ConfigMgrDogs

  • BREAKING: ConfigMgrDogs Together for Teched 2014!

    The ConfigMgrDogs boys will be getting together to deliver at TechEd Australia 2014!

    George, Ian and I will be delivering the ConfigMgrDogs Troubleshoot ConfigMgr 2012 (Level 400) session at both Melbourne and Sydney. We’ve got some exciting demos planned, and a surprise or two to be announced via the blog and Twitter. Subscribe to the blogs RSS here, or follow us on Twitter.

    Details haven’t formally been released, so stay tuned for more information!

    To wet your appetite, check out our previous TechEd sessions.

    Microsoft Application Virtualization 5.0: Introduction (TechEd 2012)

    http://channel9.msdn.com/Events/TechEd/Australia/2012/WCL312

    Implementing Security Compliance Manager for Compliance in SCCM 2012 (TechEd 2012)

    http://channel9.msdn.com/Events/TechEd/Australia/2012/SIM424

    PowerShell for ConfigMgr 2012 SP1 (TechEd 2013)

    http://channel9.msdn.com/Events/TechEd/Australia/2013/WCL416

  • Modern Style ConfigMgr Visio Stencil

    I went searching for some nice looking ConfigMgr Visio Stencils this morning and found the most amazing set created by Ryan Boud.

    You can download the stencils here (http://gallery.technet.microsoft.com/Modern-Style-Visio-da5a7470) and visit his blog (http://hmmconfused.wordpress.com/)

    Generic

    image

    Servers

    image

    Specialised

    image

    Thanks Ryan for such great work!

    Matt

  • Test your Collection WQL queries using WBEMTEST and PowerShell

     

    Hi All,

    one of the most useful tips I've learnt on the job is to use WBEMTEST on your Primary Site Server to test your Collection WQL queries. This is useful for doing things like testing the time it takes to run that query. This is especially useful when you get collections that take a very long time to run potentially causing backlogs and delays in collections updating. Using these tools can help you quickly test the queries for timing outside of Configuration Manager.

    WBEMTEST

    Log onto your Site Server or from your tools machine you can connect remotely. Ill show you both methods.

    Start up WBEMTEST from a command line

    image

    Click Connect

    image

    In Namespace type in the following

    root\SMS\SITE_XXX

    replace XXX with your SiteCode

    If your connecting remotely

    \\Computername\root\SMS\SITE_XXX

    then click Connect

    image

    Click the Query button

    image

    Enter your WQL query and click Apply

    image

    If you have a valid query you should see a result

    image

    PowerShell

    You could also run a similar query using PowerShell (Thanks to my fellow PFE’s Ryan Hall and Anthony Watherston for this.)

    just replace the value in the $WQL variable quotes with your query and of course PRI with your SiteCode.

    $WQL = 'select * from SMS_R_SYSTEM'

    $WMI = Get-WmiObject -Namespace Root\SMS\Site_PRI -Query $WQL

    $WMI

    image

    and if I want to measure that command for approximate timing

    Measure-Command -Expression {Get-WmiObject -Namespace Root\SMS\Site_PRI -Query 'select * from SMS_R_SYSTEM' }

    image

  • PowerShell Script to list Software Updates in a Software Update Group

     

    Hi everybody,

    In a recent Workshop that I was teaching I got asked how to list all of the security updates in a software update group. So I wrote a quick PowerShell script to do exactly that.

    Here is the code I used while on R2 CU1

    ############################################################################################

    $modulelocation = 'F:\Program Files\Microsoft Configuration Manager\AdminConsole\bin\configurationmanager.psd1'
    $SUG = 'Security Updates'

    Import-Module $modulelocation
    CD PRI:

    $SoftwareUpdates = (get-cmsoftwareupdategroup | Where {$_.LocalizedDisplayN -eq $SUG}).Updates
    Foreach ($SoftwareUpdate in $SoftwareUpdates){
    (Get-CMSoftwareUpdate -Id $SoftwareUpdate).LocalizedDisplayName

    }

    ############################################################################################

    image
    UPDATE

    After going to R2 CU2 The cmdlets changed slightly.

    Found a simpler command below

    ############################################################################################

    $modulelocation = 'F:\Program Files\Microsoft Configuration Manager\AdminConsole\bin\configurationmanager.psd1'
    $SUG = 'Security Updates'

    Import-Module $modulelocation
    CD PRI:

    (Get-CMSoftwareUpdate -UpdateGroupName $SUG).LocalizedDisplayName

    ############################################################################################

    image

    You will just need to change the two initial variables

    $Modulelocation to where your psd1 sits. See Matts blog for details on this.

    $SUG to the name of your Software Update Group.

    This will simply list all of the updates so you can paste it into any Change Request you need to create for Software Updates.

    Hopefully you find this useful but more than that hopefully this gets you started with some PowerShell. A fantastic free course that I always recommend to my students if you not sure where to begin is this MVA course run by Jeffrey Snover and Jason Helmick.

    Getting Started with PowerShell 3.0 Jump Start

    Feel free to comment with your own useful PowerShell script or even a new improved version of mine below…

  • ConfigMgrDogs on Twitter

    We’ve finally got an official ConfigMgrDogs Twitter account!

    https://twitter.com/ConfigMgrDogs

    Please follow us for all blog posts and news from the ConfigMgrDogs team!

  • Creating Custom RBAC Enabled Reports in ConfigMgr 2012 R2

    This post will step you through the process of creating custom reports in ConfigMgr 2012 R2 that will enforce your Role Based Access Control (RBAC) policies. Configuration Manager reports are now fully enabled for role-based administration. The data for all reports included with Configuration Manager is filtered based on the permissions of the administrative user who runs the report. Administrative users with specific roles can only view information defined for their roles. TechNet reference

    Step 1: Determine the data you wish to report on

    Using SQL Management Studio, confirm your SQL query against the new fn_rbac table views passing through the ('disabled') parameter to bypass the requirement of passing through a user SID

    NOTE: all fn_rbac_<table> views can be found under "Tabled-valued Functions".

    If you query v_<tables> than RBAC is ignored.

    clip_image001

    Step 2: Create a new custom report in ConfigMgr Management Console UI

    clip_image002

    clip_image003

    clip_image004

    Step 3: Editing your custom report will launch SQL Report Builder

    clip_image005

    clip_image006

    clip_image007

    clip_image008

    clip_image009

    Step 4: Design Your Report

    Confirm you can see Dataset values and select the type of Report you want to create

    clip_image010

    clip_image011

    clip_image012

    Step 5: Design and format your report as required

    clip_image013

    Step 7: Configure the Dependencies for RBAC

    Create a New Dataset

    clip_image014

    clip_image015

    clip_image016

    clip_image017

    clip_image018

    clip_image019

    clip_image020

    clip_image021

    clip_image022

    clip_image023

    clip_image024

    clip_image025

    clip_image026

    clip_image027

    clip_image028

    clip_image029

    NOTE: If you do not see the REFERENCES option, try and run your report, it will fail however will present the References parameters

    clip_image030

    clip_image031

    ALL DONE..

    Step 8: Test your custom report

    To test I have granted an admin account "sccm2012r2\Ian" that is limited only to the collection called "Ian's Collection"

    clip_image032

    Launch the ConfigMgr console using SCCM2012R2\Ian

    clip_image033

    clip_image034

    clip_image035

    clip_image036

    clip_image037

  • Application Catalog Failed – “Application installation not started”


    The application could not be installed. The most common reason is that software does not support the version of Windows currently installed on your computer. You can try starting the application installation from the Application Catalog again. If the problem continues, contact your network administrator

    clip_image002

    In the ConfigMgrSoftwareCatalog.log Silverlight log file (found at "C:\Users\mattsha\AppData\LocalLow\Microsoft\Silverlight\is\j2mecbot.hwg\v2uabsdl.022\1\s\s5i52ebhc445n0s2jyvmx5askg5zbspajpmi3e4bvujwll1luiaaaeda\f\ConfigMgrLogs\ConfigMgrSoftwareCatalog.log"), the following three lines were found.

    [1][06/23/2014 17:46:43] :ApplicationDetailViewModel.RequestPolicyAssingmentForInstallCallback-Error:The policy information is empty or an error ocurred!

    [1][06/23/2014 17:46:43] :ApplicationDetailViewModel.UpdatePageView:PageViewMode changed to:FastInstallError

    [1][06/23/2014 17:46:43] :FastInstallPageView:Create Page View FastInstallError

    Also in the ServicePortalWebSite.log (found "F:\Program Files\SMS_CCM\CMApplicationCatalog\Logs\ServicePortalWebSite.log") the following two errors

    [28, PID:6060][06/23/2014 17:59:54] :The web method threw a fault exception - System.ServiceModel.FaultException`1[Microsoft.ConfigurationManager.SoftwareCatalog.Service.Faults5000.ServiceError]: Invalid parameter

    [28, PID:6060][06/23/2014 17:59:54] :System.ServiceModel.FaultException`1[[Microsoft.ConfigurationManager.SoftwareCatalog.Service.Faults5000.ServiceError, Microsoft.ConfigurationManager.SoftwareCatalog.Website.PortalClasses, Version=5.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35]]: Invalid parameter

    I spent agestrying to troubleshoot this issue without success, and gave up for a short time while I did other things.

    A week later I was testing the Collection Evaluator Viewer program that comes with the R2 toolset and found that it was unable to connect directly to the database with a very similar error

    A connection was successfully established with the server, then then an error occurred during the login process. (provider: SSL Provider, error:0 – The certificate chain was issued by an authority that is not trusted)

    So now I can kind of tell that the issue is actually with the SQL db side, not necessarily ConfigMgr or the App Catalog site server roles.

    Next, I checked to make sure SQL is not forcing an encrypted connection using SQL Service Manager.

    clip_image003

    clip_image004

    All good there, however under the certificate tab I noticed we’ve got a self-signed certificate

    clip_image005

    And low-and-behold the certificate is having problems

    clip_image006

    I opened the IIS console to view the self-signed certificate

    clip_image007

    Exported the certificate

    clip_image009

    Import it into the Trusted Root Authorities

    clip_image010

    After the import, I attempted again to connect using the Collection Evaluation Viewer, this time it was successful as SQL now trusts the certificate

    clip_image011

    Back to the Application Catalog, and everything is now working nicely!

    clip_image012

    clip_image014

  • ConfigMgr 2012 Windows Update Client Process

    Hi Gang!

    So I provided this information to one of my customers recently, and Georgy said it would be quite helpful for you dedicated ConfigMgrDogs readers too, so here it is.

    This is a high-level view of the Windows Update process from a ConfigMgr clients view utilizing a SUP (Software Update Point).

    The Software Update process from the ConfigMgr client

    image

    Following the flow

    After refreshing machine policy, kick off the Software Update Scan. We can then see the Software Update Scan Cycle has started via the WUAHandler.log (C:\Windows\CCM\Logs\WUAHandler.log)

    image

    The Windows Update Handler initiates the Windows Update service against the ConfigMgr SUP. (C:\Windows\WindowsUpdate.log)

    image

    After the scan is completed, we then run the Software Update Deployment Evaluation Cycle. Use the UpdatesDeployment.log to view this process (C:\Windows\CCM\Logs\UpdatesDeployment.log)

    image

    The Content Access Service finds the content on the CMPRI-MATTSLABS Distribution Point and downloads it

    image

    Update Deployment attempts to install updates, Service Window Manager blocks the installation (C:\Windows\CCM\Logs\UpdatesDeployment.log)

    SNAGHTMLad0f073

    Service Window Manager blocking the installation (C:\Windows\CCM\Logs\ServiceWindowManager.log)

    clip_image002

    And when the window opens, the updates should install. Check the UpdatesDeployment.log

    image

    Also, the WindowsUpdate.log success

    image

    And reboot if required (and scheduled)

    image

    image

    Update: An ex-colleague reached out to me to add some extra info around the process for the SCEP update trigger. As my SCEP knowledge isn't the greatest, it's something I'll be sure to remember and very helpful for the community.

    The key difference that I can see is that the SCEP definition update initiates from the AntiMalware Policy configuration, not from the EndPoint client settings where I expected to see it, or the from Software Updates Schedule client setting.  As opposed of course to Software Update scanning and installation as per your post.  Also triggering a manual SCEP definition update is only done from the SCEP client and not the SCCM client actions from what I've seen so far.


    Thanks David!

  • ConfigMgr 2012 Version Numbers

    Hi all,

    as requested I’ve just listed all the ConfigMgr 2012 Released  versions in a table below. We will do our best to keep this up to date as new updates are released. Note that the Client and Console versions will be exactly the same as the Release/Update version.

    To see how to view the version see Matt’s earlier blog here. If you want to confirm a CU update see Neil’s blog here.

    Release/Update

    Version

    Build

    ConfigMgr 2012 RTM 5.00.7711.0000 7711
    ConfigMgr 2012 SP1 5.00.7804.1000 7804
    ConfigMgr 2012 SP1 CU1 5.00.7804.1202 7804
    ConfigMgr 2012 SP1 CU2 5.00.7804.1300 7804
    ConfigMgr 2012 SP1 CU3 5.00.7804.1400 7804
    ConfigMgr 2012 SP1 CU4 5.00.7804.1500 7804
    ConfigMgr 2012 SP1 CU5 5.00.7804.1600 7804
    ConfigMgr 2012 R2 5.00.7958.1000 7958
    ConfigMgr 2012 R2 CU1 5.00.7958.1203 7958
    ConfigMgr 2012 R2 CU2 5.00.7958.1303 7958
  • Orchestrator 2012 Logging and Debug Logging

     

    Hi All,

    If you’ve started playing with Orchestrator I have detailed the areas where you can look for issues with your Runbooks and other components.

     

    Runbook Designer

    Log Tab

    Firstly you can look at the Log tab while you’re Runbook is executing

     

    image

    Log History Tab

    Or after it is complete you can check the Log History tab

     

    image

    Double Click on the entry you want to review and then check the status for each Activity.

    image

    To control the level of Detail available you need to go to the properties of each individual Runbook  and select Store Activity-specific Published Data and or Store Common Published Data. NOTE This is only recommended in Dev and Test not production as these may significantly increase the size of your database (See the following TechNet reference for details. Database Sizing and Performance )

    Do not have these turned on in Production unless you are troubleshooting.

    image

    Events

    We can also get some useful information from the Events tab

    image

    Log Files

    Another area is the component logs for Debug Logging.

    Thankyou to Jeffrey Fanjoy who is a senior support escalation engineer based out of the US for this information.

    if you go to the following Registry key

    HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\SystemCenter2012\Orchestrator\TraceLogger

    on a box with the Runbook Designer or Runbook Server you will see that for each component there is a LogFolder and LogLevel key. The LogFolder shows you where the actual log sits and the LogLevel is the actual Verbosity level. (NOTE You may need to restart services/ the server before this will take affect.)

    Log Level

    Detail
    1 Errors
    3 Errors and warnings
    7 Errors, warnings and Information

    image

    Just keep in mind that the higher the verbosity the more information that will get put into the log so it should only be used for troubleshooting purposes and should not be left on by default.

  • I Wrote An App

    Hi Gang.

    Over the long weekend last week, I thought I’d have a crack at writing, submitting and publishing a Windows 8 app. It’s a very simple countdown to Windows XP’s End Of Life on April 8th (we are all very excited to see the end of XP).

    http://apps.microsoft.com/windows/en-au/app/windows-xp-end-of-life-countdown/08bd1136-13f0-47bb-a574-c8f3626a9227

    As I said, it’s very simple but functional, with a countdown screen and live tile that updates daily.

    Please download and rate it in the store.

    image

    Matt

  • System Center 2012 R2 Configuration Manager Toolkit

    Hi Everyone,

    just a very quick note to let you know that the Configuration Manager 2012 R2 Toolkit is available and is definitely worth a look.

    some of the new tools include

    CEViewer.exe for viewing collection update stats

    and

    DPJobManager a tool to help you monitor, suspend, cancel package distributions to Distribution Points

    download link below

    System Center 2012 R2 Configuration Manager Toolkit

  • Understanding ConfigMgr 2012 APP-V Virtual Environments

    ConfigMgr 2012 SP1 introduced APP-V Virtual Environments (VE). APP-V VE’s work differently to APP-V 5.0 Connection Groups in a “Full Infrastructure Model” (ie Publishing Server) so we need to do some application mapping before implementing APP-V Virtual Environments. You can think of ConfigMgr VE’s as a “Rule Set” that the ConfigMgr client evaluates when doing an application evaluation cycle. Once a client evaluates true to a VE “Policy”, the connection group is then created, The deviate in ConfigMgr is that an APP-V application can only be a member of one VE at anyone time. This blog aims to explain the reasons why this is the case and why application mapping is vital if your virtual application catalogue has a large number of applications that are highly dependant on other applications.

    Let’s say I have a three Applications I need to configure in a Connection Groups, in Full Infra I could easily create three separate connection groups and use the Priority to determine which VFS wins in a conflict.

    Full Infra Example (Firefox , Flash & Reader)

    Connection Group 1 = Firefox and Flash, priority = 1

    Connection Group 2 = Firefox and Reader, priority = 2

    Connection Group 3 = Firefox and Flash and Reader, priority = 3

    If I do not set my priorities correctly than as you know we get the following error

    clip_image001

    clip_image002

    However in ConfigMgr we need to use a single Virtual Environment Rule Set per application that we need to manage a Connection group for, and set Logical operators to determine the priorities. By Default the Connection Group priority in a ConfigMgr integrated environment is always set to “4294967294” (ie, the priority in traditional terms is not used in ConfigMgr). This is the underlining reason why a ConfigMgr virtual application can only ever be a member of one VE at any one time. ConfigMgr manages the creation of the Connection Group XML that gets created and processed by the client when the Client meets the rules set defined in the Virtual Environment.

    If I tried to setup the ConfigMgr Virtual Environment in the same way as I do in Full Infra, illustration below, This WILL NOT WORK! And we will end up with the same error as above

    Misconfigured Example below

    clip_image003

    clip_image004clip_image006clip_image005

    As I evaluate to True for both Virtual Environment Rule Set I configure both connection Groups but of course get the same ERROR

    clip_image007clip_image008

    To configure this in ConfigMgr I need to use my Logical operators inside the VE to achieve the same result I would get if doing it in a Full Infrastructure environment

    clip_image009clip_image010

    clip_image011

    Examples:

    Client 1: Has Firefox and Reader installed, ie No Flash. This meets the Virtual Environment rule configured so the “Firefox connection Group is created for Firefox and Reader.

    clip_image012clip_image013

    Client 2: Has Firefox, Flash and Reader installed. This also meets the Virtual Environment however as I have all three applications, the Flash VFS will take precedence over the Reader VFS as we have set Flash with a high ‘Order” in the Virtual Environment’.

    clip_image014clip_image015

    clip_image016

    Hope this helps clear up some miss understandings on how APP-V VE’s work in ConfigMgr 2012 SP1 +..

  • Windows 8 and Windows 8.1 New Group Policy Settings

    Windows 8 RTM

    For full details, download the following file

    image

     Policy Setting Name 
     
     Allow all trusted apps to install 
     Allow deployment operations in special profiles 
     Block launching desktop apps associated with a file. 
     Block launching desktop apps associated with a protocol 
     Block launching desktop apps associated with a file. 
     Block launching desktop apps associated with a protocol 
     Do not display the lock screen 
     Prevent changing lock screen image 
     Prevent changing start menu background 
     Turn on PIN sign-in 
     Turn off picture password sign-in 
     Do not display the password reveal button 
     Do not display the password reveal button 
     Device compatibility settings 
     Driver compatibility settings 
     Specify the search server for device driver updates 
     Turn off smart multi-homed name resolution 
     Turn off smart protocol reordering 
     Allow NetBT queries for fully qualified domain names 
     Prefer link local responses over DNS when received over a network with higher precedence 
     Turn off IDN encoding 
     IDN mapping 
     Use solid color for Start background 
     Turn on misconversion logging for misconversion report 
     Turn off saving auto-tuning data to file 
     Turn off history-based predictive input 
     Turn off Open Extended Dictionary 
     Turn off Internet search integration 
     Turn off custom dictionary 
     Restrict character code range of conversion 
     Do not include Non-Publishing Standard Glyph in the candidate list 
     Boot-Start Driver Initialization Policy 
     Turn off switching between recent apps 
     Turn off tracking of app usage 
     Do not allow Windows to activate Enhanced Storage devices 
     Do not throttle additional data 
     Send additional data when on battery power 
     Send data when on connected to a restricted/costed network 
     Do not throttle additional data 
     Send additional data when on battery power 
     Send data when on connected to a restricted/costed network 
     Windows To Go Default Startup Options 
     Allow hibernate (S4) when starting from a Windows To Go workspace 
     Disallow standby sleep states (S1-S3) when starting from a Windows to Go workspace 
     Turn off File History 
     Configure maximum age of file server shadow copies 
     Allow or Disallow use of encryption to protect the RPC protocol messages between File Share Shadow Copy Provider running on application server and File Share Shadow Copy Agent running on the file servers. 
     Enable / disable TXF deprecated features 
     Enable optimized move of contents in Offline Files cache on Folder Redirection server path change 
     Redirect folders on primary computers only 
     Redirect folders on primary computers only 
     Turn off offer text predictions as I type 
     Turn off insert a space after selecting a text prediction 
     Turn off autocorrect misspelled words 
     Turn off highlight misspelled words 
     Disallow copying of user input methods to the system account for sign-in 
     Block clean-up of unused language packs 
     Enable AD/DFS domain controller synchronization during policy refresh 
     Turn off Group Policy Client Service AOAC optimization 
     Configure Direct Access connections as a fast network connection 
     Change Group Policy processing to run asynchronously when a slow network connection is detected. 
     Configure Group Policy slow link detection 
     Specify workplace connectivity wait time for policy processing 
     Enable Hotspot Authentication 
     Turn off access to the Store 
     Turn off access to the Store 
     Turn off flip ahead feature 
     Turn on Enhanced Protected Mode 
     Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled 
     Always send Do Not Track header 
     Turn off encryption support 
     Show Content Advisor on Internet Options 
     Go to an intranet site for a one-word entry in the Address bar 
     Install binaries signed by MD2 and MD4 signing technologies 
     Prevent managing SmartScreen Filter 
     Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet 
     Turn off browser geolocation 
     Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash objects 
     Automatically activate newly installed add-ons 
     Turn off add-on performance notifications 
     Turn on ActiveX Filtering 
     Prevent deleting download history 
     Prevent deleting ActiveX Filtering and Tracking Protection data 
     Allow Internet Explorer 8 shutdown behavior 
     Specify default behavior for a new tab 
     Notify users if Internet Explorer is not the default web browser 
     Turn off URL Suggestions 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Allow Internet Explorer to play media files that use alternative codecs 
     Prevent configuration of top-result search on Address bar 
     Do not display the reveal password button 
     Turn off the WebSocket Object 
     Set the maximum number of WebSocket connections per server 
     Display tabs on a separate row 
     Establish InPrivate Filtering threshold 
     Establish Tracking Protection threshold 
     Turn off Tracking Protection 
     Use Policy List of Quirks Mode sites 
     Turn off ability to pin sites in Internet Explorer on the desktop 
     Set default storage limits for websites 
     Allow websites to store indexed databases on client computers 
     Set indexed database storage limits for individual domains 
     Set maximum indexed database storage limit for all domains 
     Allow websites to store application caches on client computers 
     Set application cache storage limits for individual domains 
     Set maximum application caches storage limit for all domains 
     Set application caches expiration time limit for individual domains 
     Set maximum application cache resource list size 
     Set maximum application cache individual resource size 
     Start Internet Explorer with tabs from last browsing session 
     Open Internet Explorer tiles on the desktop 
     Set how links are opened in Internet Explorer 
     Turn off flip ahead feature 
     Turn on Enhanced Protected Mode 
     Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled 
     Always send Do Not Track header 
     Show Content Advisor on Internet Options 
     Go to an intranet site for a one-word entry in the Address bar 
     Install binaries signed by MD2 and MD4 signing technologies 
     Prevent managing SmartScreen Filter 
     Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet 
     Disable Import/Export Settings wizard 
     Turn off browser geolocation 
     Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash objects 
     Automatically activate newly installed add-ons 
     Turn off add-on performance notifications 
     Turn on ActiveX Filtering 
     Prevent deleting download history 
     Prevent deleting ActiveX Filtering and Tracking Protection data 
     Allow Internet Explorer 8 shutdown behavior 
     Specify default behavior for a new tab 
     Disable changing secondary home page settings 
     Turn off URL Suggestions 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Render legacy filters 
     Enable dragging of content from different domains within a window 
     Enable dragging of content from different domains across windows 
     Turn off Print Menu 
     Allow Internet Explorer to play media files that use alternative codecs 
     Prevent configuration of search on Address bar 
     Prevent configuration of top-result search on Address bar 
     Do not display the reveal password button 
     Turn off the WebSocket Object 
     Set the maximum number of WebSocket connections per server 
     Display tabs on a separate row 
     Turn on Suggested Sites 
     Establish InPrivate Filtering threshold 
     Establish Tracking Protection threshold 
     Turn off Tracking Protection 
     Use Policy List of Quirks Mode sites 
     Turn off ability to pin sites in Internet Explorer on the desktop 
     Set default storage limits for websites 
     Allow websites to store indexed databases on client computers 
     Set indexed database storage limits for individual domains 
     Set maximum indexed database storage limit for all domains 
     Allow websites to store application caches on client computers 
     Set application cache storage limits for individual domains 
     Set maximum application caches storage limit for all domains 
     Set application caches expiration time limit for individual domains 
     Set maximum application cache resource list size 
     Set maximum application cache individual resource size 
     Start Internet Explorer with tabs from last browsing session 
     Open Internet Explorer tiles on the desktop 
     Set how links are opened in Internet Explorer 
     Install new versions of Internet Explorer automatically 
     KDC support for claims, compound authentication and Kerberos armoring 
     Warning for large Kerberos tickets 
     Specify KDC proxy servers for Kerberos clients 
     Disable revocation checking for the SSL certificate of KDC proxy servers 
     Fail authentication requests when Kerberos armoring is not available 
     Support compound authentication 
     Set maximum Kerberos SSPI context token buffer size 
     Kerberos client support for claims, compound authentication and Kerberos armoring 
     Hash Version support for BranchCache 
     Turn off Windows Location Provider 
     Show first sign-in animation 
     Do not enumerate connected users on domain-joined computers 
     Enumerate local users on domain-joined computers 
     Turn off app notifications on the lock screen 
     Automatic Maintenance Activation Boundary 
     Automatic Maintenance Random Delay 
     Automatic Maintenance WakeUp Policy 
     Turn off shared components 
     Prevent embedded UI 
     Support Email Address 
     Friendly Name 
     User Interface 
     Prefer Local Names Allowed 
     DirectAccess Passive Mode 
     Corporate Resources 
     IPsec Tunnel Endpoints 
     Custom Commands 
     Specify passive polling 
     Do not use NetBIOS-based discovery for domain controller location when DNS-based discovery fails 
     Specify address lookup behavior for DC locator ping 
     Use urgent mode when pinging domain controllers 
     Internet proxy servers for apps 
     Intranet proxy servers for  apps 
     Private network ranges for  apps 
     Proxy definitions are authoritative 
     Subnet definitions are authoritative 
     Remove "Work offline" command 
     Remove "Work offline" command 
     Enable file synchronization on costed networks 
     Detect compatibility issues for applications and drivers 
     Enable Automatic Hosted Cache Discovery by Service Connection Point 
     Configure Client BranchCache Version Support 
     Configure Hosted Cache Servers 
     Set age for segments in the data cache 
     Turn on Module Logging 
     Set the default source path for Update-Help 
     Turn on Module Logging 
     Set the default source path for Update-Help 
     Isolate print drivers from applications 
     Always rasterize content to be printed using a software rasterizer 
     Do not allow v4 printer drivers to show printer extensions 
     Change Microsoft XPS Document Writer (MXDW) default output format to the legacy Microsoft XPS format (*.xps) 
     Turn off storage and display of search history 
     Always use automatic language detection when indexing content and properties 
     Do not sync 
     Do not sync app settings 
     Do not sync passwords 
     Do not sync personalize 
     Do not sync other Windows settings 
     Do not sync desktop personalization 
     Do not sync browser settings 
     Do not sync on metered connections 
     File Classification Infrastructure: Display Classification tab in File Explorer 
     File Classification Infrastructure: Specify classification properties list 
     Enable access-denied assistance on client for all file types 
     Clear history of tile notifications on exit 
     Prevent users from uninstalling applications from Start 
     Show "Run as different user" command on Start 
     Do not allow taskbars on more than one display 
     Set IP Stateless Autoconfiguration Limits State 
     Specify default connection URL 
     Limit maximum display resolution 
     Suspend user sign-in to complete app registration 
     Configure image quality for RemoteFX Adaptive Graphics 
     Configure RemoteFX Adaptive Graphics 
     Allow RDP redirection of other supported RemoteFX USB devices from this computer 
     Configure RemoteFX 
     Optimize visual experience when using RemoteFX 
     Enable RemoteFX encoding for RemoteFX clients designed for Windows Server 2008 R2 SP1 
     Select network detection on the server 
     Select RDP transport protocols 
     Turn Off UDP On Client 
     Turn off Fair Share CPU Scheduling 
     Use the hardware default graphics adapter for all Remote Desktop Services sessions 
     Configure image quality for RemoteFX Adaptive Graphics 
     Configure RemoteFX Adaptive Graphics 
     Enable Remote Desktop Protocol 8.0 
     Select network detection on the server 
     Select RDP transport protocols 
     Turn Off UDP On Client 
     Turn on TPM backup to Active Directory Domain Services 
     Configure the level of TPM owner authorization information available to the operating system 
     Standard User Lockout Duration 
     Standard User Individual Lockout Threshold 
     Standard User Total Lockout Threshold 
     User management of sharing user name, account picture, and domain information with apps (not desktop apps) 
     Download roaming profiles on primary computers only 
     Set user home folder 
     Choose drive encryption method and cipher strength 
     Configure use of passwords for operating system drives 
     Reset platform validation data after BitLocker recovery 
     Disallow standard users from changing the PIN or password 
     Use enhanced Boot Configuration Data validation profile 
     Enforce drive encryption type on operating system drives 
     Allow network unlock at startup 
     Enable use of BitLocker authentication requiring preboot keyboard input on slates 
     Allow Secure Boot for integrity validation 
     Enforce drive encryption type on fixed data drives 
     Enforce drive encryption type on removable data drives 
     Prohibit connection to non-domain networks when connected to domain authenticated network 
     Minimize the number of simultaneous connections to the Internet or a Windows Domain 
     Prohibit connection to roaming Mobile Broadband networks 
     Disable power management in connected standby mode 
     Location where all default Library definition files for users/machines reside. 
     Start File Explorer with ribbon minimized 
     Location where all default Library definition files for users/machines reside. 
     Configure Windows SmartScreen 
     Show lock in the user tile menu 
     Show sleep in the power options menu 
     Show hibernate in the power options menu 
     Do not show the 'new application installed' notification 
     Start File Explorer with ribbon minimized 
     Set a default associations configuration file 
     Allow the use of remote paths in file shortcut icons 
     Disallow WinRM from storing RunAs credentials 
     Require use of fast startup 
     Turn off the Store application 
     Turn off the Store application 
     Allow Store to install apps on Windows To Go workspaces 
     Turn off Automatic Download of updates 
     Set Cost 
     Turn off tile notifications 
     Turn off toast notifications 
     Turn off toast notifications on the lock screen 
     Turn off notifications network usage 
     Set 3G Cost 
     Set 4G Cost 

    Windows 8.1

    For full details, download the following file

    image

     Policy Setting Name 
     
     Allow development of Windows Store apps without installing a developer license 
     Prevent enabling lock screen slide show 
     Prevent enabling lock screen camera 
     Force a specific background and accent color 
     Force a specific Start background 
     Force a specific default lock screen image 
     Allow users to select when a password is required when resuming from connected standby 
     Restrict delegation of credentials to remote servers 
     Prevent adding
     App switching 
     Charms 
     WinX 
     Automatically send memory dumps for OS-generated error reports 
     Automatically send memory dumps for OS-generated error reports 
     Configure Group Policy Caching 
     Configure Logon Script Delay 
     Turn off loading websites and content in the background to optimize performance 
     Turn on the swiping motion on Internet Explorer for the desktop 
     Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows 
     Allow Internet Explorer to use the SPDY/3 network protocol 
     Turn off phone number detection 
     Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Turn off loading websites and content in the background to optimize performance 
     Turn on the swiping motion on Internet Explorer for the desktop 
     Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows 
     Allow Internet Explorer to use the SPDY/3 network protocol 
     Turn off phone number detection 
     Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Don't run antimalware programs against ActiveX controls 
     Prevent deleting ActiveX Filtering
     Prevent deleting ActiveX Filtering
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     Allow cut
     KDC support for claims
     Kerberos client support for claims
     Automatic Maintenance Random Delay 
     Use DNS name resolution when a single-label domain name is used
     At logoff
     Run Windows PowerShell scripts first at computer startup
     Run Windows PowerShell scripts first at user logon
     Run Windows PowerShell scripts first at user logon
     Disable indexing of removable drives 
     Don't search the web or display web results in Search 
     Don't search the web or display web results in Search over metered connections 
     Set what information is shared in Search 
     Set the SafeSearch setting for Search 
     Do not sync Apps 
     Do not sync start settings 
     
     
     
     Pin Apps to Start when installed 
     Start Screen Layout 
     Default 
     Default app 
     Default search 
     Sort 
     Multimon 
     Pin Apps to Start when installed 
     Start Screen Layout 
     Remove and prevent access to the Shut Down
     For tablet pen input
     For tablet pen input
     For touch input
     For touch input
     Include rarely used Chinese
     Include rarely used Chinese
     Set remote control session UAC desktop 
     Use advanced RemoteFX graphics for RemoteApp 
     Set remote control session UAC desktop 
     Set remote control permission request timeout 
     Enable Remote Desktop Protocol 8.0 
     User management of sharing user name
     Choose drive encryption method and cipher strength (Windows Vista
     Configure TPM platform validation profile (Windows Vista
     Allow antimalware service to startup with normal priority 
     Turn on virus definitions 
     Configure local administrator merge behavior for lists 
     Define addresses to bypass proxy server 
     Define proxy server for connecting to the network 
     Randomize scheduled task times 
     Allow antimalware service to remain running always 
     Extension Exclusions 
     Path Exclusions 
     Process Exclusions 
     Turn on protocol recognition 
     Turn on definition retirement 
     Define the rate of detection events for logging 
     IP address range Exclusions 
     Port number  Exclusions 
     Process Exclusions for outbound traffic 
     Threat ID Exclusions 
     Specify additional definition sets for network traffic inspection 
     Configure local setting override for the removal of items from Quarantine folder 
     Configure removal of items from Quarantine folder 
     Turn on behavior monitoring 
     Turn on Information Protection Control 
     Turn on network protection against exploits of known vulnerabilities 
     Scan all downloaded files and attachments 
     Monitor file and program activity on your computer 
     Turn on raw volume write notifications 
     Turn on process scanning whenever real-time protection is enabled 
     Define the maximum size of downloaded files and attachments to be scanned 
     Configure local setting override for turn on behavior monitoring 
     Configure local setting override for monitoring file and program activity on your computer 
     Configure local setting override to turn off Intrusion Prevention System 
     Configure local setting override for scanning all downloaded files and attachments 
     Configure local setting override to turn on real-time protection 
     Configure local setting override for monitoring for incoming and outgoing file activity 
     Configure monitoring for incoming and outgoing file and program activity 
     Configure local setting override for the time of day to run a scheduled full scan to complete remediation 
     Specify the day of the week to run a scheduled full scan to complete remediation 
     Specify the time of day to run a scheduled full scan to complete remediation 
     Configure time out for detections requiring additional action 
     Configure time out for detections in critically failed state 
     Configure Watson events 
     Configure time out for detections in non-critical failed state 
     Configure time out for detections in recently remediated state 
     Configure Windows software trace preprocessor components 
     Configure WPP tracing level 
     Allow users to pause scan 
     Specify the maximum depth to scan archive files 
     Specify the maximum size of archive files to be scanned 
     Specify the maximum percentage of CPU utilization during a scan 
     Scan archive files 
     Turn on catch-up full scan 
     Turn on catch-up quick scan 
     Turn on e-mail scanning 
     Turn on heuristics 
     Scan packed executables 
     Scan removable drives 
     Turn on reparse point scanning 
     Create a system restore point 
     Run full scan on mapped network drives 
     Scan network files 
     Configure local setting override for maximum percentage of CPU utilization 
     Configure local setting override for the scan type to use for a scheduled scan 
     Configure local setting override for schedule scan day 
     Configure local setting override for scheduled quick scan time 
     Configure local setting override for scheduled scan time 
     Turn on removal of items from scan history folder 
     Specify the interval to run quick scans per day 
     Start the scheduled scan only when computer is on but not in use 
     Specify the scan type to use for a scheduled scan 
     Specify the day of the week to run a scheduled scan 
     Specify the time for a daily quick scan 
     Specify the time of day to run a scheduled scan 
     Define the number of days before spyware definitions are considered out of date 
     Define the number of days before virus definitions are considered out of date 
     Define file shares for downloading definition updates 
     Turn on scan after signature update 
     Allow definition updates when running on battery power 
     Initiate definition update on startup 
     Define the order of sources for downloading definition updates 
     Allow definition updates from Microsoft Update 
     Allow real-time definition updates based on reports to Microsoft MAPS 
     Specify the day of the week to check for definition updates 
     Specify the time to check for definition updates 
     Allow notifications to disable definitions based reports to Microsoft MAPS 
     Define the number of days after which a catch-up definition update is required 
     Specify the interval to check for definition updates 
     Check for the latest virus and spyware definitions on startup 
     Configure local setting override for reporting to Microsoft MAPS 
     Specify threats upon which default action should not be taken when detected 
     Specify threat alert levels at which default action should not be taken when detected 
     Display notifications to clients when they need to perform actions 
     Display additional text to clients when they need to perform an action 
     Always automatically restart at the scheduled time 
     Specify Work Folders settings 
     Turn off tile notifications 
     Turn off toast notifications 
     Turn off toast notifications on the lock screen 
     Turn off notifications network usage 
     Turn off Quiet Hours 
     Set the time Quiet Hours begins each day 
     Set the time Quiet Hours ends each day 
     Turn off calls during Quiet Hours 
     Set 3G Cost 
     Set 4G Cost 
  • Software Update Compliance Reports – Detection State Unknown

    I have been working with a number of customers recently that have had issues running their monthly Software Update compliance reports due to a high number of “DETECTION STATE UNKOWN” results reporting back long after the update deployment has successfully run.

    As usual the first thing we want to identify is whether it is on the client side or server side.

    State Message IDs are used to define specific state messages for each topic type. For our issue a State Message for a Software Updates has a TopicType=500 which has status Message ID state of 0, 1, 2 or 3 which would then depict the actual state of the given update on a client machine as below:

    Topic Type

    State Message ID

    State Message Description

    500

    0

    Detection state unknown

    500

    1

    Update is not required

    500

    2

    Update is required

    500

    3

    Update is installed

    To determine what information your clients are sending back to your Management Point we can use WMI queries to see what is happening on the client.

    1. Open wbemtest with elevated permissions

    image

    2. Connect to the WMI Namespace: root\CCM\StateMsg

    image

    3. Select Query and run the query  SELECT * FROM CCM_StateMsg

    image

    image

    Find any software update deployment which can be determined by looking for “TopicType=500” and what we want to check is the below values in yellow as this will determine if the client has indeed sent a message back to the MP and if so what it sent back, If we see it sent back a “0” and confirm that the KBs are installed then we know it is something on the client side, we would expect to see 1, 2 ,3 pending the state listed above

    image

    image

    image

    image

    Example below:

    instance of CCM_StateMsg

    { Criticality = 0;

    MessageSent = TRUE;      Message is sent

                                                MessageTime = "20101027211908.749000+000";           UTC Time

                                                ParamCount = 1;

                                                StateDetails = "";

                                                StateDetailsType = 0;

    StateID = 2;   Update is required

                                                TopicID = "9d4681d5-46fa-4250-bedc-480ac7bce3aa";

                                                TopicIDType = 3;

    TopicType = 500;   Update Detection

                                                UserFlags = 0;

                                                UserParameters = {"102"};

    Hope this helps..

  • Migrating App-V Packages– "OSD file defines incompatible OS requirements”

    Ran into an interesting issue while trying to migrate some App-V Applications from ConfigMgr 2007 to 2012 SP1. Most of the App-V packages migrated fine, however a few of them reported an error

    “OSD file defines incompatible OS requirements”

    After taking a look at the OSD file, according to this list all of the OS version listed were fine. After some troubleshooting I found that all the failing Applications had multiple OSD files associated. This led me to the solution.

    If you have multiple OSD files as part of an App-V Application, you must have the same OS requirements listed in all of the OSD files. Once we fixed the compatible OS list, the Application migrated successfully. 

  • Supported AV clients for SCEP to automatically remove

    I’ve just spent a frustrating 10 minutes searching bing/google for the list of the supported anti-virus programs that SCEP (System Center Endpoint Protection) can automatically uninstall. So to save my scalp for a future hair pulling, I thought I’d blog the list so I can find it quickly next time. Hopefully bing/google will index this post and save us all some time!

    http://technet.microsoft.com/en-us/library/gg682067.aspx#BKMK_EndpointProtectionDeviceSettings

    Automatically remove previously installed antimalware software before Endpoint Protection is installed

    Endpoint Protection uninstalls the following antimalware software only:

    • Symantec AntiVirus Corporate Edition version 10
    • Symantec Endpoint Protection version 11
    • Symantec Endpoint Protection Small Business Edition version 12
    • McAfee VirusScan Enterprise version 8
    • Trend Micro OfficeScan
    • Microsoft Forefront Codename Stirling Beta 2
    • Microsoft Forefront Codename Stirling Beta 3
    • Microsoft Forefront Client Security v1
    • Microsoft Security Essentials v1
    • Microsoft Security Essentials 2010
    • Microsoft Forefront Endpoint Protection 2010
    • Microsoft Security Center Online v1
  • Redistribute Package in Configuration Manager 2012

    One pain point with Configuration Manager 2007, was that when a package failed to distribute content to a distribution point after the retry count was exceeded, it was permanently stuck in a distributing state. There was no easy supported method to redistribute that package to a specific Distribution Point.

    Now in 2012 we have the new option to Redistribute a package.

    Open the properties of any application or package and click on the Content Locations tab.

    From there you can either select a specific Distribution point or a Distribution Point Group. see Figures below

    Application Properties

    image

    Package Properties

    image

    then Click on Redistribute

    image

    Click OK on the Warning and the package will then redistribute the content to that DP or DP Group.

  • TechEd Australia 2013 - PowerShell for ConfigMgr 2012 SP1 - Demo 2

    Demo 2: Connecting via PowerShell

    Importing the ConfigMgr module

    Import-Module 'C:\Program Files (x86)\Microsoft Configuration Manager\AdminConsole\bin\ConfigurationManager.psd1'

    Connect to Primary Site (where PRI is the site code)

    Set-Location PRI:\

    Display all Configuration Manager cmdlets

    Get-Command -Module ConfigurationManager

    Display a count of all the Configuration Manager cmdlets

    (Get-Command -Module ConfigurationManager).Count

  • TechEd Australia 2013 - PowerShell for ConfigMgr 2012 SP1 - Demo 4

     Demo 4: Packages

    Automatically create Package from source directory, create Deployment Type, create Collection and Deployment

    $ErrorActionPreference = "Stop"
    Set-Location C:\
    $NewPackageLocation = "\\TECHED13\NewPackages\*"
    $CorpSourcelocation = "\\TECHED13\Source$\Packages"
    $NewPackageLocation = Get-Item $NewPackageLocation
    Copy-Item $NewPackageLocation -Destination $CorpSourcelocation -Recurse
    Remove-Item $NewPackageLocation -Recurse
    $PackageSourcePath = $CorpSourcelocation + '\' + $NewPackageLocation.Name
    $SplitValues = $NewPackageLocation.Name.Split("-")
    $PackageManufacturer = $SplitValues[0]
    $PackageName = $SplitValues[1]
    $PackageVersion = $SplitValues[2]
    $PackageLanguage = $SplitValues[3]
    Import-Module 'C:\Program Files (x86)\Microsoft Configuration Manager\AdminConsole\bin\ConfigurationManager.psd1'
    Set-Location PRI:\
    New-CMPackage -Path $PackageSourcePath -Name $PackageName -Manufacturer $PackageManufacturer -Version $PackageVersion -Language $PackageLanguage -Description "Created Using PowerShell"
    New-CMProgram -PackageName $PackageName -StandardProgramName "Setup $PackageName" -CommandLine "msiexec /i setup.msi /q"
    Start-CMContentDistribution -PackageName $PackageName -DistributionPointGroupName "All DPs"
    New-CMDeviceCollection -Name "Install -  $PackageManufacturer$PackageName$PackageLanguage$PackageVersion" -LimitingCollectionName "All Systems"
    Start-CMPackageDeployment -PackageName $PackageName -StandardProgramName "Setup $PackageName" -CollectionName "Install -  $PackageManufacturer$PackageName$PackageLanguage$PackageVersion" -DeployPurpose Available

  • TechEd Australia 2013 - PowerShell for ConfigMgr 2012 SP1 - Demo 3

     Demo 3: Collections

    Creating a single Collection

    New-CMDeviceCollection -LimitingCollectionName "All Systems" -Name "All Computers in 10.10.10.0" -RefreshType ConstantUpdate

    Creating a Collection Query Membership Rule for the above Collection

    Add-CMDeviceCollectionQueryMembershipRule -CollectionName "All Computers in 10.10.10.0" -QueryExpression "Select * from SMS_R_System where SMS_R_System.IPSubnets like '10.10.10.0'" -RuleName "10.10.10.0 Subnet Query"

    Source CSV file automated Collection creation

    NewMelbourneDCSubnets.csv (rename the file to NewMelbourneDCSubnets.csv)

    Script creating Collections based on CSV file

    $CSVSubnets = Import-Csv -Path .\NewMelbourneDCSubnets.csv
    Set-Location PRI:\
    ForEach($Collection in $CSVSubnets)
    {
    New-CMDeviceCollection -LimitingCollectionName "All Systems" -Name $Collection.SubnetName -RefreshType Constantupdate
    Add-CMDeviceCollectionQueryMembershipRule -CollectionName $Collection.SubnetName -QueryExpression "Select * from SMS_R_System where SMS_R_System.IPSubnets like '$($Collection.Subnet)'" -RuleName "$($Collection.Subnet) Subnet Query"
    }

  • TechEd Australia 2013 - PowerShell for ConfigMgr 2012 SP1 Content

    image

    Update: here is the video of my session (link below for full resolution video)

    http://channel9.msdn.com/Events/TechEd/Australia/2013/WCL416 


    Hello ConfigMgrDogs community.

    I’ve just completed my TechEd 2013 presentation – PowerShell for ConfigMgr 2012 SP1. For those who weren’t attending the event, I’ve provided all scripts and cmdlets from the session.

    In the coming weeks there will also be the video posted.

    Demo 1 – PowerShell Basics

    http://aka.ms/Bf7b7c

    Demo 2 – Connecting to ConfigMgr

    http://aka.ms/Pb6sbx

    Demo 3 – Collections

    http://aka.ms/Xq09ps

    Demo 4 – Apps and Packages

    http://aka.ms/Khmrnv

    Demo 5 – Application Approval

    http://aka.ms/Sr6m82

    Demo 6 – Five Demos in Five Minutes

    http://aka.ms/Esmluw

  • TechEd Australia 2013 - PowerShell for ConfigMgr 2012 SP1 - Demo 5

     Demo 5: App Approvals

    Script for System Tray notification, pop-up form and Approve/Deny an Application Approval Request

    Add-Type -AssemblyName System.Windows.Forms
    Import-Module 'C:\Program Files (x86)\Microsoft Configuration Manager\AdminConsole\bin\ConfigurationManager.psd1'
    Set-Location PRI:\
    $ApprovalRequests = Get-CMApprovalRequest | Where{$_.CurrentState -eq 1}
    ForEach ($Approval in $ApprovalRequests)
    {
    function Popup-Form

    param ($form)
                      
        $form.ShowDialog()    
    }
    $RequestUser = $Approval.User.TrimStart("CONTOSO\")
    $RequestApp = $Approval.Application

    $container = New-Object System.ComponentModel.Container
    $notifyIcon = New-Object System.Windows.Forms.NotifyIcon($container)
    $notifyIcon.Icon = New-Object System.Drawing.Icon("C:\Scripts\Demo 5\tick.ico")
    $notifyIcon.Text = "New App Approval Request Available"
    $notifyIcon.Visible = $true
    $notifyIcon.BalloonTipText = "New App Approval Request Available"

    $formImage = [System.Drawing.Image]::FromFile("C:\Scripts\Demo 5\background.jpg")
    $form = New-Object System.Windows.Forms.Form
    $form.Add_Shown({$form.Activate()})
    $form.Size = New-Object System.Drawing.Point(325,200)
    $form.StartPosition = "Manual"
    $form.Text = "New App Approval Request"
    $form.BackgroundImage = $formImage
    $screenBounds = [system.Windows.Forms.Screen]::Getworkingarea(0)
    $form.Location = New-Object System.Drawing.Point( (($screenBounds.right) - ($form.Width)),(($screenBounds.Bottom) - ($form.height)) )
    $form.FormBorderStyle = "fixedDialog"

    $label = New-Object System.Windows.Forms.Label
    $label.Text = "$RequestUser has requested the $RequestApp application"
    $label.Location = New-Object System.Drawing.Point(10,20)
    $label.MaximumSize = New-Object System.Drawing.Size(300,100)
    $label.Font = New-Object System.Drawing.Font("Segoe UI",11,[system.drawing.fontstyle]::regular)
    $label.Autosize = $true
    $label.BackColor = "Transparent"
    $form.Controls.Add($label)

    $buttonApprove = New-Object System.Windows.Forms.Button
    $buttonApprove.Text = "Approve"
    $buttonApprove.Size = New-Object System.Drawing.Size(120,50)
    $buttonApprove.Location = New-Object System.Drawing.Point(35,110)

    $buttonApprove.Add_Click(
    {
    # Approve Request
    Set-Location PRI:\
    Approve-CMApprovalRequest -Id $Approval.CI_UniqueID -Comment "Approved via PowerShell Form"
    $form.close()
    $notifyIcon.Visible = $false
    New-Event ClickComplete
    })
    $form.Controls.Add($buttonApprove)

    $buttonDeny = New-Object System.Windows.Forms.Button
    $buttonDeny.Text = "Deny"
    $buttonDeny.Size = New-Object System.Drawing.Size(120,50)
    $buttonDeny.Location = New-Object System.Drawing.Point(165,110)

    $buttonDeny.Add_Click(
    {
    # Deny Request
    Set-Location PRI:\
    Deny-CMApprovalRequest -Id $Approval.CI_UniqueID -Comment "Denied via PowerShell Form"
    $form.close()
    $notifyIcon.Visible = $false
    New-Event ClickComplete
    })
    $form.Controls.Add($buttonDeny)

    $notifyIcon.ShowBalloonTip(3)
    Register-ObjectEvent -InputObject $notifyIcon -EventName BalloontipClicked -Action {Popup-Form -form $form} | Out-Null
    Register-ObjectEvent -InputObject $notifyIcon -EventName MouseClick -Action {Popup-Form -form $form} | Out-Null
    Wait-Event -SourceIdentifier ClickComplete | Out-Null
    Remove-Event -SourceIdentifier ClickComplete | Out-Null
    }

    VBScript to launch the PowerShell script silently

    command = "%SystemRoot%\syswow64\WindowsPowerShell\v1.0\powershell.exe -NoLogo -WindowStyle Hidden -File C:\Scripts\Sched\Demo5_Complete.ps1"
    set shell = CreateObject("WScript.Shell")
    shell.Run command,2

     

    Files required to run the script

    background.jpg (rename to background.jpg)

    tick.ico (rename to tick.ico)

  • TechEd Australia 2013 - PowerShell for ConfigMgr 2012 SP1 - Demo 1

     Demo 1: Three Minute Intro to PowerShell

    Display all Bluetooth services

    Get-Service –DisplayName “*Bluetooth*”

    Store all services into a variable

    $AllServices = Get-Service

    Display a count of all the systems services

    $AllServices.Count

    Display a count of all the Bluetooth services

    $BluetoothServices = Get-Service –DisplayName “*Bluetooth*”
    $BluetoothServices.Count

    Stop all Bluetooth services

    $BluetoothServices | Stop-Service

    Start all Bluetooth services

    $BluetoothServices | Start-Services

  • TechEd Australia 2013 - PowerShell for ConfigMgr 2012 SP1 - Demo 6

     Demo 6: Five Demos in Five Minutes

    List the drivers in a given Boot Image

    $BootImage = $(Get-CMBootImage -Id "PRI00005").ReferencedDrivers
    ForEach($Driver in $BootImage)
    {Get-CMDriver | Where{$_.ContentSourcePath -eq $Driver.SourcePath} | Select LocalizedDisplayName

    List all Collections with Incremental Collection Updates enabled

    Get-CMDeviceCollection | Where{$_.RefreshType -eq 6} | Select Name

    Clear Required PXE Deployments for a Collection

    Clear-CMPxeDeployment -DeviceCollectionId "PRI0010E"

    Export Boundaries to a CSV file

    Get-CMBoundary | Select DisplayName,Value,SiteSystems | Export-Csv -LiteralPath C:\Temp\Boundaries.csv

    Lock an Application

    Lock-CMObject -InputParameter $(Get-CMApplication -Name "Demo App 1")