Skip to content

Commit 3c67658

Browse files
committed
bulk update Autopilot casing
1 parent 3d528dc commit 3c67658

19 files changed

Lines changed: 39 additions & 39 deletions

memdocs/autopilot/add-devices.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Microsoft Endpoint Configuration Manager automatically collects the hardware has
7878

7979
### PowerShell
8080

81-
The hardware hash for an existing device is available through Windows Management Instrumentation (WMI), as long as that device is running a supported version of Windows. You can use a PowerShell script ([Get-WindowsAutoPilotInfo.ps1](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo)) to get a device's hardware hash and serial number. The serial number is useful for quickly seeing which device the hardware hash belongs to.
81+
The hardware hash for an existing device is available through Windows Management Instrumentation (WMI), as long as that device is running a supported version of Windows. You can use a PowerShell script ([Get-WindowsAutopilotInfo.ps1](https://www.powershellgallery.com/packages/Get-WindowsAutopilotInfo)) to get a device's hardware hash and serial number. The serial number is useful for quickly seeing which device the hardware hash belongs to.
8282

8383
To use this script, you can use either of the following methods:
8484

@@ -94,8 +94,8 @@ To install the script directly and capture the hardware hash from the local comp
9494
Set-Location -Path "C:\HWID"
9595
$env:Path += ";C:\Program Files\WindowsPowerShell\Scripts"
9696
Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned
97-
Install-Script -Name Get-WindowsAutoPilotInfo
98-
Get-WindowsAutoPilotInfo -OutputFile AutoPilotHWID.csv
97+
Install-Script -Name Get-WindowsAutopilotInfo
98+
Get-WindowsAutopilotInfo -OutputFile AutopilotHWID.csv
9999
```
100100

101101
You can run the commands remotely if both of the following are true:
@@ -109,7 +109,7 @@ To install the script directly and capture the hardware hash from the local comp
109109
PowerShell.exe -ExecutionPolicy Bypass
110110
Install-Script -name Get-WindowsAutopilotInfo -Force
111111
Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned
112-
Get-WindowsAutoPilotInfo -Online
112+
Get-WindowsAutopilotInfo -Online
113113
```
114114

115115
3. You're prompted to sign in. An account with the Intune Administrator role is sufficient, and the device hash will then be uploaded automatically.
@@ -123,7 +123,7 @@ To install the script directly and capture the hardware hash from the local comp
123123
> [!NOTE]
124124
> Because Intune offers free (or inexpensive) accounts that lack robust vetting, and because 4K hardware hashes contain sensitive information that only device owners should maintain, we recommend registering devices through Microsoft Endpoint Manager via a 4K hardware hash only for testing or other limited scenarios. In most cases, you should instead use the Microsoft Partner Center for Autopilot device registration.
125125
126-
For more information about running the *Get-WindowsAutoPilotInfo.ps1* script, see the script's help by using `Get-Help Get-WindowsAutoPilotInfo`.
126+
For more information about running the *Get-WindowsAutopilotInfo.ps1* script, see the script's help by using `Get-Help Get-WindowsAutopilotInfo`.
127127

128128
### Diagnostics page hash export
129129

memdocs/autopilot/autopilot-mbr.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -138,14 +138,14 @@ Repair technicians must sign in to the repaired device to capture the new device
138138

139139
Those repair facilities with access to the OA3 Tool (which is part of the ADK) can use the tool to capture the 4K Hardware Hash (4K HH).
140140

141-
Instead, the [WindowsAutoPilotInfo PowerShell script](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) can be used to capture the 4K HH.
141+
Instead, the [WindowsAutopilotInfo PowerShell script](https://www.powershellgallery.com/packages/Get-WindowsAutopilotInfo) can be used to capture the 4K HH.
142142

143143
> [!NOTE]
144144
> Other methods in addition to Windows PowerShell are also available to capture the hardware hash. For more information, see [Collect the hardware hash](add-devices.md#collect-the-hardware-hash).
145145
146-
To use the **WindowsAutoPilotInfo** PowerShell script, follow these steps:
146+
To use the **WindowsAutopilotInfo** PowerShell script, follow these steps:
147147

148-
1. Install the script from the [PowerShell Gallery](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) or from the command line (command-line installation is shown below).
148+
1. Install the script from the [PowerShell Gallery](https://www.powershellgallery.com/packages/Get-WindowsAutopilotInfo) or from the command line (command-line installation is shown below).
149149
2. Navigate to the script directory and run it on the device when the device is either in Full OS or Audit Mode. See the following example.
150150

151151
```powershell

memdocs/autopilot/existing-devices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ Specifies that the device should require Azure AD join and MDM enrollment.
175175

176176
_(GUID, required)_
177177

178-
A unique GUID (without braces) that's provided to Intune as part of the registration process. This ID is included in the enrollment message as the `OfflineAutoPilotEnrollmentCorrelator`. This attribute is present only if enrollment happens on a device registered with Zero Touch Provisioning via offline registration.
178+
A unique GUID (without braces) that's provided to Intune as part of the registration process. This ID is included in the enrollment message as the `OfflineAutopilotEnrollmentCorrelator`. This attribute is present only if enrollment happens on a device registered with Zero Touch Provisioning via offline registration.
179179

180180
#### CloudAssignedAadServerData
181181

@@ -200,7 +200,7 @@ Save the Autopilot profile as a JSON file in ASCII or ANSI format. Windows Power
200200
```powershell
201201
$AutopilotProfile = Get-AutopilotProfile
202202
$AutopilotProfile | ForEach-Object {
203-
$_ | ConvertTo-AutoPilotConfigurationJSON | Set-Content -Encoding Ascii "~\Desktop\$($_.displayName)\AutopilotConfigurationFile.json"
203+
$_ | ConvertTo-AutopilotConfigurationJSON | Set-Content -Encoding Ascii "~\Desktop\$($_.displayName)\AutopilotConfigurationFile.json"
204204
}
205205
```
206206

memdocs/autopilot/known-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ The services responsible for determining the list of apps that should be blockin
119119

120120
### That username looks like it belongs to another organization. Try signing in again or start over with a different account
121121

122-
Confirm that all of your information is correct at `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Provisioning\Diagnostics\AutoPilot`. For more information, see [Troubleshoot OOBE issues](troubleshoot-oobe.md#windows-10-version-1709-and-above).
122+
Confirm that all of your information is correct at `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Provisioning\Diagnostics\Autopilot`. For more information, see [Troubleshoot OOBE issues](troubleshoot-oobe.md#windows-10-version-1709-and-above).
123123

124124
### Windows Autopilot user-driven hybrid Azure AD deployments don't grant users Administrator rights even when specified in the Windows Autopilot profile
125125

memdocs/autopilot/manual-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ After the hardware hashes have been captured from existing devices, they can be
5050
- [Microsoft Intune](add-devices.md). This is the preferred mechanism for all customers.
5151
- The Microsoft Endpoint Manager admin center is used for Intune device enrollment.
5252
- [Partner Center](https://msdn.microsoft.com/partner-center/autopilot). This is used by CSP partners to register devices on behalf of customers.
53-
- [Microsoft 365 Business & Office 365 Admin](https://support.office.com/article/Create-and-edit-AutoPilot-profiles-5cf7139e-cfa1-4765-8aad-001af1c74faa). This is typically used by small and medium businesses (SMBs) who manage their devices using Microsoft 365 Business.
53+
- [Microsoft 365 Business & Office 365 Admin](https://support.office.com/article/Create-and-edit-Autopilot-profiles-5cf7139e-cfa1-4765-8aad-001af1c74faa). This is typically used by small and medium businesses (SMBs) who manage their devices using Microsoft 365 Business.
5454
- [Microsoft Store for Business](/microsoft-store/add-profile-to-devices#manage-autopilot-deployment-profiles). You might already be using MSfB to manage your apps and settings.
5555

5656
>[!IMPORTANT]

memdocs/cloud-native-windows-endpoints.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -159,14 +159,14 @@ To test the Cloud Native Windows endpoint, we need to start by getting a virtual
159159
5. Switch into PowerShell by running the command:
160160
- `powershell.exe`
161161

162-
6. Download the *Get-WindowsAutoPilotInfo* script by running the commands:
162+
6. Download the *Get-WindowsAutopilotInfo* script by running the commands:
163163
- `Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope Process`
164-
- `Install-Script Get-WindowsAutoPilotInfo`
164+
- `Install-Script Get-WindowsAutopilotInfo`
165165

166166
7. When prompted, enter **Y** to accept.
167167

168168
8. Type the command:
169-
- `Get-WindowsAutoPilotInfo.ps1 -GroupTag CloudNative -Online`
169+
- `Get-WindowsAutopilotInfo.ps1 -GroupTag CloudNative -Online`
170170

171171
> [!NOTE]
172172
> Group Tags allow you to create dynamic Azure AD groups based on a subset of devices. Group Tags can be set when importing devices or changed later in the Microsoft Endpoint Manager admin console. We'll use the Group Tag *CloudNative* in Step 4. You can set the tag name to something different for your testing.

memdocs/configmgr/core/clients/deploy/plan/client-installation-methods.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ For more information about how to manually install the client on each of platfor
162162

163163
- Can install and assign computers on the internet.
164164

165-
- Can automate with Windows AutoPilot and Microsoft Intune for co-management.
165+
- Can automate with Windows Autopilot and Microsoft Intune for co-management.
166166

167167
#### Disadvantages
168168

memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1709.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ You can enable co-management for both Windows 10 devices enrolled in Microsoft I
135135
#### Devices enrolled in Intune
136136
When Windows 10 devices are enrolled in Intune, you can install the Configuration Manager client on the devices (using a specific command-line argument) to prepare the clients for co-management. Then, you enable co-management from the Configuration Manager console to start moving specific workloads to Intune for specific Windows 10 devices.
137137

138-
For Windows 10 devices that are not yet enrolled in Intune, you can use automatic enrollment in Azure to enroll the devices. For new Windows 10 devices, you can use Windows AutoPilot to configure the Out of Box Experience (OOBE), which includes automatic enrollment that enrolls devices in Intune.
138+
For Windows 10 devices that are not yet enrolled in Intune, you can use automatic enrollment in Azure to enroll the devices. For new Windows 10 devices, you can use Windows Autopilot to configure the Out of Box Experience (OOBE), which includes automatic enrollment that enrolls devices in Intune.
139139

140140
#### Configuration Manager clients
141141
When you have Windows 10 devices that are Configuration Manager clients, you can enroll these devices and enable co-management from the Configuration Manager console. Configuration Manager triggers automatic enrollment into Intune based on the Azure AD tenant information.
@@ -179,7 +179,7 @@ ccmsetup.msi CCMSETUPCMD="/mp:https://contoso.cloudapp.net/CCM_Proxy_MutualA
179179
180180
#### New Windows 10 devices
181181
For new Windows 10 devices, you can use the Autopilot service to configure the out of box experience, which includes joining the device to AD and Azure AD, as well as enrolling the device in Intune. Then, create an app in Intune to deploy the Configuration Manager client.
182-
1. Enable AutoPilot for the new Windows 10 devices. For details, see [Overview of Windows AutoPilot](/windows/deployment/windows-10-auto-pilot).
182+
1. Enable Autopilot for the new Windows 10 devices. For details, see [Overview of Windows Autopilot](/windows/deployment/windows-10-auto-pilot).
183183
2. Configure automatic enrollment in Azure AD for your devices to be automatically enrolled into Intune. For details, see [Enroll Windows devices for Microsoft Intune](/intune/windows-enroll).
184184
3. Create an app in Intune with the Configuration Manager client package and deploy the app to Windows 10 devices that you want to co-manage. Use the [command line to install Configuration Manager client](#command-line-to-install-configuration-manager-client) when you go through the steps to [install clients from the internet using Azure AD](/sccm/core/clients/deploy/deploy-clients-cmg-azure).
185185

memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1802.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -292,9 +292,9 @@ If you deploy applications as available to users, they can now browse and instal
292292

293293

294294

295-
## Report on Windows AutoPilot device information
295+
## Report on Windows Autopilot device information
296296
<!-- 1351442 -->
297-
Windows AutoPilot is a solution for onboarding and configuring new Windows 10 devices in a modern way. For more information, see an [overview of Windows AutoPilot](/windows/deployment/windows-autopilot/windows-10-autopilot). One method of registering existing devices with Windows AutoPilot is to upload device information to the Microsoft Store for Business and Education. This information includes the device serial number, Windows product identifier, and a hardware identifier. Use Configuration Manager to collect and report this device information.
297+
Windows Autopilot is a solution for onboarding and configuring new Windows 10 devices in a modern way. For more information, see an [overview of Windows Autopilot](/windows/deployment/windows-autopilot/windows-10-autopilot). One method of registering existing devices with Windows Autopilot is to upload device information to the Microsoft Store for Business and Education. This information includes the device serial number, Windows product identifier, and a hardware identifier. Use Configuration Manager to collect and report this device information.
298298

299299
### Prerequisites
300300
- This device information only applies to clients on Windows 10, version 1703, and later
@@ -303,7 +303,7 @@ Windows AutoPilot is a solution for onboarding and configuring new Windows 10 de
303303
Try to complete the tasks. Then send **Feedback** from the **Home** tab of the ribbon letting us know how it worked.
304304

305305
1. In the Configuration Manager console, **Monitoring** workspace, expand the **Reporting** node, expand **Reports**, and select the **Hardware - General** node.
306-
2. Run the new report, **Windows AutoPilot Device Information** and view the results.
306+
2. Run the new report, **Windows Autopilot Device Information** and view the results.
307307
3. In the report viewer click the **Export** icon, and select **CSV (comma delimited)** option.
308308
4. After saving the file, upload the data to the Microsoft Store for Business and Education. For more information, see [add devices in Microsoft Store for Business and Education](/microsoft-store/add-profile-to-devices#add-devices-and-apply-autopilot-deployment-profile).
309309

memdocs/configmgr/core/get-started/capabilities-in-technical-preview-1806-2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ This release includes the following improvements:
314314

315315
- Deploying a [cloud distribution point with Azure Resource Manager](capabilities-in-technical-preview-1805.md#cloud-distribution-point-support-for-azure-resource-manager)
316316

317-
- Customers are using Windows AutoPilot to provision Windows 10 on Azure Active Directory-joined devices that are connected to the on-premises network. To install or upgrade the Configuration Manager client on these devices, now you don't need a cloud distribution point or on-premises distribution point configured to **Allow clients to connect anonymously**. Instead, enable the site option to **Use Configuration Manager-generated certificates for HTTP site systems**, which allows a cloud domain-joined client to communicate with an on-premises HTTP-enabled distribution point. For more information, see [Improved secure client communications](/sccm/core/get-started/capabilities-in-technical-preview-1805#improved-secure-client-communications).<!--515854-->
317+
- Customers are using Windows Autopilot to provision Windows 10 on Azure Active Directory-joined devices that are connected to the on-premises network. To install or upgrade the Configuration Manager client on these devices, now you don't need a cloud distribution point or on-premises distribution point configured to **Allow clients to connect anonymously**. Instead, enable the site option to **Use Configuration Manager-generated certificates for HTTP site systems**, which allows a cloud domain-joined client to communicate with an on-premises HTTP-enabled distribution point. For more information, see [Improved secure client communications](/sccm/core/get-started/capabilities-in-technical-preview-1805#improved-secure-client-communications).<!--515854-->
318318

319319

320320

0 commit comments

Comments
 (0)