Jump to content


anyweb

Root Admin
  • Posts

    9176
  • Joined

  • Last visited

  • Days Won

    366

Everything posted by anyweb

  1. can you connect to the sql server from the primary site ? are you running setup with the appropriate permissions (sysadmin) for the sql server
  2. have you verified the certs are in place BEFORE starting the refresh ?
  3. THE WINDOWS 8.1 release to manufacturers (RTM) build has seen over two million downloads since Microsoft distributed it to Technet and MSDN subscribers on Tuesday, the firm's EVP of marketing Tami Reller has claimed. Announcing the news in a keynote at the Intel Developer Forum (IDF) on Wednesday, Microsoft's Reller claimed that the firm had seen an "incredible uptake" of the Windows 8.1 build since its release. On 27 August, Microsoft announced that its RTM build of Windows 8.1 was complete, but that it would not make it available to developers on Technet and MSDN until the general availability (GA) launch on 18 October. The firm's excuse for withholding the code was that it was still making a few changes in cooperation with hardware OEM partners, so the operating system release wasn't final. However, then Microsoft released the RTM build to MSDN and Technet users on Tuesday, due to strong demand and a lot of moaning from developers. The two million download figure suggests two things: that Windows 8 developers see the Windows 8.1 release as a much needed update, and that Microsoft did right to reverse its earlier decision to withhold the RTM build until its general availability later this year. On stage, Reller said that the Windows 8.1 release shows that the software house will "respond and listen" to suggested improvements to Windows 8, promising that Windows 8.1 is "a good example of [Microsoft] doing both of those things". Microsoft hopes that the updates in Windows 8.1 will help those customers who dislike how different the operating system feels in relation to earlier releases to like it again. "It gives the audience a chance for Windows 8 to be familiar again, whether it's the Start button, whether it's the ability to boot to desktop, whether it's the old apps view or just the ability to turn off charms if you're in a keyboard type of environment," Reller added. While on stage, Reller also took the opportunity to discuss Windows XP end of support, revealing that the firm has "now seen about three quarters of Windows enterprises moving to modern desktops" from Windows XP, with the last leg of Windows XP migrations being helped by Windows 8.1. via > http://www.theinquirer.net/inquirer/news/2294174/windows-81-rtm-hits-two-million-downloads-in-24-hours
  4. if you just want to capture an image you've already created then use capture media as described here.
  5. i7 is overkill on a limited budget, save the money and buy more SSD storage instead.
  6. thanks ! please post the smsts.log including the failure that's the best thing at this point
  7. you dont need a tpm in the host pc, but in the client machine you are testing bitlocker on (assuming it's bitlocker capable) if it's a vm then it's not, you'll need to test bitlocker on real hardware.
  8. Microsoft listened and posted the RTM bits of Windows 8.1 and Server 2012 R2 on Technet and MSDN today. chances are though that by GA (General Availability to the public) in October 18th that some updates for both operating systems will be present and ready for download if the below is a hint... The Windows 8.1 Enterprise version will be available to MSDN/TechNet and volume licensees before the end of September, apparently, so for now you can download the Professional and Retail editions. still it's good news that we've got the RTM bits, I'm downloading them now and will be deploying them as soon as I can, adios niall.
  9. that's because this guide was created before SP1 was released, SP1 changed the way that build and capture works, if you want to see the new process look at the guides below using System Center 2012 Configuration Manager - Part 12. Connecting Powershell and building a reference image of Windows 8 with .NET 3.5 using System Center 2012 Configuration Manager - Part 13. Deploying Windows 8 X64 with custom Start screen
  10. also look at System Center 2012 Configuration Manager Unleashed, I wrote chapter 16 and contributed to some other chapters.
  11. Introduction Remotely accessing computers allows you to control those computers from your own desktop with (or in some cases without) the other users consent. System Center 2012 Configuration Manager offers three methods from within the console to remotely control other computers with the client agent installed. Remote Control Remote Assistance Remote Desktop client In the above list, only Remote Control is specific to Configuration Manager (i.e. it's a tool provided by Configuration Manager). Both Remote Assistance and Remote Desktop Client are Windows technologies. Workgroup based computers pose their own challenges as they lack many of the security benefits of Domain membership and as a result lack access to resources. Before we can do anything with our workgroup clients (including remote control) we need our Configuration Manager client software installed but before we do that we have to prepare our clients for this installation by preparing them. As workgroup clients are not joined to a domain they will need some help to communicate with the Configuration Manager management point as they will not be able to retrieve these values from Active Directory and they may have no (or limited) access to DNS. Microsoft have listed a number of limitations to supporting workgroup computers: Workgroup clients cannot locate management points from Active Directory Domain Services, and instead must use DNS, WINS, or another management point. Global roaming is not supported, because clients cannot query Active Directory Domain Services for site information Active Directory discovery methods cannot discover computers in workgroups. You cannot deploy software to users of workgroup computers. You cannot use the client push installation method to install the client on workgroup computers. Workgroup clients cannot use Kerberos for authentication and so might require manual approval. A workgroup client cannot be configured as a distribution point. System Center 2012 Configuration Manager requires that distribution point computers be members of a domain. Note: In the steps below I am assuming all client computers are WorkGroup joined with no access to DNS. If you have access to a fully functioning DNS then go ahead and start at Step 3. In addition, I assume that you have installed the Remote Assistance features on your server and client computers. Step 1. Create and then edit the LMHosts file Perform the following on a workgroup computer as Administrator Note: If you have access to working DNS then your client can use DNS to resolve the Configuration Manager server management point. However if you have no access to DNS then you can use the hosts file as in step 2. This step is optional as it helps client installation with auto site assignment if DNS is not accessible As our workgroup computers need to locate and communicate with the Configuration Manager server, we will create a text file on the client and this file will contain the information we need to find our Configuration Manager server. The LMHOSTS (LAN Manager Hosts) file is used to enable Netbios Name Resolution under Windows when other methods, such as WINS, fail. We will create this new file called lmhosts on the client by copying a built in sample lmhosts file. This sample file is located in C:\Windows\System32\Drivers\Etc\. Open a command prompt on the workgroup computer and issue the following commands cd windows\system32\drivers\etc copy lmhosts.sam lmhosts Open the newly created lmhosts file in notepad and add the following information, XX.XX.XX.XX YYYY #PRE XX.XX.XX.XX "SMS_SLP \0x1A" #PRE XX.XX.XX.XX "MP_ZZZ \0x1A" #PRE where XX.XX.XX.XX is the IP address of your Configuration Manager server, YYYY is the hostname of your Configuration Manager server and ZZZ is the site code. In the example below the ip address 192.168.1.2 is the ip address of my Configuration Manager 2012 SP1 standalone primary server, you should enter the ip address of your Configuration Manager Primary server. In the example below SCCM is the hostname of my standalone primary. You should enter the hostname of your server instead. In the example below P01 is the site code of my Configuration Manager Primary server, use the site code of your Configuration Manager Primary server instead. Save the file when you are finished adding the required info. After editing the lmhosts file it will look something like this: Note: The NetBIOS naming convention allows for 16 characters in a NetBIOS name. Microsoft, however, limits NetBIOS names to 15 characters and uses the 16th character as a NetBIOS suffix. The "\0x1a" is a NetBIOS suffix and there must be exactly 15 characters between the the first quote and the backslash. if you have an incorrect number of spaces between the " and / in your lmhosts file then the file may be parsed incorrectly, below is an example of too many spaces below is an example of not enough spacing and below is an example with the correct spacing At system start up, the name cache on a client computer is preloaded with entries from the LMHOSTS file, defined as preloaded by a special keyword, the #PRE keyword. You can force these entries into the name cache by rebooting the computer or by using a command line tool called nbtstat as follows. nbtstat -R nbtstat -R clears the name cache of any previous entries and then preloads the entries in the Lmhosts file (purge and preload) nbtstat -c lists NBT's cache of remote machine names and their ip addresses Step 2. Edit the hosts file Perform the following on a workgroup computer as Administrator Open the hosts file located in C:\Windows\System32\driver\etc using notepad and add the ip address and fully qualified domain name (FQDN) of your Configuration Manager 2012 server like in the example below save the file. Failure to add the FQDN of the Configuration Manager Server will result in client registration failure as noted in ClientIDStartupManager.log. Step 3. Install the Configuration Manager client Perform the following on a workgroup computer as Administrator Installation of the Configuration Manager client requires the following local administrative permissions on the workgroup computers The Network Access Account must be configured to to access resources in the System Center 2012 Configuration Manager site server domain. Installation of the client on workgroup computers is usually done manually and that's how we will do it here. On the client computer, log on as a local administrator, map a drive to \\XX.XX.XX.XX\SMS_YYY\Client, where XX.XX.XX.XX is the ip address of your management point and YYY is the site code. change to the drive letter you mapped (eg: Z:\) and issue the following command in a command line (assuming Z:\ is your mapped network drive) CCMSetup.exe SMSMP=sccm.server2008r2.lab.local /logon SMSSITECODE=P01 /source:z: the switches above are explained below SMSMP Specifies an initial management point for the Configuration Manager client to use. (see also http://blog.configmgrftw.com/ccmsetup-mp-and-smsmp/) /logon This CCMSetup property specifies that the installation should stop if an existing System Center 2012 Configuration Manager or Configuration Manager 2007 client is found on the computer. SMSSITECODE=P01 This explicitly tells the client which Site code to use, if you set to AUTO then you must make sure that the boundary is properly configured for Workgroup computers (cannot be set to use AD Site for example). /source: tells the client where to download the client files from at this point you can monitor the progress of the client installation in CMTrace using the following log file C:\Windows\CCMSetup\logs\ccmsetup.log once ccmsetup is finished, you should see the following in cmsetup.log You should also monitor ClientLocation.log,LocationServices.log in C:\Windows\CCM\Logs\ to see how things are progressing with your workgroup client and review ClientIDManagerStartup.log to check the status of Client registration with your management point. Step 4. Approve the Configuration Manager client Perform the following in the Configuration Manager console as SMSadmin At this point the client will be installed but more than likely not working, if you open the Configuration Manager client in Windows control panel and check the actions tab most likely there will be two actions listed. This is a symptom of a client that's either not registered with the site (we saw that it was registered above), or that it is not approved. Approval relies on AD authentication which naturally you won't get with a workgroup machine. In the Configuration Manager console locate your workgroup client and verify its status, it should say 'Not Approved' (you may have to add the Approved column to your console view as in the screenshot below). This is because the default site setting for client approval in Configuration Manager is to automatically approve clients in trusted domains and as a workgroup client is not in a trusted domain you would have to approve it manually or change the site setting to "automatically approve all clients" (not recommended). As a Configuration Manager client is pretty much useless without policy we will manually approve the workgroup client. Right click on the client, and click Approve. Answer Yes when prompted. After approval, the client should receive policy correctly and all actions will become available. Not only that, but it should now be ready for the next stage. Step 5. Create a Remote Tools Operator Perform the following in the Configuration Manager console as SMSadmin Now we will add a previously created Domain user called RemoteUser1 as a Configuration Manager console remote tools operator with permission to do Remote tools actions in the console, we are doing this using Role Based Access Control (RBAC) which is a pretty cool feature in Configuration Manager 2012. In the Configuration Manager console, click on Administration, Security, Administrative Users and then click on Add User or Group. next click on Browse and select our domain user (RemoteUser1) then click ok, next click on Add to add the assigned security roles, select Remote Tools Operator. Step 6. Create custom client settings with remote tools enabled Perform the following in the Configuration Manager console as SMSadmin In the Administration node of the console, create new custom client device settings with Remote Tools enabled, give the client settings a suitable name like Custom Client Settings - Remote Tools for WorkGroup computers, in the example client settings below I've enabled pretty much every option available in the remote tools agent. In addition, I've added the computer agent and for Organization Name entered Custom Client Settings - Remote Tools. Tip: To get a step by step guide for creating custom client device settings and targeting them to a collection see this post. click on Configure and set the Public profile as enabled, click ok click on Set Viewers and add a local user with a password that matches a domain user that has access to the Console. In other words if you have a domain user called domain\RemoteUser1 and you want them to do the remote tools actions in the console, then you should also create a local user called RemoteUser1 on all your workgroup clients that you want to remotely control, this user must have the same password as the domain user. Below is a screenshot of Users and computers in Active Directory, note our RemoteUser1 is listed (this is a Domain User). and below is our RemoteUser1 added as a local user on our WorkGroup client, this user has the same password as the same name domain user. Step 7. Deploy custom client settings to a collection Perform the following in the Configuration Manager console as SMSadmin Now we are ready to deploy our custom client device settings to a collection containing our workgroup computers, right click the client settings and choose Deploy and select a Device collection containing our Workgroup computers Step 8. Add Firewall exceptions Perform the following on a workgroup computer as Administrator Even though we enabled Remote Control, Remote Assistance and Remote Desktop via client settings only one of the three gets added to the firewall exceptions, (Remote Control) as a result you need to open your firewall on the workgroup computers for Remote Assistance and Remote Desktop Client. Here are the settings you need to allow as inbound exceptions for both Remote Assistance and Remote Desktop Client Step 9. Update Machine Policy Perform the following on a workgroup computer as Administrator On a workgroup computer that is in our targeted collection, start up the Configuration Manager client, click on the actions tab and initiate a Machine Policy retrieval. alternatively do nothing and wait until the policy is automatically updated. and after a few minutes you can start Software Center to verify that the correct Custom Client device Settings are applied by reviewing the Organization name in the top right corner. Step 10. Edit hosts on the computer hosting the Configuration Manager console Perform the following on the computer running the Configuration Manager console as Administrator In an administrative command prompt, open the hosts file (located in C:\Windows\System32\Drivers\Etc) on the computer hosting the configuration Manager console and add the ip address and hostnames of your workgroup computers, save the file when done. This will allow us to connect via Remote Assistance and Remote Desktop Client via the console. Step 11. Start the Configuration Manager console as RemoteUser1 Perform the following on the computer running the Configuration Manager console as RemoteUser1 On a computer that has the Console installed,logon as domain user RemoteUser1, note how the console appears to be 'slimmed down'. This is RBAC in action. Browse to our Workgroup Computers collection. Right click on a workgroup computer and choose Start, and select one of the three Remote access tools available which are Remote control Remote Assistance Remote Desktop client The sessions are described below Step 12. Do a Remote Control session Right click on a workgroup computer, select Start, then Remote Control, when you select it you might be informed that the identity of the remote computer cannot be verified, answer yes to connect anyway. the client will be prompted to accept (depending on your choices in the Custom Client Settings) choose Approve on the client the session is now active with a nice Green bar on the top of the target screen to denote the connection, below you can see how it appears on the computer that initiated the connection vhe console via the Action menu you can send ctrl alt del to the client (great function) or indeed stop the end user from interrupting your work by locking the remote keyboard and mouse If you want details about the remote control session you can review the CmRcService.log which records information for the remote control service (found in C:\Windows\CCM\Logs). Step 13. Do a Remote Assistance session Right click on a workgroup client computer and choose start, then choose Remote Assistance, on the client computer you are connecting to the end user will be prompted to accept the connection (if not then you probably havn't followed all the advice above, double check your firewall settings on the client). if they click accept you'll see this in the console, you can then use the options available to request control or have a chat if the user agrees then you are in control ! The log files for Remote Assistance are stored in both the client and the server as described below On the server: C:\Users\[userName]\Documents\Remote Assistance Logs with username the name of the user running the CM12 console. On the client: C:\Users\[userName]\Documents\Remote Assistance Logs with username the name of the user accepting the Remote Assistance. Step 14. Do a Remote Desktop Client session Right click on a workgroup client computer and choose start, then choose Remote Assistance, you'll get prompted for Credentials (note that the domain user is listed, don't worry about that, it'll use the Local user to connect...) answer yes to the Identity prompt and yes to the logon message and you are in Troubleshooting If you have any client installation failures verify that you can ping the Configuration Manager servers ip address (assuming that the server allows you to ping it), does the ip address resolve to the correct ip of the Configuration Manager server ? if not perhaps you need to double check your lmhosts file and/or hosts. If you make a change to the lmhosts file you'll need to repopulate the cache as described above (nbtstat -R or reboot the computer for the same effect). If you are having issues with Remote Control verify the following that the workgroup computer is in a collection that is targeted with the Custom device client settings for remote control that it has received that policy (check software center to verify or use policy spy RSOPv2) check the firewall settings on the client are enabled for the Public firewall profile for Remote control verify you've created a local user matching the name/password of the domain user you are running the console as Related Reading LMHOSTS File Information and Predefined Keywords - http://support.microsoft.com/kb/102725/en-us Technical Reference for Ports Used in Configuration Manager - http://technet.microsoft.com/en-us/library/hh427328.aspx Determine the Site System Roles for Client Deployment in Configuration Manager - http://technet.microsoft.com/en-us/library/gg681976.aspx#BKMK_Determine_MP Using LMHOSTS File to Find Computers and Services - http://www.microsoft.com/resources/documentation/windowsnt/4/server/reskit/en-us/net/sur_lmh.mspx?mfr=true Configuring SMS to Work on Workgroup Computers and Computers in Other Domains (LMHOSTS) - http://blogs.msdn.com/b/muaddib/archive/2008/10/19/configuring-sms-to-work-on-workgroup-computers-and-computers-in-other-domains-lmhosts.aspx HOWTO: Assign SMS Advanced Client to the Isolated Secondary Site - http://support.microsoft.com/kb/555853/en-us How to install Clients on Workgroup computers - http://technet.microsoft.com/en-us/library/gg712298.aspx#BKMK_ClientWorkgroup NetBIOS Suffixes (16th Character of the NetBIOS Name) - http://support.microsoft.com/kb/163409/en-us Managing System Center Configuration Manager clients in a workgroup - http://blogs.technet.com/b/configurationmgr/archive/2010/03/01/managing-system-center-configuration-manager-clients-in-a-workgroup.aspx Configuring Remote Control in Configuration Manager - http://technet.microsoft.com/en-us/library/gg682148.aspx http://blogs.technet.com/b/configurationmgr/archive/2014/07/01/managing-workgroup-clients-in-system-center-2012-configuration-manager.aspx Summary System Center 2012 Configuration Manager makes life easier for the admin as they can easily manage and remote control computers in the enterprise. Many enterprises still have workgroup clients however and while those workgroup clients do pose setup challenges, it's still possible to use Remote Tools with Workgroup clients. Update 2017/1/5: System Center Configuration Manager 1610 (Current Branch) offers updates to Remote capabilities as described here. until next time ! cheers niall. You can download this document in Word format here - how can I remote control workgroup clients.zip
  12. huh ? what do you mean
  13. I've amended the guide and thanks Rocket Man for your explanation. You can of course use capture media with or without the Configuration Manager Client installed, however for a build and capture task sequence the client is required
  14. I would imagine that SP1 is a requirement so R2 can be installed on top of it.
  15. you should create your image on virtual hardware, it's much more predictable and can be deployed to any hardware you want, your error is this which is a network related problem, more than likely it drops the ip address or doesnt get one at all after sysprep so if you choose to stay with real hardware are you loading any network drivers before the setup windows and configmgr step ?
  16. or just rd /s the sxs folder after .net installs...
  17. try again and capture the log(s) before the reboot
  18. what does your smsts.log file reveal ?
  19. and http://www.niallbrady.com/2012/11/12/how-can-i-sequence-applications-using-app-v-version-5-for-configuration-manager-2012-sp1/
  20. Another year has passed, and another year Microsoft System Center 2012 Service Manager (SCSM) is still not on the Gartner Magic Quadrant for “IT Service Support Management Tools”. Now granted I am referring to the Magic Quadrant dated for August 2012, as seen here: …and we still do not know what is to come for 2013, but as someone who is vested in the System Center space complimented by the fact that customers constantly ask our team about this positioning, I find it absolutely interesting why Microsoft is left off. Not to establish credibility, but more importantly to frame my acute perception on the other vendors, let me also theme the next few talking points around the fact that I have worked for HP (well Peregrine back in the day), BMC Software (well Remedy back in the day), Altiris, LANDesk, Axios Systems and have extensive experience with FrontRange, CA Technologies and ServiceNow. All of these products in their own right are very good, but in comparison to these competitors – come on – SCSM should absolutely be at least an orange blip somewhere on this radar. With all that said, let’s break down what we are really looking at! Here are some raw themed bullet points from the “Market Definition/Description” for the IT Service Support Management Tools Gartner Report: Tighter integration of functions that correlate with the activities of the broader IT support organization Leverage a business view of IT services, allowing to quickly resolve or escalate issues and problems, improving root cause isolation, and provide higher levels of business user satisfaction Using this business view, manage Incidents, problems, changes, releases and request management Enables tools to provide modules that enable business end users to find knowledge to support/resolve their computer related issues So effectively a basic ticketing system, which aligns you with ITIL best-practice and mixed in with some ITSM common sense qualifies you for this quadrant. Fair enough, have to keep it broad to include most likely the 200+ Service Desk vendors to have a fighting chance at being in this mix. Again, as I have worked for other vendors that are on this Magic Quadrant, let me passionately say all qualify and should be part of this conversation. There is no doubt in my mind that every single vendor deserves their recognition, however there is 1 very large, huge, and most important item left out of this Market Definition/Description: Business Process Automation I mean, at the end of the day what are we trying to do here? What every CIO on the planet should be trying to do is leverage a Service Desk solution to measure their business activity, understand operational cost and in an attempt to save the company a lot of money automate as much as humanly possible. Some key examples include: Password Reset Automate New Hire / Termination Processes Hardware / Software Procurement Processes Server Provisioning Access Requests The list goes on… Again, as I have worked for other vendors some of them on this Quadrant have the capabilities to do these as a platform to complement their Service Desk story. There are however a few on this quadrant that don’t even come close, remotely close, and in their attempts to do so just introduce more hassle to their customers then needed. The reality is Microsoft System Center is the only platform that can automate any tactical IT process, all from its own product eco-system, with the ability to reach out of its product eco-system and interact with other enterprise solutions. This is a very strong story, and really wish this reality was strongly interpreted inside of this Magic Quadrant evaluation. The one other startling reality that flat out should put SCSM somewhere on the Gartner Magic Quadrant is in its few years of existence, SCSM has garnered more customers than some of these other vendors combined! That in itself should shake up the perspective. I will leave you with one last thought, coming back to the “raw themed bullet points” from above: Mr. CIO, what would you rather have: A Service Desk solution that can manage a Service Request, giving your team the ability to know when someone is asking for Software? A Service Desk solution that can manage a Service Request, giving your team the ability to know when someone is asking for Software and with the simple introduction of an automated business process have that piece of software automatically be deployed to the requesting customer based upon a business approval? If I were a CIO with 500 software requests annually, and I could automate 80% – 90% of those requests freeing up my team to do much more business aligned strategic initiatives – then my decision would be made for me. Let’s no longer measure a Service Desk solution by feature function any more, but as a business solution that aligns with the simple reality of saving $$$. The key theme we should walk away with is: System Center Service Manager is not a Service Desk solution, it is a gateway into understanding, measuring and automating your business. Disclaimer: The article is from a windows-noob recommends partner.
  21. have a look at the USMT section here
  22. have you installed Windows ADK prior to running setup ?
  23. is this problem only happening after upgrading to CM12SP1 or is this fresh installs ? have you verified that no antivirus solution is blocking creation of these files/folders ?
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.