Quantcast
Channel: System Center Dudes
Viewing all 418 articles
Browse latest View live

Enable and Manage Windows Defender Firewall using Intune

$
0
0

If you’re managing your device using Microsoft Intune, you may want to control your Windows Defender Firewall policy. This can be useful to make sure that every device has the Windows Firewall enabled and that you’re controlling the inbound and outbound connections.

The Microsoft Intune interface makes this configuration pretty easy to do. The key is to create a configuration profile to target your Windows 10 devices. In this article, we’ll describe each step needed to manage the Windows Defender firewall using Intune.

Windows Defender Firewall Intune Requirements

The only requirement to manage your Windows Firewall with Intune is that your device runs Windows 10 and that it’s enrolled into Intune.

Create a Configuration Profile

To Begin, we will create a profile to make sure that the Windows Defender Firewall is enabled.

After, using the same profile, we will block certain applications and ports.

  • Log in our Intune Portal
  • One the left, select Device Configuration
Windows Defender Firewall Intune
  • On the Device Configuration pane, select Profiles
Windows Defender Firewall Intune
  • At the top of the Profile pane, select Create Profile
Windows Defender Firewall Intune
  • On the Create profile Pane
  • Enter a Name for your profile (1)
  • Add a Description (2)
  • Under Platform, select Windows 10 and later (3)
  • Under Profile Type, select Endpoint Protection (4)
  • Under Settings, click Configure (5)
  • The Endpoint Protection Pane opens
  • Select Microsoft Defender Firewall (6)
Windows Defender Firewall Intune
  • On the Microsoft Defender Firewall screen, at the bottom, we select the Domain network and in the opening pane, we select Enable under Microsoft Defender Firewall
  • Click Ok at the bottom to close the Domain network pane
  • This ensures that the device has the Firewall enabled
Windows Defender Firewall Intune

We will now create a firewall rule to block inbound port 60000 to communicate with our device.

  • Back in the Microsoft Defender Firewall pane, click the Add button at the bottom to add a Firewall rule
Windows Defender Firewall Intune
  • In the Create Rule pane, enter the desired information
  • Enter a rule Name
  • Enter a rule Description
  • In Direction, enter Inbound
  • Under Network Type, select Domain
  • In the Protocol box, enter TCP
  • In Ports, enter 60000
  • Click Ok at the bottom
Windows Defender Firewall Intune
Windows Defender Firewall Intune
  • Back in the Windows Defender pane, ensure that your Rule has been added
  • Repeat the steps if you need to add more firewall rules
  • You can remove it by clicking on the 3 dots at the right if needed
  • Click Ok twice and click Save to save your profile.
  • Now, it’s time to assign your profile to your devices. Without an assignment, your profile is not applied.
  • Click Assignments at the left (1)
  • Select Include and in the Assign to box, select the group you want to assign your Windows Firewall profile you just created (2-3)
  • Click Save at the top (4)
  • You’ll see a confirmation at the top right
  • On a managed device, you’ll see the following message: For your security, some settings are controlled by Group Policy
  • In the Inbound Rules section, you’ll see our rules that have been applied
Note: There is a rating embedded within this post, please visit this post to rate it.

Share this Post

The post Enable and Manage Windows Defender Firewall using Intune appeared first on System Center Dudes.


Create your first SCCM Dashboard with Power BI Desktop

$
0
0

You may already use many SSRS reports to monitor and visualize your SCCM data. Microsoft has released PowerBI a couple of years ago and has its advantage over SSRS

  • A large amount of data can be processed
  • Rich visuals
  • Less engineering resources to use
  • It can be embedded into your own custom apps

The latest SCCM Technical Preview 2001 included the integration of a PowerBi server. A feature that we may see soon in a production version.

System Center Dudes team has decided to develop a series of Powerbi dashboard. We think that the visualization of your SCCM data should be done using PowerBi.

So… you’re ready to give this a try but are unsure where to start? We got you covered! This blog post will describe how to create your first SCCM Dashboard with Power BI Desktop.

SCCM PowerBi Dashboard Creation Requirements

The tools needed to develop a PowerBi dashboard is PowerBi desktop. We assume that you already have a fully functioning SCCM server.

We will start by installing PowerBI Desktop on a computer:

SCCM Power BI Dashboard
  • Accept the license terms and click Next
SCCM Power BI Dashboard
  • Select the Installation Directory and click Next
SCCM Power BI Dashboard
  • Click Install
SCCM Power BI Dashboard
  • Wait for the process to finish and close the installation wizard
SCCM Power BI Dashboard
SCCM Power BI Dashboard

PowerBi Desktop

Once you launch PowerBi Desktop, at the top of the page is a ribbon of various tabs. The Home (1) tab provides various common functions. You can get new data (2), edit your current data (3), add new pages (4), visuals, or objects (5), create new measures and columns (6), or publish your report to Power BI on the internet. (7)

The View tab allows you to change from Desktop View to Phone View (1) or make other adjustments to the view settings. (2)

The Modeling tab allows you to manipulate the data you’ve imported to Power BI.

SCCM PowerBi Dashboard Creation

The Help tab offers links to a variety of Power BI help and training materials.

SCCM PowerBi Dashboard Creation

Below the ribbon, we can see three icons on the left side of the screen.

These icons is used to switch between the three options for viewing our data in Power BI Desktop. The default view is Report View, and the white space is called the Canvas. This is where we’ll build the visualizations that make up our Power BI reports.

SCCM PowerBi Dashboard Creation

At the bottom of the report are the page controls. Here, we can add new pages, delete existing ones, or rename pages by double-clicking on the title.

On the right, you have Filters and Visualizations options. We’ll come back to this later on this post.

Connect PowerBi to your SQL server

Now that you’re comfortable with the UI, we can link our SCCM SQL server which is the first step to start building your dashboard.

  • In the Home tab, click Get Data and select SQL Server
  • In the SQL Server database window, enter your Server and Database name and click Ok. Wait for the connection to complete.
  • The Navigator windows open. For our example, we’ll select the V_GS_Operating_System and V_R_System view. You can use the filter box at the top to find it. Once you selected, you’ll see a preview of the table
  • Click Load at the bottom
  • You’ll be bak in the Canvas

We will now, edit our query to remove unneeded data.

  • Still in the Home tab, we’ll select Edit Queries / Edit Queries

In this screen, you can “play” with the data. You can remove unwanted data. In our example, we will remove 2 complete columns. On the left, you can undo your action and see what steps have been applied.

  • Once completed, click Close and Apply at the top right
  • The data is loading in the PowerBi model

Create your SCCM Dashboard

The fun part of building your dashboard can now begin. We’ll create a pretty basic dashboard Dashboard. The goal is more to make you understand how easy it is to build.

On the right part, you’ll find the views you just imported. You can select the needed field and the data will appear on the Canvas. You can change between charts, tables, sliders, maps, gauge, and other visualization types.

In our example, let’s begin with a chart of the OS Build Numbers.

  • In the Visualizations pane, select Pie Chart
  • In the Fields pane, under V_GS_Operating_System, select BuildNumber0 and ResourceID
  • Back in the Visualization pane, drag down the ResourceID from Details to Values
  • The resulting Pie Chart appears on the Canvas
  • You can change the visual of the pie chart using the options in the Visualisation pane
  • Select your Pie Chart and select the paint roller brush
  • From there you have various options to change the visual of the Pie Chart

Now, let’s create a table to list the device identified by the pie chart.

  • Select Table from the Visualisation pane and in the V_R_System view, select Name0, Operating System, Build and Full Domain Name. All the information is populated in the table automatically
  • Now, click on an area on the pie chart, let’s select the only device with BuildNumber 17134 (purple)
  • The table changes automatically to display the selected device. This is where PowerBi is very cool, the data is dynamic and quick

From there, your imagination is the limit. Let’s say we want our device count displayed. Let’s try that using Q&A visualization type :

  • Select Q&A in the Visualisation pane
  • In the Ask a question about your data enter: count of v_r_system
SCCM PowerBi Dashboard Creation

Or final Dashboard looks like this :

It’s pretty basic for now but it has been created in less than 5 minutes. It’s pretty simple to add more data. From there your imagination is the limit. The tough part is to make it look good visually as too much data may be difficult to read. Please share your best PowerBi ideas!

Note: There is a rating embedded within this post, please visit this post to rate it.

Share this Post

The post Create your first SCCM Dashboard with Power BI Desktop appeared first on System Center Dudes.

Deploy Microsoft Authenticator app using Microsoft Intune

$
0
0

With the increasing number of mobile users requesting access to external resources many organizations are configuring two-factor authentification to increase their security. There’s various software token solution on the market like RSA Secure Token, Google Authenticator or Microsoft Authenticator. This post will describe how to deploy Microsoft Authenticator app to your Intune devices. We’ll be describing how to deploy it on iOS and Android.

This app provides an extra layer of protection when you sign in, often referred to as two-step verification or multi-factor authentication. This new app replaces the Azure Authenticator, Microsoft account, and Multi-Factor Authentication apps.

If you are not using Intune yet, follow our step-by-step guide to start your modern management journey.

Microsoft Authenticator Intune App Requirements

Except than having Intune already setup and configured on your device, there’s no special requirement to deploy the Microsoft Authenticator app on your device.

However, there are requirements on the client-side :

iOS : Requires iOS 10.0 and watchOS 4.0 or later. Compatible with iPhone, iPad, and iPod touch.

Android : Varies depending device type

Create the Microsoft Authenticator App

We will now add the Microsoft Authenticator app to our Intune portal.

We will begin with the iOS version.

iOS

  • Select App (1), Add (2), iOS Store App (3) and Select (4) at the bottom
  • Click on Search the App Store, on the search box, enter Microsoft, select Microsoft Authenticator and click Select
Intune Microsoft Authenticator app
  • Enter the App information and click Next at the bottom
Intune Microsoft Authenticator app
  • In the Scope screen, click Next
  • On the Assignment tab, this is where you enter the group you want to deploy the app. Add your group to the desired deployment option.
  • On the Review + Create tab, review all your choices and click on Create at the bottom
Intune Microsoft Authenticator app
  • You’ll see a confirmation at the top right
  • After creation, you’ll be sent to the Microsoft Authenticator app screen. Go to the Properties tab if you need to modify anything like Assignments. You can also see Deployment statistics on this screen

Android

We will now do the same step for the Android version of Microsoft Authenticator app.

  • Select App (1), Add (2), Android store app (3) and Select (4) at the bottom
  • Click on Search the App Store, on the search box, enter Microsoft, select Microsoft Authenticator and click Select
Intune Microsoft Authenticator app
Intune Microsoft Authenticator app
  • In the Scope screen, click Next
  • On the Assignment tab, this is where you enter the group you want to deploy the app. Add your group to the desired deployment option
  • On the Review + Create tab, review all your choices and click on Create at the bottom
Intune Microsoft Authenticator app
  • You’ll see a confirmation at the top right
  • After creation, you’ll be sent to the Microsoft Authenticator app screen. Go to the Properties tab if you need to modify anything like Assignments. You can also see Deployment statistics on this screen

Review and test

Both Applications has now been added to our tenant and is ready to test on an iOS or Android device

  • On an iOS device, open the Company Portal and if you configured everything correctly, you’ll see the Microsoft Authenticator app
Intune Microsoft Authenticator app
Note: There is a rating embedded within this post, please visit this post to rate it.

Share this Post

The post Deploy Microsoft Authenticator app using Microsoft Intune appeared first on System Center Dudes.

Step-by-step SCCM 2002 upgrade guide

$
0
0

Microsoft has released a first SCCM version for 2020. SCCM 2002 has been released on April 1st 2020 ! (SCCM has a new branding since 1910 – now called Microsoft Endpoint Configuration Manager (MEMCM)). This post is a complete step-by-step SCCM 2002 upgrade guide, meaning that if you want to upgrade your existing SCCM/MEMCM installation to the latest SCCM/MEMCM updates, this post is for you.

If you’re looking for a comprehensive SCCM installation guide to build a new server, refer to our blog series which covers it all.

You won’t be able to install SCCM 2002 if you are running SCCM 2012.

SCCM 1902 is the latest baseline version. This means that if you’re downloading the source from Volume Licensing, 1902 will be the starting version of your new SCCM site. Once a new server is built using 1902, you can upgrade to the latest version after.

To install SCCM 2002 as an update, you must have installed SCCM 1806 or later (SCCM 1810, SCCM 1902, SCCM 1906 or SCCM 1910). If you check for updates in your console and it’s not showing up, continue reading, we’ll describe how to get it using the “Fast Ring” script.

Keeping your infrastructure up to date is essential and recommended. You will benefit from the new features and fixes, which some of them can apply to your environment. It’s easier than ever to upgrade since Microsoft has implemented the servicing model directly from the console.

SCCM 2002 New Features and Fixes

SCCM 2002 includes an incredible amount of new features and enhancements in the site infrastructure, content management, client management, co-management, application management, operating system deployment, software updates, reporting, and configuration manager console. This release is packed with interesting features to try.

You can consult the What’s new in version 2002 of System Center Configuration Manager Technet article for a full list of changes.

Here’s our list of favorite features. This release is packed with OS Deployment improvements. We’ll do blog posts on the most interesting feature in the coming weeks :

  • New management insight rules
  • Token-based authentication for cloud management gateway
  • Connection Health dashboard shows client connection issues
  • Improvements to CMPivot
  • Client log collection
  • Microsoft Edge management dashboard
  • Task sequence as an app model deployment type
  • Bootstrap a task sequence immediately after client registration
  • Improvements to task sequence progress
  • Improvements to OS deployment
  • Orchestration groups
  • Evaluate software updates after a servicing stack update
  • Improvements to BitLocker management
  • Integrate with Power BI Report Server

Support for SCCM Current Branch Versions

Ensure to apply this update before you fall into an unsupported SCCM version. Read about the support end date of the prior version of the following Technet article.

Configuration Manager servicing and support timeline graphic

Windows and SQL Support

Before installing, make sure that you are running a supported Operating System and SQL version. Older SCCM version was giving a warning during the Prerequisite check but 2002 is giving an error that prevents the installation from continuing.

SCCM 2002 supports only Windows 2012+ and SQL 2012 SP3+.

Important Info
Version 1906 client requires SHA-2 code signing support.
Due to weaknesses in the SHA-1 algorithm and to align to industry standards, Microsoft now only signs Configuration Manager binaries using the more secure SHA-2 algorithm. The following Windows OS versions require an update for SHA-2 code signing support:
Windows 7 SP1
Windows Server 2008 R2 SP1
Windows Server 2008 SP2

Before you Begin

Downloading and installing this update is done entirely from the console. There’s no download link, the update will appear on your console once the Service Connection Point is synchronized.

If you’re running a multi-tier hierarchy, start at the top-level site in the hierarchy. After the CAS upgrade, you can begin the upgrade of each child site. Complete the upgrade of each site before you begin to upgrade the next site. Until all sites in your hierarchy are upgraded, your hierarchy operates in a mixed version mode.

Before applying this update, we strongly recommend that you go through the upgrade checklist provided on Technet. Most importantly, initiate a site backup before you upgrade.

In this post, we will update a stand-alone primary site server, consoles, and clients. Before installing, check if your site is ready for the update:

  • Open the SCCM console
  • Go to Administration \ Updates and Servicing
  • In the State column, ensure that the update Configuration Manager
    2002 is Available
  • If it’s not available, right-click Updates and Servicing and select Check for Updates
Warning
The SCCM 2002 update is not yet available for everyone. If you need it right away you can run the Fast-Ring script and the update will show up.
  • If the update is not downloading, click on the button Download on the upper node. The update state will change to Downloading
  • You can follow the download in Dmpdownloader.log or by going to Monitoring / Updates and Servicing Status, right-click your Update Name and select Show Status
  • The process will first download .CAB file and will extract the file in the EasyPayload folder in your SCCM installation directory.
  • It can take up to 15 minutes to extract all files.

SCCM 2002 Upgrade Guide

Step 1 | SCCM 2002 Prerequisite Check

Before launching the update, we recommend launching the prerequisite check first. To see the prerequisite checklist, see the Microsoft Documentation

  • Open the SCCM console
  • Go to Administration \ Updates and Servicing
  • Right-click the Configuration Manager 2002 update and select Run prerequisite check
  • Nothing will happen, the prerequisite check runs in the background and all menu are unavailable during the check
  • One way to see progress is by viewing C:\ConfigMgrPrereq.log
  • You can also monitor prerequisite check by going to Monitoring / Update and Servicing Status, right-click your Update Name and select Show Status
  • If you have any warnings, follow the recommendation to fix the issue in the bottom pane
  • When completed the State column will show Prerequisite check passed.
  • Right-click the Configuration Manager 2002 update and select Install Update Pack

Step 2 | Launching the SCCM 2002 Update

We are now ready to launch the SCCM 2002 update. At this point, plan about 45 minutes to install the update.

  • On the General tab, click Next
  • On the Features tab, checkboxes on the features you want to enable during the update
  • Don’t worry, if you don’t select one of the features now and want to enable it later, you’ll be able to so by using the console Administration \ Updates and Servicing \ Features
SCCM 1902 Upgrade Guide
  • In the Client Update Options, select the desired option for your client update
  • On the License Terms tab, accept the license terms and click Next
  • On the Summary tab, review your choices, click Next and close the wizard on the Completion tab

The whole process took a minute but the installation begins on the back end.

  • During installation, the State column changes to Installing
  • We suggest you monitor the progress, by navigating to Monitoring / Updates and Servicing Status, right-click your Update Name and select Show Status

Unfortunately, the status is not updated in real-time. Use the Refresh button to update the view.

  • Open the SCCM update log SCCMInstallationDirectory\Logs\CMUpdate.log with CMTrace
Important Info
We’ve done numerous SCCM upgrades. Some installation start a couple of minutes after you complete the wizard but we’ve seen some installation starts after a 10 minutes delay. Do not reboot or restart any services during this period or your update can be stuck in “Prerequisite check passed” status. There’s actually no officially documented methods by Microsoft to fix that. Patience is the key!
  • When completed, you’ll notice the message There are no pending update package to be processed in the log file
  • Monitoring / Updates and Servicing Status, right-click your Update Name and select Show Status, the last step will be Installation Succeeded
  • Refresh the Updates and Servicing node in Administration, the State column will be Installed

Updating the Outdated Consoles

As a previous update, the console has an auto-update feature. At the console opening, if you are not running the latest version, you will receive a warning and the update will start automatically.

  • Since all updates operations were initiated from the console, we didn’t close it during the process. We received a warning message when clicking certain objects. You will have the same message when opening a new console
  • Click OK, console restart and update will start automatically
SCCM 1906 Upgrade Guide
SCCM 1906 Upgrade Guide
  • Wait for the process to complete. You can follow the progress in C:\ConfigMgrAdminUISetup.log and C:\ConfigMgrAdminUISetupVerbose.log. Once completed, the console will open and you’ll be running the latest version

Verification

Consoles

After setup is completed, verify the build number of the console. If the console upgrade was successful, the build number will be 8968and the version is now Version 2002. Notice the new Endpoint Configuration Manager branding!

SCCM Servers

  • Go to Administration \ Site Configuration \ Sites
  • Right-click your site and select Properties
  • Verify the Version and Build number

SCCM 2002 Clients

The client version will be updated to 5.00.8968.100x (after updating, see the section below)

SCCM 2002 Client Package distribution

You’ll see that the 2 client packages are updated:

  • Navigate to Software Library \ Application Management \ Packages
SCCM 1906 Upgrade Guide
  • Check if the update is successful, otherwise, select both packages and initiate a Distribute Content to your distribution points

Boot Images

Boot images will automatically update during setup. See our post on upgrade consideration in a large environment to avoid this if you have multiple distribution points.

  • Go to Software Library / Operating Systems / Boot Images
  • Select your boot image and check the last Content Status date. It should match your setup date

Updating the Clients

Our preferred way to update our clients is by using the Client Upgrade feature: (You can refer to our complete post documenting this feature)

  • Open the SCCM Console
  • Go to Administration / Site Configuration / Sites
  • Click the Hierarchy Settings in the top ribbon
  • Select Client Upgrade tab
  • The Upgrade client automatically when the new client update is available to the checkbox is enabled
  • Review your time frame and adjust it to your needs

Monitor SCCM Client Version Number

SCCM Reports Client Version

You can see our SCCM Client version reports to give detailed information about every client version in your environment. It’s the easiest way to track your client updates.

Collections

In conclusion, you can create a collection that targets clients without the latest client version because is very useful when it comes to monitoring a non-compliant client.

Here’s the query to achieve this: (You can also refer to our Set of Operational Collection Powershell Script which contains this collection)

select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.ClientVersion != '5.00.8968.1006'

Share this Post

The post Step-by-step SCCM 2002 upgrade guide appeared first on System Center Dudes.

SCCM PowerBi Report Server Integration

$
0
0

Beginning with SCCM/MEMCM 2002, it’s possible to Integrate Power BI Report Server to an existing Reporting Point or to a site that doesn’t have a reporting point installed. Doing so will give you the ability to manage your Power Bi Dashboard the same way you manage your SSRS report. All done directly from the console makes it easier to deploy and edit your existing dashboard and to create a new one.

This post will describe the complete SCCM PowerBi Report Server Integration process. More specifically, how to Integrate SCCM/MEMCM Reporting point with Power BI Report Server on an SCCM 2002 site.

In our example, we’ll do it on a site that a reporting point is already installed but we’ll also explain the process for a site that doesn’t have a reporting point installed.

SCCM PowerBi Report Server Integration Prerequisites

Before you begin, you need to know that using a Power Bi Report Server is not free. You’ll need to have a Power BI Report Server license.

Power BI Report Server is available with 2 different licenses : Power BI Premium and SQL Server Enterprise Edition with Software Assurance

If you don’t have a license, your dream to manage your PowerBi Dashboard in the SCCM console has vanished like a snowman on a sunny day.

So if you have licenses, you’ll also need to download on your reporting point machine :

Configure your Reporting Point

From here you have 2 possible paths: If you have a reporting point, follow the first steps, if you don’t have a reporting point, skip the first part and jump to the next section.

Reporting Point Already installed and running

The first step is to back up the reporting service encryption key. This is really important as if you skip this, you’ll lose access to your existing reports.

  • On the SCCM Reporting Server
  • Open Reporting Server Configuration Manager
  • Connect to your Reporting Instance
  • Click Encryption Keys and then select Back Up
  • Specify where to save the key, a file name(.snk) and type a strong password
  • Select OK
  • Ensure that there’s no error at the bottom and that the file has been created in the specified location

We will now remove the reporting services point role from the SCCM site

  • Open the SCCM Console
  • Go to Administration / Site Configuration / Servers and Site System Roles
  • Select the server on which you have a reporting service point, select it and at the bottom, right-click Reporting Services Point and select Remove Role
SCCM PowerBi Report Server
  • At the warning, select Yes
  • We will now uninstall SQL Server Reporting Services using the Program and Feature on the server
  • Select your SQL Server version (ex:SQL Server 2016 (64-bit)) and select Uninstall at the top
  • At the SQL 2016 window, select Remove
  • Select your instance and click Next
  • Only select Reporting Service – Native. Be careful here not to select Database Engine as you could destroy your SCCM installation
  • At the bottom, click Remove

Power Bi Server Installation

We will now install Power BI Report Server

  • Click on the installation file downloaded in the Prerequisite Section
  • Select Install Power BI Report Server
SCCM PowerBi Report Server
  • Choose an edition to install and then select Next
SCCM PowerBi Report Server
  • Read and agree to the license terms and conditions then select Next
SCCM PowerBi Report Server
  • You need a Database Engine available to store the report server database. Select Next to install the report server only.
SCCM PowerBi Report Server
  • Specify the install location for the report server. Select Install
SCCM PowerBi Report Server
  • After a successful setup, select Configure Report Server to launch the Reporting Services Configuration Manager
SCCM PowerBi Report Server

When we uninstalled the SQL Reporting service in the steps before, the database was left intact. Now we just need to restore the backup keys.

  • Go to Database and select Change Database
  • Select Choose an existing report server database and select your Server database that you were already using
  • Select your server and credential
  • Ensure to select your ReportServer database
  • In Reporting Server Configuration Manager, select Encryption Key and then select Restore. Specify the file path that you saved in the prior steps and enter the backup password
  • Ensure at the bottom that everything is setup correctly
  • Return to the SCCM Console and add back the Reporting Services point role in Configuration Manager

No reporting points installed

Only use this process if you don’t already have a reporting services point on your SCCM site. Do all steps of this process on the same server:

SCCM Console

  • On a computer that has the SCCM console, make sure that you have at least console version 2002 and close the console
  • Install Power BI Desktop. Make sure to use the version in the prerequisites section
  • Launch Power BI Desktop before you open the SCCM Console.

Verification

  • In the SCCM console
  • Go to Monitoring / Reporting node
  • Verify that the Power BI Reports node is present
  • Select Create Report at the top. This action will open Power BI Desktop
SCCM PowerBi Report Server
  • Once you saved the new report, it will be displayed in the SCCM Console

Share this Post

The post SCCM PowerBi Report Server Integration appeared first on System Center Dudes.

SCCM Powershell collection boundary groups

$
0
0

With SCCM 2002 that was just released, a small but extremely useful feature is now available in console. It is now possible to view what boundary group a device is connected to!

This offers a new opportunity with collections based on Boundary groups, which could mean physical sites or any other meaningful needs in your environment.

I’ve created a PowerShell script that automatically creates collections based on all the available boundary groups.

SCCM Powershell script collection boundary groups
Important Info

A few important notes on the information available here first :

  • If a device is in more than one boundary group, the value is a comma-separated list of boundary group names.
  • The data updates when the client makes a location request to the site, or at most every 24 hours.
  • If a client is roaming and not a member of a boundary group, the value is blank.
  • Information is only available on Primary sites. It is not visible on the CAS.

Requirements

  • SCCM must be at least version 2002. See our Step-by-step guide upgrade guide here

SCCM Powershell collection boundary groups

The script can be downloaded on GitHub, since Technet Gallery is retiring soon.

Be sure to rate the submission if you are using it.

Example of the result of the script

SCCM Powershell collection boundary groups
Tip

Add region, country, or else as a prefix in your boundary group names for easier sort.

Collection query for boundary groups

Thanks to fellow SystemCenterDudes, Eswar Koneti, for his post about that exact query This isn’t the typical query for collections

FIX UN BOX POUR LA QUERY

select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.ResourceId in (select resourceid from SMS_CollectionMemberClientBaselineStatus where SMS_CollectionMemberClientBaselineStatus.boundarygroups like ‘%”<BoundaryGroupName>“%’) and SMS_R_System.Name not in (‘Unknown’) and SMS_R_System.Client = ‘1’

Note that I use a like in the query. I’m doing so in the case of clients in multiple boundary groups. This will help in fixing potential errors in a boundary or boundary group.

SCCM Powershell collection boundary groups

Scripts details

A few parameters can be chosen in the script to fit your environment.

SCCM Powershell collection boundary groups
  • $CollectionPrefix let you decide what, if any, characters should be at the beginning of the collection
    • by default, it is set to BG –
  • $LimitingCollection
    • There is some default limiting collection options that are available, based on my previous script to create Master Collections
    • Simply uncomment the desired limiting collection
  • $Schedule
    • Refresh of the collection is set to once a day by default
  • A new folder is created at the root of all device collections, called Boundary Groups based collection
    • All new collections are moved there by default.

Boundary report

We also offer reports for boundary and boundary groups.

Hope this help!

For more information about this new boundary groups feature, see Microsoft docs

Share this Post

The post SCCM Powershell collection boundary groups appeared first on System Center Dudes.

How to configure SCCM Software Update point in SSL

$
0
0

While the requirements of running SCCM/MEMCM in full SSL may be less required theses days with the Cloud Management Gateway being so effective with remote computers management, running the WSUS – Software Update point in SSL is likely to show up as a requirement whenever doing a security audit of your environment.

In this post, we will detail the required steps, from the certificate template creation to the client validation on enabling SSL for WSUS and the SCCM Software Update Point.

Important

Enabling SSL on WSUS isn’t required when implementing a Cloud Management Gateway.

Using Internet-based client management would require such configuration to support Patch management while computer outside of the organization network.

This post focus only on configuring WSUS / Software Update point for SSL communication.

Requirements

  • Any SCCM version
  • Communication on port 8531 must be open on your Firewall
Warning
This post assume the the root CA is trusted by clients. This will be required since the certificate used should come from the same trusted source.

Certificate template Creation

The first step to enable SSL communication is to create a server certificate for your server.

  • On the server that is running the Certification Authority, open the Certification Authority console (certsrv.mmc), right-click Certificate Templates and select Manage
SCCM Software Update SSL
  • The Certificate Templates management console opens
  • Right-click the Web Server template and then select Duplicate Template
SCCM Software Update SSL
  • In the Duplicate Template dialog box, ensure that Windows 2003 Server, Enterprise Edition is selected in Certification Authority
SCCM Software Update SSL
  • In the General tab, enter a template name, like ConfigMgr Web Server
    • Change the validity period if needed. As a best-practice, the longer the validity period, the less secure is your certificate
SCCM Software Update SSL
  • In the Request Handling tab, select Allow private key to be exported
    • While not mandatory, this could become useful depending on the environment
SCCM Software Update SSL
  • In the Security tab, remove the Enroll permission from the Enterprise Admins security group
SCCM Software Update SSL
  • Choose Add, enter a group that has the WSUS/SUP server in. It can be an existing SCCM Server group. Then choose OK
    • Select the Enroll and Read permission for this group
SCCM Software Update SSL
  • Choose OK, close Certificate Templates Console
  • Back in the Certification Authority (certsrv.mmc) console, right-click Certificate Templates, select New / Certificate Template to Issue
SCCM Software Update SSL

Request certificate

The following must be done in the WSUS/SUP server. No need for standalone server, if role is installed on the primary server, it is fine.

  • Open the MMC console for a certificate of the computer
  • Under Personal/Certificates, right-click and select All tasks /Request new certificate
SCCM Software Update SSL
  • Click next
SCCM Software Update SSL
  • Select the web server certificate template created earlier
SCCM Software Update SSL
  • Under Alternative name, select DNS and enter the FQDN of the WSUS/SUP server, then click Add
SCCM Software Update SSL
  • Under General, it may be a good idea to add a Friendly name and description to ease management of certificates on the server
SCCM Software Update SSL
  • Hit ok and complete the wizard to create the certificate.
SCCM Software Update SSL

Configure WSUS administration website to use SSL

  • Open IIS, select the WSUS administration site and click on Bindings
SCCM Software Update SSL
  • Select HTTPS and click on Edit
SCCM Software Update SSL
  • From the select, chose the ConfigMgr WSUS SSL certificate enrolled earlier on the server
    • The IP address can be left to default All Unassigned
SCCM Software Update SSL
  • Expand the WSUS Administration site and select API Remoting30, then select SSL settings
SCCM Software Update SSL
  • Check the box Require SSL and hit Apply on the right side of the console
SCCM Software Update SSL
  • Repeat this step for the following components
    • ClientWebService
    • DssAuthWebService
    • ServerSyncWebService
    • SimpleAuthWebService
SCCM Software Update SSL
  • The last step, open a command prompt as admin, browse to the C:\Program Files\Update Services\Tools, and run the following command
    • WSUSUTIL configuressl <fqdn or the WSUS server>
SCCM Software Update SSL

Configure SCCM Software update point in SSL

  • Open the SCCM console, and browse to Administration/Site Configurations /Server and Site System roles, then select the Software Update point
SCCM Software Update SSL
  • Check the box Require SSL communication to the WSUS server
SCCM Software Update SSL
  • Once completed, it is a good idea to restart the Software Update point service to ensure communications are good under SSL.
    • To do so, browse to Monitoring/System Status/Component Status and start the Configuration Manager Service manager
    • Find SMS_WSUS_Configuration_Manager and restart it
SCCM Software Update SSL

Server validation

  • Forcing a Synchronize is a good idea to confirm hierarchy is still working correctly
  • On the Software Library node, select All Software Updates and click on Synchronize Software Update in the ribbon
SCCM Software Update SSL

Client Validation

  • On a client, run a Machine policy retrieval, followed by a Software Update scan cycle to validate client->server communication is working correctly.
  • Once the Update scan is initiated, progress can be seen in the WUAHandler.log on that client. We can notice the change in the URL pointing the HTTPS://<fqdn of the WSUS/SUP server>:8531
SCCM Software Update SSL

Downstream Software Update point

If you are having multiple WSUS/Software Update point, here are some important notes

  • When enabling SSL on WSUS, it should always be the parent WSUS/SUP that is configured first in SSL, before moving to downstream servers
  • Downstream servers require the exact same steps as mentioned above in order to be configured to use SSL.
  • Doing it only on the primary WSUS/SUP will not make clients communicate over SSL to downstream servers.
  • When the primary Software Update point is forced to use SSL, downstream WSUS will automatically check the box Use SSL when synchronizing update information to sync using port 8531 to the parent WSUS.
SCCM Software Update SSL

For more details on enabling SSL for WSUS, see Microsoft Docs.

Share this Post

The post How to configure SCCM Software Update point in SSL appeared first on System Center Dudes.

How to use SCCM Delivery Optimization

$
0
0

The amount of data that transfers daily on a corporate network is quite important. Once a month, Windows Update has quite an impact on that amount. SCCM along Delivery Optimization can help better manage that crazy amount of GB or even TB of content required to patch all computers.

In an earlier post, we covered the topic to use with Intune and Windows Update for business

In this post, we will detail how to use SCCM Delivery Optimization to deliver Windows Updates.

Requirements

  • Clients must be running Windows 10
  • ConfigMgr 1910 or higher to get all
  • Network ports
    • 7680 inbound to allow peers
    • 80 to allow computer do download updates from Windows Update

For more details, see Microsoft docs

SCCM Delivery Optimization

Using Delivery Optimization along ConfigMgr can be useful for the following reasons :

  • Avoid hosting GBs of updates on-prem across many different distribution points/host/data center to support all clients download. The content also becomes obsolete about 1 month after the download and distribution date.
  • Avoid using bandwidth between sites to sync GBs of updates
  • Leverage local Internet access from clients to download content locally
  • Self-clean up of obsolete content after a defined period.
  • Still use ConfigMgr to approve updates and does not change your patch cycle strategy
  • This can be leveraged for Windows 10 and Office 365 updates

Boundary Groups

Delivery Optimization, like BranchCache and Peer Cache, needs to be enabled by Boundary groups.

The Allow peer downloads in this boundary group must be checked for Delivery optimization to work.

SCCM Delivery Optimization

If you have large boundary groups, enabling During peer downloads, only use peers within the same subnet may be a good fit.

For more details about peer download configuration for boundary groups, see Microsoft docs.

Client settings

There is 2 clients settings in order for Delivery Optimization to be configured.

  • Under Delivery Optimization, enable Use Configuration Manager boundary Groups for Delivery optimization for group ID
    • This option will define Delivery Optimization in Group Mode, which was pretty hard to achieve without boundary groups.
SCCM Delivery Optimization
  • Under Software Update, enable Allow Clients to download delta content when available.
    • This does NOT require to enable Express Update on your Software Update Point.
SCCM Delivery Optimization
  • Those client settings will create the following local policies on Windows 10 devices.
SCCM Delivery Optimization

Delivery Optimization’s GPO

Why are GPO required on top of the ConfigMgr client configuration? Because some default values are a bit low to see a real benefit from using Delivery Optimization

The following GPO should be review and changed to recommended value.

  • Under Computer Configuration/Administrative Templates/Windows Component/Delivery Optimization, enable Max Cache Age
    • By default, it is set to 3 days, which is a bit fast to allow computers to share over your patching cycle
    • 1814400 seconds is 30 days wish is reasonable to expire content prior to next cycle.
SCCM Delivery Optimization
  • Under Computer Configuration/Administrative Templates/Windows Component/Delivery Optimization, enable Minimum Peer Caching Content file size
    • By default, it is set to 100mb. This isn’t critical for Windows Updates but could become really useful to allow computers to share content for smaller content, like Windows store apps that about for about 100MB per client per month.
SCCM Delivery Optimization
  • Under Computer Configuration/Administrative Templates/Windows Component/Delivery Optimization, enable Delay Foreground download from HTTP
    • By default, it is set to 0 seconds, so it doesn’t allow computers to reach for content on Peers. Again not mandatory in terms of monthly patching from ConfigMgr, but useful for Microsoft store apps updates.
SCCM Delivery Optimization
  • Under Computer Configuration/Administrative Templates/Windows Component/Delivery Optimization, enable Delay background download from HTTP By default, it is set to 0 seconds, so it doesn’t allow computers to reach for content on Peers. We decided to wait for 60 seconds prior to reach online for content. This is mostly for clients that are past due the schedule and haven’t downloaded to content ahead. It could generate large delay in user experience.

For more details about Delivery Optimization configuration, see Microsoft Docs

Software Update deployment

In order to make to most out of Delivery Optimization, clients must get updates from Microsoft Update, otherwise, other services like BranchCache will take over if downloaded from an internal source.

  • To allow clients to get updates from Windows Update, check the box If software updates are not available on Distribution point, download content from Microsoft Update. This is done on the deployment of the Software Update group.
SCCM Delivery Optimization
  • That checkbox alone isn’t enough. If updates are available on a local Distribution Point, it will ignore any DO configuration and download locally. The Distribution point for the client must not host Windows update files.
    • This means remove the Software Update Package from the distribution point
  • Eventually, even the Automatic deployment rule can be modified to not even attempt to download updates if 100% of your clients gets content from Microsoft Update

Delivery optimization Results

The following month of patching will reflect the gain of using Delivery Optmization. To review it, browse to Monitoring/Distribution Status/Client Data source

SCCM Delivery Optimization
Important Info

Take a look at our latest FREE Power BI to review client data source

Locally on clients, there’s a few Delivery optimization cmdlet to review usage.

Get-DeliveryOptimizationPerfSnapThisMonth

Get-DeliveryOptimizationPerfSnap

A side benefit of using Delivery Optimization

As explained earlier, leveraging Delivery Optimization for ConfigMgr content can also be useful for Apps updates from the Windows Store. Windows 10 computers download about 100mb worth of updates for all apps per month. Multiply this by the number of devices you have, and a TB of content will quickly arrive.

The below screen is taken from Update compliance that tracks this information, while ConfigMgr only reports content from Windows Updates.

SCCM Delivery Optimization

Bottom notes

  • Be patient to see results
  • There’s also Microsoft Connected Cache, AKA Delivery Optimization In-Network Cache(DOINC), available if you wish to configure your distribution point as DO caches.

For more on ConfigMgr Delivery Optimization, see Microsoft docs.

Hope this helped!

Share this Post

The post How to use SCCM Delivery Optimization appeared first on System Center Dudes.


The SCCM Dos and Donts – 2020 Edition

$
0
0

We’ve been in the consulting world since SMS 2003 and we’ve seen so much stuff over the years! From the famous task sequence deployed to All system to the “fuck it let’s set our collections to be all incremental to make SCCM faster!”, we’ve seen it all… or have we? This blog post is an informative post on some of the SCCM Dos and Donts that you need to follow when using SCCM/MEMCM.

This post is intended to be informative, use it to refresh your skill or simply if you’re starting your SCCM journey and you’re looking to learn something new about.

SCCM/MEMCM – Donts

Ok, let’s start with the Don’ts. What you should avoid doing in the latest SCCM version?

Install a Central Administration Site

SCCM dos and donts

Don’t use a CAS. You’ll see this advice everywhere… and it’s true. Don’t use it. Just don’t.

When the Central Administration Site was introduced back in SCCM 2012 SP1 there was no concept of a preferred site system. If you had to manage thousands of clients in a remote site/region and a secondary site was not an option, the installation of numerous Primary Sites was needed (so was the CAS).

But now that new client management options were introduced in later SCCM version, this is not needed anymore.

A Central Administration Site may be needed in specific scenarios. If you need to manage more than 175 000 clients or need more than 250 distribution points and you’re still unsure or don’t know what you’re doing, please ask for external help!

Install a Seconday Site in remote locations

There was a day where putting a Secondary site to “big” remote site was the only solution available. Basically, you would install a secondary site if you had :

  • More than 500 clients in a remote location
  • Need a local Management Point
  • Need a local Software Update Point

With the latest SCCM version, clients can use boundaries to find site systems. Our recommendation would be to install Management Point, Distribution Points and Software Update Point remotely and use boundaries to communicates to these site systems.

Follow Microsoft recommendation for installing a secondary site but as for us, we didn’t install a secondary site for months. I’m not even sure it’s still required to this day to support the addition of secondary sites.

Install SQL on a separate server

In most scenarios, co-locate your SQL installation on your SCCM Primary Server. This is always debatable and often an unpopular topic among Database Administrators. DBA likes to have control and centralized databases as much as possible, however, co-location ensures better performance of your SCCM server.

From a licensing point of view, it’s not an issue since all of the System Center products include SQL Server technology

Incremental Collection everywhere

SCCM dos and donts

Collection refreshes are heavy processes on your server resource. It can bring your server running really slow if you configure collection incorrectly. The biggest mistake is enabling incremental refresh on all collections. We also often see incremental AND full collection updates enabled on the same collections.

Here’s a bunch of resource to help you out :

SCCM Dos and Donts – Deploy to large collections without double verification

This one is fairly simple but so often forgotten. How many times we’ve seen an admin panicking because its deployment was spreading to All System. Unfortunately, there’s no Big red button to stop a wrong deployment out of the box. When deploying, always make sure to :

  • Double-check the collection and its members. Is the scoping right? Is the collection up-to-date?
  • Ensure that the correct setting for the reboot is set. You don’t want to reboot a workstation in the middle of the day after a sneaky deployment
  • Ensure that no Maintenance Windows are applied to the collection or set your deadline behaviour accordingly
  • Ensure that your available/required option and schedule are set correctly
  • When you check all of the above, check again and then, hit Apply

SCCM/MEMCM – DO

SCCM dos and donts

Enable Co-management

Enabling Co-management lets you to manage Windows 10 devices by using both SCCM and Microsoft Intune. It lets you cloud-attach your existing investment in Configuration Manager by adding new functionality. By using co-management, you have the flexibility to use the technology solution that works best for your organization.

So why enable CoManagement ? Why not is more the question. It’s so easy to enable, that you should at least try it to start your modern management strategy. (See next tip)

Get familiar with Intune

Microsoft is putting efforts to fill in the management possibility between SCCM and Intune. Will SCCM die? Not in the near future. But who knows what the future hold in a world where technology changes so fast.

If you use mobile devices (Phone, Tablet), Intune is a no brainer.

For Windows 10 devices, Intune is an additional management tool that you should at least start to use. It gives you new possibilities to manage your devices even if they are outside your organization network. (Device Profile, Conditional Access, Compliance Policies).

Microsoft has announced that on September 1, 2019, they retired the hybrid MDM service offering. If you’re still running SCCM in Hybrid mode, plan your migration to Intune Standalone.

We thus recommend to start looking at intune to manage your devices.

Setup and install a Cloud Management Gateway

The cloud management gateway provides a simple way to manage SCCM clients on the internet. The CMG is a cloud service in Microsoft Azure, you can manage traditional clients that roam on the internet without an additional on-premises infrastructure. You don’t need to expose your on-premises infrastructure to the internet.

With the COVID outbreak, the CMG became a must to manage a roaming device during the time that everyone was working from home. Without a cloud management gateway or an Internet Based Client Management solution, you would simply won’t be able to manage them until they came back to the office.

Become a CMPivot Expert

SCCM has always been good with reporting and inventory of it’s managed devices but SCCM data is up-to-date at the last time the inventory has been run. SCCM CMPivot allows SCCM administrators to initiate a live query on selected computers on a specific topic. The result of that query can then be used to mitigate and fix potential issues.

How many time were you asked “what is the current state as of NOW?” well, you’ll finally be able to answer appropriately with SCCM CMPivot.

We have 2 blog post on the subject, one on how to use CMPivot and the other one is one of our most popular blog these day which gives CMPivot query examples.

Start using PowerBi Dashboard

You may already use many SSRS reports to monitor and visualize your SCCM data. Microsoft has released PowerBI a couple of years ago and has its advantage over SSRS:

  • A large amount of data can be processed
  • Rich visuals
  • Less engineering resources to use
  • It can be embedded into your own custom apps

The latest SCCM 2002 Version includes the integration of PowerBi server. There’s various Free and paid Dashboard solutions on the web to fit your reporting needs.

That’s the list for now, we’ll add more in the coming weeks ! Be sure to come back.

Share this Post

The post The SCCM Dos and Donts – 2020 Edition appeared first on System Center Dudes.

SCCM Windows 10 2004 Upgrade Deployment

$
0
0

Support for Windows 7 ended on January 14, 2020. If you are still using Windows 7, your PC may become more vulnerable to security risks. Microsoft published the Windows 10 2004 feature update (aka Windows 10 May 2020 Update) on VLSC. If you haven’t planned your Windows 7 migration to Windows 10, this post will help prepare your SCCM Server to deploy it.

You may also need to deploy Windows 2004 to your Windows 10 computer to stay supported or to benefits from the new features. Before deploying a new Windows 10 feature upgrade, you need to have a good plan. Test it in a lab environment, deploy it to a limited group and test all your business applications before broad deployment. Do not treat a feature upgrade as normal monthly software updates. Treat it as a new operating system as if you were upgrading Windows 7 to Windows 10.

You can also follow our complete Windows 10 Deployment blog post series if you’re unfamiliar with the whole upgrade process.

This blog post will cover all the task needed to deploy the new SCCM Windows 10 2004 Upgrade :

  • Check if you have an SCCM Supported version
  • Upgrade your Windows ADK
  • Import the OS in SCCM to use with your deployment Task Sequence
  • Create a Windows 10 Upgrade Task Sequence for Windows 10 (and Win 7 or 8.1 computers)
  • Update your Automatic Deployment Rules and Software Update, groups
  • Import your ADMX

Check Prerequisite SCCM Windows 10 2004 Upgrade

For Windows 10 2004 May 2020 Update, you need at least SCCM 2002 in order to support it as a client. See the following support matrix if you’re running an outdated SCCM version and make sure to update your site.

Windows ADK

Before capturing and deploying a Windows 10 2004 image, make sure that you’re running a supported version of the Windows ADK. Windows recommends using the Windows ADK that matches the version of Windows you’re deploying. If you’re already running an ADK version on your SCCM server, see our post on how to install a new version.

Upgrade Method – Task Sequence or Servicing Plan?

You can’t use servicing plans to upgrade Windows 7 or Windows 8 computers. So you must use an upgrade task sequence.

In order to upgrade an existing Windows 10 to Windows 2004, you have 2 choices: You can use an upgrade Task Sequence or you can use Servicing Plans.

There a strong debate over which is the best method. We prefer to use Upgrade Task Sequence for the simple reason that it’s more customizable. You can run pre-upgrade and post-upgrade tasks which will be mandatory if you have any sort of customization to your Windows 10 deployments.

For example, Windows 10 is resetting pretty much anything related to regional settings, keyboard, start menu and taskbar customization. Things are getting better from one version to another but if you’re upgrading from an older build, let’s say 1511, expect some post-configuration tasks… and the only way to do that is using a task sequence.

Servicing Plan has the simplicity, you set your option and forget, as for Automatic Deployment Rules does for Software Updates. We yet did not have any client that doesn’t want any control over Windows 10 upgrade in their organization. We totally understand the point of Servicing Plan and they’ll be useful in a couple of releases when Windows 10 upgrades will be an easy task… but for now, it’s not, unfortunately.

Import SCCM Windows 10 2004 Operating System

We will now import the Windows 10 2004 WIM file for Operating System Deployment. If you don’t have the Windows 10 ISO, you can download it from Microsoft Volume Licensing Site.

We will be importing the default Install.wim from the Windows 10 media for a “vanilla” Windows 10 deployment. You could also import a WIM file that you’ve created through a build and capture process. This WIM wile will be used for new computers, to upgrade an existing Windows 10, you need to import an Operating System Upgrade Packages. We will cover this in the next section.

  • Open the SCCM Console
  • Go to Software Library / Operating Systems / Operating System Images
  • Right-click Operating System Images and select Add Operating System Image
SCCM Windows 10 1803 Upgrade
  • On the Data Source tab, browse to your WIM file. The path must be in UNC format
  • You can now select to import only a specific index from the WIM file. We selected the Windows 10 Enterprise index
  • Select your Architecture and Language at the bottom and click Next
SCCM Windows 10 2004 Upgrade
  • In the General tab, enter the Name, Version and Comment, click Next
SCCM Windows 10 2004 Upgrade
  • On the Summary tab, review your information and click Next
  • Complete the wizard and close this window

Distribute your SCCM Windows 10 2004 Operating System Image

We now need to send the Operating System Image (WIM file) to our distribution points.

  • Right-click your Operating System Image, select Distribute Content and complete the Distribute Content wizard

Add Operating System Upgrade Packages

We will now import the complete Windows 10 media in Operating System Upgrade Packages. This package will be used to upgrade an existing Windows 10 or a Windows 7 (or 8.1) device to Windows 10 using an Upgrade Task Sequence.

  • Open the SCCM Console
  • Go to Software Library / Operating Systems / Operating System Upgrade Packages
  • Right-click Operating System Upgrade Packages and select Add Operating System Upgrade Packages
SCCM Windows 10 1803 Upgrade
  • In the Data Source tab, browse to the path of your full Windows 10 media. The path must point to an extracted source of an ISO file. You need to point at the top folder where Setup.exe reside
  • You can now select to import only a specific index from the WIM file. We selected the Windows 10 Enterprise index
  • Select your Architecture and Language at the bottom and click Next
SCCM Windows 10 2004 Upgrade
  • In the General tab, enter the Name, Version, and Comment, click Next
  • On the Summary tab, review your information and click Next and complete the wizard

Distribute your Operating System Upgrade Packages

We now need to send the Operating System Upgrade Package to your distribution points.

  • Right-click your Operating System Upgrade Package, select Distribute Content and complete the Distribute Content wizard
SCCM Windows 10 1803 Upgrade

Create SCCM Task Sequence for Windows 10 2004

Let’s create an SCCM task sequence upgrade for a computer running a Windows 10 device. Once again, this Task Sequence could be used for Windows 7 or 8.1.

  • Open the SCCM Console
  • Go to Software Library \ Operating Systems \ Task Sequences
  • Right-click Task Sequences and select Upgrade an operating system from upgrade package
  • In the Task Sequence Information tab, enter a Task Sequence Name and Description
SCCM Windows 10 2004 Upgrade
  • On the Upgrade the Windows Operating System tab, select your upgrade package by using the Browse button
  • Select your Edition Index depending on the edition you want to deploy. If you select just 1 index as per our indication in previous steps, you’ll see just 1 index to select from.
SCCM Windows 10 2004 Upgrade
  • On the Include Updates tab, select the desired Software Update task
    • All Software Updates will install the updates regardless of whether there is a deadline set on the deployment (on your OSD collection)
    • Mandatory Software Updates will only install updates from deployments that have a scheduled deadline (on your OSD collection)
    • Do not install any software updates will not install any software update during the Task Sequence
SCCM Windows 10 1803 Upgrade
  • On the Install Applications tab, select any application you want to add to your upgrade process
SCCM Windows 10 1803 Upgrade
  • On the Summary tab, review your choices and click Next and click Close

Edit the SCCM Windows 10 2004 Task Sequence Upgrade

Now that we have created the upgrade task sequence, let’s see what it looks like under the hood.

  • Open the SCCM Console
  • Go to Software Library \ Operating Systems \ Task Sequences
  • Right-click your upgrade task sequences and select Edit

As you can see, it’s fairly simple. SCCM will take care of everything in a couple of steps :

  • The Upgrade Operating System step contains the important step of applying Windows 10
  • Ensure to choose the right Edition

Deploy the SCCM Windows 10 2004 Upgrade Task Sequence

We are now ready to deploy our task sequence to the computer we want to upgrade. In our case, we are targeting a Windows 7 computer.

  • Go to Software Library \ Operating Systems \ Task Sequences
  • Right-click Task Sequences and select Deploy
  • On the General pane, select your collection. This is the collection that will receive the Windows 10 upgrade. For testing purposes, we recommend putting only 1 computer to start
  • On the Deployment Settings tab, select the Purpose of the deployment
    • Available will prompt the user to install at the desired time
    • Required will force the deployment at the deadline (see Scheduling)
  • You cannot change the Make available to the following drop-down since upgrade packages are available to clients only
SCCM Windows 10 1803 Upgrade
  • On the Scheduling tab, enter the desired available date and time. On the screenshot, we can’t create an Assignment schedule because we select Available in the previous screen
SCCM Windows 10 1803 Upgrade
  • In the User Experience pane, select the desired options
SCCM Windows 10 1803 Upgrade
  • In the Alerts tab, check Create a deployment alert when the threshold is higher than the following check-box if you want to create an alert on the failures
SCCM Windows 10 1803 Upgrade
  • On the Distribution Point pane, select the desired Deployment options. We will leave the default options
SCCM Windows 10 1803 Upgrade
  • Review the selected options and complete the wizard

Launch the Upgrade Process on a Windows 10 computer

Everything is now ready to deploy to our Windows 10 computers. For our example, we will be upgrading a Windows 10 1909 to Windows 10 2004. This task sequence can also be used on a Windows 7 or 8.1 devices to install Windows 10 2004.

  • Log on our Windows 10 computer and launch a Machine Policy Retrieval & Evaluation Cycle from Control Panel / Configuration Manager Icon
SCCM Task Sequence Upgrade
  • Open the new Software Center from the Windows 10 Start Menu
  • You’ll see the SCCM upgrade task sequence as available. We could have selected the Required option in our deployment schedule, to launch automatically without user interaction at a specific time
  • When ready, click on Install
  • On the Warning, click Install
SCCM Windows 10 1803 Upgrade
  • The update is starting, the task sequence Installation Progress screen shows the different steps
  • The WIM is downloading on the computer and saved in C:\_SMSTaskSequence
  • You can follow task sequence progress in C:\Windows\CCM\Logs\SMSTSLog\SMSTS.log
  • After downloading, the system will reboot
  • The computer restart and is loading the files in preparation for the Windows 10 upgrade
SCCM Windows 10 1803 Upgrade
  • WinPE is loading
SCCM Task Sequence Upgrade
  • The upgrade process starts. This step should take between 60-90 minutes depending on the device hardware
  • Windows 10 is getting ready, 2-3 more minutes and the upgrade will be completed
SCCM Task Sequence Upgrade
  • Once completed the SetupComplete.cmd script runs. This step is important to set the task sequence service to the correct state
SCCM Task Sequence Upgrade
  • Windows is now ready, all software and settings are preserved
SCCM Windows 10 2004 Upgrade

Create Software Update Group

One important thing in any OSD project is to make sure that the deployment of every machine is up to date. Before deploying Windows 10 2004, make sure that your Software Update Point is configured to include Windows 10 patches.

Once Windows 10 is added to your Software Update Point, we will create a Software Update Group that will be deployed to our Windows 10 deployment collection. This way, all patches released after the Windows 10 media creation (or your Capture date) will be deployed during the deployment process.

To create a Windows 10 Software Update Group :

  • Open the SCCM Console
  • Go to Software Library / Software Updates / All Software Updates
  • On the right side, click Add Criteria, select Product, Expired and Superseded
    • Product : Windows 10
    • Expired  : No
    • Superseded: No
    • Title contains 2004
  • Select only the latest Cumulative Updates that apply  (x64 or x86) and select Create Software Update Group
  • Once created, go to Software Library / Software Updates / Software Update Groups
  • Right-click your Windows 10 SUG and deploy it to your OSD deployment collection

Import ADMX File

If you’re responsible for managing group policy in your organization. Ensure that you import the latest Windows 10 2004 ADMX file on your domain controller.

Bonus Ressources

After your SCCM Windows 10 2004 Upgrade, need a report to track your Windows 10 devices? We developed a report to help you achieve that :

Asset – Windows 10 SCCM Report

Share this Post

The post SCCM Windows 10 2004 Upgrade Deployment appeared first on System Center Dudes.

Block TikTok using Intune device compliance policy and Conditional Access

$
0
0

This blog post will show you how to Block TikTok Microsoft Intune on iOS and Android. This strategy can be used for any app.

TikTok was recently caught accessing user clipboard data when running in the background, potentially exposing passwords or other sensitive data. The behaviour was revealed because of a new feature in iOS 14, and it’s unclear how long it had been present in the app. TikTok has since removed the feature, but the privacy scare underscored long-standing privacy concerns over the app, which is owned by China-based ByteDance.

The NY Times also reported that TikTok has been under scrutiny as a potential national security threat. Amazon has also asked its employee to remove TikTok from their corporate phone to keep email access.

So, with all this information, it’s possible that your company asks you to block TikTok from your corporate devices. This post will show you how to bloc TikTok using Microsoft Intune device compliance policy and Conditional Access.

Can we block the TikTok app in an enterprise environment? You can’t block users from installing it and using it, but you can block their company access if they are.

If you’re starting with Intune, you may be tempted to use a device configuration profile and use an Application Restriction policy. This look like exactly done for that… but after trying it ourselves for hours, we never got it to work. The documentation is poorly made and the troubleshooting tools and reports are just bad. Impossible to know what’s wrong with our policy.

So we didn’t stop there and we decide to go with a good old Device Compliance policy. In short, the policy checks for our app (TikTok) and mark the device as “Non-Compliant”. After, we’ll set up a Conditional Access policy to block all devices that is not compliant to company resources.

Block TikTok Microsoft Intune – Device compliance policy and Conditional Access

iOS

We will start by show how to block Tiktok on iOS.

Bundle IDs for native iOS and iPadOS apps are all well documented but third party app is more tricky to find. The easiest way is to use the method documented in this blog post. In our case, we found the Tik Tok App BundleID: com.zhiliaoapp.musically

At the end of this post, we gather some popular BundleID for you to use if you want to block more app than just Tiktok.

Now that we have the BundleID, we’ll create our Device Compliance Policy.

  • To block TikTok app with Intune, navigate to https://portal.azure.com and click on Intune
  • Click on Device compliance / Policies and Create Policy
  • Platform: iOS/iPadOS
  • Click Create at the bottom
Block TikTok Microsoft Intune
  • In the Basic tab, enter a Name and Description, click Next
Block TikTok Microsoft Intune
  • On the  iOs Compliance Policy tab, select System Security
  • In Restricted Apps , enter a friendly name and the App BundleID
    • Name : TikTok
    • Bundle ID : com.zhiliaoapp.musically
  • Click Next
Block TikTok Microsoft Intune
  • In the Action for Compliance tab
  • Keep the Mark device noncompliant at 0
  • I like to add a Send Email to end User option to notify the user. Once selected, you need to select the message template. If you haven’t created a template yet, skip this step, you could come back and add it later.
  • Click Next
  • In the Scope tab, select a scope. We leave it to the Default scope, click Next
  • iOS Compliance Policy must be assigned to groups of users.
  • On the Assignment tabs, Select the group you want to deploy your restriction to. We select our Test groups, click Next
Block TikTok Microsoft Intune
  • On the Review + Create tab, select Create at the bottom

Android

The Android version is pretty similar to a single change at the start. Follow all iOS steps except when creating your policy, select Android

  • Click on Device compliance / Policies and Create Policy
  • Platform: Android Device Administrator
  • Click Create at the bottom
Block TikTok Microsoft Intune

Conditional Access Policy

Now that we have a Device Compliance Policy, we must create a Conditional Access Policy to decide what to do with our non-compliance devices.

If you’re not familiar with Conditional Access Policy, read the Microsoft documentation as you can lock the user out your company resources.

  • In the Intune Portal click Conditional Access
Block TikTok Microsoft Intune
  • Click Policy / New Policy
  • Enter a Policy Name
  • Click User and Groups, select the group you want to target with your policy. We select our Test group
Block TikTok Microsoft Intune
Block TikTok Microsoft Intune
  • In Conditions, select Device Platforms and select iOS (and Android – if applicable)
  • Still in Conditions, select Client App and select Browser and Mobile Apps and desktop clientsMore information
  • In Access Controls, select Grant Access and Require Device to be marked as compliant. This is where we are saying to grant access only to compliant device (based on if there’s TikTok on the device)
  • At the bottom, enable your policy and click Save

Block TikTok Microsoft Intune – End UserResults

We will now test our configuration. Wait a couple of minutes for the Policy to synchronise.

  • Go to Device Compliance/ Policies
  • Select the TikTok policy and select Device Status under Monitor
  • Ensure that your test devices are Compliant. My device is compliant because I don’t have the TikTok app installed.
  • In the Company Portal, I check my device compliance status. Since my phone is compliant, I can access comany ressource.
Block TikTok Microsoft Intune
  • I’ll now add TikTok and see how it goes
  • My Company Portal is now reporting that I must update my setting and that I may not be able to access company resources.
  • Let’s press on Check Status
  • I got the notification to uninstall the App to meet company policy
  • I also received an email since I enable the notification in my device policy
  • If I try to access a cloud app, I’m not able to access it.
  • The only way to regain access it to remove the restricted app which is exactly what we want to do.

We hope this blog post helped achieve your security policy. Let us know what are you blocking

Here are some of the most common asked app to be blocked in a corporate environment

  • RSA SecureID: com.rsa.securid.iphone.SecurID
  • Zoom Meeting : us.zoom.videomeetings
  • Google Meet : com.google.meetings
  • Webex Meeting : com.webex.meeting
  • Goto Webinar : com.logmein.gotowebinar
  • Goto Meeting : com.logmein.gotomeeting
  • Slack : com.tinyspeck.chatlyio
  • Messenger : com.facebook.Messenger
  • Whatsapp Business : net.whatsapp.WhatsAppSMB
  • Adobe Scan : com.adobe.scan.ios

Share this Post

The post Block TikTok using Intune device compliance policy and Conditional Access appeared first on System Center Dudes.

How to use Windows Update for Business with Intune

$
0
0

Windows Update for Business is one of the new things Microsoft proposed along with Windows 10. It has come a long way since it’s release. Even if it isn’t perfect yet, or give all the flexibility that ConfigMgr (MEMCM) offer when managing monthly update or feature release, for many small/medium business, this brings a more simple approach to patching and maintaining Windows 10 up to date. In this post, we will detail how to configure Intune Windows Update for Business to patch Windows 10 devices managed by Intune

Pre-requisites

  • Windows 10 must be managed by Intune
    • If Windows 10 is being co-managed with ConfigMgr(MEMCM), make sure the slider for Software Update is set to Intune

Intune Windows Update Business – Update rings strategy

Depending on multiple factors, the key for Windows Update for Business to be successful is to define the various update rings for your enterprise.

Here, no magic answer or one size fit all scenarios.

To take in consideration to build your strategy :

  • Number of users total/per rings
  • Risk tolerance for the Feature update release
  • Windows 10 Pro vs Enterprise
    • Pro only allows 18months support following the release date of a build. Feature update strategy is likely to be more aggressive than if Windows 10 Enterprise is used with its 30months policy for autumn releases.

What we usually recommend :

  • Minimum of 3 Update rings
    • Test, with a few IT people only
    • Pilot, with more IT people and users for many department/roles
    • Production, with everyone else.
      • Depending on the total amount of user and support capacity, consider multiple Prod rings to avoid too many users at once installing Feature Update
  • The monthly quality update can follow the same 3 major Update rings
    • Test, within the first few days of release
    • Pilot, within a week or so of the release
    • Prod, within 2-3 weeks after release
    • Remember, it’s not possible to deny a monthly update. So better be careful and avoid faulty updates for most of the users
  • Servicing channel for most if not all should be Semi-Annual channel
  • Carefully review User experience settings in the update ring. Find the best fit for your users along with security needs.

Here’s an example of an aggressive update rings configuration.

Create Windows 10 Update rings

Intune Windows Update Business
  • Click on Create profile
  • Provide a name
  • Configure the Update Ring settings
Intune Windows Update Business
Update ring settings

Lots of stuff in this screen.

Key points are Deferrals for both monthly and Feature updates.

Other settings are mostly about User Experience, so this needs to be reviewed case by case.

  • Set scopes tags if needed
  • Set the Assignments. Interesting point here is that you can target groups of users, which in the long run is a much easier way to target test and pilot users without care about the device anymore.
  • Review
Intune Windows Update Business

Monitor Windows Update for Business

This is still done with the Update Compliance from Windows Analytics. Note that this is the only component that hasn’t retired yet.

  • Follow our post to configure Update Compliance
  • Once configured, reporting will take a bit of time. After a few days, it will look like this
  • It is possible to see the progress of both Monthly updates and Features updates.

For more details about Update Compliance, see Microsoft docs

Additional steps

When using Windows Update for Business, Delivery Optimization should be reviewed for better network effecianty.

Follow our post to enable Delivery Optimization for Windows 10 update/upgrades and Office 365 updates

Intune Windows Update Business

There is also a new option Windows 10 feature Update that is currently in preview. This allow administrators to select the Feature update to target instead of leaving it only by default.

Intune Windows Update Business

For more details about Windows Update for Business, see Microsoft docs

Share this Post

The post How to use Windows Update for Business with Intune appeared first on System Center Dudes.

Step-by-Step SCCM 2006 Upgrade Guide

$
0
0

Microsoft has released a second SCCM version for 2020. SCCM 2006 has been released on August 11th, 2020! (SCCM has a new branding since 1910 – now called Microsoft Endpoint Configuration Manager (MEMCM). This post is a complete step-by-step SCCM 2006 upgrade guide, meaning that if you want to upgrade your existing SCCM/MEMCM installation to the latest SCCM/MEMCM updates, this post is for you.

If you’re looking for a comprehensive SCCM installation guide to build a new server, refer to our blog series which covers it all.

You won’t be able to install SCCM 2006 if you are running SCCM 2012.

SCCM 2002 is the latest baseline version. This means that if you’re downloading the source from Volume Licensing, 2002 will be the starting version of your new SCCM site. Once a new server is built using 2002, you can upgrade to the latest 2006 version after.

To install SCCM 2006 as an update, you must have installed SCCM 1810 or later. If you check for updates in your console and it’s not showing up, continue reading, we’ll describe how to get it using the “Fast Ring” script.

Keeping your infrastructure up to date is essential and recommended. You will benefit from the new features and fixes, which some of them can apply to your environment. It’s easier than ever to upgrade since Microsoft has implemented the servicing model directly from the console.

SCCM 2006 Upgrade Guide – New Features and Fixes

SCCM 2006 includes an incredible amount of new features and enhancements in the site infrastructure, content management, client management, co-management, application management, operating system deployment, software updates, reporting, and configuration manager console. This release is packed with interesting features to try.

You can consult the What’s new in version 2006 of System Center Configuration Manager Technet article for a full list of changes.

Here’s our list of favourite features. Microsoft brings together SCCM/MEMCM and Intune into a single console called Microsoft Endpoint Manager admin center. We’ll do blog posts on the most interesting feature in the coming weeks :

  • Endpoint Analytics Preview
  • Endpoint analytics data collection enabled by default
  • VPN boundary type
  • Management insights to optimize for remote workers
  • Intranet clients can use a CMG software update point
  • CMPivot from the console and CMPivot standalone has been converged
  • Run CMPivot from an individual device or multiple devices without having to select or create a collection
  • CMPivot query results, you can select an individual device or multiple devices then launch a separate CMPivot instance scoped to your selection.
  • You can now configure the client setting Configuration Manager can force a device to restart to prevent devices from automatically restarting when a deployment requires it.
  • Task sequence media support for cloud-based content
  • With a task sequence that uses a boot image to deploy an OS, you can deploy it to a device that communicates via CMG
  • You can now specify the disk encryption mode on the Enable BitLocker and Pre-provision BitLocker task sequence steps
  • CMG support for endpoint protection policies

Support for SCCM Current Branch Versions

Ensure to apply this update before you fall into an unsupported SCCM version. Read about the support end date of the prior version of the following Technet article.

Windows and SQL Support

Before installing, make sure that you are running a supported Operating System and SQL version. Older SCCM version was giving a warning during the Prerequisite check but 2006 is giving an error that prevents the installation from continuing.

SCCM 2006 supports only Windows 2012+ and SQL 2012 SP3+.

Important Info
Version 1906 client requires SHA-2 code signing support.
Due to weaknesses in the SHA-1 algorithm and to align to industry standards, Microsoft now only signs Configuration Manager binaries using the more secure SHA-2 algorithm. The following Windows OS versions require an update for SHA-2 code signing support:
Windows 7 SP1
Windows Server 2008 R2 SP1
Windows Server 2008 SP2

Before you Begin – SCCM 2006 Upgrade Guide

Downloading and installing this update is done entirely from the console. There’s no download link, the update will appear on your console once the Service Connection Point is synchronized.

If you’re running a multi-tier hierarchy, start at the top-level site in the hierarchy. After the CAS upgrade, you can begin the upgrade of each child site. Complete the upgrade of each site before you begin to upgrade the next site. Until all sites in your hierarchy are upgraded, your hierarchy operates in a mixed version mode.

Before applying this update, we strongly recommend that you go through the upgrade checklist provided on Technet. Most importantly, initiate a site backup before you upgrade.

In this post, we will update a stand-alone primary site server, consoles, and clients. Before installing, check if your site is ready for the update:

  • Open the SCCM console
  • Go to Administration \ Updates and Servicing
  • In the State column, ensure that the update Configuration Manager
    2006 is Available
  • If it’s not available, right-click Updates and Servicing and select Check for Updates
Warning
The SCCM 2006 update is not yet available for everyone. If you need it right away you can run the Fast-Ring script and the update will show up.
  • If the update is not downloading, click on the button Download on the upper node. The update state will change to Downloading
  • You can follow the download in Dmpdownloader.log or by going to Monitoring / Updates and Servicing Status, right-click your Update Name and select Show Status
  • The process will first download .CAB file and will extract the file in the EasyPayload folder in your SCCM installation directory.
  • It can take up to 15 minutes to extract all files.

SCCM 2006 Upgrade Guide

Step 1 | SCCM 2006 Prerequisite Check

Before launching the update, we recommend launching the prerequisite check first. To see the prerequisite checklist, see the Microsoft Documentation

  • Open the SCCM console
  • Go to Administration \ Updates and Servicing
  • Right-click the Configuration Manager 2006 update and select Run prerequisite check
  • Nothing will happen, the prerequisite check runs in the background and all menu are unavailable during the check
  • One way to see progress is by viewing C:\ConfigMgrPrereq.log
  • You can also monitor prerequisite check by going to Monitoring / Update and Servicing Status, right-click your Update Name and select Show Status
SCCM 2006 Upgrade Guide
  • If you have any warnings, follow the recommendation to fix the issue in the bottom pane
  • When completed the State column will show Prerequisite check passed
  • Right-click the Configuration Manager 2006 update and select Install Update Pack

Step 2 | Launching the SCCM 2006 Update

We are now ready to launch the SCCM 2006 update. At this point, plan about 45 minutes to install the update.

  • On the General tab, click Next
SCCM 2006 Upgrade Guide
  • On the Features tab, checkboxes on the features you want to enable during the update
SCCM 2006 Upgrade Guide
  • Don’t worry, if you don’t select one of the features now and want to enable it later, you’ll be able to so by using the console Administration \ Updates and Servicing \ Features
SCCM 1902 Upgrade Guide
  • In the Client Update Options, select the desired option for your client update
SCCM 2006 Upgrade Guide
  • On the License Terms tab, accept the license terms and click Next
SCCM 2006 Upgrade Guide
  • On the Summary tab, review your choices, click Next and close the wizard on the Completion tab
SCCM 2006 Upgrade Guide

The whole process took a minute but the installation begins on the back end.

SCCM 2006 Upgrade Guide
  • During installation, the State column changes to Installing
SCCM 2006 Upgrade Guide
  • We suggest you monitor the progress, by navigating to Monitoring / Updates and Servicing Status, right-click your Update Name and select Show Status

Unfortunately, the status is not updated in real-time. Use the Refresh button to update the view.

  • Open the SCCM update log SCCMInstallationDirectory\Logs\CMUpdate.log with CMTrace
Important Info
We’ve done numerous SCCM upgrades. Some installation start a couple of minutes after you complete the wizard but we’ve seen some installation starts after a 10 minutes delay. Do not reboot or restart any services during this period or your update can be stuck in “Prerequisite check passed” status. There’s actually no officially documented methods by Microsoft to fix that. Patience is the key!
  • When completed, you’ll notice the message There are no pending update package to be processed in the log file
  • Monitoring / Updates and Servicing Status, right-click your Update Name and select Show Status, the last step will be Installation Succeeded
  • Refresh the Updates and Servicing node in Administration, the State column will be Installed

Updating the Outdated Consoles

As a previous update, the console has an auto-update feature. At the console opening, if you are not running the latest version, you will receive a warning and the update will start automatically.


  • Since all updates operations were initiated from the console, we didn’t close it during the process. We received a warning message when clicking certain objects. You will have the same message when opening a new console
  • Click OK, console restart and update will start automatically
SCCM 1906 Upgrade Guide
SCCM 1906 Upgrade Guide
  • Wait for the process to complete. You can follow the progress in C:\ConfigMgrAdminUISetup.log and C:\ConfigMgrAdminUISetupVerbose.log. Once completed, the console will open and you’ll be running the latest version

Verification

Consoles

After setup is completed, verify the build number of the console. If the console upgrade was successful, the build number will be 8968and the version is now Version 2006. Notice the new Endpoint Configuration Manager branding!

SCCM Servers

  • Go to Administration \ Site Configuration \ Sites
  • Right-click your site and select Properties
  • Verify the Version and Build number

SCCM 2006 Clients

The client version will be updated to 5.00.8968.100x (after updating, see the section below)

SCCM 2006 Client Package distribution

You’ll see that the 2 client packages are updated:

  • Navigate to Software Library \ Application Management \ Packages
SCCM 1906 Upgrade Guide
  • Check if the update is successful, otherwise, select both packages and initiate a Distribute Content to your distribution points

Boot Images

Boot images will automatically update during setup. See our post on upgrade consideration in a large environment to avoid this if you have multiple distribution points.

  • Go to Software Library / Operating Systems / Boot Images
  • Select your boot image and check the last Content Status date. It should match your setup date

Updating the Clients

Our preferred way to update our clients is by using the Client Upgrade feature: (You can refer to our complete post documenting this feature)

  • Open the SCCM Console
  • Go to Administration / Site Configuration / Sites
  • Click the Hierarchy Settings in the top ribbon
  • Select Client Upgrade tab
  • The Upgrade client automatically when the new client update is available to the checkbox is enabled
  • Review your time frame and adjust it to your needs

Reconfigure SQL Server AlwaysOn availability groups

If you use an availability group, reset the failover configuration to automatic. For more information, see SQL Server AlwaysOn for a site database.

Reconfigure any disabled maintenance tasks

If you disabled database maintenance tasks at a site before installing the update, reconfigure those tasks. Use the same settings that were in place before the update.

SCCM 2006 Upgrade Guide – Monitor SCCM Client Version Number

SCCM Reports Client Version

You can see our SCCM Client version reports to give detailed information about every client version in your environment. It’s the easiest way to track your client updates.

Collections

In conclusion, you can create a collection that targets clients without the latest client version because is very useful when it comes to monitoring a non-compliant client.

Here’s the query to achieve this: (You can also refer to our Set of Operational Collection Powershell Script which contains this collection)

select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.ClientVersion != '5.00.9012.1007'

Share this Post

The post Step-by-Step SCCM 2006 Upgrade Guide appeared first on System Center Dudes.

Renew Apple MDM Push Certificate in Endpoint Manager

$
0
0

To enroll and manage iOS/MAC devices into Endpoint Manager, you need to create an Apple MDM Push Certificate. These certificates expire 365 days after you create them and must be renewed manually in the Endpoint Manager portal.

You will receive a notification email 30 days before the Apple MDM Push Certificate expires. It’s strongly recommended to renew the certificate before the expiration method.

If you don’t renew the certificate in time, you will need to re-enroll all Apple devices. In a lab environment, this can be done easily, but in a production environment with a hundred or thousand devices, this could mean a nightmare.

This post will describe how to Renew Apple MDM Push Certificate in Endpoint Manager

Verification

Besides the expiration email, you can see that your certificate is expired or the expiration date in the Endpoint Manager Portal.

Antoher sign that your Apple MDM Push Certificate is expired would mean that users can’t access company ressource because the default company policy would block them.

If you tries to enroll the device, the company portal will send an error :

Couldn’t add your device. Contact your IT Admin for assistance with this issue. APNSCertificateNotValid

Renew Apple Certificate Endpoint Manager

Renew Apple MDM Push Certificate in Endpoint Manager

Hopefully, you found out before your certificate expires…right ??… For this post, our certificate is expired for a while. The procedure to Renew Apple MDM Push Certificate in Endpoint Manager is still the same.

So this is how to do it :

  • In the Configure MDM Push Certificate pane
  • Check the agreement in #1
  • In the second step (#2), click on Download your CSR. A file will download in your browser. Keep this file for the next step
  • On the third step (#3), click on Create your MDM Push Certificate
  • You’ll be redirected on the Apple Push Certificate Portal
  • Login using the Apple ID used to create the certificate in the first place
  • In the Certificate Portal, select your Mobile Device Management Certificate and click Renew
Renew Apple Certificate Endpoint Manager
  • In the Renew Push Certificate Portal, click the Choose file button and provide the Intune.CSR file that you’ve downloaded in the previous step
Renew Apple Certificate Endpoint Manager
  • Click Upload
  • On the next page, click Download. The MDM_ Microsoft Corporation_Certificate.pem file will download. Keep this file for the next steps.
  • Back in the Endpoint Manager Portal
  • Complete step 4 by entering your Apple ID
  • Complete step 5 by entering the MDM_ Microsoft Corporation_Certificate.pem that you just downloaded
  • Click Upload at the bottom
Renew Apple Certificate Endpoint Manager

Validation

Once completed, refresh the page and look at the top of the pane. You certificate should show ACTIVE and the Days until expiration will show 365

Renew Apple Certificate Endpoint Manager

You’ve successfully renewed Apple MDM Push Certificate in Endpoint Manager. You can now re-enroll your device if the certificate was expired. You don’t have anything else to do on your Apple device if the certificate was still valid before the renewal process.

The post Renew Apple MDM Push Certificate in Endpoint Manager appeared first on System Center Dudes.

SCCM PowerBi Report Server Integration

$
0
0

Beginning with SCCM/MEMCM 2002, it’s possible to Integrate Power BI Report Server to an existing Reporting Point or to a site that doesn’t have a reporting point installed. Doing so will give you the ability to manage your Power Bi Dashboard the same way you manage your SSRS report. All done directly from the console makes it easier to deploy and edit your existing dashboard and to create a new one. This post will describe the complete SCCM PowerBi Report Server Integration process. More specifically, how to Integrate SCCM/MEMCM Reporting point with Power BI Report Server on an SCCM 2002 site.

In our example, we’ll do it on a site that a reporting point is already installed but we’ll also explain the process for a site that doesn’t have a reporting point installed.

SCCM PowerBi Report Server Integration Prerequisites

Before you begin, you need to know that using a Power Bi Report Server is not free. You’ll need to have a Power BI Report Server license.

Power BI Report Server is available with 2 different licenses : Power BI Premium and SQL Server Enterprise Edition with Software Assurance

If you don’t have a license, your dream to manage your PowerBi Dashboard in the SCCM console has vanished like a snowman on a sunny day.

So if you have licenses, you’ll also need to download on your reporting point machine :

Configure your Reporting Point

From here you have 2 possible paths: If you have a reporting point, follow the first steps, if you don’t have a reporting point, skip the first part and jump to the next section.

Reporting Point Already installed and running

The first step is to back up the reporting service encryption key. This is really important as if you skip this, you’ll lose access to your existing reports.

  • On the SCCM Reporting Server
  • Open Reporting Server Configuration Manager
  • Connect to your Reporting Instance
  • Click Encryption Keys and then select Back Up
  • Specify where to save the key, a file name(.snk) and type a strong password
  • Select OK
  • Ensure that there’s no error at the bottom and that the file has been created in the specified location

We will now remove the reporting services point role from the SCCM site

  • Open the SCCM Console
  • Go to Administration / Site Configuration / Servers and Site System Roles
  • Select the server on which you have a reporting service point, select it and at the bottom, right-click Reporting Services Point and select Remove Role
SCCM PowerBi Report Server
  • At the warning, select Yes
  • We will now uninstall SQL Server Reporting Services using the Program and Feature on the server
  • Select your SQL Server version (ex:SQL Server 2016 (64-bit)) and select Uninstall at the top
  • At the SQL 2016 window, select Remove
  • Select your instance and click Next
  • Only select Reporting Service – Native. Be careful here not to select Database Engine as you could destroy your SCCM installation
  • At the bottom, click Remove

Power Bi Server Installation

We will now install Power BI Report Server

  • Click on the installation file downloaded in the Prerequisite Section
  • Select Install Power BI Report Server
SCCM PowerBi Report Server
  • Choose an edition to install and then select Next
SCCM PowerBi Report Server
  • Read and agree to the license terms and conditions then select Next
SCCM PowerBi Report Server
  • You need a Database Engine available to store the report server database. Select Next to install the report server only.
SCCM PowerBi Report Server
  • Specify the install location for the report server. Select Install
SCCM PowerBi Report Server
  • After a successful setup, select Configure Report Server to launch the Reporting Services Configuration Manager
SCCM PowerBi Report Server

When we uninstalled the SQL Reporting service in the steps before, the database was left intact. Now we just need to restore the backup keys.

  • Go to Database and select Change Database
  • Select Choose an existing report server database and select your Server database that you were already using
  • Select your server and credential
  • Ensure to select your ReportServer database
  • In Reporting Server Configuration Manager, select Encryption Key and then select Restore. Specify the file path that you saved in the prior steps and enter the backup password
  • Ensure at the bottom that everything is setup correctly
  • Return to the SCCM Console and add back the Reporting Services point role in Configuration Manager

No reporting points installed

Only use this process if you don’t already have a reporting services point on your SCCM site. Do all steps of this process on the same server:

SCCM Console

  • On a computer that has the SCCM console, make sure that you have at least console version 2002 and close the console
  • Install Power BI Desktop. Make sure to use the version in the prerequisites section
  • Launch Power BI Desktop before you open the SCCM Console.

Verification

  • In the SCCM console
  • Go to Monitoring / Reporting node
  • Verify that the Power BI Reports node is present
  • Select Create Report at the top. This action will open Power BI Desktop
SCCM PowerBi Report Server
  • Once you saved the new report, it will be displayed in the SCCM Console

Share this Post

The post SCCM PowerBi Report Server Integration appeared first on System Center Dudes.


SCCM Powershell collection boundary groups

$
0
0

With SCCM 2002 that was just released, a small but extremely useful feature is now available in console. It is now possible to view what boundary group a device is connected to!

This offers a new opportunity with collections based on Boundary groups, which could mean physical sites or any other meaningful needs in your environment.

I’ve created a PowerShell script that automatically creates collections based on all the available boundary groups.

SCCM Powershell script collection boundary groups
Important Info

A few important notes on the information available here first :

  • If a device is in more than one boundary group, the value is a comma-separated list of boundary group names.
  • The data updates when the client makes a location request to the site, or at most every 24 hours.
  • If a client is roaming and not a member of a boundary group, the value is blank.
  • Information is only available on Primary sites. It is not visible on the CAS.

Requirements

  • SCCM must be at least version 2002. See our Step-by-step guide upgrade guide here

SCCM Powershell collection boundary groups

The script can be downloaded on GitHub, since Technet Gallery is retiring soon.

Be sure to rate the submission if you are using it.

Example of the result of the script

SCCM Powershell collection boundary groups
Tip

Add region, country, or else as a prefix in your boundary group names for easier sort.

Collection query for boundary groups

Thanks to fellow SystemCenterDudes, Eswar Koneti, for his post about that exact query This isn’t the typical query for collections

WQL Query

select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.ResourceId in (select resourceid from SMS_CollectionMemberClientBaselineStatus where SMS_CollectionMemberClientBaselineStatus.boundarygroups like ‘%”<BoundaryGroupName>“%’) and SMS_R_System.Name not in (‘Unknown’) and SMS_R_System.Client = ‘1’

Note that I use a like in the query. I’m doing so in the case of clients in multiple boundary groups. This will help in fixing potential errors in a boundary or boundary group.

SCCM Powershell collection boundary groups

Scripts details

A few parameters can be chosen in the script to fit your environment.

SCCM Powershell collection boundary groups
  • $CollectionPrefix let you decide what, if any, characters should be at the beginning of the collection
    • by default, it is set to BG –
  • $LimitingCollection
    • There is some default limiting collection options that are available, based on my previous script to create Master Collections
    • Simply uncomment the desired limiting collection
  • $Schedule
    • Refresh of the collection is set to once a day by default
  • A new folder is created at the root of all device collections, called Boundary Groups based collection
    • All new collections are moved there by default.

Boundary report

We also offer reports for boundary and boundary groups.

Hope this help!

For more information about this new boundary groups feature, see Microsoft docs

Share this Post

The post SCCM Powershell collection boundary groups appeared first on System Center Dudes.

How to configure SCCM Software Update point in SSL

$
0
0

While the requirements of running SCCM/MEMCM in full SSL may be less required theses days with the Cloud Management Gateway being so effective with remote computers management, running the WSUS – Software Update point in SSL is likely to show up as a requirement whenever doing a security audit of your environment.

In this post, we will detail the required steps, from the certificate template creation to the client validation on enabling SSL for WSUS and the SCCM Software Update Point.

Important

Enabling SSL on WSUS isn’t required when implementing a Cloud Management Gateway.

Using Internet-based client management would require such configuration to support Patch management while computer outside of the organization network.

This post focus only on configuring WSUS / Software Update point for SSL communication.

Requirements

  • Any SCCM version
  • Communication on port 8531 must be open on your Firewall
Warning
This post assume the the root CA is trusted by clients. This will be required since the certificate used should come from the same trusted source.

Certificate template Creation

The first step to enable SSL communication is to create a server certificate for your server.

  • On the server that is running the Certification Authority, open the Certification Authority console (certsrv.mmc), right-click Certificate Templates and select Manage
SCCM Software Update SSL
  • The Certificate Templates management console opens
  • Right-click the Web Server template and then select Duplicate Template
SCCM Software Update SSL
  • In the Duplicate Template dialog box, ensure that Windows 2003 Server, Enterprise Edition is selected in Certification Authority
SCCM Software Update SSL
  • In the General tab, enter a template name, like ConfigMgr Web Server
    • Change the validity period if needed. As a best-practice, the longer the validity period, the less secure is your certificate
SCCM Software Update SSL
  • In the Request Handling tab, select Allow private key to be exported
    • While not mandatory, this could become useful depending on the environment
SCCM Software Update SSL
  • In the Security tab, remove the Enroll permission from the Enterprise Admins security group
SCCM Software Update SSL
  • Choose Add, enter a group that has the WSUS/SUP server in. It can be an existing SCCM Server group. Then choose OK
    • Select the Enroll and Read permission for this group
SCCM Software Update SSL
  • Choose OK, close Certificate Templates Console
  • Back in the Certification Authority (certsrv.mmc) console, right-click Certificate Templates, select New / Certificate Template to Issue
SCCM Software Update SSL

Request certificate

The following must be done in the WSUS/SUP server. No need for standalone server, if role is installed on the primary server, it is fine.

  • Open the MMC console for a certificate of the computer
  • Under Personal/Certificates, right-click and select All tasks /Request new certificate
SCCM Software Update SSL
  • Click next
SCCM Software Update SSL
  • Select the web server certificate template created earlier
SCCM Software Update SSL
  • Under Alternative name, select DNS and enter the FQDN of the WSUS/SUP server, then click Add
SCCM Software Update SSL
  • Under General, it may be a good idea to add a Friendly name and description to ease management of certificates on the server
SCCM Software Update SSL
  • Hit ok and complete the wizard to create the certificate.
SCCM Software Update SSL

Configure WSUS administration website to use SSL

  • Open IIS, select the WSUS administration site and click on Bindings
SCCM Software Update SSL
  • Select HTTPS and click on Edit
SCCM Software Update SSL
  • From the select, chose the ConfigMgr WSUS SSL certificate enrolled earlier on the server
    • The IP address can be left to default All Unassigned
SCCM Software Update SSL
  • Expand the WSUS Administration site and select API Remoting30, then select SSL settings
SCCM Software Update SSL
  • Check the box Require SSL and hit Apply on the right side of the console
SCCM Software Update SSL
  • Repeat this step for the following components
    • ClientWebService
    • DssAuthWebService
    • ServerSyncWebService
    • SimpleAuthWebService
SCCM Software Update SSL
  • The last step, open a command prompt as admin, browse to the C:\Program Files\Update Services\Tools, and run the following command
    • WSUSUTIL configuressl <fqdn or the WSUS server>
SCCM Software Update SSL

Configure SCCM Software update point in SSL

  • Open the SCCM console, and browse to Administration/Site Configurations /Server and Site System roles, then select the Software Update point
SCCM Software Update SSL
  • Check the box Require SSL communication to the WSUS server
SCCM Software Update SSL
  • Once completed, it is a good idea to restart the Software Update point service to ensure communications are good under SSL.
    • To do so, browse to Monitoring/System Status/Component Status and start the Configuration Manager Service manager
    • Find SMS_WSUS_Configuration_Manager and restart it
SCCM Software Update SSL

Server validation

  • Forcing a Synchronize is a good idea to confirm hierarchy is still working correctly
  • On the Software Library node, select All Software Updates and click on Synchronize Software Update in the ribbon
SCCM Software Update SSL

Client Validation

  • On a client, run a Machine policy retrieval, followed by a Software Update scan cycle to validate client->server communication is working correctly.
  • Once the Update scan is initiated, progress can be seen in the WUAHandler.log on that client. We can notice the change in the URL pointing the HTTPS://<fqdn of the WSUS/SUP server>:8531
SCCM Software Update SSL

Downstream Software Update point

If you are having multiple WSUS/Software Update point, here are some important notes

  • When enabling SSL on WSUS, it should always be the parent WSUS/SUP that is configured first in SSL, before moving to downstream servers
  • Downstream servers require the exact same steps as mentioned above in order to be configured to use SSL.
  • Doing it only on the primary WSUS/SUP will not make clients communicate over SSL to downstream servers.
  • When the primary Software Update point is forced to use SSL, downstream WSUS will automatically check the box Use SSL when synchronizing update information to sync using port 8531 to the parent WSUS.
SCCM Software Update SSL

For more details on enabling SSL for WSUS, see Microsoft Docs.

Share this Post

The post How to configure SCCM Software Update point in SSL appeared first on System Center Dudes.

How to use SCCM Delivery Optimization

$
0
0

The amount of data that transfers daily on a corporate network is quite important. Once a month, Windows Update has quite an impact on that amount. SCCM along Delivery Optimization can help better manage that crazy amount of GB or even TB of content required to patch all computers.

In an earlier post, we covered the topic to use with Intune and Windows Update for business

In this post, we will detail how to use SCCM Delivery Optimization to deliver Windows Updates.

Requirements

  • Clients must be running Windows 10
  • ConfigMgr 1910 or higher to get all
  • Network ports
    • 7680 inbound to allow peers
    • 80 to allow computer do download updates from Windows Update

For more details, see Microsoft docs

SCCM Delivery Optimization

Using Delivery Optimization along ConfigMgr can be useful for the following reasons :

  • Avoid hosting GBs of updates on-prem across many different distribution points/host/data center to support all clients download. The content also becomes obsolete about 1 month after the download and distribution date.
  • Avoid using bandwidth between sites to sync GBs of updates
  • Leverage local Internet access from clients to download content locally
  • Self-clean up of obsolete content after a defined period.
  • Still use ConfigMgr to approve updates and does not change your patch cycle strategy
  • This can be leveraged for Windows 10 and Office 365 updates

Boundary Groups

Delivery Optimization, like BranchCache and Peer Cache, needs to be enabled by Boundary groups.

The Allow peer downloads in this boundary group must be checked for Delivery optimization to work.

SCCM Delivery Optimization

If you have large boundary groups, enabling During peer downloads, only use peers within the same subnet may be a good fit.

For more details about peer download configuration for boundary groups, see Microsoft docs.

Client settings

There is 2 clients settings in order for Delivery Optimization to be configured.

  • Under Delivery Optimization, enable Use Configuration Manager boundary Groups for Delivery optimization for group ID
    • This option will define Delivery Optimization in Group Mode, which was pretty hard to achieve without boundary groups.
SCCM Delivery Optimization
  • Under Software Update, enable Allow Clients to download delta content when available.
    • This does NOT require to enable Express Update on your Software Update Point.
SCCM Delivery Optimization
  • Those client settings will create the following local policies on Windows 10 devices.
SCCM Delivery Optimization

Delivery Optimization’s GPO

Why are GPO required on top of the ConfigMgr client configuration? Because some default values are a bit low to see a real benefit from using Delivery Optimization

The following GPO should be review and changed to recommended value.

  • Under Computer Configuration/Administrative Templates/Windows Component/Delivery Optimization, enable Max Cache Age
    • By default, it is set to 3 days, which is a bit fast to allow computers to share over your patching cycle
    • 1814400 seconds is 30 days wish is reasonable to expire content prior to next cycle.
SCCM Delivery Optimization
  • Under Computer Configuration/Administrative Templates/Windows Component/Delivery Optimization, enable Minimum Peer Caching Content file size
    • By default, it is set to 100mb. This isn’t critical for Windows Updates but could become really useful to allow computers to share content for smaller content, like Windows store apps that about for about 100MB per client per month.
SCCM Delivery Optimization
  • Under Computer Configuration/Administrative Templates/Windows Component/Delivery Optimization, enable Delay Foreground download from HTTP
    • By default, it is set to 0 seconds, so it doesn’t allow computers to reach for content on Peers. Again not mandatory in terms of monthly patching from ConfigMgr, but useful for Microsoft store apps updates.
SCCM Delivery Optimization
  • Under Computer Configuration/Administrative Templates/Windows Component/Delivery Optimization, enable Delay background download from HTTP By default, it is set to 0 seconds, so it doesn’t allow computers to reach for content on Peers. We decided to wait for 60 seconds prior to reach online for content. This is mostly for clients that are past due the schedule and haven’t downloaded to content ahead. It could generate large delay in user experience.

For more details about Delivery Optimization configuration, see Microsoft Docs

Software Update deployment

In order to make to most out of Delivery Optimization, clients must get updates from Microsoft Update, otherwise, other services like BranchCache will take over if downloaded from an internal source.

  • To allow clients to get updates from Windows Update, check the box If software updates are not available on Distribution point, download content from Microsoft Update. This is done on the deployment of the Software Update group.
SCCM Delivery Optimization
  • That checkbox alone isn’t enough. If updates are available on a local Distribution Point, it will ignore any DO configuration and download locally. The Distribution point for the client must not host Windows update files.
    • This means remove the Software Update Package from the distribution point
  • Eventually, even the Automatic deployment rule can be modified to not even attempt to download updates if 100% of your clients gets content from Microsoft Update

Delivery optimization Results

The following month of patching will reflect the gain of using Delivery Optmization. To review it, browse to Monitoring/Distribution Status/Client Data source

SCCM Delivery Optimization
Important Info

Take a look at our latest FREE Power BI to review client data source

Locally on clients, there’s a few Delivery optimization cmdlet to review usage.

Get-DeliveryOptimizationPerfSnapThisMonth

Get-DeliveryOptimizationPerfSnap

A side benefit of using Delivery Optimization

As explained earlier, leveraging Delivery Optimization for ConfigMgr content can also be useful for Apps updates from the Windows Store. Windows 10 computers download about 100mb worth of updates for all apps per month. Multiply this by the number of devices you have, and a TB of content will quickly arrive.

The below screen is taken from Update compliance that tracks this information, while ConfigMgr only reports content from Windows Updates.

SCCM Delivery Optimization

Bonus Resources

Are you using PowerBI? We did an insane report regarding client content usage. You will have a better idea of which client is using which type of content.

Bottom notes

  • Be patient to see results
  • There’s also Microsoft Connected Cache, AKA Delivery Optimization In-Network Cache(DOINC), available if you wish to configure your distribution point as DO caches.

For more on ConfigMgr Delivery Optimization, see Microsoft docs.

Hope this helped!

Share this Post

The post How to use SCCM Delivery Optimization appeared first on System Center Dudes.

The SCCM Dos and Donts – 2020 Edition

$
0
0

We’ve been in the consulting world since SMS 2003 and we’ve seen so much stuff over the years! From the famous task sequence deployed to All system to the “fuck it let’s set our collections to be all incremental to make SCCM faster!”, we’ve seen it all… or have we? This blog post is an informative post on some of the SCCM Dos and Donts that you need to follow when using SCCM/MEMCM.

This post is intended to be informative, use it to refresh your skill or simply if you’re starting your SCCM journey and you’re looking to learn something new about.

SCCM/MEMCM – Donts

Ok, let’s start with the Don’ts. What you should avoid doing in the latest SCCM version?

Install a Central Administration Site

SCCM dos and donts

Don’t use a CAS. You’ll see this advice everywhere… and it’s true. Don’t use it. Just don’t.

When the Central Administration Site was introduced back in SCCM 2012 SP1 there was no concept of a preferred site system. If you had to manage thousands of clients in a remote site/region and a secondary site was not an option, the installation of numerous Primary Sites was needed (so was the CAS).

But now that new client management options were introduced in later SCCM version, this is not needed anymore.

A Central Administration Site may be needed in specific scenarios. If you need to manage more than 175 000 clients or need more than 250 distribution points and you’re still unsure or don’t know what you’re doing, please ask for external help!

Install a Seconday Site in remote locations

There was a day where putting a Secondary site to “big” remote site was the only solution available. Basically, you would install a secondary site if you had :

  • More than 500 clients in a remote location
  • Need a local Management Point
  • Need a local Software Update Point

With the latest SCCM version, clients can use boundaries to find site systems. Our recommendation would be to install Management Point, Distribution Points and Software Update Point remotely and use boundaries to communicates to these site systems.

Follow Microsoft recommendation for installing a secondary site but as for us, we didn’t install a secondary site for months. I’m not even sure it’s still required to this day to support the addition of secondary sites.

Install SQL on a separate server

In most scenarios, co-locate your SQL installation on your SCCM Primary Server. This is always debatable and often an unpopular topic among Database Administrators. DBA likes to have control and centralized databases as much as possible, however, co-location ensures better performance of your SCCM server.

From a licensing point of view, it’s not an issue since all of the System Center products include SQL Server technology

Incremental Collection everywhere

SCCM dos and donts

Collection refreshes are heavy processes on your server resource. It can bring your server running really slow if you configure collection incorrectly. The biggest mistake is enabling incremental refresh on all collections. We also often see incremental AND full collection updates enabled on the same collections.

Here’s a bunch of resource to help you out :

SCCM Dos and Donts – Deploy to large collections without double verification

This one is fairly simple but so often forgotten. How many times we’ve seen an admin panicking because its deployment was spreading to All System. Unfortunately, there’s no Big red button to stop a wrong deployment out of the box. When deploying, always make sure to :

  • Double-check the collection and its members. Is the scoping right? Is the collection up-to-date?
  • Ensure that the correct setting for the reboot is set. You don’t want to reboot a workstation in the middle of the day after a sneaky deployment
  • Ensure that no Maintenance Windows are applied to the collection or set your deadline behaviour accordingly
  • Ensure that your available/required option and schedule are set correctly
  • When you check all of the above, check again and then, hit Apply

SCCM/MEMCM – DO

SCCM dos and donts

Enable Co-management

Enabling Co-management lets you to manage Windows 10 devices by using both SCCM and Microsoft Intune. It lets you cloud-attach your existing investment in Configuration Manager by adding new functionality. By using co-management, you have the flexibility to use the technology solution that works best for your organization.

So why enable CoManagement ? Why not is more the question. It’s so easy to enable, that you should at least try it to start your modern management strategy. (See next tip)

Get familiar with Intune

Microsoft is putting efforts to fill in the management possibility between SCCM and Intune. Will SCCM die? Not in the near future. But who knows what the future hold in a world where technology changes so fast.

If you use mobile devices (Phone, Tablet), Intune is a no brainer.

For Windows 10 devices, Intune is an additional management tool that you should at least start to use. It gives you new possibilities to manage your devices even if they are outside your organization network. (Device Profile, Conditional Access, Compliance Policies).

Microsoft has announced that on September 1, 2019, they retired the hybrid MDM service offering. If you’re still running SCCM in Hybrid mode, plan your migration to Intune Standalone.

We thus recommend to start looking at intune to manage your devices.

Setup and install a Cloud Management Gateway

The cloud management gateway provides a simple way to manage SCCM clients on the internet. The CMG is a cloud service in Microsoft Azure, you can manage traditional clients that roam on the internet without an additional on-premises infrastructure. You don’t need to expose your on-premises infrastructure to the internet.

With the COVID outbreak, the CMG became a must to manage a roaming device during the time that everyone was working from home. Without a cloud management gateway or an Internet Based Client Management solution, you would simply won’t be able to manage them until they came back to the office.

Become a CMPivot Expert

SCCM has always been good with reporting and inventory of it’s managed devices but SCCM data is up-to-date at the last time the inventory has been run. SCCM CMPivot allows SCCM administrators to initiate a live query on selected computers on a specific topic. The result of that query can then be used to mitigate and fix potential issues.

How many time were you asked “what is the current state as of NOW?” well, you’ll finally be able to answer appropriately with SCCM CMPivot.

We have 2 blog post on the subject, one on how to use CMPivot and the other one is one of our most popular blog these day which gives CMPivot query examples.

Start using PowerBi Dashboard

You may already use many SSRS reports to monitor and visualize your SCCM data. Microsoft has released PowerBI a couple of years ago and has its advantage over SSRS:

  • A large amount of data can be processed
  • Rich visuals
  • Less engineering resources to use
  • It can be embedded into your own custom apps

The latest SCCM 2002 Version includes the integration of PowerBi server. There are various Free and paid Dashboard solutions on the web to fit your reporting needs.

That’s the list for now, we’ll add more in the coming weeks ! Be sure to come back.

Share this Post

The post The SCCM Dos and Donts – 2020 Edition appeared first on System Center Dudes.

SCCM Windows 10 2004 Upgrade Deployment

$
0
0

Support for Windows 7 ended on January 14, 2020. If you are still using Windows 7, your PC may become more vulnerable to security risks. Microsoft published the Windows 10 2004 feature update (aka Windows 10 May 2020 Update) on VLSC. If you haven’t planned your Windows 7 migration to Windows 10, this post will help prepare your SCCM Server to deploy it.

You may also need to deploy Windows 2004 to your Windows 10 computer to stay supported or to benefits from the new features. Before deploying a new Windows 10 feature upgrade, you need to have a good plan. Test it in a lab environment, deploy it to a limited group and test all your business applications before broad deployment. Do not treat a feature upgrade as normal monthly software updates. Treat it as a new operating system as if you were upgrading Windows 7 to Windows 10.

You can also follow our complete Windows 10 Deployment blog post series if you’re unfamiliar with the whole upgrade process.

This blog post will cover all the task needed to deploy the new SCCM Windows 10 2004 Upgrade :

  • Check if you have an SCCM Supported version
  • Upgrade your Windows ADK
  • Import the OS in SCCM to use with your deployment Task Sequence
  • Create a Windows 10 Upgrade Task Sequence for Windows 10 (and Win 7 or 8.1 computers)
  • Update your Automatic Deployment Rules and Software Update, groups
  • Import your ADMX

Check Prerequisite SCCM Windows 10 2004 Upgrade

For Windows 10 2004 May 2020 Update, you need at least SCCM 2002 in order to support it as a client. See the following support matrix if you’re running an outdated SCCM version and make sure to update your site.

Windows ADK

Before capturing and deploying a Windows 10 2004 image, make sure that you’re running a supported version of the Windows ADK. Windows recommends using the Windows ADK that matches the version of Windows you’re deploying. If you’re already running an ADK version on your SCCM server, see our post on how to install a new version.

Upgrade Method – Task Sequence or Servicing Plan?

You can’t use servicing plans to upgrade Windows 7 or Windows 8 computers. So you must use an upgrade task sequence.

In order to upgrade an existing Windows 10 to Windows 2004, you have 2 choices: You can use an upgrade Task Sequence or you can use Servicing Plans.

There a strong debate over which is the best method. We prefer to use Upgrade Task Sequence for the simple reason that it’s more customizable. You can run pre-upgrade and post-upgrade tasks which will be mandatory if you have any sort of customization to your Windows 10 deployments.

For example, Windows 10 is resetting pretty much anything related to regional settings, keyboard, start menu and taskbar customization. Things are getting better from one version to another but if you’re upgrading from an older build, let’s say 1511, expect some post-configuration tasks… and the only way to do that is using a task sequence.

Servicing Plan has the simplicity, you set your option and forget, as for Automatic Deployment Rules does for Software Updates. We yet did not have any client that doesn’t want any control over Windows 10 upgrade in their organization. We totally understand the point of Servicing Plan and they’ll be useful in a couple of releases when Windows 10 upgrades will be an easy task… but for now, it’s not, unfortunately.

Import SCCM Windows 10 2004 Operating System

We will now import the Windows 10 2004 WIM file for Operating System Deployment. If you don’t have the Windows 10 ISO, you can download it from Microsoft Volume Licensing Site.

We will be importing the default Install.wim from the Windows 10 media for a “vanilla” Windows 10 deployment. You could also import a WIM file that you’ve created through a build and capture process. This WIM wile will be used for new computers, to upgrade an existing Windows 10, you need to import an Operating System Upgrade Packages. We will cover this in the next section.

  • Open the SCCM Console
  • Go to Software Library / Operating Systems / Operating System Images
  • Right-click Operating System Images and select Add Operating System Image
SCCM Windows 10 1803 Upgrade
  • On the Data Source tab, browse to your WIM file. The path must be in UNC format
  • You can now select to import only a specific index from the WIM file. We selected the Windows 10 Enterprise index
  • Select your Architecture and Language at the bottom and click Next
SCCM Windows 10 2004 Upgrade
  • In the General tab, enter the Name, Version and Comment, click Next
SCCM Windows 10 2004 Upgrade
  • On the Summary tab, review your information and click Next
  • Complete the wizard and close this window

Distribute your SCCM Windows 10 2004 Operating System Image

We now need to send the Operating System Image (WIM file) to our distribution points.

  • Right-click your Operating System Image, select Distribute Content and complete the Distribute Content wizard

Add Operating System Upgrade Packages

We will now import the complete Windows 10 media in Operating System Upgrade Packages. This package will be used to upgrade an existing Windows 10 or a Windows 7 (or 8.1) device to Windows 10 using an Upgrade Task Sequence.

  • Open the SCCM Console
  • Go to Software Library / Operating Systems / Operating System Upgrade Packages
  • Right-click Operating System Upgrade Packages and select Add Operating System Upgrade Packages
SCCM Windows 10 1803 Upgrade
  • In the Data Source tab, browse to the path of your full Windows 10 media. The path must point to an extracted source of an ISO file. You need to point at the top folder where Setup.exe reside
  • You can now select to import only a specific index from the WIM file. We selected the Windows 10 Enterprise index
  • Select your Architecture and Language at the bottom and click Next
SCCM Windows 10 2004 Upgrade
  • In the General tab, enter the Name, Version, and Comment, click Next
  • On the Summary tab, review your information and click Next and complete the wizard

Distribute your Operating System Upgrade Packages

We now need to send the Operating System Upgrade Package to your distribution points.

  • Right-click your Operating System Upgrade Package, select Distribute Content and complete the Distribute Content wizard
SCCM Windows 10 1803 Upgrade

Create SCCM Task Sequence for Windows 10 2004

Let’s create an SCCM task sequence upgrade for a computer running a Windows 10 device. Once again, this Task Sequence could be used for Windows 7 or 8.1.

  • Open the SCCM Console
  • Go to Software Library \ Operating Systems \ Task Sequences
  • Right-click Task Sequences and select Upgrade an operating system from upgrade package
  • In the Task Sequence Information tab, enter a Task Sequence Name and Description
SCCM Windows 10 2004 Upgrade
  • On the Upgrade the Windows Operating System tab, select your upgrade package by using the Browse button
  • Select your Edition Index depending on the edition you want to deploy. If you select just 1 index as per our indication in previous steps, you’ll see just 1 index to select from.
SCCM Windows 10 2004 Upgrade
  • On the Include Updates tab, select the desired Software Update task
    • All Software Updates will install the updates regardless of whether there is a deadline set on the deployment (on your OSD collection)
    • Mandatory Software Updates will only install updates from deployments that have a scheduled deadline (on your OSD collection)
    • Do not install any software updates will not install any software update during the Task Sequence
SCCM Windows 10 1803 Upgrade
  • On the Install Applications tab, select any application you want to add to your upgrade process
SCCM Windows 10 1803 Upgrade
  • On the Summary tab, review your choices and click Next and click Close

Edit the SCCM Windows 10 2004 Task Sequence Upgrade

Now that we have created the upgrade task sequence, let’s see what it looks like under the hood.

  • Open the SCCM Console
  • Go to Software Library \ Operating Systems \ Task Sequences
  • Right-click your upgrade task sequences and select Edit

As you can see, it’s fairly simple. SCCM will take care of everything in a couple of steps :

  • The Upgrade Operating System step contains the important step of applying Windows 10
  • Ensure to choose the right Edition

Deploy the SCCM Windows 10 2004 Upgrade Task Sequence

We are now ready to deploy our task sequence to the computer we want to upgrade. In our case, we are targeting a Windows 7 computer.

  • Go to Software Library \ Operating Systems \ Task Sequences
  • Right-click Task Sequences and select Deploy
  • On the General pane, select your collection. This is the collection that will receive the Windows 10 upgrade. For testing purposes, we recommend putting only 1 computer to start
  • On the Deployment Settings tab, select the Purpose of the deployment
    • Available will prompt the user to install at the desired time
    • Required will force the deployment at the deadline (see Scheduling)
  • You cannot change the Make available to the following drop-down since upgrade packages are available to clients only
SCCM Windows 10 1803 Upgrade
  • On the Scheduling tab, enter the desired available date and time. On the screenshot, we can’t create an Assignment schedule because we select Available in the previous screen
SCCM Windows 10 1803 Upgrade
  • In the User Experience pane, select the desired options
SCCM Windows 10 1803 Upgrade
  • In the Alerts tab, check Create a deployment alert when the threshold is higher than the following check-box if you want to create an alert on the failures
SCCM Windows 10 1803 Upgrade
  • On the Distribution Point pane, select the desired Deployment options. We will leave the default options
SCCM Windows 10 1803 Upgrade
  • Review the selected options and complete the wizard

Launch the Upgrade Process on a Windows 10 computer

Everything is now ready to deploy to our Windows 10 computers. For our example, we will be upgrading a Windows 10 1909 to Windows 10 2004. This task sequence can also be used on a Windows 7 or 8.1 devices to install Windows 10 2004.

  • Log on our Windows 10 computer and launch a Machine Policy Retrieval & Evaluation Cycle from Control Panel / Configuration Manager Icon
SCCM Task Sequence Upgrade
  • Open the new Software Center from the Windows 10 Start Menu
  • You’ll see the SCCM upgrade task sequence as available. We could have selected the Required option in our deployment schedule, to launch automatically without user interaction at a specific time
  • When ready, click on Install
  • On the Warning, click Install
SCCM Windows 10 1803 Upgrade
  • The update is starting, the task sequence Installation Progress screen shows the different steps
  • The WIM is downloading on the computer and saved in C:\_SMSTaskSequence
  • You can follow task sequence progress in C:\Windows\CCM\Logs\SMSTSLog\SMSTS.log
  • After downloading, the system will reboot
  • The computer restart and is loading the files in preparation for the Windows 10 upgrade
SCCM Windows 10 1803 Upgrade
  • WinPE is loading
SCCM Task Sequence Upgrade
  • The upgrade process starts. This step should take between 60-90 minutes depending on the device hardware
  • Windows 10 is getting ready, 2-3 more minutes and the upgrade will be completed
SCCM Task Sequence Upgrade
  • Once completed the SetupComplete.cmd script runs. This step is important to set the task sequence service to the correct state
SCCM Task Sequence Upgrade
  • Windows is now ready, all software and settings are preserved
SCCM Windows 10 2004 Upgrade

Create Software Update Group

One important thing in any OSD project is to make sure that the deployment of every machine is up to date. Before deploying Windows 10 2004, make sure that your Software Update Point is configured to include Windows 10 patches.

Once Windows 10 is added to your Software Update Point, we will create a Software Update Group that will be deployed to our Windows 10 deployment collection. This way, all patches released after the Windows 10 media creation (or your Capture date) will be deployed during the deployment process.

To create a Windows 10 Software Update Group :

  • Open the SCCM Console
  • Go to Software Library / Software Updates / All Software Updates
  • On the right side, click Add Criteria, select Product, Expired and Superseded
    • Product : Windows 10
    • Expired  : No
    • Superseded: No
    • Title contains 2004
  • Select only the latest Cumulative Updates that apply  (x64 or x86) and select Create Software Update Group
  • Once created, go to Software Library / Software Updates / Software Update Groups
  • Right-click your Windows 10 SUG and deploy it to your OSD deployment collection

Import ADMX File

If you’re responsible for managing group policy in your organization. Ensure that you import the latest Windows 10 2004 ADMX file on your domain controller.

Bonus Resources

After your SCCM Windows 10 2004 Upgrade, need a report to track your Windows 10 devices? We developed a report to help you achieve that :

Asset – Windows 10 SCCM Report

Share this Post

The post SCCM Windows 10 2004 Upgrade Deployment appeared first on System Center Dudes.

Viewing all 418 articles
Browse latest View live


Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>