-
Posts
9247 -
Joined
-
Last visited
-
Days Won
369
Everything posted by anyweb
-
that is not the smsts.log that is another one with the date/time added to it, which happens often when logs are rolled over and a new one is generated, the original log file must be there somewhere (probably c:\windows\ccm\logs\smstslog) can you double check (there can be two) smsts-yyyymmdd-hhmmss.log smsts.log
-
ok your windowsupdate log is garbage, you need to clear the cache out and try again, read below to fix it If you encounter problems decoding the Windows Update log (for example, if you have multiple "GUID" entries that are displayed in the final text log), you may have to delete and then update your symbol cache. You can do this by deleting everything under the %temp%\windowsupdatelog folder. via > https://support.microsoft.com/en-us/help/3036646/how-to-read-windows-update-logs-in-windows-10-version-1607
-
right then the logic would have to change in the script, so that it knows if it's booted via standalone, and if so, skip the checkfornetwork step check for the following variable _SMSTSLaunchMode Specifies the task sequence launch method. The task sequence can have the following values: SMS - specifies that the task sequence is started by using the Configuration Manager client. UFD - specifies that the task sequence is started by using USB media and that the USB media was created in Windows XP/2003. UFD+FORMAT - specifies that the task sequence is started by using USB media and that the USB media was created in Windows Vista or later. CD - specifies that the task sequence is started by using a CD. DVD - specifies that the task sequence is started by using a DVD. PXE - specifies that the task sequence is started from PXE. HD – specifies that the task sequence was started from a hard disk (prestaged media only). and based on the value it returns do the above...
-
well Windows 10 WSUS requirements are listed here https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wsus Requirements for Windows 10 servicing with WSUS To be able to use WSUS to manage and deploy Windows 10 feature updates, you must have WSUS 4.0, which is available in the Windows Server 2012 R2 and Windows Server 2012 operating systems. In addition to WSUS 4.0, you must install the KB3095113 and KB3159706 patches on the WSUS server. so have you fulfilled those requirements ?
-
what version of WSUS have you installed and what operating system ?
-
New SCCM 1702 Setup Issue
anyweb replied to day79's topic in System Center Configuration Manager (Current Branch)
this is the first failure [15:26:59] Removing IIS Virtual Directory 'SMS_MP_WindowsAuth' [15:26:59] Method 'DeleteExtensionFileRecord' failed with 80020009 and that error means Exception occurred. Source: Windows ----- does that help ? -
New SCCM 1702 Setup Issue
anyweb replied to day79's topic in System Center Configuration Manager (Current Branch)
what does mpMSI.log say ? -
SCCM 1702 bug to be aware of
anyweb replied to Config Mangler's topic in System Center Configuration Manager (Current Branch)
i'm not sure if this weekends hotfix will fix this problem but check your Updates and Servicing node.... -
heh, interesting observation, but to be honest, this is in the interest of protection your details, your info, your account, so you should understand that it's important that your password is a decent one, security today, is very important as the recent ransomware news made all to clear
-
Deployment for computers with no monitors
anyweb replied to Glowbeard's question in Windows Deployment Services (WDS)
id personally use MDT (with WDS) to install those machines easily, and then the machines themselves would be hyperv VM's, there's a bunch of guides right here to start setting that up, such as this one. -
Ransomware has been around for a few years now but up until yesterday, it wasn't that well known about. This latest RansomWare called WannaCry has changed that for ever. Ransomware encrypted data on at least 75,000 systems in 99 countries on Friday. Payments were demanded for access to be restored. European countries, including Russia, were among the worst hit. Companies around Europe were hit and investigations are underway to see who was responsible. This was such a big attack that Microsoft released patches for unsupported operating systems (such as Windows XP) to allow those businesses still running them, a chance to protect themselves. Guidance available In addition to making patches available, Microsoft has published guidance to explain what is necessary in protecting yourself against this Ransomware and any others based on the same vulnerabilities (SMBv1). These vulnerabilities were patched by Microsoft in March of this year, but of course there were no patches (at that time) for unsupported operating systems such as Windows XP. Download Patches for unsupported Operating Systems To patch your unsupported operating systems, get over to this url and download the available patches. WannaCry has multiple vectors, but you should remove one vector, SMBv1. Do as follows 1. Block 445 inbound 2. Install MS17-010 3. Remove SMB1
-
Client Install Issues
anyweb replied to Jordanwaller's topic in System Center Configuration Manager (Current Branch)
what does the ccm.log tell you (on the server), attach it here if you want us to look at it
