Jump to content


Judical

Established Members
  • Posts

    54
  • Joined

  • Last visited

Everything posted by Judical

  1. The access point should be using a third party cert, not your client machines. -Judical
  2. Hello, I have enabled the feature in SCCM for "Windows Defender Application Control". For some reason I cannot get the policy to push to any machines. Any ideas on what the issue may be would be appreciated. -Judical
  3. Hello, It looks like the download for that update was broken at some point. -Judical
  4. I am trying to prevent smsdbmon.log from getting spammed about Azure. Since I'm not currently using Azure I decided to remove the Azure connection. Every time I delete the Azure Service is comes right back before I can remove the Tenant. Any ideas how I can get around this?
  5. Hello, Has any devised a way to separate Office 2013 from 2016 (Click to Run) in a query? -Judical
  6. Are you using this Peter? Its pointing at the old Lenovo site that was removed just like the original script I had linked. -Judical
  7. Update to this. I called Microsoft and they gave me the missing files, problem solved.
  8. for /F "tokens=1,2" %%i in ('qwinsta /server:%COMPUTERNAME% ^| findstr "console"') do set tempVar=%%j
  9. Is there an up to date way for pulling this information with SCCM? This was the previous way to do it. https://sccmguru.wordpress.com/2014/04/24/hp-and-lenovo-warranty-information-in-configuration-manager-2012-r2/ This script is attached since its not available anymore on the site Can any scriptwriters in the forums try to modify the existing script to add this; $test = Invoke-WebRequest -uri http://support.lenovo.com/us/en/warrantylookup-SessionVariable ln $form = $test.forms[0] $serial = 'MJNECHL' $form.Fields["serialCode"]="$($serial)" $answer = Invoke-WebRequest -Uri ("http://support.lenovo.com"+ $form.Action) -WebSession $ln -Method $form.Method -Body $form.Fields $a = $answer.ParsedHtml.getElementById("warranty_result_div").outerText $a.Substring(39,10) -Judical
  10. Hello, Is there a way to do this? I have tried several different methods and it just ends up adding the computer name to admin group. When run a package from SCCM with admin rights %username% ends up being the computer name. Is there a way around this? -Judical
  11. I was hoping it could be done without a GPO. Looking around the internet people say they have it working with a similar script to mine.
  12. I am having issues trying to get the lockscreen to stick. It will show for for the first boot then revert back to a Microsoft picture. This is what I am currently using; echo f | XCOPY "%~dp0lockscreen.jpg" "C:\Windows\Web\Screen\img100.jpg" /HRCY REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Personalization" /V "LockScreenImage" /T REG_SZ /D "C:\Windows\Web\Screen\img100.jpg" /F I recently added the registry entry but that isn't making a difference. Can this only be done through GPO or am I doing something wrong? -Judical
  13. My backups do not go back far enough. I will be able to modify the files if I can get my hands on them. I'm looking for smsbkup.ctl and afterbackup.bat
  14. Can someone please share the contents of smsbkup.box so that I may resolve my problem?
  15. Hello, Does anyone have any knowledge to recreate this folder. For some reason I do not have it and constantly seeing SMS_SITE_BACKUP failures. If someone could send me this folder from their current setup I could modify the smsbkup.ctl file for my environment and it should work. -Judical
  16. Device: * Component: BITS Server Extensions Severity: Warning Time: 2015/12/17 07:53:53.000 Message: The user Anonymous-Null could has created 52 upload sessions in virtual directory /LM/W3SVC/1/Root/CCM_Incoming. Over the past 3 days I have started receiving these warnings caused by my SCCM server. Does anyone know what would prompt this? I am running SCCM 2012 R2 SP1 CU2 -Justin
  17. I have been testing this with no luck. There is only 1 group with .Net updates. Here is UpdatesStore.log Querying update status of 14 updates. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (151e15f7-fa7a-40c4-a58a-721cb88e8071): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2972107), BulletinID=MS14-057, QNumbers=2972107, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (9a905b4e-94e7-4f23-891c-40c0185605de): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2972107), BulletinID=MS14-057, QNumbers=2972107, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (6c8c0ac4-f40b-4e4b-aa83-1694fe0dbec2): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3037581), BulletinID=MS15-041, QNumbers=3037581, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (647db682-170f-4d52-b682-50a587669fc8): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3037581), BulletinID=MS15-041, QNumbers=3037581, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (84baf93f-3645-4ef2-887a-d1e5e883adc7): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3023224), BulletinID=MS15-048, QNumbers=3023224, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (25cbae55-974b-45c9-8b4b-78ed1485ed45): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3023224), BulletinID=MS15-048, QNumbers=3023224, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (922de694-c7e6-42ac-8738-95f5a8e2390e): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3035490), BulletinID=MS15-048, QNumbers=3035490, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (642b981f-bf50-467e-b0f3-30ef96ca6cd9): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3035490), BulletinID=MS15-048, QNumbers=3035490, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (d44bd7d1-ec33-4a65-942c-093aec39b02b): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2979578), BulletinID=MS14-057, QNumbers=2979578, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (3301d1d8-517e-4e7e-81c3-42ca6609a31a): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2979578), BulletinID=MS14-057, QNumbers=2979578, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (e257d135-40b9-4361-9e7d-8537d256d54b): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2978128), BulletinID=MS14-072, QNumbers=2978128, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (cedf67fc-735e-4360-8db4-c8cb5d39663c): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2978128), BulletinID=MS14-072, QNumbers=2978128, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (e63b4eca-27a1-4fd0-b311-e468da0cd02e): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2972216), BulletinID=MS14-053, QNumbers=2972216, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Queried Update (108336d1-2d2c-4d93-87b3-49d335640f2a): Status=Missing, Title=Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB2972216), BulletinID=MS14-053, QNumbers=2972216, LocaleID=, ProductID=0fa1201d-4330-4fa8-8ae9-b877473b6441, UpdateClassification = 0fa1201d-4330-4fa8-8ae9-b877473b6441, ExcludeForStateReporting=FALSE. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) Querying update status completed successfully. UpdatesStore 7/31/2015 10:48:40 AM 1328 (0x0530) All of the updates are found as missing. Then here is UpdatesDeployment.log EnumerateUpdates for action (UpdateActionInstall) - Total actionable updates = 0 UpdatesDeploymentAgent 7/31/2015 11:36:03 AM 1816 (0x0718) EnumerateUpdates for action (UpdateActionInstall) - Total actionable updates = 0 UpdatesDeploymentAgent 7/31/2015 11:36:42 AM 4428 (0x114C) EnumerateUpdates for action (UpdateActionInstall) - Total actionable updates = 0 UpdatesDeploymentAgent 7/31/2015 11:36:42 AM 3144 (0x0C48) -Judical
  18. 2015-07-24 00:42:21, Warning [0x0606cc] IBS GetSystemPartitionPath: Unable to find DOS drive path for system partition [\Device\HarddiskVolume1]. Run diskpart clean disk 0 and give it another try.
  19. Hello, When you run the task sequence it installs the image, installs the drivers, then restarts. You need to make sure the correct drivers are in your driver package not in the boot image. Since your task sequence is starting you already have the correct drivers in your boot image. -Judical
  20. Is there a setting somewhere that would not allow .Net updates to deploy? My client sees them as missing but they do not install and there are no errors in the logs. I assume I'm just missing some setting somewhere that would fix this. Please let me know what you think. -Judical
  21. I do not see the updates in software center only available applications. UpdatesStore.log is finding that many updates are missing(which they are), all of the updates are deployed to the collection that the computers reside in. Office updates and Endpoint Protection definitions are deploying without any issues. WUAHandler.log and WindowsUpdate.log have no errors.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.