Jump to content


anyweb

Root Admin
  • Posts

    9163
  • Joined

  • Last visited

  • Days Won

    366

Everything posted by anyweb

  1. which version of configmgr ?
  2. i've no idea sorry, and i wouldn't do it that way, just restore your back up to another vm server and export the ts from there
  3. if you've deleted the task sequence then it's gone i'm afraid, you could restore the backup of your server to a vm and export the task sequence from that vm to your online server, that's what i'd do cheers niall
  4. what type of headphones are they and are you using bluetooth or wired to use them ?
  5. thanks ! if you look at the apps included on the FOD discs, chances are they are there, and you need to add them (if that's what you want), you can modify the steps i've added and add additional steps to include the apps you want localised
  6. Awesome, I'm glad to hear it ! now make sure you check out the rest of my guides ? There is plenty to learn (such as PKI, Tenant Attach, Bitlocker Management and more)
  7. hi Mike used space only in a task sequence occurs when you have enabled the Pre-Provision BitLocker step and have not configured it (or the enable bitlocker step) to use Full disk encryption I blogged about that in the following posts, please take a look: How can we utilize the Bitlocker Management feature during OSD with Endpoint Manager Full disk encryption (in ConfigMgr 1910) – a closer look using real hardware Enabling Full Disk Encryption in Microsoft Endpoint Configuration Manager 1910 in a task sequence if none of this helps then let me know and i'll investigate in my lab
  8. hi and welcome, first i'd recommend you use the Current Branch release of ConfiMgr, today that would be anything from version 2006 and later (you install the baseline version first CM2002) then upgrade. next, your error 0x8007052e translates to " The user name or password is incorrect. Source: Windows ----- so you should verify you are settings the username/password correctly cheers niall "
  9. thanks ! warnings can be ignored but anything that is Failed can not. Can you share the logs generated on the root of C:\ on your ConfigMgr server please and i'll take a look (zip them up)
  10. due to the complexity of this solution you'll probably want to use an inplace upgrade task sequence from configmgr, is that an option for you ?
  11. @lalajee yup, that's why I had a Note: in step 5, shown again below ? Note: This is an MDT integrated task sequence so if you want to use it please integrate MDT with ConfigMgr. You will get messages about missing content during the import, choose 'ignore dependancies' and it will import the task sequence steps anyway. However, you must then step through each step in the task sequence that references a package, and point it to the equivalent package on your ConfigMgr environment.
  12. anything is possible you just need to think and then come up with a solution. this solution will detect the installed language pack, and you could use that detection method and expand it to work in your environment https://www.niallbrady.com/2016/05/17/introducing-the-windows-10-uefi-bitlocker-frontend-for-system-center-configuration-manager-current-branch
  13. I'm not infront of my computer but this can be inverted so that you can get or set $OSDComputerName $tsenv = New-Object -COMObject Microsoft.SMS.TSEnvironment $tsenv.Value("OSDComputerName") = $OSDComputerName I'll fire up my lab and show some examples shortly... $tsenv = New-Object -COMObject Microsoft.SMS.TSEnvironment $OSDComputerName = $tsenv.Value("OSDComputerName")
  14. how about something simple like this... $tsenv = New-Object -COMObject Microsoft.SMS.TSEnvironment $tsenv.Value("OSDComputerName") = $OSDComputerName
  15. ok well then perhaps it would have been better to create a separate thread for this, seeing as it's got nothing to do with deploying Windows 8 to a HP computer... anyway, you are testing a very default scenario, i'll compare my log to yours... does your partition step look like this ? if not, show me a screenshot of your settings. in the Windows partition, have you verified that it does a Quick format ? secondly, your vm has an A:\ drive, have you tried without that ?
  16. Introduction These are my notes from a session @ Microsoft Ignite 2020, the session was hosted by Steve Dispensa (Director of Program Management at Microsoft Endpoint Manager) and Ramya Chitrakar (Director of Engineering at Microsoft Endpoint Manager). For the last couple of years at Ignite I blog my notes for sessions I'm interested in as I always find it nice to later refer to this reading material and punctuate it with content I've covered, and sometimes the videos just flow by too fast and you miss out on important points. Where appropriate I'll link to content that I've covered that is referred to in the video. This is part 2 of a two part series: What's new in Microsoft Endpoint Manager - part 1 What's new in Microsoft Endpoint Manager - part 2 (this part) As a reminder, Microsoft Endpoint Manager let's you manage your entire endpoint estate whether cloud native or on premise. On your cloud management journey if you've just started out or you've deployed co-management or you are completely in the cloud Microsoft Endpoint Manager is truly your hub to unify security, apps, access,compliance and end user experience across your entire technology estate. MEM delivers analytics and data to keep you ahead of change so you can keep your cost down, no matter what change brings. Focus on Security With Covid, almost all businesses in the world are dealing with remote productivity, where users are working from home and other remote locations and that means it's never been more important to ensure uniform security policy. MEM provides a rich portfolio of capabilities to assist you with keeping your organization safe and sound. "Start with Security Baselines to ensure your organization is following best practices and to ensure you have uniform application policy across your organization." You can start with Security Baselines to ensure your organization is following best practices and to ensure you have uniform application policy across your organization. You can manage a host of security specific policies across devices including platform specific capabilities like encryption and firewall rules and advanced threat protection from Microsoft Defender ATP. Then you can move on to risk-based access control where MEM can monitor the compliance of devices real time and that can be fed into Azure AD Conditional Access (powerful access control system). Additional you can deploy app control policies to provide compliance without fully managing a device, for example with BYOD devices. With users working from so many locations organizations need to deploy consistent policy either inside or outside corporate firewalls, is the foundation of Zero Trust. MEM can ensure that your Zero Trust policy is deployed to all your devices. Cyber threats and phising attacks are increasing between 3 and 5 times and in a recent survey 89% of businesses see cyber security as a top priority yet 62% say they lack the in-house skills to deal with it. "In a recent survey 89% of businesses see cyber security as a top priority yet 62% say they lack the in-house skills to deal with it." The rapid shift to secure remote work presents a huge opportunity for partners and SMB's. Covid19 is increasing IT Complexity and cyberattacks. Microsoft 365 Business Premium is a foundation for SMB management and security and contains everything from Teams, Conditional Access, to Azure AD to Intune and it can provide you a roadmap to maintain managed services for your customers as you light up new services for them every 6 months. Microsoft 365 Lighthouse will provide guidance and experiences with onboarding new customers, offer consolidated insights across multiple tenants in a single pane to understand how customer tenants are configured and secured, and help improve customer experience and demonstrate value. Demo Configuring Microsoft Defender policy on servers managed by Configuration Manager Below is a server managed by Config Manager, and using Tenant Attach it shows up in Microsoft Endpoint Manager. Using CMPivot, you can run queries on devices in MEM, in this example Ramya queries to see what antivirus service(s) are running on this server. Notice how the two instances found are both in a stopped state. Note: I showed you how you can run CMPivot queries in MEM here. You can now deploy Defender AV policies for devices managed by ConfigMgr in the MEM console. To do that go to the Endpoint Security node and select Antivirus, then Create Policy. Windows Autopilot Autopilot provides cloud value by simplifying the provisioning and management of Windows 10 devices. There is now a new ability in Windows Autopilot to work with co-managed devices that have the ConfigMgr client agent installed during the enrollment status page (ESP) and invoke a provisioning task sequence created in ConfigMgr. In the example the task sequence was a non-osd task sequence, it was responsible for restoring files and settings for the user. Company Portal changes Company Portal is going to be the one place IT users go for everything related to enterprise IT services. Company Portal now supports Apps from Configuration Manager, web apps from Azure ad and office.com. When you install and application you can monitor it's progress in the Downloads & Updates tab. The PowerBI app here can be opened in a Browser as it is a SAAS Azure AD app. "This shows you how Microsoft Endpoint Manager is providing you with unified experiences across the spectrum from IT Pros to End Users." Microsoft 365 is uniquely positioned to bring together the power of management and security. The Endpoint Security node in Microsoft Endpoint Manager is your one stop shop for managing security across your enterprise. In there you can configure Antivirus, Firewall, Disk Encryption (BitLocker) policies and settings, but you can also configure Security Baselines. When Defender ATP is connected to MEM you'll see additional tasks listed such as Security tasks as well as device risk based compliance. As Defender ATP was released recently for Android, you can now take actions on that in MEM. In this example, you can create a compliance policy in Endpoint Security to enable conditional access based on the Android risk score detected by Defender ATP. You can see this in action using the Eicar test virus on an Android device with Defender ATP enabled. After this happens when the user launches Outlook, you can see Conditional Access kicking in. After the user uninstalls the test virus from their phone they are once again able to access email successfully. Custom Compliance Policy In this demo you can see how to create a custom compliance policy using a Powershell script and a JSON file to manage Dell computers. "BIOS must be up to date" And using this new custom compliance policy you can use it to block access using conditional access if for example the BIOS is not up to date. Those settings are configurable in the JSON file. Security Settings for Micorsoft Edge Now you can use the Managed App settings in MEM to configure policy for Microsoft Edge on Windows devices. You can configure the home page and other settings for Edge. And on a remote users device you can see conditional access informing the user in Edge that they cannot access corporate email while signed in with their private credentials, they must use their office account. Using GPO Analytics to seamlessly migrate GPO's to the cloud. For more info see > https://docs.microsoft.com/en-us/mem/intune/configuration/group-policy-analytics Once you've selected your GPO, click on Migrate to migrate group policy admx to the cloud There will also be a possibility of doing this via Powershell and this is will all be released as part of overall GPO to MDM capability. Key Takeaways Recommended reading Working from home - the new reality Introducing Microsoft Tunnel Microsoft Productivity Score https://adoption.microsoft.com/productivity-score/ Endpoint Analytics https://docs.microsoft.com/en-us/mem/analytics/overview Microsoft Endpoint Manager https://endpoint.microsoft.com
  17. can you tell me a bit about the hardware you are using here and what operating system are you trying to install ? also, a screenshot of your task sequence would help
  18. If you are one of the many, many IT admins who were asked to effectively transition a whole workforce to remote working overnight due to impact of COVID-19, you will no doubt also have been concerned about the security implications of doing so. One of the most powerful and effective means IT admins have of ensuring tight security with a remote workforce is through identity management and authentication. Azure Active Directory does exactly that and this upcoming webinar from Altaro on October 7 will teach you how to use Azure Active Directory in your business. As always Altaro will present this webinar live twice to allow as many people in different time zones to attend, ask questions and receive instant feedback from the presenters: IT security expert Paul Schnackenburg and Microsoft MVP Andy Syrewicze. This event will include a live demo of Azure Active Directory showing you how to use the tools being discussed which include: Microsoft Cloud App Security, Password Protection, Multi Factor Authentication (MFA), Windows Hello for Business, Privileged Identity Management (PIM), and Identity Protection & Conditional Access. Azure Active Directory is simply an essential tool for IT admins managing remote users. Save your seat for this valuable event and find out how you can optimize its use in your infrastructure. Save your seat!
  19. i blogged it already here > https://www.windows-noob.com/forums/topic/21430-how-can-i-dynamically-install-windows-10-language-packs-and-associated-features-on-demand-in-an-offline-environment/
  20. Nice catch even if I'm not using those settings, thanks ! I'll update those two steps and re-offer the download, thanks @Aleksandra
  21. they key to getting this to work in your environment is to read my blog post, it reveals how i solved it, and you can adapt that to your environment.
  22. yes, but i want to see what steps it is taking before the error, can you attach the log ?
  23. can you attach your smsts.log so i can see what it is doing ?
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.