I needed a clean way to set the hostname of physical and virtual machines in MDT via the customsettings.ini file. Sure I could use %SerialNumber% variable but if I deploy onto a virtual machine I would hit an error because the Serial Number of a VM tends to be too long for a hostname.
So rather than write a script and have additional steps in the Task Sequence I got the desired outcome with a few extra lines in the customsettings.ini:
The first line “Subsection=VM-%ISVM%” is added to the Default section of the customsettings.ini file. This line essentially tells ZTIGather to process another section in the ini file. The section we want to process is either VM-TRUE or VM-False. Which section is processed will depend on the in-built %IsVM% Task Sequence Variable.
The next part of the solution is to set the OSDComputerName variable.
For physical machines we simply user the %SerialNumber% variable. In the example I prefix the hostname with PH.
For Virtual machines we use the MAC address instead of the serial number. This ensures we stay within the 15 character hostname limit. We cannot use the %MACADDRESS001% variable directly, we first need to remove the “:” separators. To do this we can get ztigather to process code directly from the customsettings.ini. Anything inside “#” is treated as code, in our example we are simply using the Replace function to remove the “:”.
This works with an SCCM OSD Task Sequence too (with MDT integration).
Whilst working with Windows 10 and MDT 2013 Update 1 my colleague Graham Hardie and I ran into an issue which was preventing us from running DISM Cmdlets in Win PE.
The issue became apparent whilst trying to implement Michael Niehaus’s Windows 10 Inbox App Removal script and specifically trying to run the script offline in Win PE.
The MDT boot Image was successfully generated with the MDAC, .NET, PowerShell and DISM Cmdlets features but would fail to run the “Get-AppxProvisionedPackage” Cmdlet with the following error:
Get-AppxProvisionedPackage : The ‘Get-AppxProvisionedPackage’ command was found in the module ‘Dism’, but the module could not be loaded. For more information, run ‘Import-Module Dism’.
At line:1 char:1
+ Get-AppxProvisionedPackage -Path e:\
+ CategoryInfo : ObjectNotFound: (Get-AppxProvisionedPackage:String) , CommandNotFoundException
+ FullyQualifiedErrorId : CouldNotAutoloadMatchingModule
We found that the Microsoft.Dism.Powershell.dll file was becoming corrupt at boot up…not had the chance to investigate what exactly is causing the corruption yet.
However, to workaround the issue you need to do the following:
- Delete the file from:
- Copy the file back down to the X: drive from the Deployment share:
You can obviously automate this as part of your Task Sequence. I simply added two ‘Run Command Line’ steps to Delete the file and copy the new file. The steps need to be added before you run any script which has a dependency on DISM Cmdlets…in our case before Michael’s Inbox App Removal script:
The first step:
cmd.exe /c Del “%SystemRoot%\System32\WindowsPowerShell\v1.0\Modules\Dism\Microsoft.Dism.Powershell.dll” /q /s
The Second step:
robocopy Z:\Servicing\x64 X:\Windows\System32\WindowsPowerShell\v1.0\Modules\Dism Microsoft.Dism.Powershell.dll /is
Note: Add Error Code 1 to Success Codes for this step…robocopy can report a success with a non zero return.
A bug has also been opened on Connect.
Let us know if this works for you or better still if you identify the root cause of the issue.
This sounds easy…but it’s not as straight forward as you may think so I put together a quick blog post:
Default MDT Behaviour:
By default, MDT will join a client to the domain via Windows Setup. This is driven by the Unattend.xml which MDT populates with the required settings. There is also another step (Recover from Domain) which can be used later in the deployment process (during State Restore) to re-try a Domain Join should the previous attempt have failed during OS setup.
Why does this cause an issue?
Joining the domain before the state restore phase can cause issues later in the deployment because the machine will start to process Group Policy during the build process itself. In most cases this is not an issue if:
- You pre-stage all your clients in a staging OU which has no GPO’s linked to it.
- Or you are confident there is nothing in your Group Policy which could break the imaging process.
In my case policy would break deployments (renaming/disabling admin accounts, legal notices etc..) and pre-staging was not an option so I needed to shift the Domain Join to later in the Task Sequence.
To move the Domain Join process to later in the deployment you need to update the Unattend.xml and the ZTIDomainJoin script. Here’s how you do it:
- Update Unattend.XML
The first thing we need to do is to stop MDT from performing the Domain Join during OS Setup. One way to achieve this is to remove the MDT Domain Join Task Sequence Variables in CustomSettings.ini and instead set these on the Task Sequence in the “State Restore” phase. But I generally prefer to set my variables in CustomSettings.ini so to make this work I have to remove the Domain Join Node from the unattend.xml.
This will prevent MDT from adding the Domain Join settings to the unattend.xml and OS Setup will therefore not join the machine to the domain.
- Update ZTIDomainJoin.wsf
An update to the ZTIDomainJoin.wsf script is required to prevent the script from rebooting the machine after joining the domain. I usually avoid editing built-in MDT scripts but if I have to, I prefer to make a custom subdirectory in the MDT scripts folder and edit a copy of the script in the subdirectory. This will ensure that any subsequent updates to MDT will not overwrite the script and break your Task Sequence (remember to update the relative path to ZTIUtility at the top of the script). The following TWO lines of the script need to be commented out to suppress the reboot:
oEnvironment.Item(“LTISuspend”) = “” ‘oEnvironment.Item(“SMSTSRetryRequested”) = “true” ‘oEnvironment.Item(“SMSTSRebootRequested”) = “true”
iRetVal = SUCCESS
- Add a Domain Join Step into the Task Sequence
Now add a new command line step into the Task Sequence to run the updated script:
- Set Domain Join Variables in CustomSettings.ini
Next, you need to set the following six variables in customsettings.ini for ZTIDomainJoin.wsf to work:
JoinDomain (Domain to join)
DomainAdmin (Account to be used to perform Domain Join)
DomainAdminDomain (Domain of Domain Join account)
DomainAdminPassword (Password for Domain Join account)
MachineObjectOU (OU in which machine object should be created)
DomainErrorRecovery (What to do on failure e.g FAIL)
- Update the Unattend.xml template (Optional)
This step is not essential but if you want to ensure that all new Task Sequences on the given Deployment Share always generate an unattend.xml without the Domain Join node you can update the template.To achieve this copy the unattend.xml for your OS (in my case Unattend_x64.xml) from:
%ProgramFiles%\Microsoft Deployment Toolkit\Templates
Into the Templates directory in the root of you Deployment share and then remove the Domain Join node from the file.
And that’s it..you are good to go 🙂
I recently needed to add Office Language Pack support into an MDT deployment and found this to be a looooong time consuming task…especially if you need to support a number of languages. So I ended up writing a PowerShell script to automate the steps.
Some background first. The following blog by Johan Arwidmark and Patrick Zovistoski is a great post and should be used in conjunction with my script:
deploymentresearch.com – Installing Office 2013 Language Packs in MDT
The high level steps to Install Office Language Packs with MDT are as follows:
- Obtain the Office 2013 Language Pack DVD media from the Microsoft VL website.
- Create the correct Folder structure for each language you need to import (containing all component language folders, setup files etc…)
- Update the config.XML for each language to run silent and suppress reboot.
- Import each language into MDT as an application.
- Add the Applications into the MDT Task Sequence.
My script automates the first 4 steps…so all you need to do manually is add the languages to the Task Sequence 🙂
So onto the script. You need to do the following:
- Mount the two Office 2013 Language Pack ISO files on your MDT server.
- Create a staging folder on your server. This location will be used to create the source folders for the Language packs.
- Copy the script and CSV file (Download from here) into the staging folder on your MDT Server.
- Update the varibles at the top of the script with details of your deployment share, path of the Language Pack DVD’s etc…
- Update the CSV file to reflect the languages you want to import.
- Run the script.
The script will create the source folders for each language you specify and update the config XML’s for each language:Finally the script will import each language pack into your MDT deployment share:
And that’s it… A good hour of work down to about 5 mins.
Download the script from here
Implementing Microsoft Bitlocker Administration and Monitoring (MBAM) is a great way to manage Bitlocker on your devices and can be quickly included in the deployment task sequence so that devices are encrypted as part of the task sequence and policy is enforced right from the start… almost.
My preferred way to implement MBAM during an OS deployment is to configure Bitlocker to use the protector “TPM Only” and encrypt the disk as part of the task sequence. Once the deployment is complete the computer reboots and Group Policy is then applied. In this Group Policy are the MBAM policy settings that dictate that devices should be protected by both the “TPM Only” and “Startup PIN” protectors. Therefore, when the MBAM agent refreshes policy, it realises the discrepancy between how Bitlocker is currently configured (TPM Only) and what Group Policy is stipulating and then goes ahead and prompts the user to configure a PIN via the MBAM GUI.
Doing it this way works great except for one simple fact: you need to wait for the MBAM agent policy refresh cycle to run and display the GUI to the user to resolve the configuration discrepancy. This can take up to 90 minutes which means that during this time window a device is not configured with the Startup PIN as required.
If you don’t want to wait for this policy refresh you can shortcut it by using the below trick.
The MBAM agent actually detects straight away that the configuration set on the device does not match Group Policy and logs an error 2 event in the MBAM event log, but it doesn’t display the MBAM GUI immediately that obliges the user to add the PIN. You can use the Windows Task Scheduler to attach a task to this event so that, when it is logged, the GUI will be loaded immediately.
The below screenshots show the configuration I use in the scheduled task.
I publish the scheduled task via a Group Policy Preference which means that it is automatically deployed to all in-scope computers as soon as they are built. Doing it this way means it can be centrally managed and updated easily.