-
Posts
9203 -
Joined
-
Last visited
-
Days Won
367
Everything posted by anyweb
-
ok this is weird, i've looked at the first command in part 3 of step 4, i copied the text, and pasted it into notepad++ and even in ansi it shows Correctly ! but your paste has the hidden characters... so what's going on, it looks fine to me now without me making any change, what browser are you using and how are you copying/pasting the text ? here i copy the original command line and paste it into notepad ++, and there are no hidden characters !
-
ok thanks, i'll fix it today, i can see the characters when switching to Ansi in NotePad++, so are these the characters you are referring to ? I've no idea how they ended up there, maybe it's the forum software...
-
thank you ! I put a ton of effort into creating it. I've seen this before too, and i thought i fixed all code in the 8 part series, if you could point me to the commands that you copied the code from i'll verify them again (with notepad++)
-
it works fine, you must be a logged in member of windows-noob.com to download the scripts, now that you are a member, please try again.
- 24 replies
-
you can only download the script if you are logged on as a member of this site, so please do try again now that you are one
-
MMS-2016-Windows-10-UEFI-BitLocker-HTA Start error
anyweb replied to radish's question in Frontends, HTA's and Web Services
yes as long as there is a service called GenerateName -
MMS-2016-Windows-10-UEFI-BitLocker-HTA Start error
anyweb replied to radish's question in Frontends, HTA's and Web Services
which webservice are you using ? do the webservice url(s) match those in the ini file above, if not then you must amend it accordingly, the lines that have a ; in front of them are merely comments, they are not actually used -
you need to paste in YOUR OID which you created in step 4 into the file, so that it looks pretty much like what I've shown you, other than it will have YOUR OID and not MINE. you might want to change the pki cps url also to point to your url cheers niall
-
thanks the important bit is... " Once done, paste in the OID created in Step 4 and then save the file as C:\Windows\CAPolicy.inf. "
-
MMS-2016-Windows-10-UEFI-BitLocker-HTA Start error
anyweb replied to radish's question in Frontends, HTA's and Web Services
reinstall is not a backup, so you must be doing something wrong. If i have time tomorrow i'll take a look at the logs, sorry but i've had a really long day today... -
dont confuse the ConfigMgr client policy (default 60 minutes) with the MBAM client check policy (default 90 minutes). Full disk encryption always takes time, that's the way it is, the only 'fast' encryption is something called used space only, which you can do with OSD task sequences with a Pre-Provision BitLocker step during operating system deployment. And for laptops yes connect power so it doesn't power off during encryption.
-
MMS-2016-Windows-10-UEFI-BitLocker-HTA Start error
anyweb replied to radish's question in Frontends, HTA's and Web Services
you can download the xml file in the original blogpost here https://www.windows-noob.com/forums/applications/core/interface/file/attachment.php?id=14650 -
MMS-2016-Windows-10-UEFI-BitLocker-HTA Start error
anyweb replied to radish's question in Frontends, HTA's and Web Services
first problem is this <![LOG[Failed to run the action: xcopy viewlog. The system cannot open the file. (Error: 00000004; Source: Windows)]LOG]!><time="18:09:22.504-480" date="08-04-2019" component="TSManager" context="" type="3" thread="1884" file="instruction.cxx:942"> < make sure you follow the guide correctly otherwise it will fail. -
C:\ drive Full
anyweb replied to nhottinger's topic in System Center Configuration Manager (Current Branch)
yes of course, do it and if it doesn't help choose the second shrink option and try again (it's a while since i did it) -
C:\ drive Full
anyweb replied to nhottinger's topic in System Center Configuration Manager (Current Branch)
there you go ! now you know why i use TreeFreeSize, the problem you have is as i guessed, the sql server transaction logs, look at my link above and you'll see how to compress them down to almost nothing