Windows 10 20H2 is again a small fall release with a long support cycle of 30 months. It shares a lot with the spring release (NTK 2004) so check out my list for this release, too.
If you found something new before me or if I missed anything important, please send me a message via Twitter.
Windows 10 2004 is the first big release since 1903 (NTK 1903) and compared to the small update of Windows 10 1909 (NTK 1909) this brings a lot of changes.
If you found something new before me or if I missed anything important please write a comment or send me a message via Twitter.
Even though Windows 10 1909 is only a small update compared to 1903 (NTK 1903) I have created this list with interesting links for IT Pros regarding this release. A place where I can store articles about new features, settings or bugs. I will update the post with new content as soon as I find it.
If you find something new before me or if I missed anything important please write a comment or send me a message via Twitter.
With the release of Windows 10 1903 I want to start a curated link list for every Windows 10 release. A place where I can store interesting articles about new features, settings or bugs. I plan to update with new content as soon as I find it.
If you find something new before me or if I missed anything important please write a comment or send me a message via Twitter.
I tried to create images of Windows 7 and Windows 10 (1607, 1703, 1709) with a SCCM Build and Capture Task Sequence. I deployed the January Windows Updates to the imaging clients so that the images should include the fixes for the Meltdown and Spectre vulnerabilities. But unfortunately this did not work. The reason is that the Antivirus compatibility Registrykey mentioned in this article had not been set before the updates were installed.
Update: After testing Build and Capture of Windows 10 with MDT I have added the necessary steps to the article. Update 2: Thanks to @manelrodero for pointing out that a reboot is not required between setting the key and the Install Update step. Update 3: Microsoft announced that this is not longer necessary beginning with the Cumulative Update 03-2018
Solution
You just have to add the registry in your Build and Capture sequence right before the update step performs the update scan.
SCCM
Add a Run Command Line Step to your Build and Capture Task Sequence before the Install Updates step containing the following line
2. Make sure that the box Evaluate software updates from cached scan results is not checked in the first Install Updates step.
MDT
Add a Run Command Line Step to your Build and Capture Task Sequence before the Windows Update (Pre-Application Installation) step containing the following line
Microsoft has released LAPS (Local Administrator Password Solution) to easily allow different complex passwords for the local Administrator account on every client. It also allows to manage another user than the Built-in Administrator with the Well-Known SID (-500). But it does not create such a user.
In this article, I show you how to configure a SCCM Configuration Item to create such a user with a dynamic password.
Update: I removed an issue in the remediation script which did not always delete the password expiration time in a multi domain environment.
I won’t go into the details of configuring LAPS in your environment, there are already some really good articles about that topic.
The validation script
The validation script checks the following:
is LAPS enabled?
is LAPS installed?
is an Admin Account Name specified in the GPO?
Does the Admin Account exist?
The remediation script
The remediation script creates a local user with the name specified in the Group Policy and sets a random complex password. After that it deletes the expiration time attribute (ms-Mcs-AdmPwdExpirationTime) from the Active Directory computer object so that LAPS will set a new password on the next policy update. Finally, it triggers a policy update.
It does not add the user to the Administrator group. I recommend to do this with Group Policy.
Group Policy setting
If you want to manage another local user than the Built-in Administrator you have to configure the following policy setting in your Group Policies:
Computer Configuration\Policies\Administrative Templates\LAPS\Name of the administrator account to manage
Set it to enabled and enter the name of the local account you want to create.
Configuration Manager
Create Configuration Item
In the SCCM console go to Assets and Compliance - Compliance Settings - Configuration Items and click on the Create Configuration Item .
Specify a name and select Windows Desktops and Servers (custom) as type.
Select the Operating system versions you want to support (requires PowerShell).
Click on the New… button.
Specify a name for the setting and select as Setting type Script and as Data type String.
Click on the upper Edit Script… button in the Discovery script area. Then select PowerShell, and copy paste the following script to the script area.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Do the same with the lower Edit Script… button in the Remediation Script area with the following script.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Change to the Compliance Rules Tab and click on the New… button.
Define a Name for the rule select Rule typeValue. The value returned by the specified script should be Equals the following values True.
Make sure you select the Run the specified remediation script when this setting is noncompliant checkbox.
You can choose the severity of this rule. For me Warning is high enough.
After that you can complete the creation of the Configuration Item.
Create Configuration Baseline
Now you have to create a Configuration Baseline in Assets and Compliance - Compliance Settings - Configuration Baselines .
Choose a Name for the baseline and Add the configuration item you have created earlier.
Deploy Configuration Baseline
After that you can Deploy the Configuration Baseline to a collection.
Please make sure to select the Remediate noncompliant rules when supported and the Allow remediation outside maintenance window check boxes.
Besides,you have to select how often this rule will be checked. I selected once per day.
Test the Configuration Baseline
After successfully deploying the baseline you should check the Configurations Tab in the Configuration Manager Properties Control Panel on one of your clients.
If the rule was not already evaluated press the Evaluate button.
After successfully evaluating the rule it will be shown as Compliant and the user was created.
The LAPS agent now has a target user and will soon change the password of the user and save this new password to the Active Directory object of the computer.
Hints
Check the DcmWmiProvider.log if you get any errors executing the baseline. There you can see the real PowerShell error.
If you see a message there like the one in the screenshot below you have to configure PowerShell execution policy to Bypass in the Computer Agent section in the Client settings or you have to sign the scripts with a Code-Signing-Certificate.
If you have installed the SCCM agent of a recent Technical Preview Build on a client it is not possible to push the current branch agent to it. I tested this with TP 1706 / CB 1702 and with TP 1707 / CB 1706.
This does not work even if the options Always install the client and Uninstall existing Configuration Manager client before the client is installed are selected.
As you can see in the log the request is skipped because a newer agent version is already installed.
Solution
You have to manually uninstall the Technical Preview agent before pushing from the CB console
I recently ran into the problem that the task sequence I wanted to test won’t show up in the SCCM Software Center. I checked for a common misconfiguration like
Deployment schedule
Configuration Manager Client active
Client in the correct collection
Deployment deployed to the correct collection
Client in a boundary with a distribution point
Packages deployed to the Distribution Point
Check the _SCCLient_%USER%.log, LocationServices.log, PolicyAgent.log, PolicyEvaluator.log,…
etc.
But all this was configured correct or did not show any errors.
Solution
I found out after some time that my colleague was still logged on to this computer. After logging him off the Deployments appeared as expected in the Software Center.