Windows Information Protection Policies in Configuration Manager

Windows Information Protection Policies in Configuration Manager

The  release of the 1606 build for SCCM Current Branch brought several new management capabilities around security.  One of these enhancements is the ability to set policies for the new Windows Information Protection feature of Windows 10 (formerly known as Enterprise Data Protection).  Let’s take a quick look at some of the changes and new features. These policy options can be configured as a Configuration Item for Windows 10 clients managed by Configuration Manager: Where some of these options were…

Read More Read More

Intune Conditional Access and Selective Wipe–Caveats Abound

Intune Conditional Access and Selective Wipe–Caveats Abound

A key piece of the enterprise mobility narrative centers around control of data, especially email.  There are a number of different scenarios out in the various environments, and it can be a little confusing as to how the pieces all fit together.  In this post, we’re addressing the scenario of a company that wants to enable BYOD for mobile devices to allow access to corporate email while ensuring they are able to remove the email from that device when the…

Read More Read More

MMS 2016 User Personality Management–Application Mapping

MMS 2016 User Personality Management–Application Mapping

With the amount of content covered in today’s MMS 2016 session on User Personality Management, we didn’t get a chance to do a deeper dive into the application mapping and User Device Affinity installation methods in the Task Sequence.  Let’s start with the application mapping feature. Microsoft Deployment Toolkit (MDT) has included Package Mapping capabilities for legacy Packages for several years, but the product was not updated to also include an equivalent capability for the new Application model introduced in…

Read More Read More

Managing UE-V Settings Location Templates with Group Policy

Managing UE-V Settings Location Templates with Group Policy

(Originally posted 7/9/2013. Reposting for reference) As a follow up to the previous post on working with UE-V templates catalog, let’s look at what it takes to manage those custom templates using the Group Policy ADMX template provided by Microsoft. After downloading and installing the UE-V ADMX template, we can open the Group Policy Management Console and see the available settings for the Settings Location Templates: These are located under both Computer Configuration and User Configuration in the following path:    …

Read More Read More

Intune Support for iOS7 Ending Soon

Intune Support for iOS7 Ending Soon

Companies relying upon Microsoft Intune for managing iOS 7 devices will soon need to update or replace those devices to continue support.  Per an informational bulletin in the Intune Admin Portal, support for iOS 7 (specifically for the Intune Company Portal app) will be ending in the near future.  As the bulletin states, very soon users will no longer be able to enroll new devices via the Microsoft Intune Company Portal application from the iTunes app store, and currently enrolled…

Read More Read More

Using PowerShell to Help Clear a ConfigMgr Inbox Backlog

Using PowerShell to Help Clear a ConfigMgr Inbox Backlog

(Originally posted 11/10/2015. Reposting for reference)   While working with a client recently, I noticed that the ConfigMgr console was not showing up-to-date information for things like Endpoint Protection status and several other timely sets of data.  Having been through the fun that is Inbox backlogs before, I went ahead and checked to see if there were any file backlogs. I certainly wasn’t about to browse through all of the inbox folders to look for large numbers of files…not when…

Read More Read More

Cleaning Out Previous Windows ICD Projects

Cleaning Out Previous Windows ICD Projects

(Originally posted 7/29/2015. Reposting for reference)   With the public release of Windows 10 today came the release of the updated Windows Assessment and Deployment Kit for Windows 10.  With all the bugs in the preview releases of the Win10ADK, I was anxious to get the new one downloaded and installed.  After uninstalling the previous version and installing the new one, I launched the Windows Imaging and Configuration Designer (ICD) tool…and was presented with all of the previous projects I…

Read More Read More

ConfigMgr 2012 – Retrieving Objects in a Folder with PowerShell

ConfigMgr 2012 – Retrieving Objects in a Folder with PowerShell

(Originall posted 3/21/2014. Reposting for reference)   The introduction of folders in the ConfigMgr 2012 console made for a great way to organize content within the ConfigMgr site.  To see what objects might be under any given folder in the console is simple…but what if you want to do it programmatically with PowerShell? Folders in ConfigMgr can be accessed through the WMI namespace for the site (Root\SMS\Site_XXX) in two classes: SMS_ObjectContainerNode – Contains the list of all folder objects in…

Read More Read More

ConfigMgr 2012 R2 – Notification Server Install Errors

ConfigMgr 2012 R2 – Notification Server Install Errors

(Originally posted 3/12/2014. Reposting for reference)   Issue: Upon installing a new ConfigMgr 2012 R2 site, the component status for the SMS_NOTIFICATION_SERVER component shows the following error: Site Component Manager failed to install this component, because the Microsoft Installer File for this component (bgbisapi.msi) could not install. Refer to the BgbSetup.log, the bgbisapimsi.log, as well as the ConfigMgr Documentation and the Microsoft Knowledge Base for further information. Upon examining the BgbSetup.log file, the following errors are seen:  CTool::RegisterComPlusService: Failed to…

Read More Read More

ConfigMgr 2012 – Image Revisioning (Deploying and Archiving)

ConfigMgr 2012 – Image Revisioning (Deploying and Archiving)

(Originally posted 11/6/2014. Reposting for reference)   This series of articles will provide a method of tracking end-to-end OSD revisioning using a few simple Task Sequence tasks and an optional PowerShell script.  In this first article, looked at why the out-of-box forensic information is useful but insufficient, and we implement a method for version control in the core image.  Now that we have a method of tagging our core image, how do we capture changes around the deployment of that…

Read More Read More