Power BI : Power BI SCCM Template from Microsoft

This post runs through the process of setting up Power BI and the SCCM template which will give you detailed information on your System Center Configuration Manager including client and server health, malware protection, software updates, and software inventory across your organisation. First things first, to run the Power BI SCCM template you need to running … Continue reading Power BI : Power BI SCCM Template from Microsoft

Getting email alert when imaging is finished

When Rebooting Is Not The Answer

I wanted to get some details every time a machine was imaged for my own details.  Mostly for asset tracking purposes I set up the below script to run at the end of my task sequence.

It is really nice to get all this info.

PC imaged is PCname with Serial R9ZRLB8 and Make and Model LENOVO 23594LU.  Processor is Intel(R) Core(TM) i5-3230M CPU @ 2.60GHz.  Ram is 8.00 GB.  Operating System is Microsoft Windows 10 Pro 10.0.15063

I suppose this could also be modified so that the tech imaging the machine could also get the email.  Maybe basing it off of the machine’s OU.  Hopefully someone finds this useful but I have found it quite handy.  I have also finished a script to gather logs when the task sequence fails and send them to me but I am still testing that out and will save that for my next…

View original post 46 more words

SCUP : Managing 3rd Party Updates in SCCM 2012 using SCUP

This guide will show you how to configure SCUP and deploy 3rd party updates(Adobe, Flash Player) With Microsoft Updates via SCCM 2012 using SCUP plus software update catalogs. Managing 3rd Party Updates in SCCM 2012 using SCUP 1- Installing and configuration SCUP 2011 It’s required to publish the updates to WSUS in order to deploy … Continue reading SCUP : Managing 3rd Party Updates in SCCM 2012 using SCUP

New Tool: ConfigMgr Client Notification

cnt-1

smsagent

Today I whipped-up a very simple tool for ConfigMgr admins and support staff. It allows you to send client notifications (using the so-called fast channel), such as downloading the computer policy, collecting hardware inventory, checking compliance etc, to remote computers from your local workstation independently of the ConfigMgr console.

CNT

The tool connects to your ConfigMgr site server using a Cimsession and PSSession, so you need WsMan operational in your environment. You simply provide some computer name/s in the text box, enter your site server name, select which client notification you want to send and click GO. The tool will get the online status of the clients from the SMS Provider to give you an indication of which systems will receive the client notification. Then it will trigger the client notification on online systems from the site server.

The tool is coded in PowerShell / Xaml and uses the MahApps Metro…

View original post 112 more words

Monitor Content Downloads Between an SCCM Distribution Point and a Client

smsagent

Sometimes you want to monitor the progress of a content download on an SCCM client from a distribution point. You can use the Get-BitsTransfer PowerShell cmdlet, but it doesn’t currently support running on remote computers, so I wrapped the cmdlet in a bit of extra code that lets you get Bits transfer information from a remote computer, and adds a couple of extra values like the transfer size in megabytes and gigabytes as well as a percent complete value. Run it while there’s an active transfer to monitor the progress.

Simply provide a computer name like so:

Get-BitsTransfers -ComputerName PC001

Function Get-BitsTransfers { [CmdletBinding()] Param ( [Parameter(Mandatory=$true, ValueFromPipelineByPropertyName=$true, Position=0)] $ComputerName ) Invoke-Command -ComputerName $ComputerName -ScriptBlock { $BitsTransfers = Get-BitsTransfer -AllUsers Foreach ($BitsTransfer in $BitsTransfers) { [pscustomobject]@{ DisplayName = $BitsTransfer.DisplayName JobState = $BitsTransfer.JobState OwnerAccount = $BitsTransfer.OwnerAccount FilesTotal = $BitsTransfer.FilesTotal FilesTransferred = $BitsTransfer.FilesTransferred BytesTotal = $BitsTransfer.BytesTotal MegaBytesTotal = [Math]::Round(($BitsTransfer.BytesTotal / 1MB),2) GigaBytesTotal…

View original post 24 more words

SCORCH : Active Directory Cleanup with Orchestrator

Active Directory Cleanup Runbook Automation 6 runbooks – 5 are functional workbooks and 1st runbook calls the rest in sequence. Download the Powershell Scripts - ad cleanup runbook ps   Runbook 1 – AD Cleanup The Master Runbook – which triggers every 7 days 16 hours – call the 5 runbooks and they a ‘wait … Continue reading SCORCH : Active Directory Cleanup with Orchestrator

ConfigMgr : Query Machines with LocalGroupMembers where users are admins on machine

Enable the class LocalGroupMembers from here > http://praveenkumarsharma1.blogspot.com/2014/10/enable-members-of-all-local-groups-of.html   SQL Query to find domain users who are administrators on the workstations/servers SELECT v_R_System.Netbios_Name0, v_R_System.User_Name0, v_R_System.AD_Site_Name0, LocalGroupMembers_DATA.Account00, LocalGroupMembers_DATA.Category00, LocalGroupMembers_DATA.Disabled00, LocalGroupMembers_DATA.Domain00, LocalGroupMembers_DATA.Name00, LocalGroupMembers_DATA.Type00 FROM LocalGroupMembers_DATA INNER JOIN v_R_System ON LocalGroupMembers_DATA.MachineID = v_R_System.ResourceID where Name00 like '%Administrators%' and Type00 like '%Domain%' and Category00 like '%UserAccount%' Output :

Filtered GPO’s are broken

When Rebooting Is Not The Answer

I was updating a logon script today and realized that for some reason it wasn’t applying to the machine.   I ran rsop and gpresult but neither one showed the policy or the logon script.  The gpo was filtered to a specific group of users and the user was clearly a member of the group so I was befuddled what was going on.  I finally found a Security update KB 3159398 for Group Policy that came out in June that while fixing a dangerous man-in-the-middle attack breaks filtering if Domain Computer group does not have read permissions to the OU.  Follow the below steps to fix and your gpo will be working like normal.

  1. Open up the gpo in group policy management and click the delegation tab.
  2. Click Add and type in domain computers.capture
  3. Set permissions to read as is the default.capture2
  4. Enjoy your fixed GPO’s!

Link to Microsoft Security update and known…

View original post 3 more words