Jump to content


Config Mangler

Established Members
  • Posts

    157
  • Joined

  • Last visited

  • Days Won

    3

Posts posted by Config Mangler

  1. Thanks, I just wanted a sanity check before I did much more on this.

     

    PXE is working now and we nearly have a full SCCM build for the Surface 3.

     

    Did you go as far as encryption? It encrypts with TPM / PIN and stores the recovery key in AD but when I enter the PIN at start-up I get the message "Too many PIN entry attempts" on the first attempt and have to use the recovery key to get in. I sense a Premier Support call coming.......

  2. Hope this isn't a repost. Watch out for this if you are doing an in-place upgrade using the SCCM Software Centre on XP.

     

    This has stopped our XP -> Win 7 rollout in its tracks and I would advise not upgrading to R2 until this is fixed.

     

    When you do an OSD it copies down the boot.wim and you get error 800700C1

     

    Executing command line: "C:\_SMSTaskSequence\WinPE\SMS\bin\i386\bootsect.exe" /NT60 SYS /MBR

     

    Since R2, bootsect.exe is not compatible with XP. To make matters worse, when you reboot the XP machine you get NTLDR not found and the machine is a brick.

     

    There is a relatively easy workaround which is replacing the bootsect.exe in the boot.wim with an older one, but it's not supported and I don't know what else is affected. I'll try this in my lab but have logged a MS premier call for advice.

     

    It's supposed to be fixed in SCCM 2012 R2 CU1

     

    http://social.technet.microsoft.com/Forums/en-US/6e934990-999a-4367-860a-3ce4e5eda956/sccm-2012-r2-error-0x800700c1?forum=configmanagerosd

     

     

     

     

     

  3. Got you. Touch works but you need the keyboard to pop up to enter the computer name and password. We don't use a password on PXE and pre-populate SCCM with the computer name vs MAC address so don't enter anything. We use cheap Belkin USB 4 port unpowered adapters as well as the dock and they have worked with everything.

    I built a similar Panasonic toughbook and it was 64 bit drivers only so yes that might be worth a shot.

  4. Thought I would share this. We have managed to shave 20 minutes off an i5 laptop build and 60 minutes off an Atom tablet build by turning off power savings during the build. I just added a package / batch file with the following entries.

     

    c:\windows\system32\powercfg.exe -change -monitor-timeout-ac 0
    c:\windows\system32\powercfg.exe -change -monitor-timeout-dc 0
    c:\windows\system32\powercfg.exe -change -disk-timeout-ac 0
    c:\windows\system32\powercfg.exe -change -disk-timeout-dc 0
    c:\windows\system32\powercfg.exe -change -standby-timeout-ac 0
    c:\windows\system32\powercfg.exe -change -standby-timeout-dc 0
    c:\windows\system32\powercfg.exe -change -hibernate-timeout-ac 0
    c:\windows\system32\powercfg.exe -change -hibernate-timeout-dc 0

     

    This also fixed terrible build problems with the Atom where builds could sometimes take three days to complete!

     

    I was sure that SCCM disabled any power savings during a build but it looks like this is not the case.

     

    We run another batch file at the end to revert the settings.

  5. Yes the Samsung Ativ, Lenovo X230, infact everything I've tried except the Dell store their key in AD using the same TS.

     

    Yes the Dell is joining the domain

     

    Yes the msTPM value is empty <not set>

     

    A complication on the Dell is that it has two devices under Security Devices:

     

    Intel® Atom Processor Z2760 Security Engine &

    TPM 1.2

     

    I have had problems before where a manufacturers' TPM driver is used so I have modified the build to enable just the TPM 1.2 module but I get the same result. I do think this area is where the problem lies though.

  6. Thanks. Log attached. It runs the command about 11:38.

     

    Also the output from bde status is:

     

    Volume C: [Windows]
    [OS Volume]

    Size: 57.29 GB
    BitLocker Version: 2.0
    Conversion Status: Used Space Only Encrypted
    Percentage Encrypted: 100.0%
    Encryption Method: AES 128
    Protection Status: Protection Off
    Lock Status: Unlocked
    Identification Field: Unknown
    Key Protectors: None Found

     

    I can manually activate Bitlocker after this it prompts to save a recovery key and protection status changes to ON. So the TPM side of things is ok.

     

     

     

    smsts.log

  7. I am getting the same on Dell Latitude 10 (UEFI) hardware i.e. it will not save the recovery password to AD. The TS does not fail and "manage-bde -status c:" shows it as encrypted but with a warning against the disk as there is no recovery key.

    The Samsung Slate 7 / ATIV will correctly store the key in AD on the same Windows 8 task sequence.

     

    Is it the pre-provisioning task which is at fault here and are people treating this as a bug in SCCM which should be logged with Microsoft? Are there any useful logs for BitLocker other than event viewer?

     

    The Dell only has a 64Gb SSD so encrypting it the old fashioned way is probably no big deal if I have to go that way.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.