Quantcast
Channel: Windows 7 – System Management
Viewing all 12 articles
Browse latest View live

Corrupted Name Resolution Table (NRPT) #DirectAccess

$
0
0

Last week I had some issue’s with connecting to corporate network by DirectAccess. The System Log pointed me tot the following: Event ID: 1023 Source: DNS Client Events. Name resolution policy table has been corrupted.

For some reason, the rules that come from DA GPOs had been duplicated. The originals from GPOs were named as “UAGDA Rule1” to “UAGDA Rule3” and the duplicates were named simply “Rule 1” to “Rule 3”  (HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DnsClient\DnsPolicyConfig).

By removing the duplicate rules and restarting the DNS Client service name resolution was solved. After establishing a “legacy” VPN connection to our corporate network I refreshed Group Policy and voíla, everything (DNS name resolution and DA) is working again.  Netsh name show effective shows the correct entries and only the same 7 entries exist in the registry under DNSPolicyConfig

Windows 7 Direct Access Troubleshooting

During TechDays 2011, John Craddock presented two great sessions DirectAccess Under the Hood and How to troubleshoot DirectAccess. These sessions are actually a redelivery of TechEd Berlin 2010. During the session of Troubelshooting DirectAccess I was pointed to a default built-in Windows 7 capability troubleshoot DirectAccess, which was new for me. This capability might handy for ‘ default’ end-user additonal to DirectAccess Connectivity Assistent  (DCA) (Control Panel\All Control Panel Items\Troubleshooting\Network and Internet\Connection to a Workplace Using DirectAccess)

 

Sources



How #Microsoft secures its data in a worldwide environment

$
0
0

This Microsoft IT Showcase slide gives you an overview how Microsoft secures its data. Maybe little bit outdated but still informative to get a picture of the high-level basics how to secure your corporate data.


How to Discover 16-Bit Applications Before Migrating to 64-Bit Versions of Windows 7

$
0
0

How to Discover 16-Bit Applications Before Migrating to 64-Bit Versions of Windows 7
By Andreas Stenhall, Microsoft MVP — Windows Expert – IT Pro

When companies migrate to Windows 7, most of them look at deploying the 64-bit version of Windows 7. The x64 architecture of Windows does not support running 16-bit applications as the 32-bit version does. Unfortunately, 16-bit applications are still widely in use—even though you might not know it.

You can use the Microsoft Application Compatibility Toolkit (ACT) to take an inventory of all applications on your client machines. This is a great way to find applications when migrating to Windows 7. The ACT inventory does contain information about 16-bit applications that are still on client computers and being used in your business, but there is one slight challenge.

Application Compatibility Manager, which is part of ACT, does not provide a way to view these applications in the graphical user interface, so you have to do a SQL query using Microsoft SQL Management Studio Express tools.

  1. Perform an inventory of applications using Application Compatibility Toolkit.
  2. Install SQL Management Studio Express.
  3. Connect to the database and run the following query, which will return a list of potential 16-bit applications; it will list all applications that are not 32-bit or 64-bit. (Note: You will need to replace “ACTDATABASE” with the name of the ACT database that you have.)USE ACTDATABASE
    GO

    SELECT DISTINCT Applications.appName, Static_App_Properties.fileName, fileModuleType
    FROM Static_App_Properties
    INNER JOIN Application_Instance_Files
    ON Static_App_Properties.identity_hash = Application_Instance_Files.filePropertyID
    INNER JOIN Applications
    ON Application_Instance_Files.appID = Applications.identity_hash

    WHERE fileModuleType<>’32BIT’ AND fileModuleType<>’64BIT’ AND propertyType=’File’
    ORDER BY appName
    GO

The above query will return a list of applications that need investigation and testing very early in the process of migrating to Windows 7. For example, applications listed as Windows on Windows (WOW) or DOS applications will and/or might indicate a 16-bit application that you should prioritize to test and handle as necessary. You will also see any batch files or command files that have been inventoried; you will need to verify whether these will work with Windows 7.

Options for Dealing with 16-bit Applications
If you find 16-bit applications that your business needs to keep when you migrate to Windows 7, you might virtualize them with presentation virtualization technologies such as RemoteApp or Remote Desktop Services, or you might use virtualization technologies such as Microsoft Enterprise Desktop Virtualization (MED-V) to expedite the migration to the 64-bit version of Windows 7 while keeping the legacy 16-bit applications running. Under the best circumstances, all 16-bit applications would be replaced by more modern software, but experience has shown me there are many factors that keep this from happening.

Happy hunting for 16-bit applications!

Andreas Stenhall works as a deployment specialist at Knowledge Factory in Sweden and specializes in Windows customization and deployment. He is deeply involved in the Swedish community alltomwindows.se and also maintains an English-language blog for IT professionals. Andreas has repeatedly been awarded with the Microsoft Most Valuable Professional award for “Windows Expert – IT Professional” for his dedicated work and involvement in the community.


Windows 7 Deployment Options for Small and Midsize Businesses

$
0
0

Download a printable overview of Windows 7 deployment options for small and midsize organizations that includes the advantages and limitations of each option.

Explore the different options for deploying Windows 7 in a small or midsize organization. This print-ready poster from the Springboard Series for Windows 7 features an overview of each method, details on advantages and limtations, basic requirements, and helpful links to additional tools and guidance. You’ll also find a helpful step-by-step overview of the Windows 7 deployment process.

Download the handy overview in PDF, XPS or VSD here


DirectAccess Client Cannot Establish Tunnels to the DirectAccess Server

$
0
0

This week I noticed some issues with DirectAccess on my Windows 7 client. For some strange reason both Infrastructure and Intranet tunnels are not established. When walking through the Advanced Firewall configuration I noticed that Internet Protocol security (IPsec) tunnel mode security associations (SAs) were not initiated. After some searching if found a post on Forefront forum which describes more or less the same behavior.

Thanks to Jason Jones if found my issue. By verifying the Name Resolution Policy Table (NRPT) configuration using netsh dnsclient show state and noticed that Direct Access Settings is misconfigured. The NRPT is configured using the DirectAccess Setup wizard. You can configure the rules also directly by yourself but take into account these settings are overridden when running the DirectAccess wizard!

Check the following regkey: HKLM\Software\Policies\Microsoft\Windows NT\DNSClient\EnableDAForAllNetworks and make sure it is set to 0 and not 2.

The values for the key are shown below

Enable DA for All Networks

Key: Software\Policies\Microsoft\Windows NT\DNSClient

Value: “EnableDAForAllNetworks”

Type: REG_DWORD

Size: 32 bits.

Data: This field is a 32-bit value, which MUST contain one of the following values.

Value Meaning
0x00000000 Let Network ID determine when Direct Access settings are to be used.
0x00000001 Always use Direct Access settings regardless of location.
0x00000002 Never use Direct Access settings regardless of location.

After changing the value I rebooted my Windows 7 client and DirectAccess is working again like a charm J

Sources:

http://social.technet.microsoft.com/Forums/en-US/forefrontedgeiag/thread/cd924318-12d3-4b27-ad3c-a50320819241

http://msdn.microsoft.com/en-us/library/ff957870(PROT.10).aspx

http://technet.microsoft.com/en-us/library/ee844114(WS.10).aspx

DirectAccess Client Location Awareness – NRPT Name Resolution

Configure the NRPT with Group Policy


Microsoft User Experience Virtualization and Microsoft Application Virtualization 5.0 Betas Now Available!

$
0
0

Microsoft announces the beta versions of Microsoft Application Virtualization (App-V) 5.0 and a new MDOP product Microsoft User Experience Virtualization (UE-V) are now available for download from
Microsoft Connect.

UE-V is an enterprise-scale user state virtualization solution that delivers a user’s personal Windows experience across devices, is simple for IT to deploy, and easily integrates with existing management tools.

Some of the main features of UE-V are:

  • Users retain their application experience without having to reconfigure applications when they log in from a different Windows instance – regardless of whether it is a rich desktop or virtual desktop session. 
  • Automatically delivers a personal experience to Windows 7, Windows 8, Windows Server 2008 R2, and Windows Server 8 based devices, giving users the flexibility to work from anywhere.
  • If a user accidently applies unwanted changes, IT can simply roll back to the initial state.
  • Seamlessly integrates with Microsoft desktop virtualization products to roam the user experience in heterogeneous environments.

 Some of the new features in the App-V 5.0 Beta are:

  • Flexible virtualization choices let virtual applications work more like traditionally installed applications, allowing local and virtual applications to communicate and enabling control of which virtual applications can share environments.
  • There’s no dedicated drive letter required, and no 4 gigabyte maximum package size. It’s easy for IT to work with and take action on App-V diagnostic information because App-V logs Windows events instead of separate log files.
  • Easy and efficient to use in VDI environments, allowing IT to make the best use of expensive disk resources without changing the way they get their jobs done.
  • Web-based management makes it easy for busy IT professionals to get their work done while away from their desk.
  • Rich PowerShell scripting allows IT to automate repetitive tasks and to integrate App-V with existing processes.

These products will be part of a future version of the Microsoft Desktop Optimization Pack (MDOP).  If you want to learn more about App-V 5.0 and UE-V now, check out the Windows for your Business Blog were we have posted even more information about the products.

Download and try the betas of UE-V and App-V 5.0.

 

Sources:

http://blogs.technet.com/b/mdop/archive/2012/04/04/microsoft-user-experience-virtualization-and-microsoft-application-virtualization-5-0-betas-now-available.aspx

http://windowsteamblog.com/windows/b/business/archive/2012/04/04/introducing-ue-v-and-app-v-5-0.aspx


Windows 7 and Windows Server 2008 R2 KMS hosts to support Windows 8, Windows Server 2012 and Office 2013 (KB2691586)

$
0
0

This update extends the Key Management Service (KMS) for Windows 7 and Windows Server 2008 R2 to allow enterprise licensing of Windows 8 and of Windows Server 2012. KMS provides support for the following KMS activations:

  • Windows Server 2008 R2 and Windows Server 2008 R2 Service Pack 1 (SP1)
  • Windows Server 2008 and Windows Server 2008 Service Pack 2 (SP2)
  • Windows 8
  • Windows Server 2012
  • Windows 7 and Windows 7 Service Pack 1 (SP1)
  • Windows Vista and Windows Vista Service Pack 2 (SP2)
  • Office 2013 (Preview)
Office 2013
The KMS and MAK activation processes for Office 2013 Preview are basically the same as they were for Office 2010, except that the Office 2013 Preview KMS host is not supported on Windows Server 2003. The Office 2013 Preview KMS host is supported on Windows Server 2008 R2, Windows 7 VL edition, Windows 8 VL edition, and Windows Server 2012.Office 2013 Preview can be activated by using KMS on the following platforms:
If Office 2013 Preview runs on… It can activate against a KMS host that runs on…
Windows 7 or Windows 8 Windows 7 VL edition (see Important note) Windows Server 2008 R2 (see Important note) Windows 8 VL edition Windows Server 2012
Key Management Service (KMS)
KMS is a server-client model in which a computer serves as the KMS host. KMS activation requires TCP/IP connectivity. By default, KMS hosts use DNS to publish the KMS service, and client computers connect to the KMS host for activation by using anonymous remote procedure calls (RPCs) through TCP port 1688. You can use the default settings, which require little or no administrative action, or manually configure KMS hosts and clients based on network configuration and security requirements.

Key Management Service (KMS) uses a KMS host key to activate KMS on a KMS host, and to establish a local activation service in your environment. This update extends support for KMS to provide activation for Windows 8 and for Windows Server 2012.

This update (KB2691586) can be downloaded here

source

Volume Activation Overview http://technet.microsoft.com/en-us/library/hh831612

Volume activation methods in Office 2013 Preview http://technet.microsoft.com/en-us/library/jj219430(v=office.15).aspx


MBSA 2.3 Preview Release is available for download!

$
0
0

MBSA 2.3 Preview has been released on the Client Management Connect site to the ConfigMgr Open Beta community.

image

MBSA 2.3 release adds support for Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2. Windows 2000 will no longer be supported with this release. The final release of MBSA 2.3 is expected to be available in Fall 2013.

You can download MBSA 2.3 Preview here.



Windows Intune Client – Behind the Scenes #SysCtr

$
0
0

Windows_intune_logo

As Microsoft announced on September 23rd updating their Windows Intune cloud service which will be available October 18th I thought it might be interesting having a closer look what is going-on after installing the Windows Intune client agents software.

In this post I will cover the following points of Windows Intune. Enjoy Glimlach

  • Windows Intune Client Software
  • Windows Intune Software Components
  • Windows Intune Log Files
  • Windows Intune Registry
  • Windows Intune Services
  • Windows Intune Operation Manager
  • Windows Intune Endpoint Protection
  • Windows Intune Task Scheduler
  • Windows Intune Center
  • Windows Intune Service Endpoints


Windows Intune Client Software

The Windows Intune client software can be downloaded from the Windows Intune Administrator console and can installed manually, by group policy or Configuration Manager.

When you enroll a client computer in the Windows Intune service, Windows Intune schedules the download and installation of additional agents, applications, and components to the client computer. These agents, applications, and components are updates to the initial Windows Intune client enrollment software package. After the Windows Intune client software is installed on client computers, the Windows Intune agents communicate with the Windows Intune service to provide the service with data about the clients.

Software Components

Component Name

Description

EasyAssist

This component is for Remote Assistance request, and can be accessed from the Windows Intune Center.

Microsoft Online Management Client Service

Microsoft Online Management Client Service

Microsoft Online Management Components

  • Microsoft Online Management Agent Installer
  • Microsoft Online Management Client

This component helps Windows Intune update additional components that manage the client computer.

Microsoft Online Management Policy Agent

Microsoft Online Management Policy Agent is responsible for applying policies to the client, and to report hardware/software inventory.

Microsoft Online Update Manager

This component is responsible for updating the client status to the Windows Intune online service. It consists of the service “Microsoft Updates Online Management Service”.

Microsoft Policy Platform

This agent allow clients to evaluate compliance settings.

Windows Firewall Configuration Provider

Provides for managing the Windows Firewall using a Group Policy.

Windows Intune Notification Service

This agent helps deliver administrator-initiated commands to the managed computer.

Windows Intune Center

The Windows Intune Center lets users of the managed computer request remote assistance from administrators by using Remote Assistance through Microsoft Easy Assist v2, manage how some updates are deployed to the computer, and start scans for malware.

Windows Intune Endpoint Protection

These agents help protect the managed computer against potential threats by using real-time protection, automatic scans, and definition updates.

Windows Intune Endpoint Protection

These agents help protect the managed computer against potential threats by using real-time protection, automatic scans, and definition updates.

Windows Intune Monitoring Agent

These agents monitor the health of the managed computer, and raise alerts to report current and potential problems.

Log Files

The log files for Windows Intune software components can be found at C:\Program Files\Microsoft\OnlineManagement\Logs\. This will be your start point in case of a troubleshooting.

Log files

Description

AgtInstaller.log

This log file provides information of the Operations Manager agent install process.

BitLockerStatusProvider.log

Contains information of your BitLocker configuration

ClientSvc.log

Microsoft Online Management Client Service log file

ClientSvcReportingEvents.log

 

Enrollment.log

This file details the process of a computer enrolling with Windows Intune.  If the computer fails to appear in the Windows Intune list of computers, this is the log to watch

HostProtection.log

This file provides details of any anti-malware activity on the computer. 

HostProtectionMofComp.log

This file shows the results of parsing HostProtectionWmiProvider.mof

Monitoring.log

Operations Manager log file

PolicyAgent.log

This file provides details of the process of processing hardware- , software and system policies

SignalingAgent.log

Windows Intune Notification Service

TaskExecution.log

This file shows task requests

Updates.log

This details information about updates evaluated and executed

Registry

The configuration of the Windows Intune client software is based at HKLM\SOFTWARE\Microsoft\OnlineManagement. Here you can find all Windows Intune settings.

clip_image002


Services

By installing the Windows Intune client agent and related Windows Intune components new services will be installed to your system. Below the services identified by installing Windows Intune client agent.

Display Name

Service Name

Executable

Microsoft Online Management Client Service

OmcSvc

omsvchost2.exe

Microsoft Online Management Updates Service

omupdsrv

omsvchost.exe

Windows Intune Notification Service

SignalingAgent

omsvchost2.exe

System Center Management

HealthService

HealthService.exe

Microsoft Antimalware Service

MsMpSvc

MsMpEng.exe

Operations Manager Agent

As mentioned before with the Windows Intune client software installs additional components including an Operations Manager 2012 SP1 RTM agent (7.0.9538.0). The management group used for Windows Intune is Intune. The management server configured is IntuneServer.

clip_image004

The configuration of the Operations Management agent can found as we used by a Operation Manager Agent at HKLM\SOFTWARE\Microsoft\Operations Manager\3.0

clip_image006

clip_image008

Interesting part are the management packs (39) which are used for monitoring you client systems. Below an overview of the management packs which are installed as part of the Windows Intune deployment.

Management Packs

Version

Microsoft.InformationWorker.CommonLibrary.xml

6.0.6278.0

Microsoft.InformationWorker.Office.2003.xml

6.0.6278.16052

Microsoft.InformationWorker.Office.2007.xml

6.0.6278.16052

Microsoft.InformationWorker.Office.2010.xml

6.0.6278.16052

Microsoft.InformationWorker.Windows.Explorer.xml

6.0.6278.16052

Microsoft.InformationWorker.Windows.InternetExplorer.xml

6.0.6278.16052

Microsoft.InformationWorker.Windows.MediaPlayer.xml

6.0.6278.16052

Microsoft.InformationWorker.Windows.OutlookExpressandMail.xml

6.0.6278.16052

Microsoft.InformationWorker.Windows.WindowsAndMSNMessenger.xml

6.0.6278.16052

Microsoft.OnlineManagement.Intune.Overrides.xml

Microsoft.SystemCenter.2007.xml

6.1.7221.16052

Microsoft.SystemCenter.ACS.Internal.xml

6.1.7221.16052

Microsoft.SystemCenter.ClientMonitoring.Library.xml

6.1.7221.0

Microsoft.SystemCenter.ClientMonitoring.Overrides.xml

1.0.0.2128

Microsoft.SystemCenter.DataWarehouse.Library.xml

6.1.7221.0

Microsoft.SystemCenter.DataWarehouse.Report.Library.xml

6.1.7221.0

Microsoft.SystemCenter.InstanceGroup.Library.xml

6.1.7221.0

Microsoft.SystemCenter.Internal.xml

6.1.7221.0

Microsoft.SystemCenter.Library.xml

6.1.7221.0

Microsoft.SystemCenter.ServiceDesigner.Library.xml

6.1.7221.0

Microsoft.Windows.Client.Library.xml

6.0.7024.0

Microsoft.Windows.Client.Overrides.xml

1.0.0.1

Microsoft.Windows.Client.Vista.Monitoring.xml

6.0.6729.16052

Microsoft.Windows.Client.Vista.xml

6.0.6729.0

Microsoft.Windows.Client.Win7.Monitoring.xml

6.0.6729.16052

Microsoft.Windows.Client.Win7.xml

6.0.6729.0

Microsoft.Windows.Client.Win8.Monitoring.xml

6.0.7024.16052

Microsoft.Windows.Client.Win8.xml

6.0.7024.0

Microsoft.Windows.Client.XP.xml

6.0.6729.16052

Microsoft.Windows.Cluster.Library.xml

6.1.7221.0

Microsoft.Windows.Library.xml

6.1.7221.0

System.ApplicationLog.Library.xml

6.1.7221.0

System.Health.Internal.xml

6.1.7221.0

System.Health.Library.xml

6.1.7221.0

System.Library.xml

6.1.7221.0

System.Mom.BackwardCompatibility.Library.xml

6.1.7221.16052

System.Performance.Library.xml

6.1.7221.0

System.Snmp.Library.xml

6.1.7221.0

Windows.Intune.Internal.xml

6.0.6278.0


Endpoint Protection

Depending if you configured Windows Intune Policies automatically deploy Windows Intune Endpoint Protection this client will be installed.

clip_image010

By default Windows Intune Endpoint Protection will not be deployed automatically. Furthermore you can configure the behavior what to do with you correct Antivirus solution (uninstall, upgrade, etc)

clip_image012

Task Scheduler

By default Microsoft.OnlineManagement.UpdateTask scheduled task is created and triggers the Windows Intune Updates Client. This task is scheduled daily and detects whether new updates are available.

clip_image014

This process can be triggered manually through the GUI or initiated by command prompt.

clip_image015

· %programfiles%\Microsoft\OnlineManagement\Updates\Bin\omupdclt.exe /detectnow

· %programfiles%\Microsoft\OnlineManagement\Updates\Bin\omupdclt.exe /updatenow

Client Center

The Windows Intune Client Center can be used whether applications are available through the Company Portal, check for new updates, initiate a system scan or contact your service desk or initiate a Remote Assistance session.

clip_image017


Service Endpoints

There is not such information available (or just I couldn’t find it) how the Windows Intune client agent is communicating to Windows Intune cloud services. At high level the Windows Intune client agents receives policies, software and many more bases on Windows Updates from Windows Intune Cloud services.

ff742836_Fig1_Windows_Intune_at_a_Glance(en-us,MSDN_10)

The opposite way the Windows Intune client agents communicates based on REST API endpoints/web services to the Windows Intune cloud servers. These web services are used for authentication purpose, uploading inventory-, events, etc.

In HKLM\SOFTWARE\Microsoft\OnlineManagement\…\ServiceEndpoints you find the endpoints used.

ServerAuthSlsLoc

https://manage.microsoft.com/ServerAuthLocationService/ServerAuthLocationService.svc

SlsLoc

https://manage.microsoft.com/LocationService/LocationService.svc

UnauthSlsLoc

http://manage.microsoft.com/UnauthLocationService/UnauthLocationService.svc

UserAuthSlsLoc

https://manage.microsoft.com/UserAuthLocationService/UserAuthLocationService.Svc

AgentEnrollmentSvc

https://msub05.manage.microsoft.com/AgentEnrollmentService/AgentEnrollmentService.svc

AgentSts

https://msub05.manage.microsoft.com/AgentSecurityTokenService/IWSTrust.svc

AgentSupportingSts

https://msub05.manage.microsoft.com/AgentSupportingSecurityTokenService/IWSTrust.svc

ClientSvc

https://msub05.manage.microsoft.com/ClientWebService/client.asmx/auth

EnrollmentSts

https://msub05.manage.microsoft.com/AgentEnrollmentSecurityTokenService/IWSTrust.svc

ErrorEventSvc

http://msub05.manage.microsoft.com/ErrorEventWebService/ErrorEventWebService.svc

EventSvc

https://msub05.manage.microsoft.com/EventWebService/EventWebService.svc

ExchangeIncomingGateway

https://msub05.manage.microsoft.com/ExchangeIncomingGateway/GatewayService.svc

IWPortalUdaClaimUrl

https://portal.manage.microsoft.com/devices/link

KeySvc

https://manage.microsoft.com/KeyService/KeyServiceAgent.svc

LocationSvc

https://manage.microsoft.com/LocationService/LocationService.svc

RemoteAssistanceSvc

https://msub05.manage.microsoft.com/RemoteAssistanceService/RemoteAssistanceService.svc

SignalingSvc

https://msub05.manage.microsoft.com/SignalingService/Signal.AsyncHandler

TaskDownloadSvc

https://msub05.manage.microsoft.com/RemoteAssistanceService/TaskDownloadService.svc

UnauthClientSvc

https://msub05.manage.microsoft.com/ClientWebService/client.asmx

UnauthLocationSvc

http://manage.microsoft.com/UnAuthLocationService/UnAuthLocationService.svc

UserEnrollmentSts

https://msub05.manage.microsoft.com/UserEnrollmentSecurityTokenService/IWSTrust.svc

WUASelfUpdateUrl

http://msub05.manage.microsoft.com/SelfUpdate

     


What´s new in Intune?

As mentioned before Microsoft is currently upgrading there Windows Intune cloud service platform which introduces new features and capabilities.

image

Simplifying these into real world actions quickly clarifies what we get in Intune R2, and also highlights the investments in Windows Server 2012 R2 and Configuration Manager 2012 R2:

  • Delivering a seamless interface for users to registered devices to access organization data, while enabling IT Pros to gain more granular control over these device settings, ensuring they become compliant with your policies
  • Offering a consistent experience for your users to discover your organizations services, and subscribe to the services which you offer, across all of their resisted devices.
  • Unified experience for publishing our applications and services to all devices, regardless of there form factor, location, and whether they be managed devices, or user registered.
  • Securing the data on these devices is simplified, simply revoking a registered device will remove access to applications, data and polices from the device.

Sources:

http://technet.microsoft.com/en-us/library/jj662670.aspx

http://uksbsguy.com/blogs/doverton/archive/2011/11/15/log-files-on-each-pc-with-windows-intune.aspx

http://blog.coretech.dk/bfa/windows-intune-client-agent-components/

http://albertneef.wordpress.com/2012/01/12/windows-intune-commands/

http://www.petri.co.il/windows-intune-update-2013.htm


Windows Assessment and Deployment Kit (Windows ADK) for Windows 8.1 Update released.

$
0
0

image

Today Microsoft released an updated version of the Windows Assessment and Deployment Kit. This release of Windows ADK includes new and updated functionality to improve assessment and deployment scenarios including support for Windows 8.1 Update.

To determine what version of the Windows ADK you have installed, go to Control Panel > Programs > Programs and Features. The versions are:

  • Version 8.100.25984 is for the Windows ADK for Windows 8.1 RTM
  • Version 8.100.26629 is for the Windows ADK for Windows 8.1 Update

Version increments between 25984 and 26629 are updated versions of the RTM release. Version increments higher than 26629 are for the Windows 8.1 Update.

For a complete list of changes, see the Windows ADK Release Notes.

For a list of new features included in the Windows ADK for Windows 8.1 Update, see What’s New in the Windows ADK for Windows 8.1.

Download Image Download the latest version of the Windows ADK

source


MBSA 2.3 Preview Release is available for download!

$
0
0

MBSA 2.3 Preview has been released on the Client Management Connect site to the ConfigMgr Open Beta community.

image

MBSA 2.3 release adds support for Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2. Windows 2000 will no longer be supported with this release. The final release of MBSA 2.3 is expected to be available in Fall 2013.

You can download MBSA 2.3 Preview here.


Windows Intune Client – Behind the Scenes #SysCtr

$
0
0

Windows_intune_logo

As Microsoft announced on September 23rd updating their Windows Intune cloud service which will be available October 18th I thought it might be interesting having a closer look what is going-on after installing the Windows Intune client agents software.

In this post I will cover the following points of Windows Intune. Enjoy Glimlach

  • Windows Intune Client Software
  • Windows Intune Software Components
  • Windows Intune Log Files
  • Windows Intune Registry
  • Windows Intune Services
  • Windows Intune Operation Manager
  • Windows Intune Endpoint Protection
  • Windows Intune Task Scheduler
  • Windows Intune Center
  • Windows Intune Service Endpoints


Windows Intune Client Software

The Windows Intune client software can be downloaded from the Windows Intune Administrator console and can installed manually, by group policy or Configuration Manager.

When you enroll a client computer in the Windows Intune service, Windows Intune schedules the download and installation of additional agents, applications, and components to the client computer. These agents, applications, and components are updates to the initial Windows Intune client enrollment software package. After the Windows Intune client software is installed on client computers, the Windows Intune agents communicate with the Windows Intune service to provide the service with data about the clients.

Software Components

Component Name

Description

EasyAssist

This component is for Remote Assistance request, and can be accessed from the Windows Intune Center.

Microsoft Online Management Client Service

Microsoft Online Management Client Service

Microsoft Online Management Components

  • Microsoft Online Management Agent Installer
  • Microsoft Online Management Client

This component helps Windows Intune update additional components that manage the client computer.

Microsoft Online Management Policy Agent

Microsoft Online Management Policy Agent is responsible for applying policies to the client, and to report hardware/software inventory.

Microsoft Online Update Manager

This component is responsible for updating the client status to the Windows Intune online service. It consists of the service “Microsoft Updates Online Management Service”.

Microsoft Policy Platform

This agent allow clients to evaluate compliance settings.

Windows Firewall Configuration Provider

Provides for managing the Windows Firewall using a Group Policy.

Windows Intune Notification Service

This agent helps deliver administrator-initiated commands to the managed computer.

Windows Intune Center

The Windows Intune Center lets users of the managed computer request remote assistance from administrators by using Remote Assistance through Microsoft Easy Assist v2, manage how some updates are deployed to the computer, and start scans for malware.

Windows Intune Endpoint Protection

These agents help protect the managed computer against potential threats by using real-time protection, automatic scans, and definition updates.

Windows Intune Endpoint Protection

These agents help protect the managed computer against potential threats by using real-time protection, automatic scans, and definition updates.

Windows Intune Monitoring Agent

These agents monitor the health of the managed computer, and raise alerts to report current and potential problems.

Log Files

The log files for Windows Intune software components can be found at C:\Program Files\Microsoft\OnlineManagement\Logs\. This will be your start point in case of a troubleshooting.

Log files

Description

AgtInstaller.log

This log file provides information of the Operations Manager agent install process.

BitLockerStatusProvider.log

Contains information of your BitLocker configuration

ClientSvc.log

Microsoft Online Management Client Service log file

ClientSvcReportingEvents.log

 

Enrollment.log

This file details the process of a computer enrolling with Windows Intune.  If the computer fails to appear in the Windows Intune list of computers, this is the log to watch

HostProtection.log

This file provides details of any anti-malware activity on the computer. 

HostProtectionMofComp.log

This file shows the results of parsing HostProtectionWmiProvider.mof

Monitoring.log

Operations Manager log file

PolicyAgent.log

This file provides details of the process of processing hardware- , software and system policies

SignalingAgent.log

Windows Intune Notification Service

TaskExecution.log

This file shows task requests

Updates.log

This details information about updates evaluated and executed

Registry

The configuration of the Windows Intune client software is based at HKLM\SOFTWARE\Microsoft\OnlineManagement. Here you can find all Windows Intune settings.

clip_image002


Services

By installing the Windows Intune client agent and related Windows Intune components new services will be installed to your system. Below the services identified by installing Windows Intune client agent.

Display Name

Service Name

Executable

Microsoft Online Management Client Service

OmcSvc

omsvchost2.exe

Microsoft Online Management Updates Service

omupdsrv

omsvchost.exe

Windows Intune Notification Service

SignalingAgent

omsvchost2.exe

System Center Management

HealthService

HealthService.exe

Microsoft Antimalware Service

MsMpSvc

MsMpEng.exe

Operations Manager Agent

As mentioned before with the Windows Intune client software installs additional components including an Operations Manager 2012 SP1 RTM agent (7.0.9538.0). The management group used for Windows Intune is Intune. The management server configured is IntuneServer.

clip_image004

The configuration of the Operations Management agent can found as we used by a Operation Manager Agent at HKLM\SOFTWARE\Microsoft\Operations Manager\3.0

clip_image006

clip_image008

Interesting part are the management packs (39) which are used for monitoring you client systems. Below an overview of the management packs which are installed as part of the Windows Intune deployment.

Management Packs

Version

Microsoft.InformationWorker.CommonLibrary.xml

6.0.6278.0

Microsoft.InformationWorker.Office.2003.xml

6.0.6278.16052

Microsoft.InformationWorker.Office.2007.xml

6.0.6278.16052

Microsoft.InformationWorker.Office.2010.xml

6.0.6278.16052

Microsoft.InformationWorker.Windows.Explorer.xml

6.0.6278.16052

Microsoft.InformationWorker.Windows.InternetExplorer.xml

6.0.6278.16052

Microsoft.InformationWorker.Windows.MediaPlayer.xml

6.0.6278.16052

Microsoft.InformationWorker.Windows.OutlookExpressandMail.xml

6.0.6278.16052

Microsoft.InformationWorker.Windows.WindowsAndMSNMessenger.xml

6.0.6278.16052

Microsoft.OnlineManagement.Intune.Overrides.xml

Microsoft.SystemCenter.2007.xml

6.1.7221.16052

Microsoft.SystemCenter.ACS.Internal.xml

6.1.7221.16052

Microsoft.SystemCenter.ClientMonitoring.Library.xml

6.1.7221.0

Microsoft.SystemCenter.ClientMonitoring.Overrides.xml

1.0.0.2128

Microsoft.SystemCenter.DataWarehouse.Library.xml

6.1.7221.0

Microsoft.SystemCenter.DataWarehouse.Report.Library.xml

6.1.7221.0

Microsoft.SystemCenter.InstanceGroup.Library.xml

6.1.7221.0

Microsoft.SystemCenter.Internal.xml

6.1.7221.0

Microsoft.SystemCenter.Library.xml

6.1.7221.0

Microsoft.SystemCenter.ServiceDesigner.Library.xml

6.1.7221.0

Microsoft.Windows.Client.Library.xml

6.0.7024.0

Microsoft.Windows.Client.Overrides.xml

1.0.0.1

Microsoft.Windows.Client.Vista.Monitoring.xml

6.0.6729.16052

Microsoft.Windows.Client.Vista.xml

6.0.6729.0

Microsoft.Windows.Client.Win7.Monitoring.xml

6.0.6729.16052

Microsoft.Windows.Client.Win7.xml

6.0.6729.0

Microsoft.Windows.Client.Win8.Monitoring.xml

6.0.7024.16052

Microsoft.Windows.Client.Win8.xml

6.0.7024.0

Microsoft.Windows.Client.XP.xml

6.0.6729.16052

Microsoft.Windows.Cluster.Library.xml

6.1.7221.0

Microsoft.Windows.Library.xml

6.1.7221.0

System.ApplicationLog.Library.xml

6.1.7221.0

System.Health.Internal.xml

6.1.7221.0

System.Health.Library.xml

6.1.7221.0

System.Library.xml

6.1.7221.0

System.Mom.BackwardCompatibility.Library.xml

6.1.7221.16052

System.Performance.Library.xml

6.1.7221.0

System.Snmp.Library.xml

6.1.7221.0

Windows.Intune.Internal.xml

6.0.6278.0


Endpoint Protection

Depending if you configured Windows Intune Policies automatically deploy Windows Intune Endpoint Protection this client will be installed.

clip_image010

By default Windows Intune Endpoint Protection will not be deployed automatically. Furthermore you can configure the behavior what to do with you correct Antivirus solution (uninstall, upgrade, etc)

clip_image012

Task Scheduler

By default Microsoft.OnlineManagement.UpdateTask scheduled task is created and triggers the Windows Intune Updates Client. This task is scheduled daily and detects whether new updates are available.

clip_image014

This process can be triggered manually through the GUI or initiated by command prompt.

clip_image015

· %programfiles%\Microsoft\OnlineManagement\Updates\Bin\omupdclt.exe /detectnow

· %programfiles%\Microsoft\OnlineManagement\Updates\Bin\omupdclt.exe /updatenow

Client Center

The Windows Intune Client Center can be used whether applications are available through the Company Portal, check for new updates, initiate a system scan or contact your service desk or initiate a Remote Assistance session.

clip_image017


Service Endpoints

There is not such information available (or just I couldn’t find it) how the Windows Intune client agent is communicating to Windows Intune cloud services. At high level the Windows Intune client agents receives policies, software and many more bases on Windows Updates from Windows Intune Cloud services.

ff742836_Fig1_Windows_Intune_at_a_Glance(en-us,MSDN_10)

The opposite way the Windows Intune client agents communicates based on REST API endpoints/web services to the Windows Intune cloud servers. These web services are used for authentication purpose, uploading inventory-, events, etc.

In HKLM\SOFTWARE\Microsoft\OnlineManagement\…\ServiceEndpoints you find the endpoints used.

ServerAuthSlsLoc

https://manage.microsoft.com/ServerAuthLocationService/ServerAuthLocationService.svc

SlsLoc

https://manage.microsoft.com/LocationService/LocationService.svc

UnauthSlsLoc

http://manage.microsoft.com/UnauthLocationService/UnauthLocationService.svc

UserAuthSlsLoc

https://manage.microsoft.com/UserAuthLocationService/UserAuthLocationService.Svc

AgentEnrollmentSvc

https://msub05.manage.microsoft.com/AgentEnrollmentService/AgentEnrollmentService.svc

AgentSts

https://msub05.manage.microsoft.com/AgentSecurityTokenService/IWSTrust.svc

AgentSupportingSts

https://msub05.manage.microsoft.com/AgentSupportingSecurityTokenService/IWSTrust.svc

ClientSvc

https://msub05.manage.microsoft.com/ClientWebService/client.asmx/auth

EnrollmentSts

https://msub05.manage.microsoft.com/AgentEnrollmentSecurityTokenService/IWSTrust.svc

ErrorEventSvc

http://msub05.manage.microsoft.com/ErrorEventWebService/ErrorEventWebService.svc

EventSvc

https://msub05.manage.microsoft.com/EventWebService/EventWebService.svc

ExchangeIncomingGateway

https://msub05.manage.microsoft.com/ExchangeIncomingGateway/GatewayService.svc

IWPortalUdaClaimUrl

https://portal.manage.microsoft.com/devices/link

KeySvc

https://manage.microsoft.com/KeyService/KeyServiceAgent.svc

LocationSvc

https://manage.microsoft.com/LocationService/LocationService.svc

RemoteAssistanceSvc

https://msub05.manage.microsoft.com/RemoteAssistanceService/RemoteAssistanceService.svc

SignalingSvc

https://msub05.manage.microsoft.com/SignalingService/Signal.AsyncHandler

TaskDownloadSvc

https://msub05.manage.microsoft.com/RemoteAssistanceService/TaskDownloadService.svc

UnauthClientSvc

https://msub05.manage.microsoft.com/ClientWebService/client.asmx

UnauthLocationSvc

http://manage.microsoft.com/UnAuthLocationService/UnAuthLocationService.svc

UserEnrollmentSts

https://msub05.manage.microsoft.com/UserEnrollmentSecurityTokenService/IWSTrust.svc

WUASelfUpdateUrl

http://msub05.manage.microsoft.com/SelfUpdate

     


What´s new in Intune?

As mentioned before Microsoft is currently upgrading there Windows Intune cloud service platform which introduces new features and capabilities.

image

Simplifying these into real world actions quickly clarifies what we get in Intune R2, and also highlights the investments in Windows Server 2012 R2 and Configuration Manager 2012 R2:

  • Delivering a seamless interface for users to registered devices to access organization data, while enabling IT Pros to gain more granular control over these device settings, ensuring they become compliant with your policies
  • Offering a consistent experience for your users to discover your organizations services, and subscribe to the services which you offer, across all of their resisted devices.
  • Unified experience for publishing our applications and services to all devices, regardless of there form factor, location, and whether they be managed devices, or user registered.
  • Securing the data on these devices is simplified, simply revoking a registered device will remove access to applications, data and polices from the device.

Sources:

http://technet.microsoft.com/en-us/library/jj662670.aspx

http://uksbsguy.com/blogs/doverton/archive/2011/11/15/log-files-on-each-pc-with-windows-intune.aspx

http://blog.coretech.dk/bfa/windows-intune-client-agent-components/

http://albertneef.wordpress.com/2012/01/12/windows-intune-commands/

http://www.petri.co.il/windows-intune-update-2013.htm


Viewing all 12 articles
Browse latest View live