non-sensitive privilege is called.
+
+Volume: Very High.
+
+
+GP Info:
+- GP English name: *Audit Non Sensitive Privilege Use*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Privilege Use*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/PrivilegeUse_AuditOtherPrivilegeUseEvents**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Not used.
+
+
+
+GP Info:
+- GP English name: *Audit Other Privilege Use Events*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Privilege Use*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/PrivilegeUse_AuditSensitivePrivilegeUse**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated when sensitive privileges (user rights) are used, such as the following:
+- A privileged service is called.
+- One of the following privileges are called:
+ - Act as part of the operating system.
+ - Back up files and directories.
+ - Create a token object.
+ - Debug programs.
+ - Enable computer and user accounts to be trusted for delegation.
+ - Generate security audits.
+ - Impersonate a client after authentication.
+ - Load and unload device drivers.
+ - Manage auditing and security log.
+ - Modify firmware environment values.
+ - Replace a process-level token.
+ - Restore files and directories.
+ - Take ownership of files or other objects.
+
+If you configure this policy setting, an audit event is generated when sensitive privilege requests are made. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated when sensitive privilege requests are made.
+
+Volume: High.
+
+
+GP Info:
+- GP English name: *Audit Sensitive Privilege Use*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/Privilege Use*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/System_AuditIPsecDriver**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by the IPsec filter driver, such as the following:
+- Startup and shutdown of the IPsec services.
+- Network packets dropped due to integrity check failure.
+- Network packets dropped due to replay check failure.
+- Network packets dropped due to being in plaintext.
+- Network packets received with incorrect Security Parameter Index (SPI). This may indicate that either the network card is not working correctly or the driver needs to be updated.
+- Inability to process IPsec filters.
+
+If you configure this policy setting, an audit event is generated on an IPsec filter driver operation. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated on an IPSec filter driver operation.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit IPsec Driver*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/System*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/System_AuditOtherSystemEvents**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit any of the following events:
+- Startup and shutdown of the Windows Firewall service and driver.
+- Security policy processing by the Windows Firewall Service.
+- Cryptography key file and migration operations.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Other System Events*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/System*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 (default) — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/System_AuditSecurityStateChange**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events generated by changes in the security state of the computer, such as the following events:
+- Startup and shutdown of the computer.
+- Change of system time.
+- Recovering the system from CrashOnAuditFail, which is logged after a system restarts when the security event log is full and the CrashOnAuditFail registry entry is configured.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit Security State Change*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/System*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 (default) — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/System_AuditSecuritySystemExtension**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events related to security system extensions or services, such as the following:
+- A security system extension, such as an authentication, notification, or security package is loaded and is registered with the Local Security Authority (LSA). It is used to authenticate logon attempts, submit logon requests, and any account or password changes. Examples of security system extensions are Kerberos and NTLM.
+- A service is installed and registered with the Service Control Manager. The audit log contains information about the service name, binary, type, start type, and service account.
+
+If you configure this policy setting, an audit event is generated when an attempt is made to load a security system extension. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an attempt is made to load a security system extension.
+
+Volume: Low. Security system extension events are generated more often on a domain controller than on client computers or member servers.
+
+
+GP Info:
+- GP English name: *Audit Security System Extension*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/System*
+
+
+
+The following are the supported values:
+- 0 (default) — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+
+
+**Audit/System_AuditSystemIntegrity**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, versions 1809 and 1803 through servicing. This policy setting allows you to audit events that violate the integrity of the security subsystem, such as the following:
+- Events that could not be written to the event log because of a problem with the auditing system.
+- A process that uses a local procedure call (LPC) port that is not valid in an attempt to impersonate a client by replying, reading, or writing to or from a client address space.
+- The detection of a Remote Procedure Call (RPC) that compromises system integrity.
+- The detection of a hash value of an executable file that is not valid as determined by Code Integrity.
+- Cryptographic operations that compromise system integrity.
+
+Volume: Low.
+
+
+GP Info:
+- GP English name: *Audit System Integrity*
+- GP path: *Windows Settings/Security Settings/Advanced Audit Policy Configuration/System Audit Policies/System*
+
+
+
+The following are the supported values:
+- 0 — Off/None
+- 1 — Success
+- 2 — Failure
+- 3 (default) — Success+Failure
+
+
+
+
+
+
+
+
+
+
+
+Footnotes:
+
+- 1 - Added in Windows 10, version 1607.
+- 2 - Added in Windows 10, version 1703.
+- 3 - Added in Windows 10, version 1709.
+- 4 - Added in Windows 10, version 1803.
+- 5 - Added in Windows 10, version 1809.
+- 6 - Added in Windows 10, version 1903.
+
+
diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md
index 3d598448d3..e88ef95636 100644
--- a/windows/client-management/mdm/policy-csp-defender.md
+++ b/windows/client-management/mdm/policy-csp-defender.md
@@ -6,17 +6,13 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
-ms.date: 08/26/2019
+ms.date: 09/24/2019
ms.reviewer:
manager: dansimp
---
# Policy CSP - Defender
-> [!WARNING]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-
@@ -2335,17 +2331,17 @@ ADMX Info:
-The following list shows the supported values:
+The following list shows the supported values:
-- 0 (default) – Every day
-- 1 – Monday
-- 2 – Tuesday
-- 3 – Wednesday
-- 4 – Thursday
-- 5 – Friday
-- 6 – Saturday
-- 7 – Sunday
-- 8 – No scheduled scan
+- 0 (default) – Every day
+- 1 – Sunday
+- 2 – Monday
+- 3 – Tuesday
+- 4 – Wednesday
+- 5 – Thursday
+- 6 – Friday
+- 7 – Saturday
+- 8 – No scheduled scan
diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md
index 75e6a2bd5a..ba62dc186a 100644
--- a/windows/client-management/mdm/policy-csp-deviceinstallation.md
+++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md
@@ -4,6 +4,7 @@ ms.reviewer:
manager: dansimp
description: Policy CSP - DeviceInstallation
ms.author: dansimp
+ms.date: 09/26/2019
ms.topic: article
ms.prod: w10
ms.technology: windows
@@ -11,6 +12,8 @@ author: manikadhiman
---
# Policy CSP - DeviceInstallation
+> [!WARNING]
+> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -24,6 +27,9 @@ author: manikadhiman
-
DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClasses
+ -
+ DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs
+
-
DeviceInstallation/PreventDeviceMetadataFromNetwork
@@ -33,12 +39,14 @@ author: manikadhiman
-
DeviceInstallation/PreventInstallationOfMatchingDeviceIDs
+ -
+ DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs
+
-
DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses
-
@@ -132,7 +140,7 @@ To enable this policy, use the following SyncML. This example allows Windows to
```
-To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see if the following is listed near the end of the log:
+To verify that the policy is applied, check C:\windows\INF\setupapi.dev.log and see if the following is listed near the end of the log:
```txt
>>> [Device Installation Restrictions Policy Check]
@@ -247,7 +255,7 @@ Enclose the class GUID within curly brackets {}. To configure multiple classes,
```
-To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see if the following is listed near the end of the log:
+To verify that the policy is applied, check C:\windows\INF\setupapi.dev.log and see if the following is listed near the end of the log:
```txt
@@ -264,6 +272,105 @@ To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see i
+
+**DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, version 1809. This policy setting allows you to specify a list of Plug and Play device instance IDs for devices that Windows is allowed to install. Use this policy setting only when the "Prevent installation of devices not described by other policy settings" policy setting is enabled. Other policy settings that prevent device installation take precedence over this one.
+
+If you enable this policy setting, Windows is allowed to install or update any device whose Plug and Play device instance ID appears in the list you create, unless another policy setting specifically prevents that installation (for example, the "Prevent installation of devices that match any of these device IDs" policy setting, the "Prevent installation of devices for these device classes" policy setting, the "Prevent installation of devices that match any of these device instance IDs" policy setting, or the "Prevent installation of removable devices" policy setting). If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
+
+If you disable or do not configure this policy setting, and no other policy setting describes the device, the "Prevent installation of devices not described by other policy settings" policy setting determines whether the device can be installed.
+
+Peripherals can be specified by their [device instance ID](https://docs.microsoft.com/windows-hardware/drivers/install/device-instance-ids). Test the configuration prior to rolling it out to ensure it allows the devices expected. Ideally test various instances of the hardware. For example, test multiple USB keys rather than only one.
+
+
+> [!TIP]
+> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
+
+> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
+
+> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
+
+
+ADMX Info:
+- GP English name: *Allow installation of devices that match any of these device instance IDs*
+- GP name: *DeviceInstall_Instance_IDs_Allow*
+- GP path: *System/Device Installation/Device Installation Restrictions*
+- GP ADMX file name: *deviceinstallation.admx*
+
+
+
+
+
+
+To enable this policy, use the following SyncML.
+
+``` xml
+
+
+
+ $CmdID$
+ -
+
+ ./Device/Vendor/MSFT/Policy/Config/DeviceInstallation/AllowInstallationOfMatchingDeviceInstanceIDs
+
+
+ string
+
+
+
+
+
+
+```
+To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see if the following is listed near the end of the log:
+``` txt
+>>> [Device Installation Restrictions Policy Check]
+>>> Section start 2018/11/15 12:26:41.659
+<<< Section end 2018/11/15 12:26:41.751
+<<< [Exit status: SUCCESS]
+```
+
+
+
+
+
+
+
+
**DeviceInstallation/PreventDeviceMetadataFromNetwork**
@@ -546,6 +653,107 @@ For example, this custom profile blocks installation and usage of USB devices wi
+
+
+
+**DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 6 |
+ 6 |
+ 6 |
+ 6 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1903. Also available in Windows 10, version 1809. This policy setting allows you to specify a list of Plug and Play device instance IDs for devices that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device.
+
+If you enable this policy setting, Windows is prevented from installing a device whose device instance ID appears in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
+
+If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings.
+
+Peripherals can be specified by their [device instance ID](https://docs.microsoft.com/windows-hardware/drivers/install/device-instance-ids). Test the configuration prior to rolling it out to ensure it allows the devices expected. Ideally test various instances of the hardware. For example, test multiple USB keys rather than only one.
+
+
+> [!TIP]
+> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
+
+> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
+
+> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
+
+
+ADMX Info:
+- GP English name: *Prevent installation of devices that match any of these device instance IDs*
+- GP name: *DeviceInstall_Instance_IDs_Deny*
+- GP path: *System/Device Installation/Device Installation Restrictions*
+- GP ADMX file name: *deviceinstallation.admx*
+
+
+
+
+
+
+To enable this policy, use the following SyncML.
+
+``` xml
+
+
+
+ $CmdID$
+ -
+
+ ./Device/Vendor/MSFT/Policy/Config/DeviceInstallation/PreventInstallationOfMatchingDeviceInstanceIDs
+
+
+ string
+
+
+
+
+
+
+```
+To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see if the following is listed near the end of the log:
+
+``` txt
+>>> [Device Installation Restrictions Policy Check]
+>>> Section start 2018/11/15 12:26:41.659
+<<< Section end 2018/11/15 12:26:41.751
+<<< [Exit status: SUCCESS]
+```
+
+
+
+
+
+
+
**DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses**
diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md
index 56e547eb48..40a7ae35c2 100644
--- a/windows/client-management/mdm/policy-csp-education.md
+++ b/windows/client-management/mdm/policy-csp-education.md
@@ -6,14 +6,15 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
-ms.date: 03/12/2018
+ms.date: 09/23/2019
ms.reviewer:
manager: dansimp
---
# Policy CSP - Education
-
+> [!WARNING]
+> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -21,6 +22,9 @@ manager: dansimp
## Education policies
+ -
+ Education/AllowGraphingCalculator
+
-
Education/DefaultPrinterName
@@ -32,6 +36,60 @@ manager: dansimp
+
+
+
+**Education/AllowGraphingCalculator**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+  |
+  |
+  |
+  |
+  |
+  |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * User
+
+
+
+
+
+Added in next major release of Windows 10. This policy setting allows you to control whether graphing functionality is available in the Windows Calculator app. If you disable this policy setting, graphing functionality will not be accessible in the Windows Calculator app. If you enable or don't configure this policy setting, you will be able to access graphing functionality.
+
+
+ADMX Info:
+- GP English name: *Allow Graphing Calculator*
+- GP name: *AllowGraphingCalculator*
+- GP path: *Windows Components/Calculator*
+- GP ADMX file name: *Programs.admx*
+
+
+
+The following list shows the supported values:
+- 0 - Disabled
+- 1 (default) - Enabled
+
+
@@ -176,7 +234,7 @@ The following list shows the supported values:
Added in Windows 10, version 1709. Allows IT Admins to automatically provision printers based on their names (network host names).
-The policy value is expected to be a `````` seperated list of printer names. The OS will attempt to search and install the matching printer driver for each listed printer.
+The policy value is expected to be a `````` separated list of printer names. The OS will attempt to search and install the matching printer driver for each listed printer.
@@ -190,6 +248,7 @@ Footnotes:
- 4 - Added in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903.
+- 7 - Added in next major release of Windows 10.
diff --git a/windows/client-management/mdm/policy-csp-kioskbrowser.md b/windows/client-management/mdm/policy-csp-kioskbrowser.md
index 351f5e5e34..347736e526 100644
--- a/windows/client-management/mdm/policy-csp-kioskbrowser.md
+++ b/windows/client-management/mdm/policy-csp-kioskbrowser.md
@@ -15,7 +15,7 @@ manager: dansimp
-These policies currently only apply to Kiosk Browser app. Kiosk Browser is a Microsoft Store app, added in Windows 10 version 1803, that provides IT a way to customize the end user’s browsing experience to fulfill kiosk, signage, and shared device scenarios. Application developers can also create their own kiosk browser and read these policies using [NamedPolicy.GetPolicyFromPath(String, String) Method](https://docs.microsoft.com/uwp/api/windows.management.policies.namedpolicy.getpolicyfrompath#Windows_Management_Policies_NamedPolicy_GetPolicyFromPath_System_String_System_String_).
+These policies currently only apply to Kiosk Browser app. Kiosk Browser is a Microsoft Store app, added in Windows 10 version 1803, that provides IT a way to customize the end user's browsing experience to fulfill kiosk, signage, and shared device scenarios. Application developers can also create their own kiosk browser and read these policies using [NamedPolicy.GetPolicyFromPath(String, String) Method](https://docs.microsoft.com/uwp/api/windows.management.policies.namedpolicy.getpolicyfrompath#Windows_Management_Policies_NamedPolicy_GetPolicyFromPath_System_String_System_String_).
@@ -224,7 +224,7 @@ Added in Windows 10, version 1803. Configures the default URL kiosk browsers to
-Shows the Kiosk Browser's end session button. When the policy is enabled, the Kiosk Browser app shows a button to reset the browser. When the user clicks on the button, the app will prompt the user for confirmation to end the session. When the user confirms, the Kiosk broswser will clear all browsing data (cache, cookies, etc.) and navigate back to the default URL.
+Shows the Kiosk Browser's end session button. When the policy is enabled, the Kiosk Browser app shows a button to reset the browser. When the user clicks on the button, the app will prompt the user for confirmation to end the session. When the user confirms, the Kiosk browser will clear all browsing data (cache, cookies, etc.) and navigate back to the default URL.
diff --git a/windows/client-management/mdm/policy-csp-lockdown.md b/windows/client-management/mdm/policy-csp-lockdown.md
index b775445fbd..960dbecada 100644
--- a/windows/client-management/mdm/policy-csp-lockdown.md
+++ b/windows/client-management/mdm/policy-csp-lockdown.md
@@ -65,7 +65,7 @@ manager: dansimp
-Added in Windows 10, version 1607. Allows the user to invoke any system user interface by swiping in from any screen edge using touch.
+Added in Windows 10, version 1607. Allows the user to invoke any system user interface by swiping in from any screen edge using touch.
The easiest way to verify the policy is to restart the explorer process or to reboot after the policy is applied. And then try to swipe from the right edge of the screen. The desired result is for Action Center to not be invoked by the swipe. You can also enter tablet mode and attempt to swipe from the top of the screen to rearrange. That will also be disabled.
diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md
index d2d5b890fa..c4c5c90156 100644
--- a/windows/client-management/mdm/policy-csp-privacy.md
+++ b/windows/client-management/mdm/policy-csp-privacy.md
@@ -922,11 +922,11 @@ Value type is integer.
ADMX Info:
-- GP English name: Let Windows apps access background spatial perception
-- GP name: LetAppsAccessBackgroundSpatialPerception
-- GP element: LetAppsAccessBackgroundSpatialPerception_Enum
-- GP path: Windows Components/App Privacy
-- GP ADMX file name: AppPrivacy.admx
+- GP English name: *Let Windows apps access background spatial perception*
+- GP name: *LetAppsAccessBackgroundSpatialPerception*
+- GP element: *LetAppsAccessBackgroundSpatialPerception_Enum*
+- GP path: *Windows Components/App Privacy*
+- GP ADMX file name: *AppPrivacy.admx*
@@ -989,11 +989,11 @@ Value type is chr.
ADMX Info:
-- GP English name: Let Windows apps access background spatial perception
-- GP name: LetAppsAccessBackgroundSpatialPerception
-- GP element: LetAppsAccessBackgroundSpatialPerception_ForceAllowTheseApps_List
-- GP path: Windows Components/App Privacy
-- GP ADMX file name: AppPrivacy.admx
+- GP English name: *Let Windows apps access background spatial perception*
+- GP name: *LetAppsAccessBackgroundSpatialPerception*
+- GP element: *LetAppsAccessBackgroundSpatialPerception_ForceAllowTheseApps_List*
+- GP path: *Windows Components/App Privacy*
+- GP ADMX file name: *AppPrivacy.admx*
@@ -1040,7 +1040,7 @@ ADMX Info:
-Added in Windows 10, version 1903.
+Added in Windows 10, version 1903.
> [!NOTE]
> Currently, this policy is supported only in HoloLens 2.
@@ -1051,11 +1051,11 @@ Value type is chr.
ADMX Info:
-- GP English name: Let Windows apps access background spatial perception
-- GP name: LetAppsAccessBackgroundSpatialPerception
-- GP element: LetAppsAccessBackgroundSpatialPerception_ForceDenyTheseApps_List
-- GP path: Windows Components/App Privacy
-- GP ADMX file name: AppPrivacy.admx
+- GP English name: *Let Windows apps access background spatial perception*
+- GP name: *LetAppsAccessBackgroundSpatialPerception*
+- GP element: *LetAppsAccessBackgroundSpatialPerception_ForceDenyTheseApps_List*
+- GP path: *Windows Components/App Privacy*
+- GP ADMX file name: *AppPrivacy.admx*
@@ -1116,11 +1116,11 @@ Value type is chr.
ADMX Info:
-- GP English name: Let Windows apps access background spatial perception
-- GP name: LetAppsAccessBackgroundSpatialPerception
-- GP element: LetAppsAccessBackgroundSpatialPerception_UserInControlOfTheseApps_List
-- GP path: Windows Components/App Privacy
-- GP ADMX file name: AppPrivacy.admx
+- GP English name: *Let Windows apps access background spatial perception*
+- GP name: *LetAppsAccessBackgroundSpatialPerception*
+- GP element: *LetAppsAccessBackgroundSpatialPerception_UserInControlOfTheseApps_List*
+- GP path: *Windows Components/App Privacy*
+- GP ADMX file name: *AppPrivacy.admx*
diff --git a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md
index 15a529a427..43f3e09bab 100644
--- a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md
+++ b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md
@@ -97,9 +97,6 @@ Supported values:
-
-
-
Footnotes:
@@ -109,4 +106,6 @@ Footnotes:
- 3 - Added in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809.
-- 6 - Added in Windows 10, version 1903.
\ No newline at end of file
+- 6 - Added in Windows 10, version 1903.
+
+
diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md
index bd12c8d9b7..5450d8dc1a 100644
--- a/windows/client-management/mdm/policy-csp-start.md
+++ b/windows/client-management/mdm/policy-csp-start.md
@@ -668,13 +668,7 @@ The following list shows the supported values:
Enabling this policy prevents context menus from being invoked in the Start Menu.
-
-The following list shows the supported values:
-- 0 (default) – False (Do not disable).
-- 1 - True (disable).
-
-
ADMX Info:
- GP English name: *Disable context menus in the Start Menu*
@@ -684,6 +678,10 @@ ADMX Info:
+The following list shows the supported values:
+
+- 0 (default) – False (Do not disable).
+- 1 - True (disable).
@@ -1100,13 +1098,7 @@ Added in Windows 10, version 1709. Enabling this policy removes the people icon
Value type is integer.
-
-The following list shows the supported values:
-- 0 (default) – False (do not hide).
-- 1 - True (hide).
-
-
ADMX Info:
- GP English name: *Remove the People Bar from the taskbar*
@@ -1115,6 +1107,13 @@ ADMX Info:
- GP ADMX file name: *StartMenu.admx*
+
+The following list shows the supported values:
+
+- 0 (default) – False (do not hide).
+- 1 - True (hide).
+
+
diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md
index 09a9bad5ae..d6ed85073e 100644
--- a/windows/client-management/mdm/policy-csp-storage.md
+++ b/windows/client-management/mdm/policy-csp-storage.md
@@ -6,17 +6,13 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
-ms.date: 01/14/2019
+ms.date: 09/23/2019
ms.reviewer:
manager: dansimp
---
# Policy CSP - Storage
-> [!WARNING]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
-
@@ -627,7 +623,10 @@ ADMX Info:
-If you enable this policy setting, write access is denied to this removable storage class. If you disable or do not configure this policy setting, write access is allowed to this removable storage class. Note: To require that users write data to BitLocker-protected storage, enable the policy setting "Deny write access to drives not protected by BitLocker," which is located in "Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives."
+If you enable this policy setting, write access is denied to this removable storage class. If you disable or do not configure this policy setting, write access is allowed to this removable storage class.
+
+> [!Note]
+> To require that users write data to BitLocker-protected storage, enable the policy setting "Deny write access to drives not protected by BitLocker," which is located in "Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives."
Supported values:
- 0 - Disable
@@ -647,7 +646,10 @@ ADMX Info:
+Example for setting the device custom OMA-URI setting to enable this policy:
+To deny write access to removable storage within Intune’s custom profile, set OMA-URI to ```.\[device|user]\vendor\msft\policy\[config|result]\Storage/RemovableDiskDenyWriteAccess```, Data type to Integer, and Value to 1.
+See [Use custom settings for Windows 10 devices in Intune](https://docs.microsoft.com/en-us/intune/custom-settings-windows-10) for information on how to create custom profiles.
diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md
index eade9cb700..233d029683 100644
--- a/windows/client-management/mdm/policy-csp-system.md
+++ b/windows/client-management/mdm/policy-csp-system.md
@@ -395,7 +395,7 @@ The following list shows the supported values:
- 0 – Disabled.
- 1 (default) – Permits Microsoft to configure device settings only.
-- 2 – Allows Microsoft to conduct full experimentations.
+- 2 – Allows Microsoft to conduct full experimentation.
@@ -532,9 +532,9 @@ ADMX Info:
The following list shows the supported values:
-- 0 – Force Location Off. All Location Privacy settings are toggled off and greyed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search.
+- 0 – Force Location Off. All Location Privacy settings are toggled off and grayed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search.
- 1 (default) – Location service is allowed. The user has control and can change Location Privacy settings on or off.
-- 2 – Force Location On. All Location Privacy settings are toggled on and greyed out. Users cannot change the settings and all consent permissions will be automatically suppressed.
+- 2 – Force Location On. All Location Privacy settings are toggled on and grayed out. Users cannot change the settings and all consent permissions will be automatically suppressed.
@@ -763,16 +763,14 @@ Specifies whether to allow the user to factory reset the device by using control
Most restricted value is 0.
-
> [!TIP]
> This policy is also applicable to Windows 10 and not exclusive to phone.
->
-> The following list shows the supported values:
-> orted values:
+
+
+The following list shows the supported values:
- 0 – Not allowed.
- 1 (default) – Allowed to reset to factory default settings.
-
@@ -1006,10 +1004,10 @@ This policy setting determines whether people can change their own telemetry lev
If you set this policy setting to "Disable Telemetry opt-in Settings", telemetry levels are disabled in Settings, preventing people from changing them.
-If you set this policy setting to "Enable Telemetry opt-in Setings" or don't configure this policy setting, people can change their own telemetry levels in Settings.
+If you set this policy setting to "Enable Telemetry opt-in Settings" or don't configure this policy setting, people can change their own telemetry levels in Settings.
-Note:
-Set the Allow Telemetry policy setting to prevent people from sending diagnostic data to Microsoft beyond your organization's limit.
+> [!Note]
+> Set the Allow Telemetry policy setting to prevent people from sending diagnostic data to Microsoft beyond your organization's limit.
diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md
index dd9948d56b..060fa7985d 100644
--- a/windows/client-management/mdm/policy-csp-textinput.md
+++ b/windows/client-management/mdm/policy-csp-textinput.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
-ms.date: 08/09/2018
+ms.date: 09/20/2019
ms.reviewer:
manager: dansimp
---
@@ -14,7 +14,7 @@ manager: dansimp
# Policy CSP - TextInput
> [!WARNING]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+> Some information relates to prereleased products, which may be substantially modified before they are commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -60,6 +60,15 @@ manager: dansimp
TextInput/AllowLinguisticDataCollection
-
+ TextInput/ConfigureJapaneseIMEVersion
+
+ -
+ TextInput/ConfigureSimplifiedChineseIMEVersion
+
+ -
+ TextInput/ConfigureTraditionalChineseIMEVersion
+
+ -
TextInput/EnableTouchKeyboardAutoInvokeInDesktopMode
-
@@ -705,6 +714,171 @@ This setting supports a range of values between 0 and 1.
+
+**TextInput/ConfigureJapaneseIMEVersion**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+  |
+  |
+  |
+  |
+  |
+  |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+> [!NOTE]
+> - The policy is only enforced in Windows 10 for desktop.
+> - This policy requires reboot to take effect.
+
+Added in next major release of Windows 10. Allows IT admins to configure Microsoft Japanese IME version in the desktop.
+
+
+
+The following list shows the supported values:
+
+- 0 (default) - Allows you to configure which Microsoft Japanese IME version to use. The new Microsoft Japanese IME version is configured by default.
+- 1 - Does not allow you to configure which Microsoft Japanese IME version to use. The previous version of Microsoft Japanese IME is always selected.
+- 2 - Does not allow you to configure which Microsoft Japanese IME version to use. The new Microsoft Japanese IME version is always selected.
+
+
+
+
+
+
+
+**TextInput/ConfigureSimplifiedChineseIMEVersion**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+  |
+  |
+  |
+  |
+  |
+  |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+> [!NOTE]
+> - This policy is enforced only in Windows 10 for desktop.
+> - This policy requires reboot to take effect.
+
+Added in next major release of Windows 10. Allows IT admins to configure Microsoft Simplified Chinese IME version in the desktop.
+
+
+
+The following list shows the supported values:
+
+- 0 (default) - Allows you to configure which Microsoft Simplified Chinese IME version to use. The new Microsoft Simplified Chinese IME version is configured by default.
+- 1 - Does not allow you to configure which Microsoft Simplified Chinese IME version to use. The previous version of Microsoft Simplified Chinese IME is always selected.
+- 2 - Does not allow you to configure which Microsoft Simplified Chinese IME version to use. The new Microsoft Simplified Chinese IME version is always selected.
+
+
+
+
+
+
+
+**TextInput/ConfigureTraditionalChineseIMEVersion**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+  |
+  |
+  |
+  |
+  |
+  |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+> [!NOTE]
+> - This policy is enforced only in Windows 10 for desktop.
+> - This policy requires reboot to take effect.
+
+Added in next major release of Windows 10. Allows IT admins to configure Microsoft Traditional Chinese IME version in the desktop.
+
+
+
+The following list shows the supported values:
+
+- 0 (default) - Allows you to configure which Microsoft Traditional Chinese IME version to use. The new Microsoft Traditional Chinese IME version is configured by default.
+- 1 - Does not allow you to configure which Microsoft Traditional Chinese IME version to use. The previous version of Microsoft Traditional Chinese IME is always selected.
+- 2 - Does not allow you to configure which Microsoft Traditional Chinese IME version to use. The new Microsoft Traditional Chinese IME version is always selected.
+
+
+
+
+
+
**TextInput/EnableTouchKeyboardAutoInvokeInDesktopMode**
@@ -762,6 +936,7 @@ The following list shows the supported values:
+
**TextInput/ExcludeJapaneseIMEExceptJIS0208**
@@ -1339,4 +1514,4 @@ Footnotes:
- 5 - Added in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903.
-
\ No newline at end of file
+
diff --git a/windows/client-management/mdm/policy-csp-troubleshooting.md b/windows/client-management/mdm/policy-csp-troubleshooting.md
index 082308817e..6b1d56a0b6 100644
--- a/windows/client-management/mdm/policy-csp-troubleshooting.md
+++ b/windows/client-management/mdm/policy-csp-troubleshooting.md
@@ -113,10 +113,11 @@ By default, this policy is not configured and the SKU based defaults are used fo
-ADMX Info:
- GP English name: Troubleshooting: Allow users to access recommended troubleshooting for known problems
-- GP name: TroubleshootingAllowRecommendations
-- GP path: Troubleshooting and Diagnostics/Microsoft Support Diagnostic Tool
-- GP ADMX file name: MSDT.admx
+ADMX Info:
+- GP English name: *Troubleshooting: Allow users to access recommended troubleshooting for known problems*
+- GP name: *TroubleshootingAllowRecommendations*
+- GP path: *Troubleshooting and Diagnostics/Microsoft Support Diagnostic Tool*
+- GP ADMX file name: *MSDT.admx*
@@ -127,8 +128,6 @@ ADMX Info:
- GP English name: Troubleshooting: Allow users to access r
-
-
Footnotes:
@@ -138,4 +137,5 @@ Footnotes:
- 3 - Added in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809.
-- 6 - Added in Windows 10, version 1903.
\ No newline at end of file
+- 6 - Added in Windows 10, version 1903.
+
diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md
index 86359678c2..c29f9811ad 100644
--- a/windows/client-management/mdm/policy-csp-update.md
+++ b/windows/client-management/mdm/policy-csp-update.md
@@ -13,6 +13,8 @@ manager: dansimp
# Policy CSP - Update
+> [!NOTE]
+> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
@@ -204,11 +206,6 @@ manager: dansimp
-> [!NOTE]
-> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
-
-
-
**Update/ActiveHoursEnd**
@@ -1379,49 +1376,6 @@ Added in Windows 10, version 1803. Enable IT admin to configure feature update u
-
-**Update/ConfigureFeatureUpdateUninstallPeriod**
-
-
-
-
- Home |
- Pro |
- Business |
- Enterprise |
- Education |
- Mobile |
- Mobile Enterprise |
-
-
-  |
- 4 |
- 4 |
- 4 |
- 4 |
-  |
-  |
-
-
-
-
-
-[Scope](./policy-configuration-service-provider.md#policy-scope):
-
-> [!div class = "checklist"]
-> * Device
-
-
-
-
-
-Added in Windows 10, version 1803. Enable IT admin to configure feature update uninstall period. Values range 2 - 60 days. Default is 10 days.
-
-
-
-
-
-
**Update/DeferFeatureUpdatesPeriodInDays**
diff --git a/windows/client-management/mdm/supl-csp.md b/windows/client-management/mdm/supl-csp.md
index 09ea7f32d0..64077761f8 100644
--- a/windows/client-management/mdm/supl-csp.md
+++ b/windows/client-management/mdm/supl-csp.md
@@ -9,15 +9,15 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
-ms.date: 07/20/2018
+ms.date: 09/12/2019
---
# SUPL CSP
> [!WARNING]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-The SUPL configuration service provider is used to configure the location client, as shown in the following table.
+The SUPL configuration service provider is used to configure the location client, as shown in the following table:
@@ -51,7 +51,7 @@ The SUPL configuration service provider is used to configure the location client
MCC/MNC value pairs which are used to specify which networks' UUIC the SUPL account matches.
-Address of the server—a mobile positioning center for non-trusted mode.
+Address of the server — a mobile positioning center for non-trusted mode.
The positioning method used by the MPC for non-trusted mode.
|
@@ -68,7 +68,7 @@ The following diagram shows the SUPL configuration service provider management o
-
+
@@ -86,7 +86,10 @@ If this value is not specified, the device infers the H-SLP address from the IMS
For OMA DM, if the format for this node is incorrect the entry will be ignored and an error will be returned, but the configuration service provider will continue processing the rest of the parameters.
**Version**
-Optional. Determines the version of the SUPL protocol to use. For SUPL 1.0, set this value to `1`. For SUPL 2.0, set this value to `2`. The default is 1.
+Optional. Determines the major version of the SUPL protocol to use. For SUPL 1.0.0, set this value to 1. For SUPL 2.0.0, set this value to 2. The default is 1. Refer to FullVersion to define the minor version and the service indicator.
+
+**FullVersion**
+Added in the next major release of Windows 10. Optional. Determines the full version (X.Y.Z where X, Y, and Z are the major version, the minor version, and the service indicator, respectively) of the SUPL protocol to use. The default is 1.0.0. If FullVersion is defined, Version field is ignored.
**MCCMNCPairs**
Required. List all of the MCC and MNC pairs owned by the mobile operator. This list is used to verify that the UICC matches the network and SUPL can be used. When the UICC and network do not match, the device uses the default location service and does not use SUPL.
@@ -295,7 +298,7 @@ Optional. Specifies the positioning method that the SUPL client will use for mob
0 |
-None: The device uses the default positioning method. In this default mode, the GNSS obtains assistance (time injection, coarse position injection and ephemeris data) from the Microsoft Positioning Service. |
+None: The device uses the default positioning method. In this default mode, the GNSS obtains assistance (time injection, coarse position injection, and ephemeris data) from the Microsoft Positioning Service. |
1 |
@@ -582,18 +585,6 @@ The following table shows the Microsoft custom elements that this configuration
-
## Related topics
-
-[Configuration service provider reference](configuration-service-provider-reference.md)
-
-
-
-
-
-
-
-
-
-
+[Configuration service provider reference](configuration-service-provider-reference.md)
\ No newline at end of file
diff --git a/windows/client-management/mdm/supl-ddf-file.md b/windows/client-management/mdm/supl-ddf-file.md
index bf899e6c8e..e2b10b625a 100644
--- a/windows/client-management/mdm/supl-ddf-file.md
+++ b/windows/client-management/mdm/supl-ddf-file.md
@@ -15,13 +15,13 @@ ms.date: 07/20/2018
# SUPL DDF file
> [!WARNING]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-This topic shows the OMA DM device description framework (DDF) for the **SUPL** configuration service provider.
+This topic shows the OMA DM device description framework (DDF) for the **SUPL** configuration service provider (CSP).
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
-The XML below is for Windows 10, version 1809.
+The XML below is the DDF for the current version for this CSP.
```xml
@@ -47,7 +47,7 @@ The XML below is for Windows 10, version 1809.
- com.microsoft/1.1/MDM/SUPL
+ com.microsoft/1.2/MDM/SUPL
@@ -159,7 +159,7 @@ The XML below is for Windows 10, version 1809.
1
- Optional. Determines the version of the SUPL protocol to use. For SUPL 1.0, set this value to 1. For SUPL 2.0, set this value to 2. The default is 1.
+ Optional. Determines the major version of the SUPL protocol to use. For SUPL 1.0.0, set this value to 1. For SUPL 2.0.0, set this value to 2. The default is 1. Refer to FullVersion to define the minor version and the service indicator.
@@ -174,6 +174,29 @@ The XML below is for Windows 10, version 1809.
+
+ FullVersion
+
+
+
+
+
+ 1.0.0
+ Optional. Determines the full version (X.Y.Z where X, Y, and Z are the major version, the minor version, and the service indicator, respectively) of the SUPL protocol to use. The default is 1.0.0. If FullVersion is defined, Version field is ignored.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
MCCMNCPairs
diff --git a/windows/client-management/mdm/vpnv2-csp.md b/windows/client-management/mdm/vpnv2-csp.md
index fa5597ecf6..c7555d45bf 100644
--- a/windows/client-management/mdm/vpnv2-csp.md
+++ b/windows/client-management/mdm/vpnv2-csp.md
@@ -450,7 +450,7 @@ Required for native profiles. Type of tunneling protocol used. This value can be
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
-> **Note** The **Automatic** option means that the device will try each of the built-in tunneling protocols until one succeeds. It will attempt protocols in following order: IKEv2, PPTP and then L2TP. This order is not customizable.
+> **Note** The **Automatic** option means that the device will try each of the built-in tunneling protocols until one succeeds. It will attempt protocols in following order: SSTP, IKEv2, PPTP and then L2TP. This order is not customizable.
**VPNv2/**ProfileName**/NativeProfile/Authentication**
Required node for native profile. It contains authentication information for the native VPN profile.
diff --git a/windows/deployment/s-mode.md b/windows/deployment/s-mode.md
index deb025fd32..3d5adb42f4 100644
--- a/windows/deployment/s-mode.md
+++ b/windows/deployment/s-mode.md
@@ -1,57 +1,59 @@
----
-title: Windows 10 Pro in S mode
-description: Overview of Windows 10 Pro/Enterprise in S mode. What is S mode for Enterprise customers?
-keywords: Windows 10 S, S mode, Windows S mode, Windows 10 S mode, S-mode, system requirements, Overview, Windows 10 Pro in S mode, Windows 10 Enterprise in S mode, Windows 10 Pro/Enterprise in S mode
-ms.mktglfcycl: deploy
-ms.localizationpriority: medium
-ms.prod: w10
-ms.sitesec: library
-ms.pagetype: deploy
-ms.date: 12/05/2018
-ms.reviewer:
-manager: laurawi
-ms.audience: itpro
author: greg-lindsay
-audience: itpro
author: greg-lindsay
-ms.topic: article
----
-
-# Windows 10 in S mode - What is it?
-S mode is an evolution of the S SKU introduced with Windows 10 April 2018 Update. It's a configuration that's available on all Windows Editions when enabled at the time of manufacturing. The edition of Windows can be upgrade at any time as shown below. However, the switch from S mode is a onetime switch and can only be undone by a wipe and reload of the OS.
-
-
-
-## S mode key features
-**Microsoft-verified security**
-
-With Windows 10 in S mode, you’ll find your favorite applications, such as Office, Evernote, and Spotify in the Microsoft Store where they’re Microsoft-verified for security. You can also feel secure when you’re online. Microsoft Edge, your default browser, gives you protection against phishing and socially engineered malware.
-
-**Performance that lasts**
-
-Start-ups are quick, and S mode is built to keep them that way. With Microsoft Edge as your browser, your online experience is fast and secure. Plus, you’ll enjoy a smooth, responsive experience, whether you’re streaming HD video, opening apps, or being productive on the go.
-
-**Choice and flexibility**
-
-Save your files to your favorite cloud, like OneDrive or Dropbox, and access them from any device you choose. Browse the Microsoft Store for thousands of apps, and if you don’t find exactly what you want, you can easily [switch out of S mode](https://docs.microsoft.com/windows/deployment/windows-10-pro-in-s-mode) to Windows 10 Home, Pro, or Enterprise editions at any time and search the web for more choices, as shown below.
-
-
-
-
-## Deployment
-
-Windows 10 in S mode is built for [modern management](https://docs.microsoft.com/windows/client-management/manage-windows-10-in-your-organization-modern-management) which means using [Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot). Windows Autopilot lets you deploy the device directly to a user without IT having to touch the physical device. Instead of manually deploying a custom image, Windows Autopilot will start with a generic PC that can only be used to join the company domain; policies are then deployed automatically through mobile device management to customize the device to the user and the desired environment. Devices are shipped in S mode; you can either keep them in S mode or use Windows Autopilot to switch the device out of S mode during the first run process or later using mobile device management, if desired.
-
-## Keep line of business apps functioning with Desktop Bridge
-
-Worried about your line of business apps not working in S mode? [Desktop Bridge](https://docs.microsoft.com/windows/uwp/porting/desktop-to-uwp-root) enables you to convert your line of business apps to a packaged app with UWP manifest. After testing and validating you can distribute the app through the Microsoft Store, making it ideal for Windows 10 in S mode.
-
-## Repackage Win32 apps into the MSIX format
-
-The [MSIX Packaging Tool](https://docs.microsoft.com/windows/application-management/msix-app-packaging-tool), available from the Microsoft Store, enables you to repackage existing Win32 applications to the MSIX format. You can run your desktop installers through this tool interactively and obtain an MSIX package that you can install on your device and upload to the Microsoft Store. This is another way to get your apps ready to run on Windows 10 in S mode.
-
-
-## Related links
-
-- [Consumer applications for S mode](https://www.microsoft.com/windows/s-mode)
-- [S mode devices](https://www.microsoft.com/windows/view-all-devices)
-- [Windows Defender Application Control deployment guide](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide)
-- [Windows Defender Advanced Threat Protection](https://www.microsoft.com/WindowsForBusiness/windows-atp)
+---
+title: Windows 10 Pro in S mode
+description: Overview of Windows 10 Pro/Enterprise in S mode. What is S mode for Enterprise customers?
+keywords: Windows 10 S, S mode, Windows S mode, Windows 10 S mode, S-mode, system requirements, Overview, Windows 10 Pro in S mode, Windows 10 Enterprise in S mode, Windows 10 Pro/Enterprise in S mode
+ms.mktglfcycl: deploy
+ms.localizationpriority: medium
+ms.prod: w10
+ms.sitesec: library
+ms.pagetype: deploy
+ms.date: 12/05/2018
+ms.reviewer:
+manager: laurawi
+ms.audience: itpro
+author: greg-lindsay
+audience: itpro
+author: greg-lindsay
+ms.topic: article
+---
+
+# Windows 10 in S mode - What is it?
+S mode is an evolution of the S SKU introduced with Windows 10 April 2018 Update. It's a configuration that's available on all Windows Editions when enabled at the time of manufacturing. The edition of Windows can be upgrade at any time as shown below. However, the switch from S mode is a onetime switch and can only be undone by a wipe and reload of the OS.
+
+
+
+## S mode key features
+**Microsoft-verified security**
+
+With Windows 10 in S mode, you’ll find your favorite applications, such as Office, Evernote, and Spotify in the Microsoft Store where they’re Microsoft-verified for security. You can also feel secure when you’re online. Microsoft Edge, your default browser, gives you protection against phishing and socially engineered malware.
+
+**Performance that lasts**
+
+Start-ups are quick, and S mode is built to keep them that way. With Microsoft Edge as your browser, your online experience is fast and secure. Plus, you’ll enjoy a smooth, responsive experience, whether you’re streaming HD video, opening apps, or being productive on the go.
+
+**Choice and flexibility**
+
+Save your files to your favorite cloud, like OneDrive or Dropbox, and access them from any device you choose. Browse the Microsoft Store for thousands of apps, and if you don’t find exactly what you want, you can easily [switch out of S mode](https://docs.microsoft.com/windows/deployment/windows-10-pro-in-s-mode) to Windows 10 Home, Pro, or Enterprise editions at any time and search the web for more choices, as shown below.
+
+
+
+
+## Deployment
+
+Windows 10 in S mode is built for [modern management](https://docs.microsoft.com/windows/client-management/manage-windows-10-in-your-organization-modern-management) which means using [Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot). Windows Autopilot lets you deploy the device directly to a user without IT having to touch the physical device. Instead of manually deploying a custom image, Windows Autopilot will start with a generic PC that can only be used to join the company domain; policies are then deployed automatically through mobile device management to customize the device to the user and the desired environment. Devices are shipped in S mode; you can either keep them in S mode or use Windows Autopilot to switch the device out of S mode during the first run process or later using mobile device management, if desired.
+
+## Keep line of business apps functioning with Desktop Bridge
+
+Worried about your line of business apps not working in S mode? [Desktop Bridge](https://docs.microsoft.com/windows/uwp/porting/desktop-to-uwp-root) enables you to convert your line of business apps to a packaged app with UWP manifest. After testing and validating you can distribute the app through the Microsoft Store, making it ideal for Windows 10 in S mode.
+
+## Repackage Win32 apps into the MSIX format
+
+The [MSIX Packaging Tool](https://docs.microsoft.com/windows/application-management/msix-app-packaging-tool), available from the Microsoft Store, enables you to repackage existing Win32 applications to the MSIX format. You can run your desktop installers through this tool interactively and obtain an MSIX package that you can install on your device and upload to the Microsoft Store. This is another way to get your apps ready to run on Windows 10 in S mode.
+
+
+## Related links
+
+- [Consumer applications for S mode](https://www.microsoft.com/windows/s-mode)
+- [S mode devices](https://www.microsoft.com/windows/view-all-devices)
+- [Windows Defender Application Control deployment guide](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide)
+- [Windows Defender Advanced Threat Protection](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp)
diff --git a/windows/deployment/update/fod-and-lang-packs.md b/windows/deployment/update/fod-and-lang-packs.md
index 9d1e2e68e3..8e8e208b29 100644
--- a/windows/deployment/update/fod-and-lang-packs.md
+++ b/windows/deployment/update/fod-and-lang-packs.md
@@ -6,7 +6,8 @@ ms.mktglfcycl: manage
ms.sitesec: library
ms.pagetype: article
ms.author: greglin
-audience: itpro
author: greg-lindsay
+audience: itpro
+author: greg-lindsay
ms.localizationpriority: medium
ms.date: 03/13/2019
ms.reviewer:
@@ -17,10 +18,14 @@ ms.topic: article
> Applies to: Windows 10
-As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, FOD and language packs can only be installed from Windows Update.
-
-For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading FOD and language packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor.
+As of Windows 10 version 1709, you can't use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FODs) locally. Starting with Windows 10 version 1803, language packs can no longer be hosted on WSUS.
-Changing this policy does not affect how other updates are distributed. They continue to come from WSUS or SCCM as you have scheduled them.
+The **Specify settings for optional component installation and component repair** policy, located under `Computer Configuration\Administrative Templates\System` in the Group Policy Editor, can be used to specify alternate ways to acquire FOD packages, language packages, and content for corruption repair. However, it’s important to note this policy only allows specifying one alternate location and behaves differently across OS versions.
+
+In Windows 10 version 1709 and 1803, changing the **Specify settings for optional component installation and component repair** policy to download content from Windows Update enables acquisition of FOD packages while also enabling corruption repair. Specifying a network location works for either, depending on the content is found at that location. Changing this policy on these OS versions does not influence how language packs are acquired.
+
+In Windows 10 version 1809 and beyond, changing the **Specify settings for optional component installation and component repair** policy also influences how language packs are acquired, however language packs can only be acquired directly from Windows Update. It’s currently not possible to acquire them from a network share. Specifying a network location works for FOD packages or corruption repair, depending on the content at that location.
+
+For all OS versions, changing the **Specify settings for optional component installation and component repair** policy does not affect how OS updates are distributed. They continue to come from WSUS or SCCM or other sources as you have scheduled them, even while optional content is sourced from Windows Update or a network location.
Learn about other client management options, including using Group Policy and administrative templates, in [Manage clients in Windows 10](https://docs.microsoft.com/windows/client-management/).
diff --git a/windows/deployment/windows-autopilot/existing-devices.md b/windows/deployment/windows-autopilot/existing-devices.md
index 0e14ae0b89..e762a53ed9 100644
--- a/windows/deployment/windows-autopilot/existing-devices.md
+++ b/windows/deployment/windows-autopilot/existing-devices.md
@@ -1,315 +1,317 @@
----
-title: Windows Autopilot for existing devices
-description: Windows Autopilot deployment
-keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
-ms.reviewer: mniehaus
-manager: laurawi
-ms.prod: w10
-ms.mktglfcycl: deploy
-ms.localizationpriority: medium
-ms.sitesec: library
-ms.pagetype: deploy
-audience: itpro
author: greg-lindsay
-ms.author: greglin
-ms.collection: M365-modern-desktop
-ms.topic: article
----
-
-# Windows Autopilot for existing devices
-
-**Applies to: Windows 10**
-
-Modern desktop deployment with Windows Autopilot enables you to easily deploy the latest version of Windows 10 to your existing devices. The apps you need for work can be automatically installed. Your work profile is synchronized, so you can resume working right away.
-
-This topic describes how to convert Windows 7 or Windows 8.1 domain-joined computers to Windows 10 devices joined to either Azure Active Directory or Active Directory (Hybrid Azure AD Join) by using Windows Autopilot.
-
->[!NOTE]
->Windows Autopilot for existing devices only supports user-driven Azure Active Directory and Hybrid Azure AD profiles. Self-deploying profiles are not supported.
-
-## Prerequisites
-
-- System Center Configuration Manager Current Branch (1806) OR System Center Configuration Manager Technical Preview (1808)
-- The [Windows ADK](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) 1803 or later
- - Note: Config Mgr 1806 or later is required to [support](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10#windows-10-adk) the Windows ADK 1809.
-- Assigned Microsoft Intune Licenses
-- Azure Active Directory Premium
-- Windows 10 version 1809 or later imported into Config Mgr as an Operating System Image
-
-## Procedures
-
-### Configure the Enrollment Status Page (optional)
-
-If desired, you can set up an [enrollment status page](https://docs.microsoft.com/windows/deployment/windows-autopilot/enrollment-status) for Autopilot using Intune.
-
-To enable and configure the enrollment and status page:
-
-1. Open [Intune in the Azure portal](https://aka.ms/intuneportal).
-2. Access **Intune > Device enrollment > Windows enrollment** and [Set up an enrollment status page](https://docs.microsoft.com/intune/windows-enrollment-status).
-3. Access **Azure Active Directory > Mobility (MDM and MAM) > Microsoft Intune** and [Configure automatic MDM enrollment](https://docs.microsoft.com/sccm/mdm/deploy-use/enroll-hybrid-windows#enable-windows-10-automatic-enrollment) and configure the MDM user scope for some or all users.
-
-See the following examples.
-
-
-
-
-### Create the JSON file
-
->[!TIP]
->To run the following commands on a computer running Windows Server 2012/2012 R2 or Windows 7/8.1, you must first download and install the [Windows Management Framework](https://www.microsoft.com/download/details.aspx?id=54616).
-
-1. On an Internet connected Windows PC or Server open an elevated Windows PowerShell command window
-2. Enter the following lines to install the necessary modules
-
- #### Install required modules
-
- ```powershell
- Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force
- Install-Module AzureAD -Force
- Install-Module WindowsAutopilotIntune -Force
- ```
-
-3. Enter the following lines and provide Intune administrative credentials
- - In the following command, replace the example user principal name for Azure authentication (admin@M365x373186.onmicrosoft.com) with your user account. Be sure that the user account you specify has sufficient administrative rights.
-
- ```powershell
- Connect-AutopilotIntune -user admin@M365x373186.onmicrosoft.com
- ```
- The password for your account will be requested using a standard Azure AD form. Type your password and then click **Sign in**.
-
See the following example:
-
- 
-
- If this is the first time you’ve used the Intune Graph APIs, you’ll also be prompted to enable read and write permissions for Microsoft Intune PowerShell. To enable these permissions:
- - Select **Consent on behalf or your organization**
- - Click **Accept**
-
-4. Next, retrieve and display all the Autopilot profiles available in the specified Intune tenant in JSON format:
-
- #### Retrieve profiles in Autopilot for existing devices JSON format
-
- ```powershell
- Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON
- ```
-
- See the following sample output: (use the horizontal scroll bar at the bottom to view long lines)
-
- PS C:\> Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON
- {
- "CloudAssignedTenantId": "1537de22-988c-4e93-b8a5-83890f34a69b",
- "CloudAssignedForcedEnrollment": 1,
- "Version": 2049,
- "Comment_File": "Profile Autopilot Profile",
- "CloudAssignedAadServerData": "{\"ZeroTouchConfig\":{\"CloudAssignedTenantUpn\":\"\",\"ForcedEnrollment\":1,\"CloudAssignedTenantDomain\":\"M365x373186.onmicrosoft.com\"}}",
- "CloudAssignedTenantDomain": "M365x373186.onmicrosoft.com",
- "CloudAssignedDomainJoinMethod": 0,
- "CloudAssignedOobeConfig": 28,
- "ZtdCorrelationId": "7F9E6025-1E13-45F3-BF82-A3E8C5B59EAC"
- }
-
- Each profile is encapsulated within braces **{ }**. In the previous example, a single profile is displayed.
-
- See the following table for a description of properties used in the JSON file.
-
-
- | Property | Description |
- |------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
- | Version (number, optional) | The version number that identifies the format of the JSON file. For Windows 10 1809, the version specified must be 2049. |
- | CloudAssignedTenantId (guid, required) | The Azure Active Directory tenant ID that should be used. This is the GUID for the tenant, and can be found in properties of the tenant. The value should not include braces. |
- | CloudAssignedTenantDomain (string, required) | The Azure Active Directory tenant name that should be used, e.g. tenant.onmicrosoft.com. |
- | CloudAssignedOobeConfig (number, required) | This is a bitmap that shows which Autopilot settings were configured. Values include: SkipCortanaOptIn = 1, OobeUserNotLocalAdmin = 2, SkipExpressSettings = 4, SkipOemRegistration = 8, SkipEula = 16 |
- | CloudAssignedDomainJoinMethod (number, required) | This property specifies whether the device should join Azure Active Directory or Active Directory (Hybrid Azure AD Join). Values include: Active AD Join = 0, Hybrid Azure AD Join = 1 |
- | CloudAssignedForcedEnrollment (number, required) | Specifies that the device should require AAD Join and MDM enrollment.
0 = not required, 1 = required. |
- | ZtdCorrelationId (guid, required) | A unique GUID (without braces) that will be provided to Intune as part of the registration process. ZtdCorrelationId will be included in enrollment message as “OfflineAutoPilotEnrollmentCorrelator”. This attribute will be present only if the enrollment is taking place on a device registered with Zero Touch Provisioning via offline registration. |
- | CloudAssignedAadServerData (encoded JSON string, required) | An embedded JSON string used for branding. It requires AAD corp branding enabled.
Example value: "CloudAssignedAadServerData": "{\"ZeroTouchConfig\":{\"CloudAssignedTenantUpn\":\"\",\"CloudAssignedTenantDomain\":\"tenant.onmicrosoft.com\"}}" |
- | CloudAssignedDeviceName (string, optional) | The name automatically assigned to the computer. This follows the naming pattern convention that can be configured in Intune as part of the Autopilot profile, or can specify an explicit name to use. |
-
-
-5. The Autopilot profile must be saved as a JSON file in ASCII or ANSI format. Windows PowerShell defaults to Unicode format, so if you attempt to redirect output of the commands to a file, you must also specify the file format. For example, to save the file in ASCII format using Windows PowerShell, you can create a directory (ex: c:\Autopilot) and save the profile as shown below: (use the horizontal scroll bar at the bottom if needed to view the entire command string)
-
- ```powershell
- Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON | Out-File c:\Autopilot\AutopilotConfigurationFile.json -Encoding ASCII
- ```
- **IMPORTANT**: The file name must be named **AutopilotConfigurationFile.json** in addition to being encoded as ASCII/ANSI.
-
- If preferred, you can save the profile to a text file and edit in Notepad. In Notepad, when you choose **Save as** you must select Save as type: **All Files** and choose ANSI from the drop-down list next to **Encoding**. See the following example.
-
- 
-
- After saving the file, move the file to a location suitable as an SCCM package source.
-
- >[!IMPORTANT]
- >Multiple JSON profile files can be used, but each must be named **AutopilotConfigurationFile.json** in order for OOBE to follow the Autopilot experience. The file also must be encoded as ANSI.
**Saving the file with Unicode or UTF-8 encoding or saving it with a different file name will cause Windows 10 OOBE to not follow the Autopilot experience**.
-
-
-### Create a package containing the JSON file
-
-1. In Configuration Manager, navigate to **\Software Library\Overview\Application Management\Packages**
-2. On the ribbon, click **Create Package**
-3. In the **Create Package and Program Wizard** enter the following **Package** and **Program Type** details:
- - Name: **Autopilot for existing devices config**
- - Select the **This package contains source files** checkbox
- - Source folder: Click **Browse** and specify a UNC path containing the AutopilotConfigurationFile.json file.
- - Click **OK** and then click **Next**.
- - Program Type: **Do not create a program**
-4. Click **Next** twice and then click **Close**.
-
-**NOTE**: If you change user-driven Autopilot profile settings in Intune at a later date, you must also update the JSON file and redistribute the associated Config Mgr package.
-
-### Create a target collection
-
->[!NOTE]
->You can also choose to reuse an existing collection
-
-1. Navigate to **\Assets and Compliance\Overview\Device Collections**
-2. On the ribbon, click **Create** and then click **Create Device Collection**
-3. In the **Create Device Collection Wizard** enter the following **General** details:
- - Name: **Autopilot for existing devices collection**
- - Comment: (optional)
- - Limiting collection: Click **Browse** and select **All Systems**
-
- >[!NOTE]
- >You can optionally choose to use an alternative collection for the limiting collection. The device to be upgraded must be running the ConfigMgr agent in the collection that you select.
-
-4. Click **Next**, then enter the following **Membership Rules** details:
- - Click **Add Rule** and specify either a direct or query based collection rule to add the target test Windows 7 devices to the new collection.
- - For example, if the hostname of the computer to be wiped and reloaded is PC-01 and you wish to use Name as the attribute, click **Add Rule > Direct Rule > (wizard opens) > Next** and then enter **PC-01** next to **Value**. Click **Next** and then choose **PC-01** under **Resources**. See the following examples.
-
- 
- 
-
-5. Continue creating the device collection with the default settings:
- - Use incremental updates for this collection: not selected
- - Schedule a full update on this collection: default
- - Click **Next** twice and then click **Close**
-
-### Create an Autopilot for existing devices Task Sequence
-
->[!TIP]
->The next procedure requires a boot image for Windows 10 1803 or later. Review your available boot images in the Configuration Manager conole under **Software Library\Overview\Operating Systems\Boot images** and verify that the **OS Version** is 10.0.17134.1 (Windows 10 version 1803) or later.
-
-1. In the Configuration Manager console, navigate to **\Software Library\Overview\Operating Systems\Task Sequences**
-2. On the Home ribbon, click **Create Task Sequence**
-3. Select **Install an existing image package** and then click **Next**
-4. In the Create Task Sequence Wizard enter the following details:
- - Task sequence name: **Autopilot for existing devices**
- - Boot Image: Click **Browse** and select a Windows 10 boot image (1803 or later)
- - Click **Next**, and then on the Install Windows page click **Browse** and select a Windows 10 **Image package** and **Image Index**, version 1803 or later.
- - Select the **Partition and format the target computer before installing the operating system** checkbox.
- - Select or clear **Configure task sequence for use with Bitlocker** checkbox. This is optional.
- - Product Key and Server licensing mode: Optionally enter a product key and server licencing mode.
- - Randomly generate the local administrator password and disable the account on all support platforms (recommended): Optional.
- - Enable the account and specify the local administrator password: Optional.
- - Click **Next**, and then on the Configure Network page choose **Join a workgroup** and specify a name (ex: workgroup) next to **Workgroup**.
-
- >[!IMPORTANT]
- >The Autopilot for existing devices task sequence will run the **Prepare Windows for capture** action which calls the System Preparation Tool (syeprep). This action will fail if the target machine is joined to a domain.
-
-5. Click **Next** and then click **Next** again to accept the default settings on the Install Configuration Manager page.
-6. On the State Migration page, enter the following details:
- - Clear the **Capture user settings and files** checkbox.
- - Clear the **Capture network settings** checkbox.
- - Clear the **Capture Microsoft Windows settings** checkbox.
- - Click **Next**.
-
- >[!NOTE]
- >The Autopilot for existing devices task sequence will result in an Azure Active Directory Domain (AAD) joined device. The User State Migration Toolkit (USMT) does not support AAD joined or hybrid AAD joined devices.
-
-7. On the Include Updates page, choose one of the three available options. This selection is optional.
-8. On the Install applications page, add applications if desired. This is optional.
-9. Click **Next**, confirm settings, click **Next** and then click **Close**.
-10. Right click on the Autopilot for existing devices task sequence and click **Edit**.
-11. In the Task Sequence Editor under the **Install Operating System** group, click the **Apply Windows Settings** action.
-12. Click **Add** then click **New Group**.
-13. Change the group **Name** from **New Group** to **Autopilot for existing devices config**.
-14. Click **Add**, point to **General**, then click **Run Command Line**.
-15. Verify that the **Run Command Line** step is nested under the **Autopilot for existing devices config** group.
-16. Change the **Name** to **Apply Autopilot for existing devices config file** and paste the following into the **Command line** text box, and then click **Apply**:
- ```
- cmd.exe /c xcopy AutopilotConfigurationFile.json %OSDTargetSystemDrive%\windows\provisioning\Autopilot\ /c
- ```
- - **AutopilotConfigurationFile.json** must be the name of the JSON file present in the Autopilot for existing devices package created earlier.
-
-17. In the **Apply Autopilot for existing devices config file** step, select the **Package** checkbox and then click **Browse**.
-18. Select the **Autopilot for existing devices config** package created earlier and click **OK**. An example is displayed at the end of this section.
-19. Under the **Setup Operating System** group, click the **Setup Windows and Configuration Manager** task.
-20. Click **Add** and then click **New Group**.
-21. Change **Name** from **New Group** to **Prepare Device for Autopilot**
-22. Verify that the **Prepare Device for Autopilot** group is the very last step in the task sequence. Use the **Move Down** button if necessary.
-23. With the **Prepare device for Autopilot** group selected, click **Add**, point to **Images** and then click **Prepare ConfigMgr Client for Capture**.
-24. Add a second step by clicking **Add**, pointing to **Images**, and clicking **Prepare Windows for Capture**. Use the following settings in this step:
- - Automatically build mass storage driver list: **Not selected**
- - Do not reset activation flag: **Not selected**
- - Shutdown the computer after running this action: **Optional**
-
- 
-
-25. Click **OK** to close the Task Sequence Editor.
-
-### Deploy Content to Distribution Points
-
-Next, ensure that all content required for the task sequence is deployed to distribution points.
-
-1. Right click on the **Autopilot for existing devices** task sequence and click **Distribute Content**.
-2. Click **Next**, **Review the content to distribute** and then click **Next**.
-3. On the Specify the content distribution page click **Add** to specify either a **Distribution Point** or **Distribution Point Group**.
-4. On the a Add Distribution Points or Add Distribution Point Groups wizard specify content destinations that will allow the JSON file to be retrieved when the task sequence is run.
-5. When you are finished specifying content distribution, click **Next** twice then click **Close**.
-
-### Deploy the OS with Autopilot Task Sequence
-
-1. Right click on the **Autopilot for existing devices** task sequence and then click **Deploy**.
-2. In the Deploy Software Wizard enter the following **General** and **Deployment Settings** details:
- - Task Sequence: **Autopilot for existing devices**.
- - Collection: Click **Browse** and then select **Autopilot for existing devices collection** (or another collection you prefer).
- - Click **Next** to specify **Deployment Settings**.
- - Action: **Install**.
- - Purpose: **Available**. You can optionally select **Required** instead of **Available**. This is not recommended during the test owing to the potential impact of inadvertent configurations.
- - Make available to the following: **Only Configuration Manager Clients**. Note: Choose the option here that is relevant for the context of your test. If the target client does not have the Configuration Manager agent or Windows installed, you will need to select an option that includes PXE or Boot Media.
- - Click **Next** to specify **Scheduling** details.
- - Schedule when this deployment will become available: Optional
- - Schedule when this deployment will expire: Optional
- - Click **Next** to specify **User Experience** details.
- - Show Task Sequence progress: Selected.
- - Software Installation: Not selected.
- - System restart (if required to complete the installation): Not selected.
- - Commit changed at deadline or during a maintenance windows (requires restart): Optional.
- - Allow task sequence to be run for client on the Internet: Optional
- - Click **Next** to specify **Alerts** details.
- - Create a deployment alert when the threshold is higher than the following: Optional.
- - Click **Next** to specify **Distribution Points** details.
- - Deployment options: **Download content locally when needed by the running task sequence**.
- - When no local distribution point is available use a remote distribution point: Optional.
- - Allow clients to use distribution points from the default site boundary group: Optional.
- - Click **Next**, confirm settings, click **Next**, and then click **Close**.
-
-### Complete the client installation process
-
-1. Open the Software Center on the target Windows 7 or Windows 8.1 client computer. You can do this by clicking Start and then typing **software** in the search box, or by typing the following at a Windows PowerShell or command prompt:
-
- ```
- C:\Windows\CCM\SCClient.exe
- ```
-
-2. In the software library, select **Autopilot for existing devices** and click **Install**. See the following example:
-
- 
- 
-
-The Task Sequence will download content, reboot, format the drives and install Windows 10. The device will then proceed to be prepared for Autopilot. Once the task sequence has completed the device will boot into OOBE and provide an Autopilot experience.
-
-
-
-
-
->[!NOTE]
->If joining devices to Active Directory (Hybrid Azure AD Join), it is necessary to create a Domain Join device configuration profile that is targeted to "All Devices" (since there is no Azure Active Directory device object for the computer to do group-based targeting). See [User-driven mode for hybrid Azure Active Directory join](https://docs.microsoft.com/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-hybrid-azure-active-directory-join) for more information.
-
-### Register the device for Windows Autopilot
-
-Devices provisioned through Autopilot will only receive the guided OOBE Autopilot experience on first boot. Once updated to Windows 10, the device should be registered to ensure a continued Autopilot experience in the event of PC reset. You can enable automatic registration for an assigned group using the **Convert all targeted devices to Autopilot** setting. For more information, see [Create an Autopilot deployment profile](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-deployment-profile).
-
-Also see [Adding devices to Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/add-devices).
-
-## Speeding up the deployment process
-
-To remove around 20 minutes from the deployment process, see Michael Niehaus's blog with instructions for [Speeding up Windows Autopilot for existing devices](https://blogs.technet.microsoft.com/mniehaus/2018/10/25/speeding-up-windows-autopilot-for-existing-devices/).
+---
+title: Windows Autopilot for existing devices
+description: Windows Autopilot deployment
+keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
+ms.reviewer: mniehaus
+manager: laurawi
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.localizationpriority: medium
+ms.sitesec: library
+ms.pagetype: deploy
+audience: itpro
+author: greg-lindsay
+ms.author: greglin
+ms.collection: M365-modern-desktop
+ms.topic: article
+---
+
+# Windows Autopilot for existing devices
+
+**Applies to: Windows 10**
+
+Modern desktop deployment with Windows Autopilot enables you to easily deploy the latest version of Windows 10 to your existing devices. The apps you need for work can be automatically installed. Your work profile is synchronized, so you can resume working right away.
+
+This topic describes how to convert Windows 7 or Windows 8.1 domain-joined computers to Windows 10 devices joined to either Azure Active Directory or Active Directory (Hybrid Azure AD Join) by using Windows Autopilot.
+
+>[!NOTE]
+>Windows Autopilot for existing devices only supports user-driven Azure Active Directory and Hybrid Azure AD profiles. Self-deploying profiles are not supported.
+
+## Prerequisites
+
+- System Center Configuration Manager Current Branch (1806) OR System Center Configuration Manager Technical Preview (1808)
+- The [Windows ADK](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) 1803 or later
+ - Note: Config Mgr 1806 or later is required to [support](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10#windows-10-adk) the Windows ADK 1809.
+- Assigned Microsoft Intune Licenses
+- Azure Active Directory Premium
+- Windows 10 version 1809 or later imported into Config Mgr as an Operating System Image
+ - **Important**: See [Known issues](known-issues.md) if you are using Windows 10 1903 with Configuration Manager’s built-in **Windows Autopilot existing device** task sequence template. Currently, one of the steps in this task sequence must be edited to work properly with Windows 10, version 1903.
+
+## Procedures
+
+### Configure the Enrollment Status Page (optional)
+
+If desired, you can set up an [enrollment status page](https://docs.microsoft.com/windows/deployment/windows-autopilot/enrollment-status) for Autopilot using Intune.
+
+To enable and configure the enrollment and status page:
+
+1. Open [Intune in the Azure portal](https://aka.ms/intuneportal).
+2. Access **Intune > Device enrollment > Windows enrollment** and [Set up an enrollment status page](https://docs.microsoft.com/intune/windows-enrollment-status).
+3. Access **Azure Active Directory > Mobility (MDM and MAM) > Microsoft Intune** and [Configure automatic MDM enrollment](https://docs.microsoft.com/sccm/mdm/deploy-use/enroll-hybrid-windows#enable-windows-10-automatic-enrollment) and configure the MDM user scope for some or all users.
+
+See the following examples.
+
+
+
+
+### Create the JSON file
+
+>[!TIP]
+>To run the following commands on a computer running Windows Server 2012/2012 R2 or Windows 7/8.1, you must first download and install the [Windows Management Framework](https://www.microsoft.com/download/details.aspx?id=54616).
+
+1. On an Internet connected Windows PC or Server open an elevated Windows PowerShell command window
+2. Enter the following lines to install the necessary modules
+
+ #### Install required modules
+
+ ```powershell
+ Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force
+ Install-Module AzureAD -Force
+ Install-Module WindowsAutopilotIntune -Force
+ ```
+
+3. Enter the following lines and provide Intune administrative credentials
+ - In the following command, replace the example user principal name for Azure authentication (admin@M365x373186.onmicrosoft.com) with your user account. Be sure that the user account you specify has sufficient administrative rights.
+
+ ```powershell
+ Connect-AutopilotIntune -user admin@M365x373186.onmicrosoft.com
+ ```
+ The password for your account will be requested using a standard Azure AD form. Type your password and then click **Sign in**.
+
See the following example:
+
+ 
+
+ If this is the first time you’ve used the Intune Graph APIs, you’ll also be prompted to enable read and write permissions for Microsoft Intune PowerShell. To enable these permissions:
+ - Select **Consent on behalf or your organization**
+ - Click **Accept**
+
+4. Next, retrieve and display all the Autopilot profiles available in the specified Intune tenant in JSON format:
+
+ #### Retrieve profiles in Autopilot for existing devices JSON format
+
+ ```powershell
+ Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON
+ ```
+
+ See the following sample output: (use the horizontal scroll bar at the bottom to view long lines)
+
+ PS C:\> Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON
+ {
+ "CloudAssignedTenantId": "1537de22-988c-4e93-b8a5-83890f34a69b",
+ "CloudAssignedForcedEnrollment": 1,
+ "Version": 2049,
+ "Comment_File": "Profile Autopilot Profile",
+ "CloudAssignedAadServerData": "{\"ZeroTouchConfig\":{\"CloudAssignedTenantUpn\":\"\",\"ForcedEnrollment\":1,\"CloudAssignedTenantDomain\":\"M365x373186.onmicrosoft.com\"}}",
+ "CloudAssignedTenantDomain": "M365x373186.onmicrosoft.com",
+ "CloudAssignedDomainJoinMethod": 0,
+ "CloudAssignedOobeConfig": 28,
+ "ZtdCorrelationId": "7F9E6025-1E13-45F3-BF82-A3E8C5B59EAC"
+ }
+
+ Each profile is encapsulated within braces **{ }**. In the previous example, a single profile is displayed.
+
+ See the following table for a description of properties used in the JSON file.
+
+
+ | Property | Description |
+ |------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+ | Version (number, optional) | The version number that identifies the format of the JSON file. For Windows 10 1809, the version specified must be 2049. |
+ | CloudAssignedTenantId (guid, required) | The Azure Active Directory tenant ID that should be used. This is the GUID for the tenant, and can be found in properties of the tenant. The value should not include braces. |
+ | CloudAssignedTenantDomain (string, required) | The Azure Active Directory tenant name that should be used, e.g. tenant.onmicrosoft.com. |
+ | CloudAssignedOobeConfig (number, required) | This is a bitmap that shows which Autopilot settings were configured. Values include: SkipCortanaOptIn = 1, OobeUserNotLocalAdmin = 2, SkipExpressSettings = 4, SkipOemRegistration = 8, SkipEula = 16 |
+ | CloudAssignedDomainJoinMethod (number, required) | This property specifies whether the device should join Azure Active Directory or Active Directory (Hybrid Azure AD Join). Values include: Active AD Join = 0, Hybrid Azure AD Join = 1 |
+ | CloudAssignedForcedEnrollment (number, required) | Specifies that the device should require AAD Join and MDM enrollment.
0 = not required, 1 = required. |
+ | ZtdCorrelationId (guid, required) | A unique GUID (without braces) that will be provided to Intune as part of the registration process. ZtdCorrelationId will be included in enrollment message as “OfflineAutoPilotEnrollmentCorrelator”. This attribute will be present only if the enrollment is taking place on a device registered with Zero Touch Provisioning via offline registration. |
+ | CloudAssignedAadServerData (encoded JSON string, required) | An embedded JSON string used for branding. It requires AAD corp branding enabled.
Example value: "CloudAssignedAadServerData": "{\"ZeroTouchConfig\":{\"CloudAssignedTenantUpn\":\"\",\"CloudAssignedTenantDomain\":\"tenant.onmicrosoft.com\"}}" |
+ | CloudAssignedDeviceName (string, optional) | The name automatically assigned to the computer. This follows the naming pattern convention that can be configured in Intune as part of the Autopilot profile, or can specify an explicit name to use. |
+
+
+5. The Autopilot profile must be saved as a JSON file in ASCII or ANSI format. Windows PowerShell defaults to Unicode format, so if you attempt to redirect output of the commands to a file, you must also specify the file format. For example, to save the file in ASCII format using Windows PowerShell, you can create a directory (ex: c:\Autopilot) and save the profile as shown below: (use the horizontal scroll bar at the bottom if needed to view the entire command string)
+
+ ```powershell
+ Get-AutopilotProfile | ConvertTo-AutopilotConfigurationJSON | Out-File c:\Autopilot\AutopilotConfigurationFile.json -Encoding ASCII
+ ```
+ **IMPORTANT**: The file name must be named **AutopilotConfigurationFile.json** in addition to being encoded as ASCII/ANSI.
+
+ If preferred, you can save the profile to a text file and edit in Notepad. In Notepad, when you choose **Save as** you must select Save as type: **All Files** and choose ANSI from the drop-down list next to **Encoding**. See the following example.
+
+ 
+
+ After saving the file, move the file to a location suitable as an SCCM package source.
+
+ >[!IMPORTANT]
+ >Multiple JSON profile files can be used, but each must be named **AutopilotConfigurationFile.json** in order for OOBE to follow the Autopilot experience. The file also must be encoded as ANSI.
**Saving the file with Unicode or UTF-8 encoding or saving it with a different file name will cause Windows 10 OOBE to not follow the Autopilot experience**.
+
+
+### Create a package containing the JSON file
+
+1. In Configuration Manager, navigate to **\Software Library\Overview\Application Management\Packages**
+2. On the ribbon, click **Create Package**
+3. In the **Create Package and Program Wizard** enter the following **Package** and **Program Type** details:
+ - Name: **Autopilot for existing devices config**
+ - Select the **This package contains source files** checkbox
+ - Source folder: Click **Browse** and specify a UNC path containing the AutopilotConfigurationFile.json file.
+ - Click **OK** and then click **Next**.
+ - Program Type: **Do not create a program**
+4. Click **Next** twice and then click **Close**.
+
+**NOTE**: If you change user-driven Autopilot profile settings in Intune at a later date, you must also update the JSON file and redistribute the associated Config Mgr package.
+
+### Create a target collection
+
+>[!NOTE]
+>You can also choose to reuse an existing collection
+
+1. Navigate to **\Assets and Compliance\Overview\Device Collections**
+2. On the ribbon, click **Create** and then click **Create Device Collection**
+3. In the **Create Device Collection Wizard** enter the following **General** details:
+ - Name: **Autopilot for existing devices collection**
+ - Comment: (optional)
+ - Limiting collection: Click **Browse** and select **All Systems**
+
+ >[!NOTE]
+ >You can optionally choose to use an alternative collection for the limiting collection. The device to be upgraded must be running the ConfigMgr agent in the collection that you select.
+
+4. Click **Next**, then enter the following **Membership Rules** details:
+ - Click **Add Rule** and specify either a direct or query based collection rule to add the target test Windows 7 devices to the new collection.
+ - For example, if the hostname of the computer to be wiped and reloaded is PC-01 and you wish to use Name as the attribute, click **Add Rule > Direct Rule > (wizard opens) > Next** and then enter **PC-01** next to **Value**. Click **Next** and then choose **PC-01** under **Resources**. See the following examples.
+
+ 
+ 
+
+5. Continue creating the device collection with the default settings:
+ - Use incremental updates for this collection: not selected
+ - Schedule a full update on this collection: default
+ - Click **Next** twice and then click **Close**
+
+### Create an Autopilot for existing devices Task Sequence
+
+>[!TIP]
+>The next procedure requires a boot image for Windows 10 1803 or later. Review your available boot images in the Configuration Manager conole under **Software Library\Overview\Operating Systems\Boot images** and verify that the **OS Version** is 10.0.17134.1 (Windows 10 version 1803) or later.
+
+1. In the Configuration Manager console, navigate to **\Software Library\Overview\Operating Systems\Task Sequences**
+2. On the Home ribbon, click **Create Task Sequence**
+3. Select **Install an existing image package** and then click **Next**
+4. In the Create Task Sequence Wizard enter the following details:
+ - Task sequence name: **Autopilot for existing devices**
+ - Boot Image: Click **Browse** and select a Windows 10 boot image (1803 or later)
+ - Click **Next**, and then on the Install Windows page click **Browse** and select a Windows 10 **Image package** and **Image Index**, version 1803 or later.
+ - Select the **Partition and format the target computer before installing the operating system** checkbox.
+ - Select or clear **Configure task sequence for use with Bitlocker** checkbox. This is optional.
+ - Product Key and Server licensing mode: Optionally enter a product key and server licensing mode.
+ - Randomly generate the local administrator password and disable the account on all support platforms (recommended): Optional.
+ - Enable the account and specify the local administrator password: Optional.
+ - Click **Next**, and then on the Configure Network page choose **Join a workgroup** and specify a name (ex: workgroup) next to **Workgroup**.
+
+ >[!IMPORTANT]
+ >The Autopilot for existing devices task sequence will run the **Prepare Windows for capture** action which calls the System Preparation Tool (syeprep). This action will fail if the target machine is joined to a domain.
+
+5. Click **Next** and then click **Next** again to accept the default settings on the Install Configuration Manager page.
+6. On the State Migration page, enter the following details:
+ - Clear the **Capture user settings and files** checkbox.
+ - Clear the **Capture network settings** checkbox.
+ - Clear the **Capture Microsoft Windows settings** checkbox.
+ - Click **Next**.
+
+ >[!NOTE]
+ >The Autopilot for existing devices task sequence will result in an Azure Active Directory Domain (AAD) joined device. The User State Migration Toolkit (USMT) does not support AAD joined or hybrid AAD joined devices.
+
+7. On the Include Updates page, choose one of the three available options. This selection is optional.
+8. On the Install applications page, add applications if desired. This is optional.
+9. Click **Next**, confirm settings, click **Next** and then click **Close**.
+10. Right click on the Autopilot for existing devices task sequence and click **Edit**.
+11. In the Task Sequence Editor under the **Install Operating System** group, click the **Apply Windows Settings** action.
+12. Click **Add** then click **New Group**.
+13. Change the group **Name** from **New Group** to **Autopilot for existing devices config**.
+14. Click **Add**, point to **General**, then click **Run Command Line**.
+15. Verify that the **Run Command Line** step is nested under the **Autopilot for existing devices config** group.
+16. Change the **Name** to **Apply Autopilot for existing devices config file** and paste the following into the **Command line** text box, and then click **Apply**:
+ ```
+ cmd.exe /c xcopy AutopilotConfigurationFile.json %OSDTargetSystemDrive%\windows\provisioning\Autopilot\ /c
+ ```
+ - **AutopilotConfigurationFile.json** must be the name of the JSON file present in the Autopilot for existing devices package created earlier.
+
+17. In the **Apply Autopilot for existing devices config file** step, select the **Package** checkbox and then click **Browse**.
+18. Select the **Autopilot for existing devices config** package created earlier and click **OK**. An example is displayed at the end of this section.
+19. Under the **Setup Operating System** group, click the **Setup Windows and Configuration Manager** task.
+20. Click **Add** and then click **New Group**.
+21. Change **Name** from **New Group** to **Prepare Device for Autopilot**
+22. Verify that the **Prepare Device for Autopilot** group is the very last step in the task sequence. Use the **Move Down** button if necessary.
+23. With the **Prepare device for Autopilot** group selected, click **Add**, point to **Images** and then click **Prepare ConfigMgr Client for Capture**.
+24. Add a second step by clicking **Add**, pointing to **Images**, and clicking **Prepare Windows for Capture**. Use the following settings in this step:
+ - Automatically build mass storage driver list: **Not selected**
+ - Do not reset activation flag: **Not selected**
+ - Shutdown the computer after running this action: **Optional**
+
+ 
+
+25. Click **OK** to close the Task Sequence Editor.
+
+### Deploy Content to Distribution Points
+
+Next, ensure that all content required for the task sequence is deployed to distribution points.
+
+1. Right click on the **Autopilot for existing devices** task sequence and click **Distribute Content**.
+2. Click **Next**, **Review the content to distribute** and then click **Next**.
+3. On the Specify the content distribution page click **Add** to specify either a **Distribution Point** or **Distribution Point Group**.
+4. On the a Add Distribution Points or Add Distribution Point Groups wizard specify content destinations that will allow the JSON file to be retrieved when the task sequence is run.
+5. When you are finished specifying content distribution, click **Next** twice then click **Close**.
+
+### Deploy the OS with Autopilot Task Sequence
+
+1. Right click on the **Autopilot for existing devices** task sequence and then click **Deploy**.
+2. In the Deploy Software Wizard enter the following **General** and **Deployment Settings** details:
+ - Task Sequence: **Autopilot for existing devices**.
+ - Collection: Click **Browse** and then select **Autopilot for existing devices collection** (or another collection you prefer).
+ - Click **Next** to specify **Deployment Settings**.
+ - Action: **Install**.
+ - Purpose: **Available**. You can optionally select **Required** instead of **Available**. This is not recommended during the test owing to the potential impact of inadvertent configurations.
+ - Make available to the following: **Only Configuration Manager Clients**. Note: Choose the option here that is relevant for the context of your test. If the target client does not have the Configuration Manager agent or Windows installed, you will need to select an option that includes PXE or Boot Media.
+ - Click **Next** to specify **Scheduling** details.
+ - Schedule when this deployment will become available: Optional
+ - Schedule when this deployment will expire: Optional
+ - Click **Next** to specify **User Experience** details.
+ - Show Task Sequence progress: Selected.
+ - Software Installation: Not selected.
+ - System restart (if required to complete the installation): Not selected.
+ - Commit changed at deadline or during a maintenance windows (requires restart): Optional.
+ - Allow task sequence to be run for client on the Internet: Optional
+ - Click **Next** to specify **Alerts** details.
+ - Create a deployment alert when the threshold is higher than the following: Optional.
+ - Click **Next** to specify **Distribution Points** details.
+ - Deployment options: **Download content locally when needed by the running task sequence**.
+ - When no local distribution point is available use a remote distribution point: Optional.
+ - Allow clients to use distribution points from the default site boundary group: Optional.
+ - Click **Next**, confirm settings, click **Next**, and then click **Close**.
+
+### Complete the client installation process
+
+1. Open the Software Center on the target Windows 7 or Windows 8.1 client computer. You can do this by clicking Start and then typing **software** in the search box, or by typing the following at a Windows PowerShell or command prompt:
+
+ ```
+ C:\Windows\CCM\SCClient.exe
+ ```
+
+2. In the software library, select **Autopilot for existing devices** and click **Install**. See the following example:
+
+ 
+ 
+
+The Task Sequence will download content, reboot, format the drives and install Windows 10. The device will then proceed to be prepared for Autopilot. Once the task sequence has completed the device will boot into OOBE and provide an Autopilot experience.
+
+
+
+
+
+>[!NOTE]
+>If joining devices to Active Directory (Hybrid Azure AD Join), it is necessary to create a Domain Join device configuration profile that is targeted to "All Devices" (since there is no Azure Active Directory device object for the computer to do group-based targeting). See [User-driven mode for hybrid Azure Active Directory join](https://docs.microsoft.com/windows/deployment/windows-autopilot/user-driven#user-driven-mode-for-hybrid-azure-active-directory-join) for more information.
+
+### Register the device for Windows Autopilot
+
+Devices provisioned through Autopilot will only receive the guided OOBE Autopilot experience on first boot. Once updated to Windows 10, the device should be registered to ensure a continued Autopilot experience in the event of PC reset. You can enable automatic registration for an assigned group using the **Convert all targeted devices to Autopilot** setting. For more information, see [Create an Autopilot deployment profile](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-deployment-profile).
+
+Also see [Adding devices to Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/add-devices).
+
+## Speeding up the deployment process
+
+To remove around 20 minutes from the deployment process, see Michael Niehaus's blog with instructions for [Speeding up Windows Autopilot for existing devices](https://blogs.technet.microsoft.com/mniehaus/2018/10/25/speeding-up-windows-autopilot-for-existing-devices/).
diff --git a/windows/deployment/windows-autopilot/known-issues.md b/windows/deployment/windows-autopilot/known-issues.md
index 9ba16cd6f9..b2de8f53ee 100644
--- a/windows/deployment/windows-autopilot/known-issues.md
+++ b/windows/deployment/windows-autopilot/known-issues.md
@@ -25,9 +25,15 @@ ms.topic: article
Issue | More information
- | The following known issue will be resolved by installing the KB4517211 update, due to be released in late September 2019:
-
-- TPM attestation fails on Windows 10 1903 due to missing AKI extension in EK certificate. (An additional validation added in Windows 10 1903 to check that the TPM EK certs had the proper attributes according to the TCG specifications uncovered that a number of them don’t, so that validation will be removed).
+ |
Windows Autopilot for existing devices does not work for Windows 10, version 1903; you see screens that you've disabled in your Windows Autopilot profile, such as the Windows 10 License Agreement screen.
+
+This happens because Windows 10, version 1903 deletes the AutopilotConfigurationFile.json file.
+ | To fix this issue: - Edit the Configuration Manager task sequence and disable the Prepare Windows for Capture step.
+
- Add a new Run command line step that runs c:\windows\system32\sysprep\sysprep.exe /oobe /reboot.
+More information
+ |
The following known issue will be resolved by installing the KB4517211 update, due to be released in late September 2019.
+
+TPM attestation fails on Windows 10 1903 due to missing AKI extension in EK certificate. (An additional validation added in Windows 10 1903 to check that the TPM EK certs had the proper attributes according to the TCG specifications uncovered that a number of them don’t, so that validation will be removed).
| Download and install the KB4517211 update.
This update is currently pending release.
|
The following known issues are resolved by installing the August 30, 2019 KB4512941 update (OS Build 18362.329):
diff --git a/windows/deployment/windows-autopilot/user-driven.md b/windows/deployment/windows-autopilot/user-driven.md
index 7629dc2ba8..ae6ae398bc 100644
--- a/windows/deployment/windows-autopilot/user-driven.md
+++ b/windows/deployment/windows-autopilot/user-driven.md
@@ -1,99 +1,103 @@
----
-title: Windows Autopilot User-Driven Mode
-description: Windows Autopilot deployment
-keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
-ms.reviewer: mniehaus
-manager: laurawi
-ms.prod: w10
-ms.mktglfcycl: deploy
-ms.localizationpriority: medium
-ms.sitesec: library
-ms.pagetype: deploy
-audience: itpro
author: greg-lindsay
-ms.author: greglin
-ms.collection: M365-modern-desktop
-ms.topic: article
----
-
-
-# Windows Autopilot user-driven mode
-
-Windows Autopilot user-driven mode is designed to enable new Windows 10 devices to be transformed from their initial state, directly from the factory, into a ready-to-use state without requiring that IT personnel ever touch the device. The process is designed to be simple so that anyone can complete it, enabling devices to be shipped or distributed to the end user directly with simple instructions:
-
-- Unbox the device, plug it in, and turn it on.
-- Choose a language, locale and keyboard.
-- Connect it to a wireless or wired network with internet access.
-- Specify your e-mail address and password for your organization account.
-
-After completing those simple steps, the remainder of the process is completely automated, with the device being joined to the organization, enrolled in Intune (or another MDM service), and fully configured as defined by the organization. Any additional prompts during the Out-of-Box Experience (OOBE) can be supressed; see [Configuring Autopilot Profiles](profiles.md) for options that are available.
-
-Today, Windows Autopilot user-driven mode supports joining devices to Azure Active Directory. Support for Hybrid Azure Active Directory Join (with devices joined to an on-premises Active Directory domain) will be available in a future Windows 10 release. See [Introduction to device management in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/device-management-introduction) for more information about the differences between these two join options.
-
-## Available user-driven modes
-
-The following options are available for user-driven deployment:
-
-- [Azure Active Directory join](#user-driven-mode-for-azure-active-directory-join) is available if devices do not need to be joined to an on-prem Active Directory domain.
-- [Hybrid Azure Active Directory join](#user-driven-mode-for-hybrid-azure-active-directory-join) is available for devices that must be joined to both Azure Active Directory and your on-prem Active Directory domain.
-
-### User-driven mode for Azure Active Directory join
-
-In order to perform a user-driven deployment using Windows Autopilot, the following preparation steps need to be completed:
-
-- Ensure that the users who will be performing user-driven mode deployments are able to join devices to Azure Active Directory. See [Configure device settings](https://docs.microsoft.com/azure/active-directory/device-management-azure-portal#configure-device-settings) in the Azure Active Directory documentation for more information.
-- Create an Autopilot profile for user-driven mode with the desired settings. In Microsoft Intune, this mode is explicitly chosen when creating the profile. With Microsoft Store for Business and Partner Center, user-driven mode is the default and does not need to be selected.
-- If using Intune, create a device group in Azure Active Directory and assign the Autopilot profile to that group.
-
-For each device that will be deployed using user-driven deployment, these additional steps are needed:
-
-- Ensure that the device has been added to Windows Autopilot. This can be done automatically by an OEM or partner at the time the device is purchased, or it can be done through a manual harvesting process later. See [Adding devices to Windows Autopilot](add-devices.md) for more information.
-- Ensure an Autopilot profile has been assigned to the device:
- - If using Intune and Azure Active Directory dynamic device groups, this can be done automatically.
- - If using Intune and Azure Active Directory static device groups, manually add the device to the device group.
- - If using other methods (e.g. Microsoft Store for Business or Partner Center), manually assign an Autopilot profile to the device.
-
-Also see the [Validation](#validation) section below.
-
-### User-driven mode for hybrid Azure Active Directory join
-
-Windows Autopilot requires that devices be Azure Active Directory joined. If you have an on-premises Active Directory environment and want to also join devices to your on-premises domain, you can accomplish this by configuring Autopilot devices to be [hybrid Azure Active Directory (AAD) joined](https://docs.microsoft.com/azure/active-directory/devices/hybrid-azuread-join-plan).
-
-#### Requirements
-
-To perform a user-driven hybrid AAD joined deployment using Windows Autopilot:
-
-- A Windows Autopilot profile for user-driven mode must be created and
- - **Hybrid Azure AD joined** must be specified as the selected option under **Join to Azure AD as** in the Autopilot profile.
-- If using Intune, a device group in Azure Active Directory must exist with the Windows Autopilot profile assigned to that group.
-- The device must be running Windows 10, version 1809 or later.
-- The device must be able to access an Active Directory domain controller, so it must be connected to the organization's network (where it can resolve the DNS records for the AD domain and the AD domain controller, and communicate with the domain controller to authenticate the user).
-- The device must be able to access the Internet, following the [documented Windows Autopilot network requirements](windows-autopilot-requirements.md).
-- The Intune Connector for Active Directory must be installed.
- - Note: The Intune Connector will perform an on-prem AD join, therefore users do not need on-prem AD-join permission, assuming the Connector is [configured to perform this action](https://docs.microsoft.com/intune/windows-autopilot-hybrid#increase-the-computer-account-limit-in-the-organizational-unit) on the user's behalf.
-- If using Proxy, WPAD Proxy settings option must be enabled and configured.
-
-**AAD device join**: The hybrid AAD join process uses the system context to perform device AAD join, therefore it is not affected by user based AAD join permission settings. In addition, all users are enabled to join devices to AAD by default.
-
-#### Step by step instructions
-
-See [Deploy hybrid Azure AD joined devices using Intune and Windows Autopilot](https://docs.microsoft.com/intune/windows-autopilot-hybrid).
-
-Also see the **Validation** section in the [Windows Autopilot user-driven mode](user-driven.md) topic.
-
-## Validation
-
-When performing a user-driven deployment using Windows Autopilot, the following end-user experience should be observed:
-
-- If multiple languages are preinstalled in Windows 10, the user must pick a language.
-- The user must pick a locale and a keyboard layout, and optionally a second keyboard layout.
-- If connected via Ethernet, no network prompt is expected. If no Ethernet connection is available and Wi-fi is built in, the user needs to connect to a wireless network.
-- Once connected to a network, the Autopilot profile will be downloaded.
-- Windows 10 will check for critical OOBE updates, and if any are available they will be automatically installed (rebooting if required).
-- The user will be prompted for Azure Active Directory credentials, with a customized user experience showing the Azure AD tenant name, logo, and sign-in text.
-- Once correct credentials have been entered, the device will join Azure Active Directory.
-- After joining Azure Active Directory, the device will enroll in Intune (or other configured MDM services).
-- If configured, the [enrollment status page](enrollment-status.md) will be displayed.
-- Once the device configuration tasks have completed, the user will be signed into Windows 10 using the credentials they previously provided.
-- Once signed in, the enrollment status page will again be displayed for user-targeted configuration tasks.
-
-In case the observed results do not match these expectations, consult the [Windows Autopilot Troubleshooting](troubleshooting.md) documentation.
+---
+title: Windows Autopilot User-Driven Mode
+description: Windows Autopilot deployment
+keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
+ms.reviewer: mniehaus
+manager: laurawi
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.localizationpriority: medium
+ms.sitesec: library
+ms.pagetype: deploy
+audience: itpro
+author: greg-lindsay
+ms.author: greglin
+ms.collection: M365-modern-desktop
+ms.topic: article
+---
+
+
+# Windows Autopilot user-driven mode
+
+Windows Autopilot user-driven mode is designed to enable new Windows 10 devices to be transformed from their initial state, directly from the factory, into a ready-to-use state without requiring that IT personnel ever touch the device. The process is designed to be simple so that anyone can complete it, enabling devices to be shipped or distributed to the end user directly with simple instructions:
+
+- Unbox the device, plug it in, and turn it on.
+- Choose a language, locale and keyboard.
+- Connect it to a wireless or wired network with internet access.
+- Specify your e-mail address and password for your organization account.
+
+After completing those simple steps, the remainder of the process is completely automated, with the device being joined to the organization, enrolled in Intune (or another MDM service), and fully configured as defined by the organization. Any additional prompts during the Out-of-Box Experience (OOBE) can be suppressed; see [Configuring Autopilot Profiles](profiles.md) for options that are available.
+
+Today, Windows Autopilot user-driven mode supports joining devices to Azure Active Directory. Support for Hybrid Azure Active Directory Join (with devices joined to an on-premises Active Directory domain) will be available in a future Windows 10 release. See [Introduction to device management in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/device-management-introduction) for more information about the differences between these two join options.
+
+## Available user-driven modes
+
+The following options are available for user-driven deployment:
+
+- [Azure Active Directory join](#user-driven-mode-for-azure-active-directory-join) is available if devices do not need to be joined to an on-prem Active Directory domain.
+- [Hybrid Azure Active Directory join](#user-driven-mode-for-hybrid-azure-active-directory-join) is available for devices that must be joined to both Azure Active Directory and your on-prem Active Directory domain.
+
+### User-driven mode for Azure Active Directory join
+
+In order to perform a user-driven deployment using Windows Autopilot, the following preparation steps need to be completed:
+
+- Ensure that the users who will be performing user-driven mode deployments are able to join devices to Azure Active Directory. See [Configure device settings](https://docs.microsoft.com/azure/active-directory/device-management-azure-portal#configure-device-settings) in the Azure Active Directory documentation for more information.
+- Create an Autopilot profile for user-driven mode with the desired settings. In Microsoft Intune, this mode is explicitly chosen when creating the profile. With Microsoft Store for Business and Partner Center, user-driven mode is the default and does not need to be selected.
+- If using Intune, create a device group in Azure Active Directory and assign the Autopilot profile to that group.
+
+For each device that will be deployed using user-driven deployment, these additional steps are needed:
+
+- Ensure that the device has been added to Windows Autopilot. This can be done automatically by an OEM or partner at the time the device is purchased, or it can be done through a manual harvesting process later. See [Adding devices to Windows Autopilot](add-devices.md) for more information.
+- Ensure an Autopilot profile has been assigned to the device:
+ - If using Intune and Azure Active Directory dynamic device groups, this can be done automatically.
+ - If using Intune and Azure Active Directory static device groups, manually add the device to the device group.
+ - If using other methods (e.g. Microsoft Store for Business or Partner Center), manually assign an Autopilot profile to the device.
+
+Also see the [Validation](#validation) section below.
+
+>[!NOTE]
+>If the device reboots during the device enrollment status page (ESP) in the user-driven Azure Active Directoy join scenario, the user will not automatically sign on because the user's credentials cannot be saved across reboots. In this scenario, the user will need to sign in manually after the device ESP completes.
+
+### User-driven mode for hybrid Azure Active Directory join
+
+Windows Autopilot requires that devices be Azure Active Directory joined. If you have an on-premises Active Directory environment and want to also join devices to your on-premises domain, you can accomplish this by configuring Autopilot devices to be [hybrid Azure Active Directory (AAD) joined](https://docs.microsoft.com/azure/active-directory/devices/hybrid-azuread-join-plan).
+
+#### Requirements
+
+To perform a user-driven hybrid AAD joined deployment using Windows Autopilot:
+
+- A Windows Autopilot profile for user-driven mode must be created and
+ - **Hybrid Azure AD joined** must be specified as the selected option under **Join to Azure AD as** in the Autopilot profile.
+- If using Intune, a device group in Azure Active Directory must exist with the Windows Autopilot profile assigned to that group.
+- The device must be running Windows 10, version 1809 or later.
+- The device must be able to access an Active Directory domain controller, so it must be connected to the organization's network (where it can resolve the DNS records for the AD domain and the AD domain controller, and communicate with the domain controller to authenticate the user).
+- The device must be able to access the Internet, following the [documented Windows Autopilot network requirements](windows-autopilot-requirements.md).
+- The Intune Connector for Active Directory must be installed.
+ - Note: The Intune Connector will perform an on-prem AD join, therefore users do not need on-prem AD-join permission, assuming the Connector is [configured to perform this action](https://docs.microsoft.com/intune/windows-autopilot-hybrid#increase-the-computer-account-limit-in-the-organizational-unit) on the user's behalf.
+- If using Proxy, WPAD Proxy settings option must be enabled and configured.
+
+**AAD device join**: The hybrid AAD join process uses the system context to perform device AAD join, therefore it is not affected by user based AAD join permission settings. In addition, all users are enabled to join devices to AAD by default.
+
+#### Step by step instructions
+
+See [Deploy hybrid Azure AD joined devices using Intune and Windows Autopilot](https://docs.microsoft.com/intune/windows-autopilot-hybrid).
+
+Also see the **Validation** section in the [Windows Autopilot user-driven mode](user-driven.md) topic.
+
+## Validation
+
+When performing a user-driven deployment using Windows Autopilot, the following end-user experience should be observed:
+
+- If multiple languages are preinstalled in Windows 10, the user must pick a language.
+- The user must pick a locale and a keyboard layout, and optionally a second keyboard layout.
+- If connected via Ethernet, no network prompt is expected. If no Ethernet connection is available and Wi-fi is built in, the user needs to connect to a wireless network.
+- Once connected to a network, the Autopilot profile will be downloaded.
+- Windows 10 will check for critical OOBE updates, and if any are available they will be automatically installed (rebooting if required).
+- The user will be prompted for Azure Active Directory credentials, with a customized user experience showing the Azure AD tenant name, logo, and sign-in text.
+- Once correct credentials have been entered, the device will join Azure Active Directory.
+- After joining Azure Active Directory, the device will enroll in Intune (or other configured MDM services).
+- If configured, the [enrollment status page](enrollment-status.md) will be displayed.
+- Once the device configuration tasks have completed, the user will be signed into Windows 10 using the credentials they previously provided.
+- Once signed in, the enrollment status page will again be displayed for user-targeted configuration tasks.
+
+If your results do not match these expectations, see the [Windows Autopilot Troubleshooting](troubleshooting.md) documentation.
diff --git a/windows/privacy/gdpr-it-guidance.md b/windows/privacy/gdpr-it-guidance.md
index f142ad0677..50d0770521 100644
--- a/windows/privacy/gdpr-it-guidance.md
+++ b/windows/privacy/gdpr-it-guidance.md
@@ -117,7 +117,7 @@ Diagnostic data is categorized into the levels "Security", "Basic", "Enhanced",
### Windows services where Microsoft is the processor under the GDPR
-Most Windows 10 services are controller services in terms of the GDPR – for both Windows functional data and Windows diagnostic data. But there are a few Windows services where Microsoft is a processor for functional data under the GDPR, such as [Windows Analytics](https://www.microsoft.com/windowsforbusiness/windows-analytics) and [Windows Defender Advanced Threat Protection (ATP)](https://www.microsoft.com/windowsforbusiness/windows-atp).
+Most Windows 10 services are controller services in terms of the GDPR – for both Windows functional data and Windows diagnostic data. But there are a few Windows services where Microsoft is a processor for functional data under the GDPR, such as [Windows Analytics](https://www.microsoft.com/windowsforbusiness/windows-analytics) and [Windows Defender Advanced Threat Protection (ATP)](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp).
>[!NOTE]
>Both Windows Analytics and Windows Defender ATP are subscription services for organizations. Some functionality requires a certain license (please see [Compare Windows 10 editions](https://www.microsoft.com/windowsforbusiness/compare)).
@@ -137,7 +137,7 @@ As a result, in terms of the GDPR, the organization that has subscribed to Windo
#### Windows Defender ATP
-[Windows Defender ATP](https://www.microsoft.com/WindowsForBusiness/windows-atp) is cloud-based service that collects and analyzes usage data from an organization’s devices to detect security threats. Some of the data can contain personal data as defined by the GDPR. Enrolled devices transmit usage data to Microsoft datacenters, where that data is analyzed, processed, and stored. The security operations center (SOC) of the organization can view the analyzed data using the [Windows Defender ATP portal](https://securitycenter.windows.com/).
+[Windows Defender ATP](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp) is cloud-based service that collects and analyzes usage data from an organization’s devices to detect security threats. Some of the data can contain personal data as defined by the GDPR. Enrolled devices transmit usage data to Microsoft datacenters, where that data is analyzed, processed, and stored. The security operations center (SOC) of the organization can view the analyzed data using the [Windows Defender ATP portal](https://securitycenter.windows.com/).
As a result, in terms of the GDPR, the organization that has subscribed to Windows Defender ATP is acting as the controller, while Microsoft is the processor for Windows Defender ATP.
diff --git a/windows/release-information/resolved-issues-windows-10-1709.yml b/windows/release-information/resolved-issues-windows-10-1709.yml
index b9fb594146..07fbc6a7b2 100644
--- a/windows/release-information/resolved-issues-windows-10-1709.yml
+++ b/windows/release-information/resolved-issues-windows-10-1709.yml
@@ -32,6 +32,7 @@ sections:
- type: markdown
text: "
Summary | Originating update | Status | Date resolved |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 16299.1387
September 10, 2019 KB4516066 | Resolved
| September 19, 2019 04:08 PM PT |
Domain connected devices that use MIT Kerberos realms will not start up Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.
See details > | OS Build 16299.1296
July 16, 2019 KB4507465 | Resolved KB4512516 | August 13, 2019 10:00 AM PT |
Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | OS Build 16299.1217
June 11, 2019 KB4503284 | Resolved KB4512494 | August 16, 2019 02:00 PM PT |
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.
See details > | OS Build 16299.1331
August 13, 2019 KB4512516 | Resolved KB4512494 | August 16, 2019 02:00 PM PT |
@@ -57,6 +58,15 @@ sections:
"
+- title: September 2019
+- items:
+ - type: markdown
+ text: "
+ Details | Originating update | Status | History |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: Due to security related changes in KB4516066, this issue may occur when Touch Keyboard and Handwriting Panel Service is not configured to its default startup type of Manual. To resolve the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Back to top | OS Build 16299.1387
September 10, 2019 KB4516066 | Resolved
| Resolved: September 19, 2019 04:08 PM PT
Opened: September 13, 2019 05:25 PM PT |
+
+ "
+
- title: August 2019
- items:
- type: markdown
diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml
index a65cc10df5..678191535f 100644
--- a/windows/release-information/resolved-issues-windows-10-1803.yml
+++ b/windows/release-information/resolved-issues-windows-10-1803.yml
@@ -32,6 +32,7 @@ sections:
- type: markdown
text: "
Summary | Originating update | Status | Date resolved |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 17134.1006
September 10, 2019 KB4516058 | Resolved
| September 19, 2019 04:08 PM PT |
Domain connected devices that use MIT Kerberos realms will not start up Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.
See details > | OS Build 17134.915
July 16, 2019 KB4507466 | Resolved KB4512501 | August 13, 2019 10:00 AM PT |
Notification issue: \"Your device is missing important security and quality fixes.\" Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"
See details > | N/A
| Resolved
| September 03, 2019 12:32 PM PT |
Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | OS Build 17134.829
June 11, 2019 KB4503286 | Resolved KB4512509 | August 19, 2019 02:00 PM PT |
@@ -63,6 +64,7 @@ sections:
- type: markdown
text: "
Details | Originating update | Status | History |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: Due to security related changes in KB4516058, this issue may occur when Touch Keyboard and Handwriting Panel Service is not configured to its default startup type of Manual. To resolve the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Back to top | OS Build 17134.1006
September 10, 2019 KB4516058 | Resolved
| Resolved: September 19, 2019 04:08 PM PT
Opened: September 13, 2019 05:25 PM PT |
Notification issue: \"Your device is missing important security and quality fixes.\" Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes\" in the Windows Update dialog and a red \"!\" in the task tray on the Windows Update tray icon. This notification is intended for devices that are 90 days or more out of date, but some users with installed updates released in June or July also saw this notification.
Affected platforms: - Client: Windows 10, version 1803
- Server: Windows Server, version 1803
Resolution: This issue was resolved on the server side on August 30, 2019. Only devices that are out of date by 90 days or more should now see the notification. No action is required by the user to resolve this issue. If you are still seeing the \"Your device is missing important security and quality fixes\" notification, we recommend selecting Check for Updates in the Windows Update dialog. For instructions, see Update Windows 10. Microsoft always recommends trying to keep your devices up to date, as the monthly updates contain important security fixes. Back to top | N/A
| Resolved
| Resolved: September 03, 2019 12:32 PM PT
Opened: September 03, 2019 12:32 PM PT |
"
diff --git a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml
index 829b497041..29d533154d 100644
--- a/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml
+++ b/windows/release-information/resolved-issues-windows-10-1809-and-windows-server-2019.yml
@@ -32,6 +32,8 @@ sections:
- type: markdown
text: "
Summary | Originating update | Status | Date resolved |
+ Apps and scripts using the NetQueryDisplayInformation API may fail with error Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.
See details > | OS Build 17763.55
October 09, 2018 KB4464330 | Resolved KB4516077 | September 24, 2019 10:00 AM PT |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 17763.737
September 10, 2019 KB4512578 | Resolved
| September 19, 2019 04:08 PM PT |
Domain connected devices that use MIT Kerberos realms will not start up Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.
See details > | OS Build 17763.652
July 22, 2019 KB4505658 | Resolved KB4511553 | August 13, 2019 10:00 AM PT |
Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | OS Build 17763.557
June 11, 2019 KB4503327 | Resolved KB4512534 | August 17, 2019 02:00 PM PT |
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.
See details > | OS Build 17763.678
August 13, 2019 KB4511553 | Resolved KB4512534 | August 17, 2019 02:00 PM PT |
@@ -65,11 +67,21 @@ sections:
"
+- title: September 2019
+- items:
+ - type: markdown
+ text: "
+ Details | Originating update | Status | History |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: Due to security related changes in KB4512578, this issue may occur when Touch Keyboard and Handwriting Panel Service is not configured to its default startup type of Manual. To resolve the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Back to top | OS Build 17763.737
September 10, 2019 KB4512578 | Resolved
| Resolved: September 19, 2019 04:08 PM PT
Opened: September 13, 2019 05:25 PM PT |
+
+ "
+
- title: August 2019
- items:
- type: markdown
text: "
Details | Originating update | Status | History |
+ Apps and scripts using the NetQueryDisplayInformation API may fail with error Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”
Affected platforms: - Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4516077. Back to top | OS Build 17763.55
October 09, 2018 KB4464330 | Resolved KB4516077 | Resolved: September 24, 2019 10:00 AM PT
Opened: August 01, 2019 05:00 PM PT |
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with errorAfter installing KB4511553, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512534. This ‘optional’ update is available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512534 and install. For instructions, see Update Windows 10.
Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS). Back to top | OS Build 17763.678
August 13, 2019 KB4511553 | Resolved KB4512534 | Resolved: August 17, 2019 02:00 PM PT
Opened: August 14, 2019 03:34 PM PT |
MacOS may be unable to access network shares via CIFS or SMBv1 on Windows devicesYou may receive an error on your Apple MacOS device when trying to access network shares via CIFS or SMBv1 on a Windows devices that has installed updates on June 11, 2019 ( KB4503327) or later. When you encounter this issue, in MacOS you may receive the error, “There was a problem connecting to the server “{Server Host Name}”. Check the server name or IP address, and then try again. If you continue to have problems, contact your system administrator.”
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Back to top | OS Build 17763.557
June 11, 2019 KB4503327 | Resolved External
| Last updated: August 09, 2019 07:03 PM PT
Opened: August 09, 2019 04:25 PM PT |
diff --git a/windows/release-information/resolved-issues-windows-10-1903.yml b/windows/release-information/resolved-issues-windows-10-1903.yml
index c2c7870398..1176b9fe06 100644
--- a/windows/release-information/resolved-issues-windows-10-1903.yml
+++ b/windows/release-information/resolved-issues-windows-10-1903.yml
@@ -32,6 +32,9 @@ sections:
- type: markdown
text: "
Summary | Originating update | Status | Date resolved |
+ Audio in games is quiet or different than expected Microsoft has received reports that audio in certain games is quieter or different than expected.
See details > | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved KB4517211 | September 26, 2019 02:00 PM PT |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved
| September 19, 2019 04:08 PM PT |
+ Some users report issues related to the Start menu and Windows Desktop Search Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.
See details > | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved
| September 19, 2019 04:58 PM PT |
Screenshots and Snips have an unnatural orange tint Users have reported an orange tint on Screenshots and Snips with the Lenovo Vantage app installed
See details > | OS Build 18362.356
September 10, 2019 KB4516115 | Resolved External
| September 11, 2019 08:54 PM PT |
Windows Desktop Search may not return any results and may have high CPU usage Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.
See details > | OS Build 18362.329
August 30, 2019 KB4512941 | Resolved KB4515384 | September 10, 2019 10:00 AM PT |
Domain connected devices that use MIT Kerberos realms will not start up Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.
See details > | OS Build 18362.145
May 29, 2019 KB4497935 | Resolved KB4512941 | August 30, 2019 10:00 AM PT |
@@ -66,6 +69,9 @@ sections:
- type: markdown
text: "
Details | Originating update | Status | History |
+ Audio in games is quiet or different than expected Microsoft has received reports that audio in certain games is quieter or different than expected. At the request of some of our audio partners, we implemented a compatibility change that enabled certain games to query support and render multi-channel audio. Due to customer feedback, we are reverting this change as some games and some devices are not rendering multi-channel audio as expected. This may result in games sounding different than customers are used to and may have missing channels.
Affected platforms: - Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4517211. Back to top | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved KB4517211 | Resolved: September 26, 2019 02:00 PM PT
Opened: September 13, 2019 05:25 PM PT |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: Due to security related changes in KB4515384, this issue may occur when Touch Keyboard and Handwriting Panel Service is not configured to its default startup type of Manual. To resolve the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Back to top | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved
| Resolved: September 19, 2019 04:08 PM PT
Opened: September 13, 2019 05:25 PM PT |
+ Some users report issues related to the Start menu and Windows Desktop Search Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.
Affected platforms: - Client: Windows 10, version 1903
Resolution: At this time, Microsoft has not found a Search or Start issue significantly impacting users originating from KB4515384. We will continue monitoring to ensure users have a high-quality experience when interacting with these areas. If you are currently having issues, we recommend you to take a moment to report it in via the Feedback Hub (Windows + F) then try the Windows 10 Troubleshoot settings (found in Settings). If you are having an issue with search, see Fix problems in Windows Search. Back to top | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved
| Resolved: September 19, 2019 04:58 PM PT
Opened: September 11, 2019 05:18 PM PT |
Screenshots and Snips have an unnatural orange tint When creating screenshots or using similar tools (such as Snipping Tool or Snip & Sketch), the resulting images may have an unnatural orange tint. This issue is caused by the Eye Care mode feature of Lenovo Vantage. This issue started on or around September 5, 2019.
Affected platforms: - Client: Windows 10, version 1903
- Server: None
Back to top | OS Build 18362.356
September 10, 2019 KB4516115 | Resolved External
| Last updated: September 11, 2019 08:54 PM PT
Opened: September 11, 2019 08:54 PM PT |
Windows Desktop Search may not return any results and may have high CPU usageMicrosoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.
Affected platforms: - Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4515384. Back to top | OS Build 18362.329
August 30, 2019 KB4512941 | Resolved KB4515384 | Resolved: September 10, 2019 10:00 AM PT
Opened: September 04, 2019 02:25 PM PT |
diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml
index aa64a5bbb2..5ac6ed8257 100644
--- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml
+++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml
@@ -32,6 +32,7 @@ sections:
- type: markdown
text: "
Summary | Originating update | Status | Date resolved |
+ You may receive an error when opening or using the Toshiba Qosmio AV Center Toshiba Qosmio AV Center may error when opening and you may also receive an error in Event Log related to cryptnet.dll.
See details > | August 13, 2019 KB4512506 | Resolved KB4516048 | September 24, 2019 10:00 AM PT |
Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV Windows updates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed
See details > | August 13, 2019 KB4512506 | Resolved External
| August 27, 2019 02:29 PM PT |
Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | June 11, 2019 KB4503292 | Resolved KB4512514 | August 17, 2019 02:00 PM PT |
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.
See details > | August 13, 2019 KB4512506 | Resolved KB4517297 | August 16, 2019 02:00 PM PT |
@@ -59,6 +60,15 @@ sections:
"
+- title: September 2019
+- items:
+ - type: markdown
+ text: "
+ Details | Originating update | Status | History |
+ You may receive an error when opening or using the Toshiba Qosmio AV CenterAfter installing KB4512506, you may receive an error when opening or using the Toshiba Qosmio AV Center. You may also receive an error in Event Log related to cryptnet.dll.
Affected platforms: Resolution: This issue was resolved in KB4516048. Back to top | August 13, 2019 KB4512506 | Resolved KB4516048 | Resolved: September 24, 2019 10:00 AM PT
Opened: September 10, 2019 09:48 AM PT |
+
+ "
+
- title: August 2019
- items:
- type: markdown
diff --git a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml
index 6255d324e1..16abec6cc8 100644
--- a/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml
+++ b/windows/release-information/resolved-issues-windows-8.1-and-windows-server-2012-r2.yml
@@ -32,6 +32,7 @@ sections:
- type: markdown
text: "
Summary | Originating update | Status | Date resolved |
+ Windows RT 8.1 devices may have issues opening Internet Explorer 11 On Windows RT 8.1 devices, Internet Explorer 11 may not open and you may receive an error.
See details > | September 10, 2019 KB4516067 | Resolved KB4516041 | September 24, 2019 10:00 AM PT |
Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | June 11, 2019 KB4503276 | Resolved KB4512478 | August 17, 2019 02:00 PM PT |
Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.
See details > | August 13, 2019 KB4512488 | Resolved KB4517298 | August 16, 2019 02:00 PM PT |
System may be unresponsive after restart with certain McAfee antivirus products Devices with McAfee Endpoint Security Threat Prevention 10.x, Host Intrusion Prevention 8.0, or VirusScan Enterprise 8.8 may be slow or unresponsive at startup.
See details > | April 09, 2019 KB4493446 | Resolved External
| August 13, 2019 06:59 PM PT |
@@ -46,7 +47,6 @@ sections:
System may be unresponsive after restart if Avira antivirus software installed Devices with Avira antivirus software installed may become unresponsive upon restart.
See details > | April 09, 2019 KB4493446 | Resolved
| May 14, 2019 01:21 PM PT |
Embedded objects may display incorrectly Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBlt API may display embedded objects incorrectly.
See details > | February 12, 2019 KB4487000 | Resolved KB4493446 | April 09, 2019 10:00 AM PT |
Devices may not respond at login or Welcome screen if running certain Avast software Devices running Avast for Business, Avast CloudCare, and AVG Business Edition antivirus software may become unresponsive after restart.
See details > | April 09, 2019 KB4493446 | Resolved
| April 25, 2019 02:00 PM PT |
- Devices with winsock kernel client may receive error Devices with a winsock kernel client may receive D1, FC, and other errors.
See details > | March 12, 2019 KB4489881 | Resolved KB4489893 | March 19, 2019 10:00 AM PT |
Custom URI schemes may not start corresponding application Custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites in Internet Explorer.
See details > | March 12, 2019 KB4489881 | Resolved KB4493446 | April 09, 2019 10:00 AM PT |
MSXML6 may cause applications to stop responding. MSXML6 may cause applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().
See details > | January 08, 2019 KB4480963 | Resolved KB4493446 | April 09, 2019 10:00 AM PT |
Internet Explorer 11 authentication issue with multiple concurrent logons Internet Explorer 11 users may encounter issues if two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine.
See details > | January 08, 2019 KB4480963 | Resolved KB4493446 | April 09, 2019 10:00 AM PT |
@@ -60,6 +60,15 @@ sections:
"
+- title: September 2019
+- items:
+ - type: markdown
+ text: "
+ Details | Originating update | Status | History |
+ Windows RT 8.1 devices may have issues opening Internet Explorer 11 On Windows 8.1 RT devices, Internet Explorer 11 may not open and you may receive the error, \"C:\\Program Files\\Internet Explorer\\iexplore.exe: A certificate was explicitly revoked by its issuer.\"
Affected platforms: Resolution: This issue was resolved in KB4516041. Back to top | September 10, 2019 KB4516067 | Resolved KB4516041 | Resolved: September 24, 2019 10:00 AM PT
Opened: September 13, 2019 05:25 PM PT |
+
+ "
+
- title: August 2019
- items:
- type: markdown
@@ -118,7 +127,6 @@ sections:
text: "
Details | Originating update | Status | History |
Issue using PXE to start a device from WDSAfter installing KB4489881, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 8.1
- Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
Resolution: This issue was resolved in KB4503276. Back to top | March 12, 2019 KB4489881 | Resolved KB4503276 | Resolved: June 11, 2019 10:00 AM PT
Opened: March 12, 2019 10:00 AM PT |
- Devices with winsock kernel client may receive errorAfter installing KB4489881, devices with a winsock kernel client may receive D1, FC, and other errors. Additionally, systems that run the Skype for Business or Lync Server Edge Transport role may be affected by this issue.
Affected platforms: - Client: Windows 8.1
- Server: Windows Server 2012 R2
Resolution: This issue is resolved in KB4489893. Back to top | March 12, 2019 KB4489881 | Resolved KB4489893 | Resolved: March 19, 2019 10:00 AM PT
Opened: March 12, 2019 10:00 AM PT |
Custom URI schemes may not start corresponding applicationAfter installing KB4489881, custom URI schemes for application protocol handlers may not start the corresponding application for local intranet and trusted sites security zones on Internet Explorer.
Affected platforms: - Client: Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10, version 1607; Windows 10 Enterprise LTSC 2016; Windows 10, version 1507; Windows 10 Enterprise LTSB 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709; Windows Server 2016; Windows Server 2012 R2; Windows Server 2008 R2 SP1
Resolution: This issue is resolved in KB4493446. Back to top | March 12, 2019 KB4489881 | Resolved KB4493446 | Resolved: April 09, 2019 10:00 AM PT
Opened: March 12, 2019 10:00 AM PT |
"
diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml
index 88f03f07b7..b9561023e9 100644
--- a/windows/release-information/status-windows-10-1507.yml
+++ b/windows/release-information/status-windows-10-1507.yml
@@ -33,17 +33,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- items:
- type: markdown
text: "
diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml
index f2f699cd5b..5828e086a9 100644
--- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml
+++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml
@@ -33,17 +33,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- items:
- type: markdown
text: "
@@ -63,7 +63,6 @@ sections:
IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 14393.3204
September 10, 2019 KB4516044 | Resolved
| September 17, 2019 04:47 PM PT |
Apps and scripts using the NetQueryDisplayInformation API may fail with error Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.
See details > | OS Build 14393.3053
June 18, 2019 KB4503294 | Resolved KB4516044 | September 10, 2019 10:00 AM PT |
Domain connected devices that use MIT Kerberos realms will not start up Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.
See details > | OS Build 14393.3115
July 16, 2019 KB4507459 | Resolved KB4512517 | August 13, 2019 10:00 AM PT |
- Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | OS Build 14393.3025
June 11, 2019 KB4503267 | Resolved KB4512495 | August 17, 2019 02:00 PM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".
See details > | OS Build 14393.2724
January 08, 2019 KB4480961 | Mitigated
| April 25, 2019 02:00 PM PT |
Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.
See details > | OS Build 14393.2608
November 13, 2018 KB4467691 | Mitigated
| February 19, 2019 10:00 AM PT |
Cluster service may fail if the minimum password length is set to greater than 14 The cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the Group Policy “Minimum Password Length” is configured with greater than 14 characters.
See details > | OS Build 14393.2639
November 27, 2018 KB4467684 | Mitigated
| April 25, 2019 02:00 PM PT |
@@ -102,7 +101,6 @@ sections:
Details | Originating update | Status | History |
Domain connected devices that use MIT Kerberos realms will not start upDevices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507459. Devices that are domain controllers or domain members are both affected.
To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.
Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists: HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512517 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903. Back to top | OS Build 14393.3115
July 16, 2019 KB4507459 | Resolved KB4512517 | Resolved: August 13, 2019 10:00 AM PT
Opened: July 25, 2019 06:10 PM PT |
- Devices starting using PXE from a WDS or SCCM servers may fail to startDevices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503267 on a WDS server.
Affected platforms: - Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512495. Back to top | OS Build 14393.3025
June 11, 2019 KB4503267 | Resolved KB4512495 | Resolved: August 17, 2019 02:00 PM PT
Opened: July 10, 2019 02:51 PM PT |
"
diff --git a/windows/release-information/status-windows-10-1703.yml b/windows/release-information/status-windows-10-1703.yml
index c9f01b66d5..2a8cd27694 100644
--- a/windows/release-information/status-windows-10-1703.yml
+++ b/windows/release-information/status-windows-10-1703.yml
@@ -39,17 +39,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- items:
- type: markdown
text: "
diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml
index 9bd26e7699..44cb4e2af3 100644
--- a/windows/release-information/status-windows-10-1709.yml
+++ b/windows/release-information/status-windows-10-1709.yml
@@ -33,17 +33,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- items:
- type: markdown
text: "
@@ -60,9 +60,8 @@ sections:
- type: markdown
text: "This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
Summary | Originating update | Status | Last updated |
- IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 16299.1387
September 10, 2019 KB4516066 | Mitigated
| September 16, 2019 05:36 PM PT |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 16299.1387
September 10, 2019 KB4516066 | Resolved
| September 19, 2019 04:08 PM PT |
Domain connected devices that use MIT Kerberos realms will not start up Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.
See details > | OS Build 16299.1296
July 16, 2019 KB4507465 | Resolved KB4512516 | August 13, 2019 10:00 AM PT |
- Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | OS Build 16299.1217
June 11, 2019 KB4503284 | Resolved KB4512494 | August 16, 2019 02:00 PM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".
See details > | OS Build 16299.904
January 08, 2019 KB4480978 | Mitigated
| April 25, 2019 02:00 PM PT |
"
@@ -79,7 +78,7 @@ sections:
- type: markdown
text: "
Details | Originating update | Status | History |
- IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Workaround: To mitigate the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Next steps: We are working on a resolution and will provide an update in an upcoming release. Back to top | OS Build 16299.1387
September 10, 2019 KB4516066 | Mitigated
| Last updated: September 16, 2019 05:36 PM PT
Opened: September 13, 2019 05:25 PM PT |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: Due to security related changes in KB4516066, this issue may occur when Touch Keyboard and Handwriting Panel Service is not configured to its default startup type of Manual. To resolve the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Back to top | OS Build 16299.1387
September 10, 2019 KB4516066 | Resolved
| Resolved: September 19, 2019 04:08 PM PT
Opened: September 13, 2019 05:25 PM PT |
"
@@ -90,7 +89,6 @@ sections:
Details | Originating update | Status | History |
Domain connected devices that use MIT Kerberos realms will not start upDevices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507465. Devices that are domain controllers or domain members are both affected.
To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.
Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists: HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512516 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903. Back to top | OS Build 16299.1296
July 16, 2019 KB4507465 | Resolved KB4512516 | Resolved: August 13, 2019 10:00 AM PT
Opened: July 25, 2019 06:10 PM PT |
- Devices starting using PXE from a WDS or SCCM servers may fail to startDevices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503284 on a WDS server.
Affected platforms: - Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512494. Back to top | OS Build 16299.1217
June 11, 2019 KB4503284 | Resolved KB4512494 | Resolved: August 16, 2019 02:00 PM PT
Opened: July 10, 2019 02:51 PM PT |
"
diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml
index a6be94d23c..14756394ad 100644
--- a/windows/release-information/status-windows-10-1803.yml
+++ b/windows/release-information/status-windows-10-1803.yml
@@ -38,17 +38,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- items:
- type: markdown
text: "
@@ -65,12 +65,10 @@ sections:
- type: markdown
text: "This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
Summary | Originating update | Status | Last updated |
- IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 17134.1006
September 10, 2019 KB4516058 | Mitigated
| September 16, 2019 05:36 PM PT |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 17134.1006
September 10, 2019 KB4516058 | Resolved
| September 19, 2019 04:08 PM PT |
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code You may receive a 15-5 error code in Windows Mixed Reality Portal and your headset may not respond to \"wake up\" from sleep.
See details > | OS Build 17134.950
August 13, 2019 KB4512501 | Mitigated
| September 11, 2019 05:32 PM PT |
Domain connected devices that use MIT Kerberos realms will not start up Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.
See details > | OS Build 17134.915
July 16, 2019 KB4507466 | Resolved KB4512501 | August 13, 2019 10:00 AM PT |
Notification issue: \"Your device is missing important security and quality fixes.\" Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"
See details > | N/A
| Resolved
| September 03, 2019 12:32 PM PT |
- Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | OS Build 17134.829
June 11, 2019 KB4503286 | Resolved KB4512509 | August 19, 2019 02:00 PM PT |
- Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error Applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and VBScript may stop responding and you may receive an error.
See details > | OS Build 17134.950
August 13, 2019 KB4512501 | Resolved KB4512509 | August 19, 2019 02:00 PM PT |
Startup to a black screen after installing updates Your device may startup to a black screen during the first logon after installing updates.
See details > | OS Build 17134.829
June 11, 2019 KB4503286 | Mitigated
| June 14, 2019 04:41 PM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".
See details > | OS Build 17134.523
January 08, 2019 KB4480966 | Mitigated
| April 25, 2019 02:00 PM PT |
@@ -88,21 +86,12 @@ sections:
- type: markdown
text: "
Details | Originating update | Status | History |
- IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Workaround: To mitigate the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Next steps: We are working on a resolution and will provide an update in an upcoming release. Back to top | OS Build 17134.1006
September 10, 2019 KB4516058 | Mitigated
| Last updated: September 16, 2019 05:36 PM PT
Opened: September 13, 2019 05:25 PM PT |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: Due to security related changes in KB4516058, this issue may occur when Touch Keyboard and Handwriting Panel Service is not configured to its default startup type of Manual. To resolve the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Back to top | OS Build 17134.1006
September 10, 2019 KB4516058 | Resolved
| Resolved: September 19, 2019 04:08 PM PT
Opened: September 13, 2019 05:25 PM PT |
Windows Mixed Reality Portal users may intermittently receive a 15-5 error codeAfter installing KB4512501, Windows Mixed Reality Portal users may intermittently receive a 15-5 error code. In some cases, Windows Mixed Reality Portal may report that the headset is sleeping and pressing “Wake up” may appear to produce no action.
Affected platforms: - Client: Windows 10, version 1809; Windows 10, version 1803
Workaround: To mitigate the issue, use the following steps: - Close the Windows Mixed Reality Portal, if it is running.
- Open Task Manager by selecting the Start button and typing Task Manager.
- In Task Manager under the Processes tab, right click or long press on “Windows Explorer” and select restart.
- You can now open the Windows Mixed Reality Portal.
Next steps: We are working on a resolution and will provide an update in an upcoming release. Back to top | OS Build 17134.950
August 13, 2019 KB4512501 | Mitigated
| Last updated: September 11, 2019 05:32 PM PT
Opened: September 11, 2019 05:32 PM PT |
Notification issue: \"Your device is missing important security and quality fixes.\" Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes\" in the Windows Update dialog and a red \"!\" in the task tray on the Windows Update tray icon. This notification is intended for devices that are 90 days or more out of date, but some users with installed updates released in June or July also saw this notification.
Affected platforms: - Client: Windows 10, version 1803
- Server: Windows Server, version 1803
Resolution: This issue was resolved on the server side on August 30, 2019. Only devices that are out of date by 90 days or more should now see the notification. No action is required by the user to resolve this issue. If you are still seeing the \"Your device is missing important security and quality fixes\" notification, we recommend selecting Check for Updates in the Windows Update dialog. For instructions, see Update Windows 10. Microsoft always recommends trying to keep your devices up to date, as the monthly updates contain important security fixes. Back to top | N/A
| Resolved
| Resolved: September 03, 2019 12:32 PM PT
Opened: September 03, 2019 12:32 PM PT |
"
-- title: August 2019
-- items:
- - type: markdown
- text: "
- Details | Originating update | Status | History |
- Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with errorAfter installing KB4512501, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
Resolution: This issue was resolved in KB4512509. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512509 and install. For instructions, see Update Windows 10.
Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS). Back to top | OS Build 17134.950
August 13, 2019 KB4512501 | Resolved KB4512509 | Resolved: August 19, 2019 02:00 PM PT
Opened: August 14, 2019 03:34 PM PT |
-
- "
-
- title: July 2019
- items:
- type: markdown
@@ -110,7 +99,6 @@ sections:
Details | Originating update | Status | History |
Domain connected devices that use MIT Kerberos realms will not start upDevices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4507466. Devices that are domain controllers or domain members are both affected.
To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.
Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists: HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4512501 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903. Back to top | OS Build 17134.915
July 16, 2019 KB4507466 | Resolved KB4512501 | Resolved: August 13, 2019 10:00 AM PT
Opened: July 25, 2019 06:10 PM PT |
- Devices starting using PXE from a WDS or SCCM servers may fail to startDevices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503286 on a WDS server.
Affected platforms: - Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512509. Back to top | OS Build 17134.829
June 11, 2019 KB4503286 | Resolved KB4512509 | Resolved: August 19, 2019 02:00 PM PT
Opened: July 10, 2019 02:51 PM PT |
"
diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml
index f32d6b5f10..0611a7cea8 100644
--- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml
+++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml
@@ -37,17 +37,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- items:
- type: markdown
text: "
@@ -64,11 +64,10 @@ sections:
- type: markdown
text: "This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
Summary | Originating update | Status | Last updated |
- IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 17763.737
September 10, 2019 KB4512578 | Mitigated
| September 16, 2019 05:36 PM PT |
+ Apps and scripts using the NetQueryDisplayInformation API may fail with error Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.
See details > | OS Build 17763.55
October 09, 2018 KB4464330 | Resolved KB4516077 | September 24, 2019 10:00 AM PT |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 17763.737
September 10, 2019 KB4512578 | Resolved
| September 19, 2019 04:08 PM PT |
Windows Mixed Reality Portal users may intermittently receive a 15-5 error code You may receive a 15-5 error code in Windows Mixed Reality Portal and your headset may not respond to \"wake up\" from sleep.
See details > | OS Build 17763.678
August 13, 2019 KB4511553 | Mitigated
| September 11, 2019 05:32 PM PT |
Domain connected devices that use MIT Kerberos realms will not start up Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.
See details > | OS Build 17763.652
July 22, 2019 KB4505658 | Resolved KB4511553 | August 13, 2019 10:00 AM PT |
- Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | OS Build 17763.557
June 11, 2019 KB4503327 | Resolved KB4512534 | August 17, 2019 02:00 PM PT |
- Apps and scripts using the NetQueryDisplayInformation API may fail with error Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data.
See details > | OS Build 17763.55
October 09, 2018 KB4464330 | Investigating
| August 01, 2019 05:00 PM PT |
Startup to a black screen after installing updates Your device may startup to a black screen during the first logon after installing updates.
See details > | OS Build 17763.557
June 11, 2019 KB4503327 | Mitigated
| June 14, 2019 04:41 PM PT |
Devices with some Asian language packs installed may receive an error After installing the KB4493509 devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_F
See details > | OS Build 17763.437
April 09, 2019 KB4493509 | Mitigated
| May 03, 2019 10:59 AM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\".
See details > | OS Build 17763.253
January 08, 2019 KB4480116 | Mitigated
| April 09, 2019 10:00 AM PT |
@@ -87,7 +86,7 @@ sections:
- type: markdown
text: "
Details | Originating update | Status | History |
- IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Workaround: To mitigate the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Next steps: We are working on a resolution and will provide an update in an upcoming release. Back to top | OS Build 17763.737
September 10, 2019 KB4512578 | Mitigated
| Last updated: September 16, 2019 05:36 PM PT
Opened: September 13, 2019 05:25 PM PT |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: Due to security related changes in KB4512578, this issue may occur when Touch Keyboard and Handwriting Panel Service is not configured to its default startup type of Manual. To resolve the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Back to top | OS Build 17763.737
September 10, 2019 KB4512578 | Resolved
| Resolved: September 19, 2019 04:08 PM PT
Opened: September 13, 2019 05:25 PM PT |
Windows Mixed Reality Portal users may intermittently receive a 15-5 error codeAfter installing KB4511553, Windows Mixed Reality Portal users may intermittently receive a 15-5 error code. In some cases, Windows Mixed Reality Portal may report that the headset is sleeping and pressing “Wake up” may appear to produce no action.
Affected platforms: - Client: Windows 10, version 1809; Windows 10, version 1803
Workaround: To mitigate the issue, use the following steps: - Close the Windows Mixed Reality Portal, if it is running.
- Open Task Manager by selecting the Start button and typing Task Manager.
- In Task Manager under the Processes tab, right click or long press on “Windows Explorer” and select restart.
- You can now open the Windows Mixed Reality Portal.
Next steps: We are working on a resolution and will provide an update in an upcoming release. Back to top | OS Build 17763.678
August 13, 2019 KB4511553 | Mitigated
| Last updated: September 11, 2019 05:32 PM PT
Opened: September 11, 2019 05:32 PM PT |
"
@@ -97,7 +96,7 @@ sections:
- type: markdown
text: "
Details | Originating update | Status | History |
- Apps and scripts using the NetQueryDisplayInformation API may fail with error Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”
Affected platforms: - Server: Windows Server 2019; Windows Server 2016
Next steps: We are working on a resolution and will provide an update in an upcoming release. Back to top | OS Build 17763.55
October 09, 2018 KB4464330 | Investigating
| Last updated: August 01, 2019 05:00 PM PT
Opened: August 01, 2019 05:00 PM PT |
+ Apps and scripts using the NetQueryDisplayInformation API may fail with error Applications and scripts that call the NetQueryDisplayInformation API or the WinNT provider equivalent may fail to return results after the first page of data, often 50 or 100 entries. When requesting additional pages you may receive the error, “1359: an internal error occurred.”
Affected platforms: - Server: Windows Server 2019; Windows Server 2016
Resolution: This issue was resolved in KB4516077. Back to top | OS Build 17763.55
October 09, 2018 KB4464330 | Resolved KB4516077 | Resolved: September 24, 2019 10:00 AM PT
Opened: August 01, 2019 05:00 PM PT |
"
@@ -108,7 +107,6 @@ sections:
Details | Originating update | Status | History |
Domain connected devices that use MIT Kerberos realms will not start upDevices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after installation of KB4505658. Devices that are domain controllers or domain members are both affected.
To safeguard your update experience, we have applied a compatibility hold on devices configured to use MIT Kerberos realm from being offered Windows 10, version 1903 or Windows Server, version 1903.
Note If you are not sure if your device is affected, contact your administrator. Advanced users can check for “Define interoperable Kerberos v5 realm settings” policy under Computer Configuration -> Policies -> Administrative Templates > System -> Kerberos or check if this registry key exists: HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Kerberos\\MitRealms
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: This issue was resolved in KB4511553 and the safeguard hold has been removed. Please note, it can take up to 48 hours before you can update to offered Windows 10, version 1903 or Windows Server, version 1903. Back to top | OS Build 17763.652
July 22, 2019 KB4505658 | Resolved KB4511553 | Resolved: August 13, 2019 10:00 AM PT
Opened: July 25, 2019 06:10 PM PT |
- Devices starting using PXE from a WDS or SCCM servers may fail to startDevices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503327 on a WDS server.
Affected platforms: - Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512534. Back to top | OS Build 17763.557
June 11, 2019 KB4503327 | Resolved KB4512534 | Resolved: August 17, 2019 02:00 PM PT
Opened: July 10, 2019 02:51 PM PT |
"
diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml
index d7af320a1c..81ac035ba0 100644
--- a/windows/release-information/status-windows-10-1903.yml
+++ b/windows/release-information/status-windows-10-1903.yml
@@ -21,8 +21,7 @@ sections:
Find information on known issues and the status of the rollout for Windows 10, version 1903 and Windows Server, version 1903. Looking for a specific issue? Press CTRL + F (or Command + F if you are using a Mac) and enter your search term(s).
-Current status as of July 16, 2019:
- We are initiating the Windows 10 May 2019 Update for customers with devices that are at or nearing end of service and have not yet updated their device. Keeping these devices both supported and receiving monthly updates is critical to device security and ecosystem health. Based on the large number of devices running the April 2018 Update, that will reach the end of 18 months of service on November 12, 2019, we are starting the update process now for Home and Pro editions to help ensure adequate time for a smooth update process. Our update rollout process takes into consideration the scale and complexity of the Windows 10 ecosystem, with the many hardware, software, and app configuration options users have, to provide a seamless update experience for all users. We closely monitor update feedback to allow us to prioritize those devices likely to have a good update experience and quickly put safeguards on other devices while we address known issues. Windows 10 Home and Pro edition users will have the ability to pause the update for up to 35 days so they can choose a convenient time. The Windows 10 May 2019 Update is available for any user who manually selects “Check for updates” via Windows Update on a device that does not have a safeguard hold for issues already detected. If you are not offered the update, please check below for any known issues that may affect your device. We recommend commercial customers running earlier versions of Windows 10 begin targeted deployments of Windows 10, version 1903 to validate that the apps, devices, and infrastructure used by their organizations work as expected with the new release and features. Note Follow @WindowsUpdate to find out when new content is published to the release information dashboard.
+ | Current status as of September 26, 2019: Windows 10, version 1903 (the May 2019 Update) is designated ready for broad deployment for all users via Windows Update. As devices running the Home, Pro, and Pro for Workstation editions of Windows 10, version 1803 (the April 2018 Update) will reach end of service on November 12, 2019, we are broadly updating these devices, as well as those running earlier versions of Windows 10 that are past end of service, to keep these devices both supported and receiving monthly updates. If you are not offered the Windows 10, version 1903 feature update, please check below for known issues and safeguard holds that may affect your device. We recommend commercial customers running earlier versions of Windows 10 begin broad deployments of Windows 10, version 1903 in their organizations. Note Follow @WindowsUpdate to find out when new content is published to the release information dashboard.
|
"
@@ -38,17 +37,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- items:
- type: markdown
text: "
@@ -65,10 +64,10 @@ sections:
- type: markdown
text: "This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
Summary | Originating update | Status | Last updated |
- IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 18362.356
September 10, 2019 KB4515384 | Mitigated
| September 16, 2019 05:36 PM PT |
+ Audio in games is quiet or different than expected Microsoft has received reports that audio in certain games is quieter or different than expected.
See details > | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved KB4517211 | September 26, 2019 02:00 PM PT |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.
See details > | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved
| September 19, 2019 04:08 PM PT |
+ Some users report issues related to the Start menu and Windows Desktop Search Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.
See details > | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved
| September 19, 2019 04:58 PM PT |
Safeguard on certain devices with some Intel and Broadcom Wi-Fi adapters Microsoft and NEC have found incompatibility issues with some devices with Intel Centrino 6205/6235 and Broadcom 802.11ac Wi-Fi cards when running Windows 10, version 1903.
See details > | N/A
| Mitigated
| September 13, 2019 05:25 PM PT |
- Some users report issues related to the Start menu and Windows Desktop Search Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.
See details > | OS Build 18362.356
September 10, 2019 KB4515384 | Investigating
| September 13, 2019 05:35 PM PT |
- Audio in games is quiet or different than expected Microsoft has received reports that audio in certain games is quieter or different than expected.
See details > | OS Build 18362.356
September 10, 2019 KB4515384 | Mitigated
| September 13, 2019 05:25 PM PT |
Screenshots and Snips have an unnatural orange tint Users have reported an orange tint on Screenshots and Snips with the Lenovo Vantage app installed
See details > | OS Build 18362.356
September 10, 2019 KB4516115 | Resolved External
| September 11, 2019 08:54 PM PT |
Windows Desktop Search may not return any results and may have high CPU usage Windows Desktop Search may not return any results and SearchUI.exe may have high CPU usage after installing KB4512941.
See details > | OS Build 18362.329
August 30, 2019 KB4512941 | Resolved KB4515384 | September 10, 2019 10:00 AM PT |
Domain connected devices that use MIT Kerberos realms will not start up Devices connected to a domain that is configured to use MIT Kerberos realms will not start up or may continue to restart after updating.
See details > | OS Build 18362.145
May 29, 2019 KB4497935 | Resolved KB4512941 | August 30, 2019 10:00 AM PT |
@@ -99,10 +98,10 @@ sections:
- type: markdown
text: "
Details | Originating update | Status | History |
- IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Workaround: To mitigate the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Next steps: We are working on a resolution and will provide an update in an upcoming release. Back to top | OS Build 18362.356
September 10, 2019 KB4515384 | Mitigated
| Last updated: September 16, 2019 05:36 PM PT
Opened: September 13, 2019 05:25 PM PT |
+ Audio in games is quiet or different than expected Microsoft has received reports that audio in certain games is quieter or different than expected. At the request of some of our audio partners, we implemented a compatibility change that enabled certain games to query support and render multi-channel audio. Due to customer feedback, we are reverting this change as some games and some devices are not rendering multi-channel audio as expected. This may result in games sounding different than customers are used to and may have missing channels.
Affected platforms: - Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4517211. Back to top | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved KB4517211 | Resolved: September 26, 2019 02:00 PM PT
Opened: September 13, 2019 05:25 PM PT |
+ IME may become unresponsive or have High CPU usage Some Input Method Editor (IME) may become unresponsive or may have high CPU usage. Affected IMEs include Chinese Simplified (ChsIME.EXE) and Chinese Traditional (ChtIME.EXE) with Changjie/Quick keyboard.
Affected platforms: - Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
- Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
Resolution: Due to security related changes in KB4515384, this issue may occur when Touch Keyboard and Handwriting Panel Service is not configured to its default startup type of Manual. To resolve the issue, perform the following steps: - Select the Start button and type Services.
- Locate Touch Keyboard and Handwriting Panel Service and double click on it or long press and select Properties.
- Locate Startup type: and change it to Manual
- Select Ok
- The TabletInputService service is now in the default configuration and IME should work as expected.
Back to top | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved
| Resolved: September 19, 2019 04:08 PM PT
Opened: September 13, 2019 05:25 PM PT |
+ Some users report issues related to the Start menu and Windows Desktop Search Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.
Affected platforms: - Client: Windows 10, version 1903
Resolution: At this time, Microsoft has not found a Search or Start issue significantly impacting users originating from KB4515384. We will continue monitoring to ensure users have a high-quality experience when interacting with these areas. If you are currently having issues, we recommend you to take a moment to report it in via the Feedback Hub (Windows + F) then try the Windows 10 Troubleshoot settings (found in Settings). If you are having an issue with search, see Fix problems in Windows Search. Back to top | OS Build 18362.356
September 10, 2019 KB4515384 | Resolved
| Resolved: September 19, 2019 04:58 PM PT
Opened: September 11, 2019 05:18 PM PT |
Safeguard on certain devices with some Intel and Broadcom Wi-Fi adapters Microsoft and NEC have found incompatibility issues with Intel Centrino 6205/6235 and Broadcom 802.11ac Wi-Fi cards when running Windows 10, version 1903 on specific models of NEC devices. If these devices are updated to Windows 10, version 1903, they will no longer be able to use any Wi-Fi connections. The Wi-Fi driver may have a yellow exclamation point in device manager. The task tray icon for networking may show the icon for no internet and Network & Internet settings may not show any Wi-Fi networks.
To safeguard your update experience, we have applied a compatibility hold on the affected devices from being offered Windows 10, version 1903.
Affected platforms: - Client: Windows 10, version 1903
Workaround: If you are using an affected device and you have already installed Windows 10, version 1903, you can mitigate the issue disabling then re-enabling the Wi-Fi adapter in Device Manager. You should now be able to use Wi-Fi until your next reboot.
Next steps: Microsoft and NEC are working on a resolution and will provide an update in an upcoming release.
Note We recommend that you do not attempt to manually update using the Update now button or the Media Creation Tool until this issue has been resolved. Back to top | N/A
| Mitigated
| Last updated: September 13, 2019 05:25 PM PT
Opened: September 13, 2019 05:25 PM PT |
- Some users report issues related to the Start menu and Windows Desktop Search Microsoft has received reports that a small number of users are having issues related to the Start menu and Windows Desktop Search.
Affected platforms: - Client: Windows 10, version 1903
Next steps: We are presently investigating and will provide an update when more information is available.
Note As a first step with any issue you may encounter, we recommend you refer to our troubleshooting support guides. If you are having an issue with search, see Fix problems in Windows Search. Back to top | OS Build 18362.356
September 10, 2019 KB4515384 | Investigating
| Last updated: September 13, 2019 05:35 PM PT
Opened: September 11, 2019 05:18 PM PT |
- Audio in games is quiet or different than expected Microsoft has received reports that audio in certain games is quieter or different than expected. At the request of some of our audio partners, we implemented a compatibility change that enabled certain games to query support and render multi-channel audio. Due to customer feedback, we are reverting this change as some games and some devices are not rendering multi-channel audio as expected. This may result in games sounding different than customers are used to and may have missing channels.
Affected platforms: - Client: Windows 10, version 1903
Workaround: To mitigate the issue, open settings in the impacted game and disable multi-channel audio, if this option is available. You can also search in the Windows Control Panel for 3rd party audio device control panels and disable Multi-channel audio or Virtual Surround Sound, if these options are available.
Next steps: We are working on a resolution and estimates a solution will be available in late September. Back to top | OS Build 18362.356
September 10, 2019 KB4515384 | Mitigated
| Last updated: September 13, 2019 05:25 PM PT
Opened: September 13, 2019 05:25 PM PT |
Screenshots and Snips have an unnatural orange tint When creating screenshots or using similar tools (such as Snipping Tool or Snip & Sketch), the resulting images may have an unnatural orange tint. This issue is caused by the Eye Care mode feature of Lenovo Vantage. This issue started on or around September 5, 2019.
Affected platforms: - Client: Windows 10, version 1903
- Server: None
Back to top | OS Build 18362.356
September 10, 2019 KB4516115 | Resolved External
| Last updated: September 11, 2019 08:54 PM PT
Opened: September 11, 2019 08:54 PM PT |
Windows Desktop Search may not return any results and may have high CPU usageMicrosoft is getting reports that a small number of users may not receive results when using Windows Desktop Search and may see high CPU usage from SearchUI.exe when searching after installing KB4512941. This issue is only encountered on devices in which searching the web from Windows Desktop Search has been disabled.
Affected platforms: - Client: Windows 10, version 1903
Resolution: This issue was resolved in KB4515384. Back to top | OS Build 18362.329
August 30, 2019 KB4512941 | Resolved KB4515384 | Resolved: September 10, 2019 10:00 AM PT
Opened: September 04, 2019 02:25 PM PT |
diff --git a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml
index 02b0c3aa47..0bc8f4deb6 100644
--- a/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml
+++ b/windows/release-information/status-windows-7-and-windows-server-2008-r2-sp1.yml
@@ -33,17 +33,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- items:
- type: markdown
text: "
@@ -60,9 +60,7 @@ sections:
- type: markdown
text: "This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
Summary | Originating update | Status | Last updated |
- You may receive an error when opening or using the Toshiba Qosmio AV Center Toshiba Qosmio AV Center may error when opening and you may also receive an error in Event Log related to cryptnet.dll.
See details > | August 13, 2019 KB4512506 | Investigating
| September 13, 2019 04:25 PM PT |
- Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV Windows updates that are SHA-2 signed are not available with Symantec or Norton antivirus program installed
See details > | August 13, 2019 KB4512506 | Resolved External
| August 27, 2019 02:29 PM PT |
- Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | June 11, 2019 KB4503292 | Resolved KB4512514 | August 17, 2019 02:00 PM PT |
+ You may receive an error when opening or using the Toshiba Qosmio AV Center Toshiba Qosmio AV Center may error when opening and you may also receive an error in Event Log related to cryptnet.dll.
See details > | August 13, 2019 KB4512506 | Resolved KB4516048 | September 24, 2019 10:00 AM PT |
IA64 and x64 devices may fail to start after installing updates After installing updates released on or after August 13, 2019, IA64 and x64 devices using EFI Boot may fail to start.
See details > | August 13, 2019 KB4512506 | Mitigated
| August 17, 2019 12:59 PM PT |
"
@@ -79,7 +77,7 @@ sections:
- type: markdown
text: "
Details | Originating update | Status | History |
- You may receive an error when opening or using the Toshiba Qosmio AV CenterAfter installing KB4512506, you may receive an error when opening or using the Toshiba Qosmio AV Center. You may also receive an error in Event Log related to cryptnet.dll.
Affected platforms: Next steps: Microsoft is working with Dynabook to resolve this issue and estimate a solution will be available late September. Back to top | August 13, 2019 KB4512506 | Investigating
| Last updated: September 13, 2019 04:25 PM PT
Opened: September 10, 2019 09:48 AM PT |
+ You may receive an error when opening or using the Toshiba Qosmio AV CenterAfter installing KB4512506, you may receive an error when opening or using the Toshiba Qosmio AV Center. You may also receive an error in Event Log related to cryptnet.dll.
Affected platforms: Resolution: This issue was resolved in KB4516048. Back to top | August 13, 2019 KB4512506 | Resolved KB4516048 | Resolved: September 24, 2019 10:00 AM PT
Opened: September 10, 2019 09:48 AM PT |
"
@@ -88,16 +86,6 @@ sections:
- type: markdown
text: "
Details | Originating update | Status | History |
- Windows updates that are SHA-2 signed may not be offered for Symantec and Norton AV Symantec identified the potential for a negative interaction that may occur after Windows Updates code signed with SHA-2 only certificates are installed on devices with Symantec or Norton antivirus programs installed. The software may not correctly identify files included in the update as code signed by Microsoft, putting the device at risk for a delayed or incomplete update.
Affected platforms: - Client: Windows 7 SP1
- Server: Windows Server 2008 R2 SP1
Resolution: The safeguard hold has been removed. Symantec has completed its evaluation of the impact of this update and future updates to Windows 7/Windows 2008 R2 and has determined that there is no increased risk of a false positive detection for all in-field versions of Symantec Endpoint Protection and Norton antivirus programs. See the Symantec support article for additional detail and please reach out to Symantec or Norton support if you encounter any issues. Back to top | August 13, 2019 KB4512506 | Resolved External
| Last updated: August 27, 2019 02:29 PM PT
Opened: August 13, 2019 10:05 AM PT |
IA64 and x64 devices may fail to start after installing updates IA64 devices (in any configuration) and x64 devices using EFI boot that were provisioned after the July 9th updates and/or skipped the recommended update (KB3133977), may fail to start with the following error: \"File: \\Windows\\system32\\winload.efi Status: 0xc0000428 Info: Windows cannot verify the digital signature for this file.\"
Affected platforms: - Client: Windows 7 SP1
- Server: Windows Server 2008 R2 SP1
Take Action: To resolve this issue please follow the steps outlined in the SHA-2 support FAQ article for error code 0xc0000428. Back to top | August 13, 2019 KB4512506 | Mitigated
| Last updated: August 17, 2019 12:59 PM PT
Opened: August 13, 2019 08:34 AM PT |
"
-
-- title: July 2019
-- items:
- - type: markdown
- text: "
- Details | Originating update | Status | History |
- Devices starting using PXE from a WDS or SCCM servers may fail to startDevices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503292 on a WDS server.
Affected platforms: - Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512514. Back to top | June 11, 2019 KB4503292 | Resolved KB4512514 | Resolved: August 17, 2019 02:00 PM PT
Opened: July 10, 2019 02:51 PM PT |
-
- "
diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml
index 57124dd060..ede09177dd 100644
--- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml
+++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml
@@ -33,17 +33,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- items:
- type: markdown
text: "
@@ -60,8 +60,7 @@ sections:
- type: markdown
text: "This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
Summary | Originating update | Status | Last updated |
- Windows RT 8.1 devices may have issues opening Internet Explorer 11 On Windows RT 8.1 devices, Internet Explorer 11 may not open and you may receive an error.
See details > | September 10, 2019 KB4516067 | Investigating
| September 13, 2019 05:25 PM PT |
- Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | June 11, 2019 KB4503276 | Resolved KB4512478 | August 17, 2019 02:00 PM PT |
+ Windows RT 8.1 devices may have issues opening Internet Explorer 11 On Windows RT 8.1 devices, Internet Explorer 11 may not open and you may receive an error.
See details > | September 10, 2019 KB4516067 | Resolved KB4516041 | September 24, 2019 10:00 AM PT |
Japanese IME doesn't show the new Japanese Era name as a text input option If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.
See details > | April 25, 2019 KB4493443 | Mitigated
| May 15, 2019 05:53 PM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.
See details > | January 08, 2019 KB4480963 | Mitigated
| April 25, 2019 02:00 PM PT |
@@ -79,16 +78,7 @@ sections:
- type: markdown
text: "
Details | Originating update | Status | History |
- Windows RT 8.1 devices may have issues opening Internet Explorer 11 On Windows 8.1 RT devices, Internet Explorer 11 may not open and you may receive the error, \"C:\\Program Files\\Internet Explorer\\iexplore.exe: A certificate was explicitly revoked by its issuer.\"
Affected platforms: Next steps: We are working on a resolution and will provide an update in an upcoming release. Back to top | September 10, 2019 KB4516067 | Investigating
| Last updated: September 13, 2019 05:25 PM PT
Opened: September 13, 2019 05:25 PM PT |
-
- "
-
-- title: July 2019
-- items:
- - type: markdown
- text: "
- Details | Originating update | Status | History |
- Devices starting using PXE from a WDS or SCCM servers may fail to startDevices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503276 on a WDS server.
Affected platforms: - Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512478. Back to top | June 11, 2019 KB4503276 | Resolved KB4512478 | Resolved: August 17, 2019 02:00 PM PT
Opened: July 10, 2019 02:51 PM PT |
+ Windows RT 8.1 devices may have issues opening Internet Explorer 11 On Windows 8.1 RT devices, Internet Explorer 11 may not open and you may receive the error, \"C:\\Program Files\\Internet Explorer\\iexplore.exe: A certificate was explicitly revoked by its issuer.\"
Affected platforms: Resolution: This issue was resolved in KB4516041. Back to top | September 10, 2019 KB4516067 | Resolved KB4516041 | Resolved: September 24, 2019 10:00 AM PT
Opened: September 13, 2019 05:25 PM PT |
"
diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml
index 92caeeca25..e928ce6351 100644
--- a/windows/release-information/status-windows-server-2008-sp2.yml
+++ b/windows/release-information/status-windows-server-2008-sp2.yml
@@ -33,17 +33,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- items:
- type: markdown
text: "
@@ -60,7 +60,7 @@ sections:
- type: markdown
text: "This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
Summary | Originating update | Status | Last updated |
- Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | June 11, 2019 KB4503273 | Resolved KB4512499 | August 17, 2019 02:00 PM PT |
+ Issues manually installing updates by double-clicking the .msu file You may encounter issues manually installing updates by double-clicking the .msu file and may receive an error.
See details > | September 10, 2019 KB4474419 | Mitigated KB4474419 | September 24, 2019 08:17 AM PT |
"
@@ -71,11 +71,11 @@ sections:
"
-- title: July 2019
+- title: September 2019
- items:
- type: markdown
text: "
Details | Originating update | Status | History |
- Devices starting using PXE from a WDS or SCCM servers may fail to startDevices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503273 on a WDS server.
Affected platforms: - Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512499. Back to top | June 11, 2019 KB4503273 | Resolved KB4512499 | Resolved: August 17, 2019 02:00 PM PT
Opened: July 10, 2019 02:51 PM PT |
+ Issues manually installing updates by double-clicking the .msu fileAfter installing the SHA-2 update ( KB4474419) released on September 10, 2019, you may encounter issues manually installing updates by double-clicking on the .msu file and may receive the error, \"Installer encountered an error: 0x80073afc. The resource loader failed to find MUI file.\"
Affected platforms: - Server: Windows Server 2008 SP2
Workaround: Open a command prompt and use the following command (replacing <msu location> with the actual location and filename of the update): wusa.exe <msu location> /quiet
Resolution: This issue is resolved in KB4474419 released September 23, 2019. Currently, this version is only available from the Microsoft Update Catalog. To resolve this issue, you will need to manually download the package and use the workaround above to install it.
Next steps: We estimate a solution will be available in mid-October on Windows Update and Windows Server Update Services (WSUS). Back to top | September 10, 2019 KB4474419 | Mitigated KB4474419 | Last updated: September 24, 2019 08:17 AM PT
Opened: September 20, 2019 04:57 PM PT |
"
diff --git a/windows/release-information/status-windows-server-2012.yml b/windows/release-information/status-windows-server-2012.yml
index 53d71fb08e..02d382905f 100644
--- a/windows/release-information/status-windows-server-2012.yml
+++ b/windows/release-information/status-windows-server-2012.yml
@@ -33,17 +33,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- items:
- type: markdown
text: "
@@ -60,7 +60,6 @@ sections:
- type: markdown
text: "This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.
Summary | Originating update | Status | Last updated |
- Devices starting using PXE from a WDS or SCCM servers may fail to start Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"
See details > | June 11, 2019 KB4503285 | Resolved KB4512512 | August 17, 2019 02:00 PM PT |
Japanese IME doesn't show the new Japanese Era name as a text input option If previous dictionary updates are installed, the Japanese input method editor (IME) doesn't show the new Japanese Era name as a text input option.
See details > | April 25, 2019 KB4493462 | Mitigated
| May 15, 2019 05:53 PM PT |
Certain operations performed on a Cluster Shared Volume may fail Certain operations, such as rename, performed on files or folders on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.
See details > | January 08, 2019 KB4480975 | Mitigated
| April 25, 2019 02:00 PM PT |
@@ -73,15 +72,6 @@ sections:
"
-- title: July 2019
-- items:
- - type: markdown
- text: "
- Details | Originating update | Status | History |
- Devices starting using PXE from a WDS or SCCM servers may fail to startDevices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503285 on a WDS server.
Affected platforms: - Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
Resolution: This issue was resolved in KB4512512. Back to top | June 11, 2019 KB4503285 | Resolved KB4512512 | Resolved: August 17, 2019 02:00 PM PT
Opened: July 10, 2019 02:51 PM PT |
-
- "
-
- title: May 2019
- items:
- type: markdown
diff --git a/windows/release-information/windows-message-center.yml b/windows/release-information/windows-message-center.yml
index 531c4806b0..7941d7e26d 100644
--- a/windows/release-information/windows-message-center.yml
+++ b/windows/release-information/windows-message-center.yml
@@ -27,17 +27,17 @@ sections:
html: Get the update >
image:
src: https://docs.microsoft.com/media/common/i_deploy.svg
- title: Windows 10, version 1903 rollout begins
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-in-Windows-Update-for-Business-in-Windows-10-version/ba-p/622064
- html: Read about the latest enhancements >
+ title: Windows 10, version 1903 rollout in progress
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Using-machine-learning-to-improve-the-Windows-10-update/ba-p/877860
+ html: Learn how machine learning informs each rollout >
image:
- src: https://docs.microsoft.com/media/common/i_whats-new.svg
- title: What’s new in Windows Update for Business
- - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1903/ba-p/622024
- html: Get an overview >
+ src: https://docs.microsoft.com/media/common/i_multi-connect.svg
+ title: Improving the Windows 10 update experience
+ - href: https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376
+ html: Learn more >
image:
src: https://docs.microsoft.com/media/common/i_investigate.svg
- title: What’s new for businesses and IT pros in Windows 10
+ title: Windows 10 update servicing cadence
- href: https://docs.microsoft.com/windows/windows-10/release-information
html: Visit the Windows 10 release information page >
image:
@@ -50,6 +50,11 @@ sections:
text: "
Message | Date |
+ September 2019 Windows 10, version 1903 \"D\" optional release is available
The September 2019 optional monthly “D” release for Windows 10, version 1903 is now available. For more information on the different types of monthly quality updates, see our Windows 10 update servicing cadence primer. Follow @WindowsUpdate for the latest on the availability of this release. | September 26, 2019 02:00 PM PT |
+ Advisory: Scripting Engine Memory Corruption Vulnerability (CVE-2019-1367)
On September 23, 2019, Microsoft released a security update to address a remote code execution vulnerability in the way the scripting engine handles objects in memory in Internet Explorer. An attacker who successfully exploited the vulnerability could gain the same user permissions as the current user. For example, if a user is logged on with administrative rights, an attacker could take control of an affected system and install programs; view, change, or delete data; or create new accounts with full user rights. Alternatively, an attacker could host a specially crafted website targeting Internet Explorer and then entice a user to open web page or a malicious document attached to an e-mail. For more information about the vulnerability, see the Microsoft Security Guide CVE-2019-1367 | Scripting Engine Memory Corruption Vulnerability. Mitigation and more information for this vulnerability is available from the Microsoft Security Update Guide at CVE-2019-1367 | Scripting Engine Memory Corruption Vulnerability. For the best protection, we recommend you apply the latest Windows updates and follow security best practices and do not open attachments or documents from an untrusted source.
Update: Starting September 24, 2019, mitigation for this vulnerability is included as part of the 9C optional update, via Windows Update (WU) and Microsoft Update Catalog, for all supported versions of Windows 10, with the exception of Windows 10, version 1903 and Windows 10, version 1507 (LTSB). For devices running Windows 10, version 1903, mitigation for this vulnerability will be included as part of the 9D optional update via WU, WSUS and the Microsoft Update Catalog (targeted for September 26, 2019.) To apply this update, go to Settings > Windows Update > Check for Updates. (Note Because this update requires a reboot, we are making it optional to give customers and administrators a choice to install/deploy the update now.)
For customers running Windows 8.1/ Windows Server 2012 R2 or below, the 9C update is also available on Windows Server Update Services (WSUS). For other supported versions of Windows, IT admins using WSUS can import this update into WSUS/SCCM manually from Microsoft Update Catalog. See instructions on the WSUS and the Catalog Site. | September 24, 2019 05:00 PM PT |
+ Status update: September 2019 Windows \"C\" optional release available
The September 2019 optional monthly “C” release for all supported versions of Windows is now available. For more information on the different types of monthly quality updates, see our Windows 10 update servicing cadence primer. Follow @WindowsUpdate for the latest on the availability of this release. | September 24, 2019 08:10 AM PT |
+ Plan for change: Windows Media Center Electronic Program Guide retiring in January 2020
Starting in January 2020, Microsoft is retiring its Electronic Program Guide (EPG) service for all versions of Windows Media Center. To continue receiving TV Program Guide information on your Windows Media Center, you’ll need to configure an alternate TV listing provider. | September 24, 2019 08:00 AM PT |
+ Status of September 2019 “C” release
The optional monthly “C” release for September 2019 for all supported versions of Windows and Windows Server prior to Windows 10, version 1903 and Windows Server, version 1903 will be available in the near term. For more information on the different types of monthly quality updates, see our Windows 10 update servicing cadence primer. Follow @WindowsUpdate for the latest on the availability of this release. | September 19, 2019 04:11 PM PT |
Plan for change: End of service reminders for Windows 10, versions 1703 and 1803
The Enterprise and Education editions of Windows 10, version 1703 (the Creators Update) will reach end of service on October 8, 2019. The Home, Pro, Pro for Workstations, and IoT Core editions of Windows 10, version 1803 (the April 2018 Update) will reach end of service on November 12, 2019. We recommend that you update devices running these versions and editions to the latest version of Windows 10—Windows 10, version 1903—as soon as possible to help keep them protected and your environments secure. | September 13, 2019 03:23 PM PT |
September 2019 security update available for all supported versions of Windows
The September 2019 security update release, referred to as our “B” release, is now available for Windows 10, version 1903 and all supported versions of Windows. We recommend that you install these updates promptly. To be informed about the latest updates and releases, follow us on Twitter @WindowsUpdate. | September 10, 2019 09:34 AM PT |
Status update: Windows 10, version 1903 \"D\" optional release available August 30th
The August optional monthly “D” release for Windows 10, version 1903 is now available. Follow @WindowsUpdate for the latest on the availability of this release. | August 30, 2019 08:00 AM PT |
@@ -90,48 +95,5 @@ Given the potential impact to customers and their businesses, we have also relea
For more information about the Windows 10 update servicing cadence, please see the Window IT Pro blog.
May 10, 2019 10:00 AM PT |
- Take action: Install servicing stack update for Windows Server 2008 SP2 for SHA-2 code sign support A standalone update, KB4493730, that introduce SHA-2 code sign support for the servicing stack (SSU) was released today as a security update. | April 19, 2019 10:00 AM PT |
- The benefits of Windows 10 Dynamic Update
Dynamic Update can help organizations and end users alike ensure that their Windows 10 devices have the latest feature update content (as part of an in-place upgrade)—and preserve precious features on demand (FODs) and language packs (LPs) that may have been previously installed.
-
-Find out which components are updated by Dynamic Update, how Dynamic Update is initiated, and how to enable or disable it. | April 17, 2019 11:26 AM PT |
- Improvements to the Windows 10 update experience are coming Find out about the changes coming to the Windows update process that will improve the experience, offer users more control, and improve the quality of Windows updates. | April 04, 2019 09:00 AM PT |
- Take action: review your Windows Update for Business deferral values
If devices under your management are still running Windows 10 Pro or Windows 10 Pro for Workstations, version 1709, your devices will reach end of service on April 9, 2019 if you have configured both of the following Windows Update for Business policies:
-
-- Branch readiness is configured as Semi-Annual Channel (SAC)
-- Feature update deferral is configured as 274 days or more
-
-In order avoid this, you need to set your feature update deferral policy to 273 days or less. | April 03, 2019 05:47 PM PT |
- Find a list of currently supported versions and previous releases Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it is no longer serviced or supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade, or make other changes to your software. Check out the updated Windows 10 release information page for a list of current versions by servicing option as well as end of service dates. | March 28, 2019 02:00 PM PT |
- Windows 10, version 1809 designated for broad deployment Based on the data and the feedback we’ve received from consumers, OEMs, ISVs, partners, and commercial customers, Windows 10, version 1809 has transitioned to broad deployment. With this, the Windows 10 release information page will now reflect Semi-Annual Channel (SAC) for version 1809. | March 28, 2019 10:00 AM PT |
- Reminder: Additional servicing for the Windows 10 Enterprise, Education, and IoT Enterprise, version 1607 ends April 9, 2019
The additional servicing for Windows 10 Enterprise, Education, and IoT Enterprise editions ends on April 9, 2019 and doesn't extend beyond this date. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.
Devices running Windows 10 Enterprise 2016 LTSB will continue to receive updates until October 2026 per the Fixed Lifecycle Policy. Windows 10, version 1607 devices running the Intel “Clovertrail” chipset will continue to receive updates until January 2023. | March 12, 2019 10:00 AM PT |
- Reminder: Windows 10 Home, Pro, Pro for Workstations, and IoT Core, version 1709 will reach end of service on April 9, 2019
Windows 10, version 1709, will reach end of service on April 9, 2019 for devices running Windows 10 Home, Pro, Pro for Workstations, and IoT Core editions. These devices will no longer receive monthly security and quality updates that contain protection from the latest security threats. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10.
Windows 10 Enterprise, Education, and IoT Enterprise editions will continue to receive servicing for 12 months at no cost per the lifecycle announcement on October 2018. | March 12, 2019 10:00 AM PT |
- Take action: Install standalone security updates to introduce SHA-2 code sign support for Windows 7 amd Windows Server 2008 R2 A standalone SHA-2 code signing support update for Windows Server 2008 R2 and Windows 7 is now available, as is a servicing stack update for Windows 7 SP1 and Windows Server 2008 R2 SP1 that includes the SHA-2 code signing support update. | March 12, 2019 10:00 AM PT |
- Take action: Install standalone update for WSUS 3.0 SP2 to support the delivery of SHA-2 signed updates A standalone update, KB4484071 is available on Windows Update Catalog for WSUS 3.0 SP2 that supports delivering SHA-2 signed updates. For those customers using WSUS 3.0 SP2, this update should be manually installed no later than June 18, 2019. | March 12, 2019 10:00 AM PT |
- Reminder: Final Delta update for Windows 10, version 1607, 1703, 1709, and 1803 will be April 9, 2019 March 12th and April 9th will be the last two Delta updates for Windows 10, version 1607, 1703, 1709, and 1803. Security and quality updates will continue to be available via the express and full cumulative update packages. | March 12, 2019 10:00 AM PT |
- How do we measure and improve the quality of Windows?
Measuring the quality of Windows is a complex undertaking that requires gathering a variety of diagnostic signals from millions of devices within the Windows ecosystem. In addition to rigorous internal testing, we rely heavily on the feedback provided through diagnostic data to detect and fix problems before we release new updates of Windows to the general population, and to monitor the impact of those updates after each release.
-
-Get insight into some of the practices we employ to measure and improve the quality of Windows. | March 06, 2019 10:23 AM PT |
- Getting to know the Windows update history pages
Windows update history pages offer detailed information about each Windows update: the type of update, which operating systems it affects, the improvements and fixes included, and how to get the update. See how simple it is to use this important resource to access information for Windows 10, Windows Server 2019, and earlier versions of the Windows and Windows Server operating systems. | February 21, 2019 06:37 PM PT |
- Share your feedback: Windows update history We read every comment you leave on our update history pages, and are always looking to improve these pages and the monthly knowledge base (KB) articles that accompany each monthly update. Take our survey and let us know how we can improve our transparency further and make these more compelling and useful to you and your organization. | February 21, 2019 12:00 PM PT |
- Plan for change: Windows Update for Business and the retirement of SAC-T Beginning with Windows 10, version 1903 (the next feature update for Windows 10), the Windows 10 release information page will no longer list SAC-T information for version 1903 and future feature updates. Instead, you will find a single entry for each new SAC release. In addition, if you are using Windows Update for Business, you will see new UI and behavior to reflect that there is only one release date for each SAC release. If you use System Center Configuration Manager, Windows Server Update Services (WSUS), or other management tools, there will now only be one feature update published to WSUS, and this will occur at the time of release. Learn how this change will affect Windows Business for Update customers. | February 14, 2019 12:00 PM PT |
- Champs corner: Classifying Windows updates in common deployment tools If you utilize automated update deployment tools, such as Windows Server Update Services (WSUS) or System Center Configuration Manager, you likely use automatic rules to streamline the approval and deployment of Windows updates. Using the correct update classification is, therefore, an important component of your organization’s device update process. Explore the options available and how to approach it in a WSUS or Configuration Manager environment. | February 05, 2019 10:34 AM PT |
- Update: Delta updates for Windows 10, version 1607, 1703, 1709, and 1803 will be available until April 9, 2019 Based on customer feedback, we are extending Delta update publication for Windows 10 versions 1607, 1703, 1709, and 1803. We will continue to provide Delta updates via the Microsoft Update Catalog through April 9th, 2019, which will be the last delta update available. | February 05, 2019 09:00 AM PT |
- Global DNS outage affecting Windows Update customers Windows Update customers were affected by a network infrastructure event on January 29, 2019 (21:00 UTC), caused by an external DNS service provider’s global outage. A software update to the external provider’s DNS servers resulted in the distribution of corrupted DNS records that affected connectivity to the Windows Update service. The DNS records were restored by January 30, 2019 (00:10 UTC), and the majority of local Internet Service Providers (ISP) have refreshed their DNS servers and customer services have been restored.
-
-While this was not an issue with Microsoft’s services, we take any service disruption for our customers seriously. We will work with partners to better understand this so we can provide higher quality service in the future even across diverse global network providers.
-
-If you are still unable to connect to Windows Update services due to this problem, please contact your local ISP or network administrator. You can also refer to our new KB4493784 for more information to determine if your network is affected, and to provide your local ISP or network administrator with additional information to assist you. | January 29, 2019 04:15 PM PT |
- Application compatibility in the Windows ecosystem Our application ecosystem is incredibly diverse, encompassing tens of millions of applications (apps) with numerous versions, languages, architectures, services and configuration options. While our ecosystem is complex, our vision is simple. All apps on Windows devices should just work! Explore the various programs and technologies we use to improve application compatibility. | January 15, 2019 10:00 AM PT |
- Modern desktop servicing: the year in review 2018 was a pivotal year for the modern desktop and the servicing transformation journey we have been taking with you and your organization. In this post, John Wilcox takes a look back and recaps the progress that has been made, highlighting significant events, and provideing nsight into what 2019 has in store. | December 19, 2018 02:20 PM PT |
- Driver quality in the Windows ecosystem Ensuring Windows 10 works great with all the devices and accessories our customers use is a top priority. We work closely with this broad mix of partners to test new drivers, monitor health characteristics over time, and make Windows and our ecosystem more resilient architecturally. Our goal is to ensure that all the updates and drivers we deliver to non-Insider populations are validated and at production quality (including monthly optional releases) before pushing drivers broadly to all. Explore the driver distribution chain and learn how we measure driver quality and prevent conflicts. | December 19, 2018 10:04 AM PT |
- Introducing the Modern Desktop podcast series In this new podcast series, we'll explore the good, the bad, and, yes, the ugly of servicing and delivery for Windows 10 and Office 365 ProPlus. We'll talk about modern desktop management through Enterprise Mobility, security, and cloud-attached and co-managed environments. Listen to the first episode, in which we discuss monthly quality updates fpr Windows 10, the Microsoft 365 Stay Current pilot program, and interview a real customer to see how they ingest monthly updates in their organization. | December 18, 2018 01:00 PM PT |
- Measuring Delivery Optimization and its impact to your network If you've familiarized yourself with the configuration options for Delivery Optimization in Windows 10, and have started to configure the settings you feel will be the best fit for your organization’s network topology, now is the time to see how well those settings are working. This article provides tips on how evaluate performance at the device level or organization level. | December 13, 2018 03:48 PM PT |
- Windows monthly security and quality updates overview Today’s global cybersecurity threats are both dynamic and sophisticated, and new vulnerabilities are discovered almost every day. We focus on protecting customers from these security threats by providing security updates on a timely basis and with high quality. Find out how we deliver these critical updates on a massive scale as a key component of our ongoing Windows as a service effort. | December 10, 2018 10:00 AM PT |
- LTSC: What is it, and when should it be used? With the Semi-Annual Channel, devices receive two feature updates per year, and benefit from the best performance, user experience, security, and stability. This servicing option continues to be our recommendation for managing Windows 10 updates; however, we acknowledge that certain devices and use cases (e.g. medical systems and industrial process controllers) dictate that functionality and features don’t change over time. Find out how we designed the Long-Term Servicing Channel (LTSC) with these types of use cases in mind, and what is offered through the LTSC. | November 29, 2018 07:02 PM PT |
- Plan for change: Local Experience Packs: What are they and when should you use them? When we released Windows 10, version 1803, we introduced Local Experience Packs (LXPs), which are modern language packs delivered through the Microsoft Store or Microsoft Store for Business. Learn about the biggest advantage to LXPs, and the retirement of legacy language packs (lp.cab) for all Language Interface Packs (LIP). | November 14, 2018 11:10 AM PT |
- Windows 10 Quality approach for a complex ecosystem While our measurements of quality show improving trends on aggregate for each successive Windows 10 release, if a single customer experiences an issue with any of our updates, we take it seriously. In this blog post, Windows CVP Mike Fortin shares an overview of how we work to continuously improve the quality of Windows and our Windows as a service approach. This blog will be the first in a series of more in-depth explanations of the work we do to deliver quality in our Windows releases. | November 13, 2018 10:00 AM PT |
- Windows 10, version 1809 rollout resumes; now available on VLSC Today we are resuming the rollout of the latest Windows 10 feature update—Windows 10, version 1809—via the Software Download Center (via Update Assistant or the Media Creation Tool), Windows Server Update Services (WSUS), and Windows Update for Business. Windows 10, version 1809 is also now available on the Volume Licensing Service Center (VLSC). | November 13, 2018 10:00 AM PT |
- Express updates for Windows Server 2016 re-enabled for November 2018 update Starting with the November 13, 2018 Update Tuesday release, Windows will again publish Express updates for Windows Server 2016. That means that system administrators for WSUS and System Center Configuration Manager will once again see two packages for the Windows Server 2016 update: a Full update and an Express update. Read this article for more details. | November 12, 2018 03:00 PM PT |
- Plan for change: 2019 SHA-2 code signing support requirement for Windows and WSUS
To protect your security, Windows operating system updates are dual-signed using both the SHA-1 and SHA-2 hash algorithms to authenticate that updates come directly from Microsoft and were not tampered with during delivery. Due to weaknesses in the SHA-1 algorithm and to align to industry standards Microsoft will only sign Windows updates using the more secure SHA-2 algorithm exclusively. Customers running legacy OS versions (Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Server 2008 SP2) will be required to have SHA-2 code signing support installed on their devices by July 2019. Any devices without SHA-2 support will not be offered Windows updates after July 2019. To help prepare you for this change, we will release support for SHA-2 signing in 2019. Windows Server Update Services (WSUS) 3.0 SP2 will receive SHA-2 support to properly deliver SHA-2 signed updates. Please make note of the dates in the migration timeline and plan accordingly. | November 09, 2018 10:00 AM PT |
"
diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview.md b/windows/security/information-protection/bitlocker/bitlocker-overview.md
index 0707268a3a..b57d24fd11 100644
--- a/windows/security/information-protection/bitlocker/bitlocker-overview.md
+++ b/windows/security/information-protection/bitlocker/bitlocker-overview.md
@@ -60,6 +60,9 @@ A computer with a TPM must also have a Trusted Computing Group (TCG)-compliant B
The system BIOS or UEFI firmware (for TPM and non-TPM computers) must support the USB mass storage device class, including reading small files on a USB flash drive in the pre-operating system environment.
+> [!IMPORTANT]
+> From Windows 7, you can encrypt an OS drive without a TPM and USB flash drive. For this procedure, see [Tip of the Day: Bitlocker without TPM or USB](https://blogs.technet.microsoft.com/tip_of_the_day/2014/01/22/tip-of-the-day-bitlocker-without-tpm-or-usb/).
+
> [!NOTE]
> TPM 2.0 is not supported in Legacy and CSM Modes of the BIOS. Devices with TPM 2.0 must have their BIOS mode configured as Native UEFI only. The Legacy and Compatibility Support Module (CSM) options must be disabled. For added security Enable the Secure Boot feature.
diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md
index 76ea17db0e..eaedfb4d15 100644
--- a/windows/security/threat-protection/TOC.md
+++ b/windows/security/threat-protection/TOC.md
@@ -121,7 +121,7 @@
#### [Custom detections]()
##### [Understand custom detection rules](microsoft-defender-atp/overview-custom-detections.md)
-##### [Create custom detections rules](microsoft-defender-atp/custom-detection-rules.md)
+##### [Create and manage custom detections rules](microsoft-defender-atp/custom-detection-rules.md)
### [Management and APIs]()
#### [Overview of management and APIs](microsoft-defender-atp/management-apis.md)
@@ -303,6 +303,7 @@
### [Microsoft Defender Advanced Threat Protection for Mac](windows-defender-antivirus/microsoft-defender-atp-mac.md)
+#### [What's New in Microsoft Defender ATP for Mac](windows-defender-antivirus/microsoft-defender-atp-mac-whatsnew.md)
#### [Deploy Microsoft Defender Advanced Threat Protection for Mac]()
##### [Microsoft Intune-based deployment](windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md)
##### [JAMF-based deployment](windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md)
@@ -455,8 +456,11 @@
##### [Threat protection reports](microsoft-defender-atp/threat-protection-reports.md)
##### [Machine health and compliance reports](microsoft-defender-atp/machine-reports.md)
-#### [Interoperability]()
+#### [Partners & APIs]()
##### [Partner applications](microsoft-defender-atp/partner-applications.md)
+##### [Connected applications](microsoft-defender-atp/connected-applications.md)
+##### [API explorer](microsoft-defender-atp/api-explorer.md)
+
#### [Manage machine configuration]()
##### [Ensure your machines are configured properly](microsoft-defender-atp/configure-machines.md)
diff --git a/windows/security/threat-protection/auditing/event-4624.md b/windows/security/threat-protection/auditing/event-4624.md
index 2ca7e8267c..1eaf9e6b79 100644
--- a/windows/security/threat-protection/auditing/event-4624.md
+++ b/windows/security/threat-protection/auditing/event-4624.md
@@ -33,55 +33,55 @@ This event generates when a logon session is created (on destination machine). I
***Event XML:***
-```
--
--
-
- 4624
- 2
- 0
- 12544
- 0
- 0x8020000000000000
-
- 211
-
-
- Security
- WIN-GG82ULGC9GO
-
-
--
- S-1-5-18
- WIN-GG82ULGC9GO$
- WORKGROUP
- 0x3e7
- S-1-5-21-1377283216-344919071-3415362939-500
- Administrator
- WIN-GG82ULGC9GO
- 0x8dcdc
- 2
- User32
- Negotiate
- WIN-GG82ULGC9GO
- {00000000-0000-0000-0000-000000000000}
- -
- -
- 0
- 0x44c
- C:\\Windows\\System32\\svchost.exe
- 127.0.0.1
- 0
- %%1833
- -
- -
- -
- %%1843
- 0x0
- %%1842
-
-
-
+```xml
+
+
+
+
+ 4624
+ 2
+ 0
+ 12544
+ 0
+ 0x8020000000000000
+
+ 211
+
+
+ Security
+ WIN-GG82ULGC9GO
+
+
+
+ S-1-5-18
+ WIN-GG82ULGC9GO$
+ WORKGROUP
+ 0x3e7
+ S-1-5-21-1377283216-344919071-3415362939-500
+ Administrator
+ WIN-GG82ULGC9GO
+ 0x8dcdc
+ 2
+ User32
+ Negotiate
+ WIN-GG82ULGC9GO
+ {00000000-0000-0000-0000-000000000000}
+ -
+ -
+ 0
+ 0x44c
+ C:\\Windows\\System32\\svchost.exe
+ 127.0.0.1
+ 0
+ %%1833
+ -
+ -
+ -
+ %%1843
+ 0x0
+ %%1842
+
+
```
***Required Server Roles:*** None.
@@ -144,17 +144,17 @@ This event generates when a logon session is created (on destination machine). I
## Logon types and descriptions
-| Logon Type | Logon Title | Description |
-|------------|-------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| 2 | Interactive | A user logged on to this computer. |
-| 3 | Network | A user or computer logged on to this computer from the network. |
-| 4 | Batch | Batch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention. |
-| 5 | Service | A service was started by the Service Control Manager. |
-| 7 | Unlock | This workstation was unlocked. |
-| 8 | NetworkCleartext | A user logged on to this computer from the network. The user's password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext). |
-| 9 | NewCredentials | A caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity, but uses different credentials for other network connections. |
-| 10 | RemoteInteractive | A user logged on to this computer remotely using Terminal Services or Remote Desktop. |
-| 11 | CachedInteractive | A user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials. |
+| Logon Type | Logon Title | Description |
+|:----------:|---------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| `2` | `Interactive` | A user logged on to this computer. |
+| `3` | `Network` | A user or computer logged on to this computer from the network. |
+| `4` | `Batch` | Batch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention. |
+| `5` | `Service` | A service was started by the Service Control Manager. |
+| `7` | `Unlock` | This workstation was unlocked. |
+| `8` | `NetworkCleartext` | A user logged on to this computer from the network. The user's password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext). |
+| `9` | `NewCredentials` | A caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity, but uses different credentials for other network connections. |
+| `10` | `RemoteInteractive` | A user logged on to this computer remotely using Terminal Services or Remote Desktop. |
+| `11` | `CachedInteractive` | A user logged on to this computer with network credentials that were stored locally on the computer. The domain controller was not contacted to verify the credentials. |
- **Restricted Admin Mode** \[Version 2\] \[Type = UnicodeString\]**:** Only populated for **RemoteInteractive** logon type sessions. This is a Yes/No flag indicating if the credentials provided were passed using Restricted Admin mode. Restricted Admin mode was added in Win8.1/2012R2 but this flag was added to the event in Win10.
diff --git a/windows/security/threat-protection/fips-140-validation.md b/windows/security/threat-protection/fips-140-validation.md
index a1ad5ab37c..5f47de9db6 100644
--- a/windows/security/threat-protection/fips-140-validation.md
+++ b/windows/security/threat-protection/fips-140-validation.md
@@ -109,6 +109,7 @@ The following list contains some of the Windows components and Microsoft product
- Some Microsoft .NET Framework Applications (.NET also provides cryptographic algorithm implementations that have not been FIPS 140 validated.)
- BitLocker® Drive Full-volume Encryption
- IPsec Settings of Windows Firewall
+- Server Message Block (SMB) 3.x
## Information for System Integrators
@@ -1290,7 +1291,7 @@ Validated Editions: Ultimate Edition
Algorithms |
-Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enchanced Cryptographic Provider, and Enhanced Cryptographic Provider |
+Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider |
5.0.2150.1 |
76 |
FIPS Approved algorithms: Triple-DES (vendor affirmed); DSA/SHA-1 (Certs. #28 and 29); RSA (vendor affirmed)
@@ -1317,7 +1318,7 @@ Validated Editions: Ultimate Edition
| Algorithms |
-Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enchanced Cryptographic Provider, and Enhanced Cryptographic Provider |
+Base DSS Cryptographic Provider, Base Cryptographic Provider, DSS/Diffie-Hellman Enhanced Cryptographic Provider, and Enhanced Cryptographic Provider |
5.0.1877.6 and 5.0.1877.7 |
75 |
FIPS Approved algorithms: Triple-DES (vendor affirmed); SHA-1 (Certs. #20 and 21); DSA/SHA-1 (Certs. #25 and 26); RSA (vendor- affirmed)
@@ -6219,7 +6220,7 @@ Version 6.3.9600 |
SHA-256 (BYTE-only)
SHA-384 (BYTE-only)
SHA-512 (BYTE-only)
-Windows 7and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1081
+ | Windows 7 and SP1 and Windows Server 2008 R2 and SP1 Symmetric Algorithm Implementation #1081
Windows Server 2003 SP2 Enhanced Cryptographic Provider (RSAENH) #816 |
diff --git a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md
index 9bd0cfef19..792be1c6c8 100644
--- a/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md
+++ b/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests.md
@@ -18,7 +18,7 @@ search.appverid: met150
# Top scoring in industry tests
-Microsoft Defender Advanced Threat Protection ([Microsoft Defender ATP](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=cx-docs-avreports)) technologies consistently achieve high scores in independent tests, demonstrating the strength of its enterprise threat protection capabilities. Microsoft aims to be transparent about these test scores. This page summarizes the results and provides analysis.
+Microsoft Defender Advanced Threat Protection ([Microsoft Defender ATP](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=cx-docs-avreports)) technologies consistently achieve high scores in independent tests, demonstrating the strength of its enterprise threat protection capabilities. Microsoft aims to be transparent about these test scores. This page summarizes the results and provides analysis.
## Next generation protection
@@ -96,4 +96,4 @@ It is important to remember that Microsoft sees a wider and broader set of threa
The capabilities within [Microsoft Defender ATP](https://www.microsoft.com/windowsforbusiness?ocid=cx-docs-avreports) provide [additional layers of protection](https://cloudblogs.microsoft.com/microsoftsecure/2017/12/11/detonating-a-bad-rabbit-windows-defender-antivirus-and-layered-machine-learning-defenses?ocid=cx-docs-avreports) that are not factored into industry antivirus tests, and address some of the latest and most sophisticated threats. Isolating AV from the rest of Microsoft Defender ATP creates a partial picture of how our security stack operates in the real world. For example, attack surface reduction and endpoint detection & response capabilities can help prevent malware from getting onto devices in the first place. We have proven that [Microsoft Defender ATP components catch samples](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2ouJA?ocid=cx-docs-avreports) that Windows Defender Antivirus missed in these industry tests, which is more representative of how effectively our security suite protects customers in the real world.
-Using independent tests, customers can view one aspect of their security suite but can't assess the complete protection of all the security features. Microsoft is highly engaged in working with several independent testers to evolve security testing to focus on the end-to-end security stack. In the meantime, customers can evaluate Microsoft Defender Advanced Threat Protection in their own networks by signing up for a [90-day trial of Microsoft Defender ATP](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=cx-docs-avreports), or [enabling Preview features on existing tenants](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection?ocid=cx-docs-avreports).
+Using independent tests, customers can view one aspect of their security suite but can't assess the complete protection of all the security features. Microsoft is highly engaged in working with several independent testers to evolve security testing to focus on the end-to-end security stack. In the meantime, customers can evaluate Microsoft Defender Advanced Threat Protection in their own networks by signing up for a [90-day trial of Microsoft Defender ATP](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=cx-docs-avreports), or [enabling Preview features on existing tenants](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-settings-windows-defender-advanced-threat-protection?ocid=cx-docs-avreports).
diff --git a/windows/security/threat-protection/intelligence/understanding-malware.md b/windows/security/threat-protection/intelligence/understanding-malware.md
index 2486a1e427..c28ab7c0e4 100644
--- a/windows/security/threat-protection/intelligence/understanding-malware.md
+++ b/windows/security/threat-protection/intelligence/understanding-malware.md
@@ -21,7 +21,7 @@ Malware is a term used to describe malicious applications and code that can caus
Cybercriminals that distribute malware are often motivated by money and will use infected computers to launch attacks, obtain banking credentials, collect information that can be sold, sell access to computing resources, or extort payment from victims.
-As criminals become more sophisticated with their attacks, Microsoft is here to help. Windows 10 is the most secure version of Windows yet and includes many features to help protect you whether you're at home, at work, or on the go. With Microsoft Defender Advanced Threat Protection ([Microsoft Defender ATP](https://www.microsoft.com/WindowsForBusiness/windows-atp)), businesses can stay protected with next-generation protection and other security capabilities.
+As criminals become more sophisticated with their attacks, Microsoft is here to help. Windows 10 is the most secure version of Windows yet and includes many features to help protect you whether you're at home, at work, or on the go. With Microsoft Defender Advanced Threat Protection ([Microsoft Defender ATP](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp)), businesses can stay protected with next-generation protection and other security capabilities.
For good general tips, check out the [prevent malware infection](prevent-malware-infection.md) topic.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md
index 55e9157bfa..85ea675b5d 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md
@@ -22,7 +22,7 @@ ms.topic: article
**Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedfeats-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedfeats-abovefoldlink)
Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Microsoft Defender ATP with.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-alertevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-alertevents-table.md
index 11138ccab3..e8fd745ba1 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-alertevents-table.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-alertevents-table.md
@@ -24,7 +24,7 @@ ms.date: 07/24/2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
The AlertEvents table in the Advanced hunting schema contains information about alerts on Microsoft Defender Security Center. Use this reference to construct queries that return information from the table.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md
index 918e31047d..75465b34a5 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-best-practices.md
@@ -24,7 +24,7 @@ ms.date: 04/24/2018
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-bestpractices-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-bestpractices-abovefoldlink)
## Performance best practices
The following best practices serve as a guideline of query performance best practices and for you to get faster results and be able to run complex queries.
@@ -93,4 +93,4 @@ ProcessCreationEvents
| where CanonicalCommandLine contains "stop" and CanonicalCommandLine contains "MpsSvc"
```
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-bestpractices-belowfoldlink)
\ No newline at end of file
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-bestpractices-belowfoldlink)
\ No newline at end of file
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-filecreationevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-filecreationevents-table.md
index 2f8d8b5394..2b414ee047 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-filecreationevents-table.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-filecreationevents-table.md
@@ -24,7 +24,7 @@ ms.date: 07/24/2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
The FileCreationEvents table in the Advanced hunting schema contains information about file creation, modification, and other file system events. Use this reference to construct queries that return information from the table.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-imageloadevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-imageloadevents-table.md
index aabe8804ca..160e833850 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-imageloadevents-table.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-imageloadevents-table.md
@@ -24,7 +24,7 @@ ms.date: 07/24/2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
The ImageLoadEvents table in the Advanced hunting schema contains information about DLL loading events. Use this reference to construct queries that return information from the table.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-logonevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-logonevents-table.md
index 90d2fe815e..c5279cdd3d 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-logonevents-table.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-logonevents-table.md
@@ -24,7 +24,7 @@ ms.date: 07/24/2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
The LogonEvents table in the Advanced hunting schema contains information about user logons and other authentication events. Use this reference to construct queries that return information from the table.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-machineinfo-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-machineinfo-table.md
index 5ac8eced92..abe7b49af5 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-machineinfo-table.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-machineinfo-table.md
@@ -24,7 +24,7 @@ ms.date: 07/24/2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
The MachineInfo table in the Advanced hunting schema contains information about machines in the organization, including OS version, active users, and computer name. Use this reference to construct queries that return information from the table.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-machinenetworkinfo-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-machinenetworkinfo-table.md
index cb1ff3f42a..717019c475 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-machinenetworkinfo-table.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-machinenetworkinfo-table.md
@@ -24,7 +24,7 @@ ms.date: 07/24/2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
The MachineNetworkInfo table in the Advanced hunting schema contains information about networking configuration of machines, including network adapters, IP and MAC addresses, and connected networks or domains. Use this reference to construct queries that return information from the table.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-miscevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-miscevents-table.md
index 34eb98af98..deeef6fd8a 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-miscevents-table.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-miscevents-table.md
@@ -24,7 +24,7 @@ ms.date: 07/24/2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
The MiscEvents table in the Advanced hunting schema contains information about multiple event types, including events triggered by security controls, such as Windows Defender Antivirus and exploit protection. Use this reference to construct queries that return information from the table.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-networkcommunicationevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-networkcommunicationevents-table.md
index 29cce6edf3..9427ce74c8 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-networkcommunicationevents-table.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-networkcommunicationevents-table.md
@@ -24,7 +24,7 @@ ms.date: 07/24/2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
The NetworkCommunicationEvents table in the Advanced hunting schema contains information about network connections and related events. Use this reference to construct queries that return information from the table.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-processcreationevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-processcreationevents-table.md
index ff4bcab4b7..43a0651a0f 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-processcreationevents-table.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-processcreationevents-table.md
@@ -24,7 +24,7 @@ ms.date: 07/24/2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
The ProcessCreationEvents table in the Advanced hunting schema contains information about process creation and related events. Use this reference to construct queries that return information from the table.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md
index a0d1dd41a1..140286d974 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-reference.md
@@ -24,7 +24,7 @@ ms.date: 07/24/2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
## Advanced hunting table reference
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-registryevents-table.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-registryevents-table.md
index dcf2cf5422..3099373d13 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-registryevents-table.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-registryevents-table.md
@@ -24,7 +24,7 @@ ms.date: 07/24/2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
The RegistryEvents table in the Advanced hunting schema contains information about the creation and modification of registry entries. Use this reference to construct queries that return information from the table.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md
index 7c51f049ba..9ce09a700b 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting.md
@@ -20,7 +20,7 @@ ms.date: 08/15/2018
# Query data using Advanced hunting in Microsoft Defender ATP
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink)
To get you started in querying your data, you can use the Basic or Advanced query examples, which have some preloaded queries to help you understand the basic query syntax.
@@ -146,7 +146,7 @@ The filter selections will resolve as an additional query term and the results w
Check out the [Advanced hunting repository](https://github.com/Microsoft/WindowsDefenderATP-Hunting-Queries). Contribute and use example queries shared by our customers.
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhunting-belowfoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-belowfoldlink)
## Related topic
- [Advanced hunting reference](advanced-hunting-reference.md)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md
index fe3c249332..9d9bea3f59 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md
@@ -23,7 +23,7 @@ ms.date: 04/24/2018
**Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-alertsq-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-alertsq-abovefoldlink)
The **Alerts queue** shows a list of alerts that were flagged from machines in your network. By default, the queue displays alerts seen in the last 30 days in a grouped view, with the most recent alerts showing at the top of the list, helping you see the most recent alerts first.
@@ -84,9 +84,10 @@ The table below lists the current categories and how they generally map to previ
| Persistence | Installation, Persistence | Creating autostart extensibility points (ASEPs) to remain active and survive system restarts |
| Privilege escalation | PrivilegeEscalation | Obtaining higher permission levels for code by running it in the context of a privileged process or account |
| Ransomware | Ransomware | Malware that encrypts files and extorts payment to restore access |
-| Suspicious activity | General, None, NotApplicable, EnterprisePolicy, SuspiciousNetworkTraffic | Atypicaly activity that could be malware activity or part of an attack |
+| Suspicious activity | General, None, NotApplicable, EnterprisePolicy, SuspiciousNetworkTraffic | Atypical activity that could be malware activity or part of an attack |
| Unwanted software | UnwantedSoftware | Low-reputation apps and apps that impact productivity and the user experience; detected as potentially unwanted applications (PUAs) |
+
### Status
You can choose to limit the list of alerts based on their status.
@@ -115,6 +116,11 @@ If you have specific machine groups that you're interested in checking the alert
### Associated threat
Use this filter to focus on alerts that are related to high profile threats. You can see the full list of high-profile threats in [Threat analytics](threat-analytics.md).
+
+
+
+
+
## Related topics
- [Manage Microsoft Defender Advanced Threat Protection alerts](manage-alerts.md)
- [Investigate Microsoft Defender Advanced Threat Protection alerts](investigate-alerts.md)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md
new file mode 100644
index 0000000000..010fb7a43b
--- /dev/null
+++ b/windows/security/threat-protection/microsoft-defender-atp/api-explorer.md
@@ -0,0 +1,61 @@
+---
+title: API Explorer in Microsoft Defender ATP
+ms.reviewer:
+description: Use the API Explorer to construct and perform API queries, test and send requests for any available API
+keywords: api, explorer, send, request, get, post,
+search.product: eADQiWindows 10XVcnh
+search.appverid: met150
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+ms.author: macapara
+author: mjcaparas
+ms.localizationpriority: medium
+manager: dansimp
+audience: ITPro
+ms.collection: M365-security-compliance
+ms.topic: conceptual
+---
+
+# API Explorer
+**Applies to:**
+- [Microsoft Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
+
+[!include[Prerelease information](prerelease.md)]
+
+The Microsoft Defender ATP API Explorer is a tool that helps you explore various Microsoft Defender ATP APIs interactively.
+
+The API Explorer makes it easy to construct and perform API queries, test and send requests for any available Microsoft Defender ATP API endpoint. You can also use the API Explorer to perform actions or find data that might not yet be available through the user interface.
+
+The tool is useful during app development because it allows you to perform API queries that respect your user access settings, reducing the need to generate access tokens.
+
+You can also use the tool to explore the gallery of sample queries, copy result code samples, and generate debug information.
+
+With the API Explorer, you can:
+
+- Run requests for any method and see responses in real-time
+- Quickly browse through the API samples and learn what parameters they support
+- Make API calls with ease; no need to authenticate beyond the management portal sign-in
+
+## Access API Explorer
+From the left navigation menu, select **Partners & APIs** > **API Explorer**.
+
+## Supported APIs
+API Explorer supports all the APIs offered by Microsoft Defender ATP.
+
+The list of supported APIs is available in the [APIs documentation](apis-intro.md).
+
+## Get started with the API Explorer
+1. In the left pane, there is a list of sample requests that you can use.
+2. Follow the links and click **Run query**.
+
+Some of the samples may require specifying a parameter in the URL, for example, {machine- id}.
+
+## FAQ
+**Do I need to have an API token to use the API Explorer?**
+Credentials to access an API are not needed since the API Explorer uses the Microsoft Defender ATP management portal token whenever it makes a request.
+
+The logged-in user authentication credential is used to verify that the API Explorer is authorized to access data on your behalf.
+
+Specific API requests are limited based on your RBAC privileges; for example, a request to "Submit indicator" is limited to the security admin role.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md
index b4aec2ce09..82dfc632fd 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/api-hello-world.md
@@ -21,7 +21,7 @@ ms.topic: article
**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
-- Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
+- Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
## Get Alerts using a simple PowerShell script
diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md
index 4af26a7805..03274e47b8 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md
@@ -21,7 +21,7 @@ ms.topic: article
**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
-- Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
+- Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
Automating security procedures is a standard requirement for every modern Security Operations Center. The lack of professional Cyber defenders, forces SOC to work in the most efficient way and automation is a must. MS flow supports different connectors that were built exactly for that. You can build an end-to-end procedure automation within few minutes.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md
index 979340a3ca..3b57273926 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md
@@ -23,7 +23,7 @@ ms.topic: article
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-apiportalmapping-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-apiportalmapping-abovefoldlink)
Understand what data fields are exposed as part of the detections API and how they map to Microsoft Defender Security Center.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md
index 4c582017dc..2eaa43daee 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/api-power-bi.md
@@ -21,7 +21,7 @@ ms.topic: article
**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
-- Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
+- Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
In this section you will learn create a Power BI report on top of Microsoft Defender ATP APIs.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md
index 84db47e022..425ad57ee8 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/apis-intro.md
@@ -22,7 +22,7 @@ ms.topic: conceptual
**Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
-> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
+> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Microsoft Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
diff --git a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md
index 0924219800..4329883752 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/assign-portal-access.md
@@ -25,7 +25,7 @@ ms.date: 11/28/2018
- Office 365
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-assignaccess-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink)
Microsoft Defender ATP supports two ways to manage permissions:
diff --git a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md
index f39d0ddd2f..ce50cf47b1 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/attack-simulations.md
@@ -24,7 +24,7 @@ ms.date: 11/20/2018
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-attacksimulations-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-attacksimulations-abovefoldlink)
>[!TIP]
>- Learn about the latest enhancements in Microsoft Defender ATP: [What's new in Microsoft Defender ATP](https://cloudblogs.microsoft.com/microsoftsecure/2018/11/15/whats-new-in-windows-defender-atp/).
@@ -58,7 +58,7 @@ Read the walkthrough document provided with each attack scenario. Each document
> Simulation files or scripts mimic attack activity but are actually benign and will not harm or compromise the test machine.
>
>
-> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-attacksimulations-belowfoldlink)
+> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-attacksimulations-belowfoldlink)
## Related topics
diff --git a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md
index 0d2841c46b..00a8b85828 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md
@@ -19,7 +19,7 @@ ms.topic: conceptual
# Overview of Automated investigations
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automated-investigations-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-automated-investigations-abovefoldlink)
The Microsoft Defender ATP service has a wide breadth of visibility on multiple machines. With this kind of optics, the service generates a multitude of alerts. The volume of alerts generated can be challenging for a typical security operations team to individually address.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md
index 6cad0006a9..b735ec5aa0 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/basic-permissions.md
@@ -23,7 +23,7 @@ ms.topic: article
- Azure Active Directory
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-basicaccess-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-basicaccess-abovefoldlink)
Refer to the instructions below to use basic permissions management.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md
index 6fcd846c60..3666eb4a2a 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/check-sensor-status.md
@@ -23,7 +23,7 @@ ms.date: 04/24/2018
**Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-checksensor-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-checksensor-abovefoldlink)
The sensor health tile is found on the Security Operations dashboard. This tile provides information on the individual machine’s ability to provide sensor data and communicate with the Microsoft Defender ATP service. It reports how many machines require attention and helps you identify problematic machines and take action to correct known issues.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md b/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md
index eb36f604f9..9049705849 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/conditional-access.md
@@ -24,7 +24,7 @@ ms.topic: article
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-conditionalaccess-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-conditionalaccess-abovefoldlink)
Conditional Access is a capability that helps you better protect your users and enterprise information by making sure that only secure devices have access to applications.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md b/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md
index f6f11da946..fac075a33c 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md
@@ -52,6 +52,19 @@ The goal is to remediate the issues in the security recommendations list to impr
See how you can [improve your security configuration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios#improve-your-security-configuration), for details.
+>[!IMPORTANT]
+>To boost your vulnerability assessment detection rates, you can download the following set of optional security updates and deploy them in your network:
+>- 19H1 customers | [KB 4512941](https://support.microsoft.com/help/4512941/windows-10-update-kb4512941)
+>- RS5 customers | [KB 4516077](https://support.microsoft.com/help/4516077/windows-10-update-kb4516077)
+>- RS4 customers | [KB 4516045](https://support.microsoft.com/help/4516045/windows-10-update-kb4516045)
+>- RS3 customers | [KB 4516071](https://support.microsoft.com/help/4516071/windows-10-update-kb4516071)
+>
+>To download the security updates:
+>1. Go to [Microsoft Update Catalog](http://www.catalog.update.microsoft.com/home.aspx).
+>2. Key-in the security update KB number that you need to download, then click **Search**.
+>
+>Downloading the above-mentioned security updates will be mandatory starting Patch Tuesday, October 8, 2019.
+
## Related topics
- [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md)
- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md
index 65f1d888f8..0b7d271c77 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-arcsight.md
@@ -26,7 +26,7 @@ ms.topic: article
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configurearcsight-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configurearcsight-abovefoldlink)
You'll need to install and configure some files and tools to use HP ArcSight so that it can pull Microsoft Defender ATP detections.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md
index 97cc98af49..944a823a64 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-conditional-access.md
@@ -104,4 +104,4 @@ Take the following steps to enable Conditional Access:
For more information, see [Enable Microsoft Defender ATP with Conditional Access in Intune](https://docs.microsoft.com/intune/advanced-threat-protection).
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-conditionalaccess-belowfoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-conditionalaccess-belowfoldlink)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md
index e0e025ebc9..35c6a3a37d 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md
@@ -23,7 +23,7 @@ ms.topic: article
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-emailconfig-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-emailconfig-abovefoldlink)
You can configure Microsoft Defender ATP to send email notifications to specified recipients for new alerts. This feature enables you to identify a group of individuals who will immediately be informed and can act on alerts based on their severity.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md
index 914b140411..fafeee5fd2 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp.md
@@ -29,7 +29,7 @@ ms.date: 04/24/2018
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsgp-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configureendpointsgp-abovefoldlink)
> [!NOTE]
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md
index 9710f0d825..cc02d11893 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-mdm.md
@@ -25,7 +25,7 @@ ms.date: 12/06/2018
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsmdm-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configureendpointsmdm-abovefoldlink)
You can use mobile device management (MDM) solutions to configure machines. Microsoft Defender ATP supports MDMs by providing OMA-URIs to create policies to manage machines.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md
index b5ebde69de..dec845f1d0 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-non-windows.md
@@ -1,6 +1,6 @@
---
title: Onboard non-Windows machines to the Microsoft Defender ATP service
-description: Configure non-Winodws machines so that they can send sensor data to the Microsoft Defender ATP service.
+description: Configure non-Windows machines so that they can send sensor data to the Microsoft Defender ATP service.
keywords: onboard non-Windows machines, macos, linux, machine management, configure Windows ATP machines, configure Microsoft Defender Advanced Threat Protection machines
search.product: eADQiWindows 10XVcnh
search.appverid: met150
@@ -8,6 +8,7 @@ ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
+ms.author: macapara
author: mjcaparas
ms.localizationpriority: medium
manager: dansimp
@@ -24,16 +25,12 @@ ms.topic: article
- Linux
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-nonwindows-abovefoldlink)
-
-
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-nonwindows-abovefoldlink)
Microsoft Defender ATP provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Microsoft Defender Security Center and better protect your organization's network.
You'll need to know the exact Linux distros and macOS versions that are compatible with Microsoft Defender ATP for the integration to work.
-
-
## Onboarding non-Windows machines
You'll need to take the following steps to onboard non-Windows machines:
1. Select your preferred method of onboarding:
@@ -67,4 +64,4 @@ You'll need to take the following steps to onboard non-Windows machines:
- [Onboard Windows 10 machines](configure-endpoints.md)
- [Onboard servers](configure-server-endpoints.md)
- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md)
-- [Troubleshooting Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md)
\ No newline at end of file
+- [Troubleshooting Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md
index ab167bc4fd..60b3f33af2 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm.md
@@ -28,7 +28,7 @@ ms.date: 12/11/2018
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointssccm-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configureendpointssccm-abovefoldlink)
## Onboard Windows 10 machines using System Center Configuration Manager (current branch) version 1606
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md
index 6c658e6d81..f290c1d7b3 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-script.md
@@ -27,7 +27,7 @@ ms.topic: article
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
You can also manually onboard individual machines to Microsoft Defender ATP. You might want to do this first when testing the service before you commit to onboarding all machines in your network.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md
index 19a1f29ebd..b268c9db63 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md
@@ -25,7 +25,7 @@ ms.date: 04/24/2018
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configvdi-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configvdi-abovefoldlink)
## Onboard non-persistent virtual desktop infrastructure (VDI) machines
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md
index f7fccc3f2b..bff2f62710 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints.md
@@ -45,4 +45,4 @@ Topic | Description
[Onboard non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi.md) | Learn how to use the configuration package to configure VDI machines.
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpoints-belowfoldlink)
\ No newline at end of file
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configureendpoints-belowfoldlink)
\ No newline at end of file
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md
index bd168aac8b..3974d3dc84 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-onboarding.md
@@ -22,7 +22,7 @@ ms.topic: article
**Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
Each onboarded machine adds an additional endpoint detection and response (EDR) sensor and increases visibility over breach activity in your network. Onboarding also ensures that a machine can be checked for vulnerable components as well security configuration issues and can receive critical remediation actions during attacks.
@@ -59,7 +59,7 @@ From the device compliance page, create a configuration profile specifically for
For more information, [read about using Intune device configuration profiles to onboard machines to Microsoft Defender ATP](https://docs.microsoft.com/en-us/intune/advanced-threat-protection#onboard-devices-by-using-a-configuration-profile).
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
# Related topics
- [Ensure your machines are configured properly](configure-machines.md)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md
index 90713b48a1..c51725fb99 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md
@@ -22,7 +22,7 @@ ms.topic: article
**Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
Security baselines ensure that security features are configured according to guidance from both security experts and expert Windows system administrators. When deployed, the Microsoft Defender ATP security baseline sets Microsoft Defender ATP security controls to provide optimal protection.
@@ -95,7 +95,7 @@ Machine configuration management monitors baseline compliance only of Windows 10
>[!TIP]
>Security baselines on Intune provide a convenient way to comprehensively secure and protect your machines. [Learn more about security baselines on Intune](https://docs.microsoft.com/intune/security-baselines).
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
# Related topics
- [Ensure your machines are configured properly](configure-machines.md)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md
index 3c6d45957a..463aa8e967 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines.md
@@ -22,7 +22,7 @@ ms.topic: conceptual
**Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-abovefoldlink)
With properly configured machines, you can boost overall resilience against threats and enhance your capability to detect and respond to attacks. Security configuration management helps ensure that your machines:
@@ -76,4 +76,4 @@ Topic | Description
[Increase compliance to the Microsoft Defender ATP security baseline](configure-machines-security-baseline.md) | Track baseline compliance and noncompliance. Deploy the security baseline to more Intune-managed machines.
[Optimize ASR rule deployment and detections](configure-machines-asr.md) | Review rule deployment and tweak detections using impact analysis tools in Microsoft 365 security center.
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
\ No newline at end of file
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
\ No newline at end of file
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md
index 7738dedb9f..33c9d7d4d1 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md
@@ -26,7 +26,7 @@ ms.date: 09/03/2018
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-mssp-support-abovefoldlink)
+>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-mssp-support-abovefoldlink)
[!include[Prerelease information](prerelease.md)]
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md
index 3ba4e51fda..5830eaa9af 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md
@@ -109,7 +109,7 @@ If a proxy or firewall is blocking all traffic by default and allowing only spec
Service location | Microsoft.com DNS record
-|-
-Common URLs for all locations | ```*.blob.core.windows.net``` ```crl.microsoft.com``` ```ctldl.windowsupdate.com``` ```events.data.microsoft.com``` ```notify.windows.com```
+Common URLs for all locations | ```*.blob.core.windows.net``` ```crl.microsoft.com``` ```ctldl.windowsupdate.com``` ```events.data.microsoft.com``` ```notify.windows.com``` ```settings-win.data.microsoft.com ```
European Union | ```eu.vortex-win.data.microsoft.com``` ```eu-v20.events.data.microsoft.com``` ```winatp-gw-neu.microsoft.com``` ```winatp-gw-weu.microsoft.com```
United Kingdom | ```uk.vortex-win.data.microsoft.com``` ```uk-v20.events.data.microsoft.com``` ```winatp-gw-uks.microsoft.com``` ```winatp-gw-ukw.microsoft.com```
United States | ```us.vortex-win.data.microsoft.com``` ```us-v20.events.data.microsoft.com``` ```winatp-gw-cus.microsoft.com``` ```winatp-gw-eus.microsoft.com```
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md
index ec708627ca..7e89edf437 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md
@@ -28,7 +28,7 @@ ms.topic: article
- Windows Server, 2019
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configserver-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configserver-abovefoldlink)
Microsoft Defender ATP extends support to also include the Windows Server operating system, providing advanced attack detection and investigation capabilities, seamlessly through the Microsoft Defender Security Center console.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md
index 44e2fdd28e..521fbb5621 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-siem.md
@@ -24,7 +24,7 @@ ms.date: 10/16/2017
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresiem-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresiem-abovefoldlink)
## Pull detections using security information and events management (SIEM) tools
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md
index fd61b88ec1..fd5efbf9ea 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md
@@ -26,7 +26,7 @@ ms.topic: article
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresplunk-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresplunk-abovefoldlink)
You'll need to configure Splunk so that it can pull Microsoft Defender ATP detections.
@@ -40,19 +40,19 @@ You'll need to configure Splunk so that it can pull Microsoft Defender ATP detec
- Make sure you have enabled the **SIEM integration** feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)
- Have the details file you saved from enabling the **SIEM integration** feature ready. You'll need to get the following values:
- - OAuth 2 Token refresh URL
- - OAuth 2 Client ID
- - OAuth 2 Client secret
+ - Tenant ID
+ - Client ID
+ - Client Secret
+ - Resource URL
-- Have the refresh token that you generated from the SIEM integration feature ready.
## Configure Splunk
1. Login in to Splunk.
-2. Click **Search & Reporting**, then **Settings** > **Data inputs**.
+2. Go to **Settings** > **Data inputs**.
-3. Click **REST** under **Local inputs**.
+3. Select **Windows Defender ATP alerts** under **Local inputs**.
NOTE:
This input will only appear after you install the [Windows Defender ATP Modular Inputs TA](https://splunkbase.splunk.com/app/4128/).
@@ -71,55 +71,30 @@ You'll need to configure Splunk so that it can pull Microsoft Defender ATP detec
Value |
- Endpoint URL |
+ Name |
+ Name for the Data Input |
+
+ Login URL |
+ URL to authenticate the azure app (Default : https://login.microsoftonline.com) |
+
+ Endpoint |
Depending on the location of your datacenter, select any of the following URL: For EU: https://wdatp-alertexporter-eu.securitycenter.windows.com/api/alerts For US:https://wdatp-alertexporter-us.securitycenter.windows.com/api/alerts
For UK:https://wdatp-alertexporter-uk.securitycenter.windows.com/api/alerts
|
- HTTP Method |
- GET |
+ Tenant ID |
+ Azure Tenant ID |
- Authentication Type |
- oauth2 |
+ Resource |
+ Value from the SIEM integration feature page |
- OAuth 2 Access token |
- Use the value that you generated when you enabled the SIEM integration feature. NOTE: The access token expires after an hour. |
+ Client ID |
+ Value from the SIEM integration feature page |
- OAuth 2 Refresh Token |
- Use the value that you generated when you enabled the SIEM integration feature. |
-
-
- OAuth 2 Token Refresh URL |
- Use the value from the details file you saved when you enabled the SIEM integration feature. |
-
-
- OAuth 2 Client ID |
- Use the value from the details file you saved when you enabled the SIEM integration feature. |
-
-
- OAuth 2 Client Secret |
- Use the value from the details file you saved when you enabled the SIEM integration feature. |
-
-
- Response type |
- Json |
-
-
- Response Handler |
- JSONArrayHandler |
-
-
- Polling Interval |
- Number of seconds that Splunk will ping the Microsoft Defender ATP machine. Accepted values are in seconds. |
-
-
- Set sourcetype |
- Manual |
-
-
- Source type |
- _json |
+ Client Secret |
+ Value from the SIEM integration feature page |
+
@@ -133,20 +108,20 @@ Use the solution explorer to view detections in Splunk.
2. Select **New**.
3. Enter the following details:
- - Destination app: Select Search & Reporting (search)
- - Search name: Enter a name for the query
- Search: Enter a query, for example:
- `source="rest://windows atp alerts"|spath|table*`
+ `sourcetype="wdatp:alerts" |spath|table*`
+ - App: Add-on for Windows Defender (TA_Windows-defender)
Other values are optional and can be left with the default values.
+
4. Click **Save**. The query is saved in the list of searches.
5. Find the query you saved in the list and click **Run**. The results are displayed based on your query.
>[!TIP]
-> To mininimize Detection duplications, you can use the following query:
->```source="rest://windows atp alerts" | spath | dedup _raw | table *```
+> To minimize Detection duplications, you can use the following query:
+>```source="rest://wdatp:alerts" | spath | dedup _raw | table *```
## Related topics
- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md
new file mode 100644
index 0000000000..97adf97d65
--- /dev/null
+++ b/windows/security/threat-protection/microsoft-defender-atp/connected-applications.md
@@ -0,0 +1,45 @@
+---
+title: Connected applications in Microsoft Defender ATP
+ms.reviewer:
+description: View connected partner applications to Microsoft Defender ATP
+keywords: partners, applications, third-party, connections, sentinelone, lookout, bitdefender, corrata, morphisec, paloalto, ziften, better mobile
+search.product: eADQiWindows 10XVcnh
+search.appverid: met150
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+ms.author: macapara
+author: mjcaparas
+ms.localizationpriority: medium
+manager: dansimp
+audience: ITPro
+ms.collection: M365-security-compliance
+ms.topic: conceptual
+---
+
+# Connected applications in Microsoft Defender ATP
+**Applies to:**
+- [Microsoft Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
+
+[!include[Prerelease information](prerelease.md)]
+
+Connected applications integrates with the Microsoft Defender ATP platform using APIs.
+
+Applications use standard OAuth 2.0 protocol to authenticate and provide tokens for use with Microsoft Defender ATP APIs. In addition, Azure Active Directory (Azure AD) applications allow tenant admins to set explicit control over which APIs can be accessed using the corresponding app.
+
+You'll need to follow [these steps](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/apis-intro) to use the APIs with the connected application.
+
+## Access the connected application page
+From the left navigation menu, select **Partners & APIs** > **Connected AAD applications**.
+
+
+## View connected application details
+The Connected applications page provides information about the Azure AD applications connected to Microsoft Defender ATP in your organization. You can review the usage of the connected applications: last seen, number of requests in the past 24 hours, and request trends in the last 30 days.
+
+
+
+## Edit, reconfigure, or delete a connected application
+The **Open application settings** link opens the corresponding Azure AD application management page in the Azure portal. From the Azure portal, you can manage permissions, reconfigure, or delete the connected applications.
+
+
diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md b/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md
index 9561fe831c..0af9f2e7a8 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md
@@ -1,16 +1,16 @@
---
-title: Create custom detection rules in Microsoft Defender ATP
+title: Create and manage custom detection rules in Microsoft Defender ATP
ms.reviewer:
-description: Learn how to create custom detections rules based on advanced hunting queries
-keywords: create custom detections, detections, advanced hunting, hunt, detect, query
+description: Learn how to create and manage custom detections rules based on advanced hunting queries
+keywords: custom detections, create, manage, alerts, edit, run on demand, frequency, interval, detection rules, advanced hunting, hunt, query, response actions, mdatp, microsoft defender atp
search.product: eADQiWindows 10XVcnh
search.appverid: met150
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
-ms.author: macapara
-author: mjcaparas
+ms.author: lomayor
+author: lomayor
ms.localizationpriority: medium
manager: dansimp
audience: ITPro
@@ -19,53 +19,86 @@ ms.topic: article
---
-# Create custom detections rules
+# Create and manage custom detections rules
**Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
-Create custom detection rules from [Advanced hunting](overview-hunting.md) queries to automatically check for threat indicators and generate alerts whenever these indicators are found.
+Custom detection rules built from [Advanced hunting](overview-hunting.md) queries let you proactively monitor various events and system states, including suspected breach activity and misconfigured machines. The queries run every 24 hours, generating alerts and taking response actions whenever there are matches.
>[!NOTE]
->To create and manage custom detections, [your role](user-roles.md#create-roles-and-assign-the-role-to-an-azure-active-directory-group) needs to have the **manage security settings** permission. For the detection rule to work properly and create alerts, the query must return in each row a set of MachineId, ReportId, EventTime which match to an actual event in advanced hunting.
+>To create and manage custom detections, [your role](user-roles.md#create-roles-and-assign-the-role-to-an-azure-active-directory-group) needs to have the **manage security settings** permission.
-1. In the navigation pane, select **Advanced hunting**.
+## Create a custom detection rule
+### 1. Prepare the query.
-2. Select an existing query that you'd like to base the monitor on or create a new query.
+In Microsoft Defender Security Center, go to **Advanced hunting** and select an existing query or create a new query. When using an new query, run the query to identify errors and understand possible results.
-3. Select **Create detection rule**.
+>[!NOTE]
+>To use a query for a custom detection rule, the query must return the `EventTime`, `MachineId`, and `ReportId` columns in the results. Queries that don’t use the `project` operator to customize results usually return these common columns.
-4. Specify the alert details:
+### 2. Create new rule and provide alert details.
- - Alert title
- - Severity
- - Category
- - Description
- - Recommended actions
+With the query in the query editor, select **Create detection rule** and specify the following alert details:
-5. Click **Create**.
+- **Alert title**
+- **Severity**
+- **Category**
+- **Description**
+- **Recommended actions**
-> [!TIP]
-> TIP #1: Running the query for the first time before saving it can help you find any mistakes or errors and give you a preview of the data you can expect to be returned.
-> When a new detection rule is created, it will run for the first time (it might take a few minutes) and raise any alerts created by this rule. After that, the rule will automatically run every 24 hours.
-> TIP #2: Since the detection automatically runs every 24 hours, it's best to query data in the last 24 hours.
+For more information about these alert details, [read about managing alerts](manage-alerts.md).
+
+### 3. Specify actions on files or machines.
+Your custom detection rule can automatically take actions on files or machines that are returned by the query.
+
+#### Actions on machines
+These actions are applied to machines in the `MachineId` column of the query results:
+- **Isolate machine** — applies full network isolation, preventing the machine from connecting to any application or service, except for the Microsoft Defender ATP service. [Learn more about machine isolation](respond-machine-alerts.md#isolate-machines-from-the-network)
+- **Collect investigation package** — collects machine information in a ZIP file. [Learn more about the investigation package](respond-machine-alerts.md#collect-investigation-package-from-machines)
+- **Run antivirus scan** — performs a full Windows Defender Antivirus scan on the machine
+- **Initiate investigation** — initiates an [automated investigation](automated-investigations.md) on the machine
+
+#### Actions on files
+These actions are applied to files in the `SHA1` or the `InitiatingProcessSHA1` column of the query results:
+- **Allow/Block** — automatically adds the file to your [custom indicator list](manage-indicators.md) so that it is always allowed to run or blocked from running. You can set the scope of this action so that it is taken only on selected machine groups. This scope is independent of the scope of the rule.
+- **Quarantine file** — deletes the file from its current location and places a copy in quarantine
+
+### 4. Click **Create** to save and turn on the rule.
+When saved, the custom detection rule immediately runs. It runs again every 24 hours to check for matches, generate alerts, and take response actions.
## Manage existing custom detection rules
-View existing rules in your network, see the last results of each rule, navigate to view all alerts that were created by each rule. You can also modify existing rules.
+In **Settings** > **Custom detections**, you can view the list of existing custom detection rules, check their previous runs, and review the alerts they have triggered. You can also run a rule on demand and modify it.
-1. In the navigation pane, select **Settings** > **Custom detections**. You'll see all the detections created in the system.
+### View existing rules
-2. Select one of the rules to take any of the following actions:
- - Open related alerts - See all the alerts that were raised based to this rule
- - Run - Run the selected detection immediately.
+To view all existing custom detection rules, navigate to **Settings** > **Custom detections**. The page lists all the rules with the following run information:
- > [!NOTE]
- > The next run for the query will be in 24 hours after the last run.
-
- - Edit - Modify the settings of the rule.
- - Modify query - View and edit the query itself.
- - Turn off - Stop the query from running.
- - Delete
+- **Last run** — when a rule was last run to check for query matches and generate alerts
+- **Last run status** — whether a rule ran successfully
+- **Next run** — the next scheduled run
+- **Status** — whether a rule has been turned on or off
+### View rule details, modify rule, and run rule
+
+To view comprehensive information about a custom detection rule, select the name of rule from the list of rules in **Settings** > **Custom detections**. This opens a page about the custom detection rule with the following information:
+
+- General information about the rule, including the details of the alert, run status, and scope
+- List of triggered alerts
+- List of triggered actions
+
+
+*Custom detection rule page*
+
+You can also take the following actions on the rule from this page:
+
+- **Run** — run the rule immediately. This also resets the interval for the next run.
+- **Edit** — modify the rule without changing the query
+- **Modify query** — edit the query in Advanced hunting
+- **Turn on** / **Turn off** — enable the rule or stop it from running
+- **Delete** — turn off the rule and remove it
+
+>[!TIP]
+>To quickly view information and take action on an item in a table, use the selection column [✓] at the left of the table.
## Related topic
- [Custom detections overview](overview-custom-detections.md)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md b/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md
index 0a42682bb7..90dbd0efc5 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/custom-ti-api.md
@@ -25,7 +25,7 @@ ms.topic: article
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-customti-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-customti-abovefoldlink)
You can define custom alert definitions and indicators of compromise (IOC) using the threat intelligence API. Creating custom threat intelligence alerts allows you to generate specific alerts that are applicable to your organization.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md
index 0a4d585b53..1c3591492a 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md
@@ -26,7 +26,7 @@ ms.date: 04/24/2018
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-gensettings-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-gensettings-abovefoldlink)
During the onboarding process, a wizard takes you through the general settings of Microsoft Defender ATP. After onboarding, you might want to update the data retention settings.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md
index a16de0a429..f59264a083 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.md
@@ -92,4 +92,4 @@ By providing customers with compliant, independently-verified services, Microsof
For more information on the Microsoft Defender ATP ISO certification reports, see [Microsoft Trust Center](https://www.microsoft.com/trustcenter/compliance/iso-iec-27001).
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-datastorage-belowfoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-datastorage-belowfoldlink)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md
index 42ef196d91..a8b1269d9c 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/defender-compatibility.md
@@ -28,7 +28,7 @@ ms.date: 04/24/2018
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-defendercompat-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-defendercompat-abovefoldlink)
The Microsoft Defender Advanced Threat Protection agent depends on Windows Defender Antivirus for some capabilities such as file scanning.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md
index 3fbbd36ff6..f27473d081 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration.md
@@ -23,7 +23,7 @@ ms.topic: article
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-enablesiem-abovefoldlink)
+>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink)
Enable security information and event management (SIEM) integration so you can pull detections from Microsoft Defender Security Center using your SIEM solution or by connecting directly to the detections REST API.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md b/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md
index ee4f4e583c..2278aa052c 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/evaluate-atp.md
@@ -22,7 +22,7 @@ ms.topic: conceptual
[Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) is a unified platform for preventative protection, post-breach detection, automated investigation, and response.
-You can evaluate Microsoft Defender Advanced Threat Protection in your organization by [starting your free trial](https://www.microsoft.com/WindowsForBusiness/windows-atp).
+You can evaluate Microsoft Defender Advanced Threat Protection in your organization by [starting your free trial](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp).
You can also evaluate the different security capabilities in Microsoft Defender ATP by using the following instructions.
diff --git a/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md
index 0875478e90..2fe02c746b 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/event-error-codes.md
@@ -342,7 +342,7 @@ See { URL = "file:///Library/StagedExtensions/Library/Extensions/wdavkext.kext/", ID = "com.microsoft.wdavkext" }
Diagnostics for /Library/Extensions/wdavkext.kext:
@@ -125,13 +125,13 @@ In this case, you need to perform the following steps to enable Real-Time Protec
4. In Terminal, install the driver again. This time the operation will succeed:
```bash
-sudo kextutil /Library/Extensions/wdavkext.kext
+$ sudo kextutil /Library/Extensions/wdavkext.kext
```
The banner should disappear from the Defender application, and ```mdatp --health``` should now report that Real-Time Protection is both enabled and available:
```bash
-mdatp --health
+$ mdatp --health
...
realTimeProtectionAvailable : true
realTimeProtectionEnabled : true
@@ -145,20 +145,20 @@ realTimeProtectionEnabled : true
The client machine is not associated with orgId. Note that the *orgId* attribute is blank.
```bash
- mdatp --health orgId
+ $ mdatp --health orgId
```
2. Run the Python script to install the configuration file:
```bash
- /usr/bin/python WindowsDefenderATPOnboarding.py
+ $ /usr/bin/python WindowsDefenderATPOnboarding.py
Generating /Library/Application Support/Microsoft/Defender/com.microsoft.wdav.atp.plist ... (You may be required to enter sudos password)
```
3. Verify that the machine is now associated with your organization and reports a valid *orgId*:
```bash
- mdatp --health orgId
+ $ mdatp --health orgId
E6875323-A6C0-4C60-87AD-114BBE7439B8
```
diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md
index 21be43c179..1abf3471f5 100644
--- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md
+++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md
@@ -50,28 +50,29 @@ Download the installation and onboarding packages from Microsoft Defender Securi
Extract the contents of the .zip files:
```bash
- mavel-macmini:Downloads test$ ls -l
+ $ ls -l
total 721688
-rw-r--r-- 1 test staff 269280 Mar 15 11:25 IntuneAppUtil
-rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip
-rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg
- mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip
+ $ unzip WindowsDefenderATPOnboardingPackage.zip
Archive: WindowsDefenderATPOnboardingPackage.zip
warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
inflating: intune/kext.xml
inflating: intune/WindowsDefenderATPOnboarding.xml
inflating: jamf/WindowsDefenderATPOnboarding.plist
- mavel-macmini:Downloads test$
```
7. Make IntuneAppUtil an executable:
- ```mavel-macmini:Downloads test$ chmod +x IntuneAppUtil```
+ ```bash
+ $ chmod +x IntuneAppUtil
+ ```
8. Create the wdav.pkg.intunemac package from wdav.pkg:
```bash
- mavel-macmini:Downloads test$ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0"
+ $ ./IntuneAppUtil -c wdav.pkg -o . -i "com.microsoft.wdav" -n "1.0.0"
Microsoft Intune Application Utility for Mac OS X
Version: 1.0.0.0
Copyright 2018 Microsoft Corporation
diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md
index 9a52b56369..621dee60a6 100644
--- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md
+++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md
@@ -51,17 +51,16 @@ Download the installation and onboarding packages from Windows Defender Security
5. From the command prompt, verify that you have the two files. Extract the contents of the .zip files like so:
```bash
- mavel-macmini:Downloads test$ ls -l
+ $ ls -l
total 721160
-rw-r--r-- 1 test staff 11821 Mar 15 09:23 WindowsDefenderATPOnboardingPackage.zip
-rw-r--r-- 1 test staff 354531845 Mar 13 08:57 wdav.pkg
- mavel-macmini:Downloads test$ unzip WindowsDefenderATPOnboardingPackage.zip
+ $ unzip WindowsDefenderATPOnboardingPackage.zip
Archive: WindowsDefenderATPOnboardingPackage.zip
warning: WindowsDefenderATPOnboardingPackage.zip appears to use backslashes as path separators
inflating: intune/kext.xml
inflating: intune/WindowsDefenderATPOnboarding.xml
inflating: jamf/WindowsDefenderATPOnboarding.plist
- mavel-macmini:Downloads test$
```
## Create JAMF policies
@@ -166,7 +165,7 @@ Once the policy is applied, you'll see the Microsoft Defender ATP icon in the ma
You can monitor policy installation on a device by following the JAMF log file:
```bash
- mavel-mojave:~ testuser$ tail -f /var/log/jamf.log
+ $ tail -f /var/log/jamf.log
Thu Feb 21 11:11:41 mavel-mojave jamf[7960]: No patch policies were found.
Thu Feb 21 11:16:41 mavel-mojave jamf[8051]: Checking for policies triggered by "recurring check-in" for user "testuser"...
Thu Feb 21 11:16:43 mavel-mojave jamf[8051]: Executing Policy WDAV
@@ -179,7 +178,7 @@ You can monitor policy installation on a device by following the JAMF log file:
You can also check the onboarding status:
```bash
-mavel-mojave:~ testuser$ mdatp --health
+$ mdatp --health
...
licensed : true
orgId : "4751b7d4-ea75-4e8f-a1f5-6d640c65bc45"
@@ -195,7 +194,7 @@ orgId : "4751b7d4-ea75-4e8f-a1f5-6d640c65bc45"
You can check that devices have been correctly onboarded by creating a script. For example, the following script checks enrolled devices for onboarding status:
```bash
-mdatp --health healthy
+$ mdatp --health healthy
```
The above command prints "1" if the product is onboarded and functioning as expected.
@@ -219,6 +218,8 @@ Create a script in **Settings > Computer Management > Scripts**.
This script removes Microsoft Defender ATP from the /Applications directory:
```bash
+ #!/bin/bash
+
echo "Is WDAV installed?"
ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null
diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md
index 8d22a596c8..80ec6a0f67 100644
--- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md
+++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-preferences.md
@@ -62,6 +62,23 @@ Whether real-time protection (scan files as they are accessed) is enabled or not
| **Data type** | Boolean |
| **Possible values** | true (default) false |
+#### Enable / disable passive mode
+
+Whether the antivirus engine runs in passive mode or not. In passive mode:
+- Real-time protection is turned off
+- On-demand scanning is turned on
+- Automatic threat remediation is turned off
+- Security intelligence updates are turned on
+- Status menu icon is hidden
+
+|||
+|:---|:---|
+| **Domain** | com.microsoft.wdav |
+| **Key** | passiveMode |
+| **Data type** | Boolean |
+| **Possible values** | false (default) true |
+| **Comments** | Available in Microsoft Defender ATP version 100.67.60 or higher. |
+
#### Scan exclusions
Entities that have been excluded from the scan. Exclusions can be specified by full paths, extensions, or file names.
@@ -132,6 +149,16 @@ Used to exclude content from the scan by file name.
| **Possible values** | any string |
| **Comments** | Applicable only if *$type* is *excludedFileName* |
+#### Allowed threats
+
+List of threats (identified by their name) that are not blocked by the product and are instead allowed to run.
+
+|||
+|:---|:---|
+| **Domain** | com.microsoft.wdav |
+| **Key** | allowedThreats |
+| **Data type** | Array of strings |
+
#### Threat type settings
The *threatTypeSettings* preference in the antivirus engine is used to control how certain threat types are handled by the product.
@@ -213,6 +240,28 @@ Determines whether suspicious samples (that are likely to contain threats) are s
| **Data type** | Boolean |
| **Possible values** | true (default) false |
+### User interface preferences
+
+The *userInterface* section of the configuration profile is used to manage the preferences of the user interface of the product.
+
+|||
+|:---|:---|
+| **Domain** | com.microsoft.wdav |
+| **Key** | userInterface |
+| **Data type** | Dictionary (nested preference) |
+| **Comments** | See the following sections for a description of the dictionary contents. |
+
+#### Show / hide status menu icon
+
+Whether the status menu icon (shown in the top-right corner of the screen) is hidden or not.
+
+|||
+|:---|:---|
+| **Domain** | com.microsoft.wdav |
+| **Key** | hideStatusMenuIcon |
+| **Data type** | Boolean |
+| **Possible values** | false (default) true |
+
## Recommended configuration profile
To get started, we recommend the following configuration profile for your enterprise to take advantage of all protection features that Microsoft Defender ATP provides.
@@ -357,6 +406,8 @@ The following configuration profile contains entries for all settings described
enableRealTimeProtection
+ passiveMode
+
exclusions
@@ -384,7 +435,7 @@ The following configuration profile contains entries for all settings described
allowedThreats
- eicar
+ EICAR-Test-File (not a virus)
threatTypeSettings
@@ -411,6 +462,11 @@ The following configuration profile contains entries for all settings described
automaticSampleSubmission
+ userInterface
+
+ hideStatusMenuIcon
+
+
```
@@ -465,6 +521,8 @@ The following configuration profile contains entries for all settings described
enableRealTimeProtection
+ passiveMode
+
exclusions
@@ -492,7 +550,7 @@ The following configuration profile contains entries for all settings described
allowedThreats
- eicar
+ EICAR-Test-File (not a virus)
threatTypeSettings
@@ -519,6 +577,11 @@ The following configuration profile contains entries for all settings described
automaticSampleSubmission
+ userInterface
+
+ hideStatusMenuIcon
+
+
diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md
index 7cf18820f8..0c56970e6f 100644
--- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md
+++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-privacy.md
@@ -116,6 +116,7 @@ The following fields are collected:
| Field | Description |
| --------------------------------------------------- | ----------- |
| antivirus_engine.enable_real_time_protection | Whether real-time protection is enabled on the device or not. |
+| antivirus_engine.passive_mode | Whether passive mode is enabled on the device or not. |
| cloud_service.enabled | Whether cloud delivered protection is enabled on the device or not. |
| cloud_service.timeout | Time out when the application communicates with the Microsoft Defender ATP cloud. |
| cloud_service.heartbeat_interval | Interval between consecutive heartbeats sent by the product to the cloud. |
@@ -123,6 +124,8 @@ The following fields are collected:
| cloud_service.diagnostic_level | Diagnostic level of the device (required, optional). |
| cloud_service.automatic_sample_submission | Whether automatic sample submission is turned on or not. |
| edr.early_preview | Whether the machine should run EDR early preview features. |
+| edr.group_id | Group identifier used by the detection and response component. |
+| edr.tags | User-defined tags. |
| features.\[optional feature name\] | List of preview features, along with whether they are enabled or not. |
#### Product and service performance data events
@@ -230,37 +233,44 @@ The following fields are collected:
| Field | Description |
| ------------------------------ | ----------- |
| pkt_ack_timeout | The following properties are aggregated numerical values, representing count of events that happened since kernel extension startup. |
-| pkt_ack_conn_timeout | |
-| ipc.ack_pkts | |
-| ipc.nack_pkts | |
-| ipc.send.ack_no_conn | |
-| ipc.send.nack_no_conn | |
-| ipc.send.ack_no_qsq | |
-| ipc.send.nack_no_qsq | |
-| ipc.ack.no_space | |
-| ipc.ack.timeout | |
-| ipc.ack.ackd_fast | |
-| ipc.ack.ackd | |
-| ipc.recv.bad_pkt_len | |
-| ipc.recv.bad_reply_len | |
-| ipc.recv.no_waiter | |
-| ipc.recv.copy_failed | |
-| ipc.kauth.vnode.mask | |
-| ipc.kauth.vnode.read | |
-| ipc.kauth.vnode.write | |
-| ipc.kauth.vnode.exec | |
-| ipc.kauth.vnode.del | |
-| ipc.kauth.vnode.read_attr | |
-| ipc.kauth.vnode.write_attr | |
-| ipc.kauth.vnode.read_ex_attr | |
-| ipc.kauth.vnode.write_ex_attr | |
-| ipc.kauth.vnode.read_sec | |
-| ipc.kauth.vnode.write_sec | |
-| ipc.kauth.vnode.take_own | |
-| ipc.kauth.vnode.denied | |
-| ipc.kauth.file_op.mask | |
-| ipc.kauth_file_op.open | |
-| ipc.kauth.file_op.close | |
+| pkt_ack_conn_timeout | |
+| ipc.ack_pkts | |
+| ipc.nack_pkts | |
+| ipc.send.ack_no_conn | |
+| ipc.send.nack_no_conn | |
+| ipc.send.ack_no_qsq | |
+| ipc.send.nack_no_qsq | |
+| ipc.ack.no_space | |
+| ipc.ack.timeout | |
+| ipc.ack.ackd_fast | |
+| ipc.ack.ackd | |
+| ipc.recv.bad_pkt_len | |
+| ipc.recv.bad_reply_len | |
+| ipc.recv.no_waiter | |
+| ipc.recv.copy_failed | |
+| ipc.kauth.vnode.mask | |
+| ipc.kauth.vnode.read | |
+| ipc.kauth.vnode.write | |
+| ipc.kauth.vnode.exec | |
+| ipc.kauth.vnode.del | |
+| ipc.kauth.vnode.read_attr | |
+| ipc.kauth.vnode.write_attr | |
+| ipc.kauth.vnode.read_ex_attr | |
+| ipc.kauth.vnode.write_ex_attr | |
+| ipc.kauth.vnode.read_sec | |
+| ipc.kauth.vnode.write_sec | |
+| ipc.kauth.vnode.take_own | |
+| ipc.kauth.vnode.denied | |
+| ipc.kauth.file_op.mask | |
+| ipc.kauth_file_op.open | |
+| ipc.kauth.file_op.close | |
+| ipc.kauth.file_op.close_modified | |
+| ipc.kauth.file_op.move | |
+| ipc.kauth.file_op.link | |
+| ipc.kauth.file_op.exec | |
+| ipc.kauth.file_op.remove | |
+| ipc.kauth.file_op.fork | |
+| ipc.kauth.file_op.create | |
## Resources
diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md
index e8697f63a3..2f67653ec0 100644
--- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md
+++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-resources.md
@@ -31,7 +31,7 @@ If you can reproduce a problem, please increase the logging level, run the syste
1. Increase logging level:
```bash
- mdatp --log-level verbose
+ $ mdatp --log-level verbose
Creating connection to daemon
Connection established
Operation succeeded
@@ -39,10 +39,10 @@ If you can reproduce a problem, please increase the logging level, run the syste
2. Reproduce the problem
-3. Run `mdatp --diagnostic --create` to backup Microsoft Defender ATP's logs. The files will be stored inside of a .zip archive. This command will also print out the file path to the backup after the operation succeeds.
+3. Run `sudo mdatp --diagnostic --create` to backup Microsoft Defender ATP's logs. The files will be stored inside of a .zip archive. This command will also print out the file path to the backup after the operation succeeds.
```bash
- mdatp --diagnostic --create
+ $ sudo mdatp --diagnostic --create
Creating connection to daemon
Connection established
```
@@ -50,7 +50,7 @@ If you can reproduce a problem, please increase the logging level, run the syste
4. Restore logging level:
```bash
- mdatp --log-level info
+ $ mdatp --log-level info
Creating connection to daemon
Connection established
Operation succeeded
@@ -82,13 +82,13 @@ Important tasks, such as controlling product settings and triggering on-demand s
|-------------|-------------------------------------------|-----------------------------------------------------------------------|
|Configuration|Turn on/off real-time protection |`mdatp --config realTimeProtectionEnabled [true/false]` |
|Configuration|Turn on/off cloud protection |`mdatp --config cloudEnabled [true/false]` |
-|Configuration|Turn on/off product diagnostics |`mdatp --config diagnostic [true/false]` |
+|Configuration|Turn on/off product diagnostics |`mdatp --config cloudDiagnosticEnabled [true/false]` |
|Configuration|Turn on/off automatic sample submission |`mdatp --config cloudAutomaticSampleSubmission [true/false]` |
|Configuration|Turn on PUA protection |`mdatp --threat --type-handling potentially_unwanted_application block`|
|Configuration|Turn off PUA protection |`mdatp --threat --type-handling potentially_unwanted_application off` |
|Configuration|Turn on audit mode for PUA protection |`mdatp --threat --type-handling potentially_unwanted_application audit`|
|Diagnostics |Change the log level |`mdatp --log-level [error/warning/info/verbose]` |
-|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic` |
+|Diagnostics |Generate diagnostic logs |`mdatp --diagnostic --create` |
|Health |Check the product's health |`mdatp --health` |
|Protection |Scan a path |`mdatp --scan --path [path]` |
|Protection |Do a quick scan |`mdatp --scan --quick` |
diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-whatsnew.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-whatsnew.md
new file mode 100644
index 0000000000..8fb33dfa72
--- /dev/null
+++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac-whatsnew.md
@@ -0,0 +1,26 @@
+---
+title: Microsoft Defender ATP for Mac What's New
+ms.reviewer:
+description: List of major changes for Microsoft Defender ATP for Mac.
+keywords: microsoft, defender, atp, mac, installation, macos, whatsnew
+search.product: eADQiWindows 10XVcnh
+search.appverid: met150
+ms.prod: w10
+ms.mktglfcycl: security
+ms.sitesec: library
+ms.pagetype: security
+ms.author: dansimp
+author: dansimp
+ms.localizationpriority: medium
+manager: dansimp
+audience: ITPro
+ms.collection: M365-security-compliance
+ms.topic: conceptual
+---
+
+# What's new in Microsoft Defender Advanced Threat Protection for Mac
+
+## 100.65.28
+
+- Added support for macOS Catalina
+- Performance improvements
diff --git a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md
index 8fe52e371e..f87f5332c7 100644
--- a/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md
+++ b/windows/security/threat-protection/windows-defender-antivirus/microsoft-defender-atp-mac.md
@@ -27,7 +27,7 @@ This topic describes how to install, configure, update, and use Microsoft Defend
## What’s new in the latest release
-Since the announcement of the public preview, Microsoft has been working non-stop to enhance the product, by listening to customer feedback. We've added management features and more granular controls for diagnostic data collection, refined the user experience, and fixed bugs.
+[What's new](microsoft-defender-atp-mac-whatsnew.md)
If you have any feedback that you would like to share, submit it by opening Microsoft Defender ATP for Mac on your device and navigating to **Help** > **Send feedback**.
@@ -69,7 +69,7 @@ To test that a connection is not blocked, open [https://x.cp.wd.microsoft.com/ap
If you prefer the command line, you can also check the connection by running the following command in Terminal:
```bash
-curl -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping'
+$ curl -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping'
```
The output from this command should be similar to the following:
diff --git a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md
index 5ba3f228c0..0a78bbd6af 100644
--- a/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md
+++ b/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md
@@ -46,9 +46,9 @@ Tamper Protection doesn't prevent you from viewing your security settings. And,
### What do you want to do?
-[Turn Tamper Protection on (or off) for an individual machine](#turn-tamper-protection-on-or-off-for-an-individual-machine)
+[Turn Tamper Protection on (or off) for an individual machine using Windows Security](#turn-tamper-protection-on-or-off-for-an-individual-machine)
-[Turn Tamper Protection on (or off) for your organization with Intune (Preview)](#turn-tamper-protection-on-or-off-for-your-organization-with-intune)
+[Turn Tamper Protection on (or off) for your organization using Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune)
## Turn Tamper Protection on (or off) for an individual machine
@@ -68,11 +68,9 @@ If you are a home user, or you are not subject to settings managed by a security
> Once you’ve made this update, Tamper Protection will continue to protect your registry settings, and will also log attempts to modify them without returning errors.
-## Turn Tamper Protection on (or off) for your organization with Intune
+## Turn Tamper Protection on (or off) for your organization using Intune
-If you are part of your organization's security team, the ability to turn Tamper Protection on (or off) for your organization in the Microsoft 365 Device Management portal (Intune) is now in preview. "In preview" means this feature is rolling out to business customers who have [Microsoft Defender ATP](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) and who have agreed to participate in the preview program. As a preview feature, the following applies:
-
-*Some information in this section relates to prereleased product that might be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.*
+If you are part of your organization's security team, you can turn Tamper Protection on (or off) for your organization in the Microsoft 365 Device Management portal (Intune). (This feature is rolling out now; if you don't have it yet, you should very soon, assuming your organization has [Microsoft Defender ATP](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) and that you meet the prerequisites listed below.)
You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations, to perform the following task.
@@ -118,7 +116,7 @@ Tamper Protection will not have any impact on such devices.
If you are a home user, see [Turn Tamper Protection on (or off) for an individual machine](#turn-tamper-protection-on-or-off-for-an-individual-machine).
-If you are an organization using [Microsoft Defender Advanced Threat Protection E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp), you should be able to manage Tamper Protection in Intune similar to how you manage other endpoint protection features. See [Turn Tamper Protection on (or off) for your organization with Intune](#turn-tamper-protection-on-or-off-for-your-organization-with-intune).
+If you are an organization using [Microsoft Defender Advanced Threat Protection E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp), you should be able to manage Tamper Protection in Intune similar to how you manage other endpoint protection features. See [Turn Tamper Protection on (or off) for your organization using Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune).
### How does configuring Tamper Protection in Intune affect how I manage Windows Defender through my group policy?
diff --git a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md
index def6571abc..f4224a60a4 100644
--- a/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md
+++ b/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md
@@ -11,35 +11,28 @@ ms.pagetype: security
ms.localizationpriority: medium
author: dansimp
ms.author: dansimp
+ms.date: 06/11/2019
ms.reviewer:
manager: dansimp
---
-# Windows Defender Antivirus
+# Next Generation Protection in Windows 10 and Windows Server 2016
**Applies to:**
-- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
+- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
-Windows Defender Antivirus is a built-in antimalware solution that provides next generation protection for desktops, portable computers, and servers.
+Next-gen protection provides enhanced safety, alongside more traditional security measures. Next-gen services use machine learning and the cloud to keep all devices on your enterprise network safe.
-Windows Defender Antivirus includes:
-- [Cloud-delivered protection](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats. Along with machine learning and the Intelligent Security Graph, cloud-delivered protection is part of the next-gen technologies that power Windows Defender Antivirus.
-- [Always-on scanning](configure-real-time-protection-windows-defender-antivirus.md), using advanced file and process behavior monitoring and other heuristics (also known as "real-time protection")
-- [Dedicated protection updates](manage-updates-baselines-windows-defender-antivirus.md) based on machine-learning, human and automated big-data analysis, and in-depth threat resistance research
+Next-gen protection services include:
-Windows Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/).
-
-
-You can configure and manage Windows Defender Antivirus with:
-- System Center Configuration Manager (as System Center Endpoint Protection, or SCEP)
-- Microsoft Intune
-- PowerShell
-- Windows Management Instrumentation (WMI)
-- Group Policy
+- [Always-on scanning](configure-real-time-protection-windows-defender-antivirus.md), also known as "real-time protection", for advanced file and process behavior monitoring
+- [Cloud-based delivery](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats
+- [Dedicated protection updates](manage-updates-baselines-windows-defender-antivirus.md) powered by machine-learning, big-data analysis, and in-depth threat resistance research
>[!TIP]
>You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working and see how they work:
+>
>- Cloud-delivered protection
>- Fast learning (including Block at first sight)
>- Potentially unwanted application blocking
@@ -50,11 +43,24 @@ You can configure and manage Windows Defender Antivirus with:
## Minimum system requirements
-Windows Defender AV has the same hardware requirements as Windows 10. For more information, see:
-- [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx)
-- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx)
+Windows Defender Antivirus is our main vehicle for next-gen protection.
-Functionality, configuration, and management is largely the same when using Windows Defender AV on Windows Server 2016; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md).
+It has the same hardware requirements as Windows 10. For more information, see:
+
+- [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx)
+- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx)
+
+## Configuring next-gen services
+
+You can use the following to configure and manage next-gen services in Windows 10, while running Windows Defender Antivirus:
+
+- System Center Configuration Manager (as System Center Endpoint Protection, or SCEP)
+- Microsoft Intune
+- PowerShell
+- Windows Management Instrumentation (WMI)
+- Group Policy
+
+Configuration and management is largely the same in Windows Server 2016, while running Windows Defender Antivirus; however, [there are some differences](windows-defender-antivirus-on-windows-server-2016.md).
>[!TIP]
>You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following features are working and see how they work:
@@ -64,13 +70,10 @@ Functionality, configuration, and management is largely the same when using Wind
## Related topics
-- [Windows Defender AV in the Windows Security app](windows-defender-security-center-antivirus.md)
-- [Windows Defender AV on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md)
-- [Windows Defender AV compatibility](windows-defender-antivirus-compatibility.md)
-- [Evaluate Windows Defender AV protection](evaluate-windows-defender-antivirus.md)
-- [Deploy, manage updates, and report on Windows Defender AV](deploy-manage-report-windows-defender-antivirus.md)
-- [Configure Windows Defender AV features](configure-windows-defender-antivirus-features.md)
-- [Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-windows-defender-antivirus.md)
-- [Review event logs and error codes to troubleshoot issues](troubleshoot-windows-defender-antivirus.md)
-- [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md)
-
+- [Full version history for Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md)
+- [Windows Defender Antivirus management and configuration](configuration-management-reference-windows-defender-antivirus.md)
+- [Evaluate Windows Defender Antivirus protection](evaluate-windows-defender-antivirus.md)
+- [Enable cloud protection](enable-cloud-protection-windows-defender-antivirus.md)
+- [Configure real-time protection](configure-real-time-protection-windows-defender-antivirus.md)
+- [Configure cloud block at first sight](configure-block-at-first-sight-windows-defender-antivirus.md)
+- [Create and deploy cloud-protected antimalware policies](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-antimalware-policies#cloud-protection-service.md)
diff --git a/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md b/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md
index 785d80cbcc..c0e0200d21 100644
--- a/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md
+++ b/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md
@@ -7,6 +7,7 @@ ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: mdsakibMSFT
+ms.author: mdsakib
ms.date: 05/21/2019
---
diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md
index 54ec678b22..de1860a1a6 100644
--- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md
+++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md
@@ -29,7 +29,7 @@ This topic for the IT professional describes the process dependencies and intera
AppLocker policies are collections of AppLocker rules that might contain any one of the enforcement settings configured. When applied, each rule is evaluated within the policy and the collection of rules is applied according to the enforcement setting and according to your Group Policy structure.
-The AppLocker policy is enforced on a computer through the Application Identity service, which is the engine that evaluates the policies. If the service is not running, policies will not be enforced. The Application Identity service returns the information from the binary—even if product or binary names are empty—to the results pane of the Local Security Policy snap-in.
+The AppLocker policy is enforced on a computer through the Application Identity service, which is the engine that evaluates the policies. If the service is not running, policies will not be enforced. The Application Identity service returns the information from the binary -even if product or binary names are empty- to the results pane of the Local Security Policy snap-in.
AppLocker policies are stored in a security descriptor format according to Application Identity service requirements. It uses file path, hash, or fully qualified binary name attributes to form allow or deny actions on a rule. Each rule is stored as an access control entry (ACE) in the security descriptor and contains the following information:
@@ -47,7 +47,7 @@ An AppLocker rule is a control placed on a file to govern whether or not it is a
- An executable rule controls whether a user or group can run an executable file. Executable files most often have the .exe or .com file name extensions and apply to applications.
- A script rule controls whether a user or group can run scripts with a file name extension of .ps1, .bat, .cmd, .vbs, and .js.
-- A Windows Installer rule controls whether a user or group can run files with a file name extension of .msi, mst and .msp (Windows Installer patch).
+- A Windows Installer rule controls whether a user or group can run files with a file name extension of .msi, .mst and .msp (Windows Installer patch).
- A DLL rule controls whether a user or group can run files with a file name extension of .dll and .ocx.
- A packaged app and packaged app installer rule controls whether a user or group can run or install a packaged app. A Packaged app installer has the .appx extension.
diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md
index ec45f1d75e..be5c338598 100644
--- a/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md
+++ b/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md
@@ -41,9 +41,11 @@ The following table lists the default rules that are available for the DLL rule
| Allow all users to run DLLs in the Program Files folder | (Default Rule) All DLLs located in the Program Files folder|
| Everyone | Path: %programfiles%\*|
-> **Important:** If you use DLL rules, a DLL allow rule has to be created for each DLL that is used by all of the allowed apps
->
-> **Caution:** When DLL rules are used, AppLocker must check each DLL that an app loads. Therefore, users may experience a reduction in performance if DLL rules are used.
+> [!IMPORTANT]
+> If you use DLL rules, a DLL allow rule has to be created for each DLL that is used by all of the allowed apps
+
+> [!CAUTION]
+> When DLL rules are used, AppLocker must check each DLL that an app loads. Therefore, users may experience a reduction in performance if DLL rules are used.
## Related topics
diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md
index bde5f92033..02e8dd5393 100644
--- a/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md
+++ b/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md
@@ -44,11 +44,13 @@ You cannot use AppLocker (or Software Restriction Policies) to prevent code from
AppLocker can only control VBScript, JScript, .bat files, .cmd files, and Windows PowerShell scripts. It does not control all interpreted code that runs within a host process, for example, Perl scripts and macros. Interpreted code is a form of executable code that runs within a host process. For example, Windows batch files (\*.bat) run within the context of the Windows Command Host (cmd.exe). To control interpreted code by using AppLocker, the host process must call AppLocker before it runs the interpreted code, and then enforce the decision returned by AppLocker. Not all host processes call into AppLocker and, therefore, AppLocker cannot control every kind of interpreted code, such as Microsoft Office macros.
->**Important:** You should configure the appropriate security settings of these host processes if you must allow them to run. For example, configure the security settings in Microsoft Office to ensure that only signed and trusted macros are loaded.
+> [!IMPORTANT]
+> You should configure the appropriate security settings of these host processes if you must allow them to run. For example, configure the security settings in Microsoft Office to ensure that only signed and trusted macros are loaded.
AppLocker rules either allow or prevent an application from launching. AppLocker does not control the behavior of applications after they are launched. Applications could contain flags passed to functions that signal AppLocker to circumvent the rules and allow another .exe or .dll to be loaded. In practice, an application that is allowed by AppLocker could use these flags to bypass AppLocker rules and launch child processes. You must thoroughly examine each application before allowing them to run by using AppLocker rules.
->**Note:** Two flags that illustrate this condition are `SANDBOX_INERT`, which can be passed to `CreateRestrictedToken`, and `LOAD_IGNORE_CODE_AUTHZ_LEVEL`, which can be passed to `LoadLibraryEx`. Both of these flags signal AppLocker to circumvent the rules and allow a child .exe or .dll to be loaded.
+> [!NOTE]
+> Two flags that illustrate this condition are `SANDBOX_INERT`, which can be passed to `CreateRestrictedToken`, and `LOAD_IGNORE_CODE_AUTHZ_LEVEL`, which can be passed to `LoadLibraryEx`. Both of these flags signal AppLocker to circumvent the rules and allow a child .exe or .dll to be loaded.
You can block the Windows Subsystem for Linux by blocking LxssManager.dll.
diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md
index eef85dda63..ce6f6d4292 100644
--- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md
+++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md
@@ -30,7 +30,9 @@ Rule enforcement is applied only to collections of rules, not individual rules.
Group Policy merges AppLocker policy in two ways:
- **Rules.** Group Policy does not overwrite or replace rules that are already present in a linked Group Policy Object (GPO). For example, if the current GPO has 12 rules and a linked GPO has 50 rules, 62 rules are applied to all computers that receive the AppLocker policy.
- >**Important:** When determining whether a file is permitted to run, AppLocker processes rules in the following order:
+
+ > [!IMPORTANT]
+ > When determining whether a file is permitted to run, AppLocker processes rules in the following order:
1. **Explicit deny.** An administrator created a rule to deny a file.
2. **Explicit allow.** An administrator created a rule to allow a file.
diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md
index ace4b89837..44c123c7a2 100644
--- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md
+++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md
@@ -51,14 +51,16 @@ Selecting the appropriate condition for each rule depends on the overall applica
- Create a rule by using a file hash condition.
- Create a rule by using a path condition.
- >**Note:** To determine how many applications on a reference computer are digitally signed, you can use the **Get-AppLockerFileInformation** Windows PowerShell cmdlet for a directory of files. For example,
+ > [!NOTE]
+ > To determine how many applications on a reference computer are digitally signed, you can use the **Get-AppLockerFileInformation** Windows PowerShell cmdlet for a directory of files. For example,
`Get-AppLockerFileInformation –Directory C:\Windows\ -FileType EXE -recurse` displays the properties for all .exe and .com files within the Windows directory.
2. What rule condition type does your organization prefer?
If your organization is already using Software Restriction Policies (SRP) to restrict what files users can run, rules using file hash or path conditions are probably already in place.
- >**Note:** For a list of supported operating system versions and editions to which SRP and AppLocker rules can be applied, see [Requirements to use AppLocker](requirements-to-use-applocker.md).
+ > [!NOTE]
+ > For a list of supported operating system versions and editions to which SRP and AppLocker rules can be applied, see [Requirements to use AppLocker](requirements-to-use-applocker.md).
## Related topics
diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md
index adf5eb6279..bf87000f78 100644
--- a/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md
+++ b/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md
@@ -1,9 +1,6 @@
-ms.assetid: 10c3597f-f44c-4c8e-8fe5-105d4ac016a6
-ms.reviewer:
---
title: Use a reference device to create and maintain AppLocker policies (Windows 10)
description: This topic for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
-
ms.author: macapara
ms.prod: w10
ms.mktglfcycl: deploy
@@ -16,6 +13,8 @@ audience: ITPro
ms.collection: M365-security-compliance
ms.topic: conceptual
ms.date: 09/21/2017
+ms.assetid: 10c3597f-f44c-4c8e-8fe5-105d4ac016a6
+ms.reviewer:
---
# Use a reference device to create and maintain AppLocker policies
diff --git a/windows/security/threat-protection/windows-defender-application-control/create-path-based-rules.md b/windows/security/threat-protection/windows-defender-application-control/create-path-based-rules.md
index babbce2e0b..44a9846b76 100644
--- a/windows/security/threat-protection/windows-defender-application-control/create-path-based-rules.md
+++ b/windows/security/threat-protection/windows-defender-application-control/create-path-based-rules.md
@@ -7,6 +7,7 @@ ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: mdsakibMSFT
+ms.author: mdsakib
ms.date: 05/17/2019
---
diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md
index 40326f9ba8..d192ac21a9 100644
--- a/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md
+++ b/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md
@@ -7,6 +7,7 @@ ms.sitesec: library
ms.pagetype: security
ms.localizationpriority: medium
author: mdsakibMSFT
+ms.author: mdsakib
ms.date: 05/17/2019
---
diff --git a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md
index 530d8659f9..db654141a9 100644
--- a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md
+++ b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md
@@ -110,6 +110,8 @@ They could also choose to create a catalog that captures information about the u
## Create path-based rules
Beginning with Windows 10 version 1903, Windows Defender Application Control (WDAC) policies can contain path-based rules.
+> [!NOTE]
+> Due to an existing bug, you can not combine Path-based ALLOW rules with any DENY rules in a single policy. Instead, either separate DENY rules into a separate Base policy or move the Path-based ALLOW rules into a supplemental policy as described in [Deploy multiple WDAC policies.](deploy-multiple-windows-defender-application-control-policies.md)
- New-CIPolicy parameter
- FilePath: create path rules under path \ for anything not user-writeable (at the individual file level)
diff --git a/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md b/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md
index fe043e036b..87a52c4dd8 100644
--- a/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md
+++ b/windows/security/threat-protection/windows-security-configuration-framework/level-1-enterprise-basic-security.md
@@ -5,7 +5,7 @@ keywords: virtualization, security, malware
ms.prod: w10
ms.mktglfcycl: deploy
ms.localizationpriority: medium
-ms.author: appcompatguy
+ms.author: cjacks
author: appcompatguy
manager: dansimp
audience: ITPro
@@ -177,7 +177,7 @@ Microsoft recommends using [the rings methodology](https://docs.microsoft.com/wi
| Network / Network Connections | Prohibit use of Internet Connection Sharing on your DNS domain network | Enabled | Determines whether administrators can enable and configure the Internet Connection Sharing (ICS) feature of an Internet connection and if the ICS service can run on the computer. |
| Network / Network Provider | Hardened UNC Paths | \\\\\*\\SYSVOL and \\\\\*\\NETLOGON RequireMutualAuthentication = 1, RequireIntegrity = 1 | This policy setting configures secure access to UNC paths. If you enable this policy, Windows only allows access to the specified UNC paths after fulfilling additional security requirements. |
| Network / Windows Connection Manager | Prohibit connection to non-domain networks when connected to domain authenticated network | Enabled | This policy setting prevents computers from connecting to both a domain-based network and a non-domain-based network at the same time. |
-| System / Credentials Delegation | Encryption Oracle Remediation | Force Updated Clients | Enryption Oracle Remediation |
+| System / Credentials Delegation | Encryption Oracle Remediation | Force Updated Clients | Encryption Oracle Remediation |
| System / Credentials Delegation | Remote host allows delegation of non-exportable credentials | Enabled | When using credential delegation, devices provide an exportable version of credentials to the remote host. This exposes users to the risk of credential theft from attackers on the remote host. If you enable this policy setting, the host supports Restricted Admin or Remote Credential Guard mode. |
| System / Device Installation / Device Installation Restrictions | Prevent installation of devices that match any of these device IDs | [[[main setting]]] = Enabled Also apply to matching devices that are already installed = True 1 = PCI\CC_0C0A | This policy setting allows you to specify a list of Plug and Play hardware IDs and compatible IDs for devices that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. if you enable this policy setting, Windows is prevented from installing a device whose hardware ID or compatible ID appears in a list that you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings. |
| System / Device Installation / Device Installation Restrictions | Prevent installation of devices using drivers that match these device setup classes | [[[main setting]]] = Enabled Also apply to matching devices that are already installed = True 1 = {d48179be-ec20-11d1-b6b8-00c04fa372a7} | This policy setting allows you to specify a list of device setup class globally unique identifiers (GUIDs) for device drivers that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. if you enable this policy setting, Windows is prevented from installing or updating device drivers whose device setup class GUIDs appear in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. If you disable or do not configure this policy setting, Windows can install and update devices as allowed or prevented by other policy settings. |
diff --git a/windows/security/threat-protection/windows-security-configuration-framework/level-2-enterprise-enhanced-security.md b/windows/security/threat-protection/windows-security-configuration-framework/level-2-enterprise-enhanced-security.md
index 3671675351..f66320e362 100644
--- a/windows/security/threat-protection/windows-security-configuration-framework/level-2-enterprise-enhanced-security.md
+++ b/windows/security/threat-protection/windows-security-configuration-framework/level-2-enterprise-enhanced-security.md
@@ -5,7 +5,7 @@ keywords: virtualization, security, malware
ms.prod: w10
ms.mktglfcycl: deploy
ms.localizationpriority: medium
-ms.author: appcompatguy
+ms.author: cjacks
author: appcompatguy
manager: dansimp
audience: ITPro
diff --git a/windows/security/threat-protection/windows-security-configuration-framework/level-3-enterprise-high-security.md b/windows/security/threat-protection/windows-security-configuration-framework/level-3-enterprise-high-security.md
index d1673ce03b..640af6ba59 100644
--- a/windows/security/threat-protection/windows-security-configuration-framework/level-3-enterprise-high-security.md
+++ b/windows/security/threat-protection/windows-security-configuration-framework/level-3-enterprise-high-security.md
@@ -5,7 +5,7 @@ keywords: virtualization, security, malware
ms.prod: w10
ms.mktglfcycl: deploy
ms.localizationpriority: medium
-ms.author: appcompatguy
+ms.author: cjacks
author: appcompatguy
manager: dansimp
audience: ITPro
|