* We also have additional documentation about the [fundamentals](docs/fundamentals) including file access consent.
12
12
* You're now ready to deploy and run your application on Windows.
13
13
14
-
Binaries for the tools used to package applications to run isolated are shared under the [releases](../../releases) section of the repo.
14
+
Binaries for the tools used to package applications to run isolated are shared under the [releases](https://github.com/microsoft/win32-app-isolation/releases) section of the repo.
15
15
16
16
Release notes for supported Windows builds and tools can be found [here](relnotes/windows-release-notes.md).
17
17
18
18
## Communicating with the team
19
19
We'd love to hear your feedback and answer your questions!
20
-
The best way to communicate with the team is through GitHub [discussions](../../discussions)and[issues](../../issues).
20
+
The best way to communicate with the team is through GitHub [discussions](https://github.com/microsoft/win32-app-isolation/discussions)
21
+
and [issues](https://github.com/microsoft/win32-app-isolation/issues).
21
22
Please search for similar discussions and issues before creating new ones.
is **outdated** for the purposes of the Win32 app isolation feature. You can find additional
12
12
documentation for MPT [here](https://learn.microsoft.com/en-us/windows/msix/packaging-tool/tool-overview).
13
13
14
-
You can find the download for MPT, as well as the profiler, in the [releases](../../../../releases) section of the github.
14
+
You can find the download for MPT, as well as the profiler, in the [releases](https://github.com/microsoft/win32-app-isolation/releases) section of the github.
15
15
16
16
## Win32 -> MSIX
17
17
skipped 1 lines
19
19
This flow will follow the "Create package on this computer" option. **Note** This will result
20
20
in the app installed as a normal win32 after finishing step 5.
#### 5. Download the application capability profiler archive and extract it to a convenient path.
31
31
32
-
The application capability profiler archive can be downloaded from this project's [release assets](../../../..//releases).
32
+
The application capability profiler archive can be downloaded from this project's [release assets](https://github.com/microsoft/win32-app-isolation/releases).
33
33
34
34
#### 6. Follow the instructions on [msix-packaging-tool](../packaging/msix-packaging-tool.md) to package the application and install it on the target system.
Superseded by -ManifestPath. Specifies the full name of the application package to be profiled. This can be obtained via [Get-AppxPackage](https://learn.microsoft.com/en-us/powershell/module/appx/get-appxpackage?view=windowsserver2022-ps). See [ApplicationCapabilityProfiler](application-capability-profiler.md) for details.
54
+
Superseded by -ManifestPath. Specifies the full name of the application package to be profiled.
55
+
This can be obtained via [Get-AppxPackage](https://learn.microsoft.com/en-us/powershell/module/appx/get-appxpackage?view=windowsserver2022-ps).
56
+
See [ApplicationCapabilityProfiler](../application-capability-profiler.md) for details.
Superseded by -ManifestPath. Specifies the full name of the application package from which to take away access attempt logging instrumentation. Avoid using unless individual packages must have instrumentation taken away. This can be obtained via [Get-AppxPackage](https://learn.microsoft.com/en-us/powershell/module/appx/get-appxpackage?view=windowsserver2022-ps). See [ApplicationCapabilityProfiler](application-capability-profiler.md) for details.
71
+
Superseded by -ManifestPath. Specifies the full name of the application package from which to take away access attempt logging instrumentation.
72
+
Avoid using unless individual packages must have instrumentation taken away.
73
+
This can be obtained via [Get-AppxPackage](https://learn.microsoft.com/en-us/powershell/module/appx/get-appxpackage?view=windowsserver2022-ps).
74
+
See [ApplicationCapabilityProfiler](../application-capability-profiler.md) for details.