UPDATE: 8/20 - Adam Gross (@AdamGrossTX) added more info and explain even more! That guys is awesome, really nice walk through on how to do it with a script to automate! Check it out HERE
UPDATE: 8/17 - Heard back from MS. Rest of those Dynamic Updates need to be applied offline to your Build Media, they are NOT included in the monthly CU. (Read full article for context)
Dynamic updates, what are those things? Well, as Microsoft says “With Dynamic Update, if you start a computer from an existing operating system (for example, Windows 8), and then run Setup from that operating system [IN PLACE UPGRADE], Setup [Windows 10 Upgrade Setup] can check for new Setup files, including drivers and other files.” You can enable it in your TS on the Upgrade OS step: (yes, you want to do this if you have bandwidth, way more info HERE, Thanks Adam)
WARNING... WORK IN PROGRESS... This has been in my drafts for a couple months, I'm pretty busy so I don't know when I'll get to polish it, so for now, just publishing it with intent to go back and update it. Since I wrote this, there has been several changes already, due to advances in CM, finding bugs, etc. Anyway, because this is really never going to be 100% done, just going to click publish now, so you can start playing with it...
PS.. Mike Terrill is working on a very detailed blog post that will hopefully answer many of your questions as well, but he is waiting for making his more polished, he takes more pride in his blog posts than I do. 🙂
Download the Task Sequences and Content ---> HERE <--- I will try to keep that updated as I update my Lab's TS
Ok, so about a couple weeks ago, I posted the Pre-Cache Compat Scan Task Sequence, in Part 1, now it’s time to go over the IPU. It’s taken a couple weeks as I keep updating, refining, and finally came to the realization, I could keep tweaking this forever and never get around to posting. So, I figured, I should just post this, even if it’s not 100% complete. Just this should be pretty helpful to many.
This was one of Keith S. Garner’s (@keithga1) gifts to me before he parted ways on his new adventure. I asked him for a script to automatically pull the Hard Blocker from the compatdata XML file created during the Windows 10 compatibility scan. After I gave him my request, he hit me up on skype about 2 hours later and said he didn’t write a script, he wrote me a 1 liner. Keith knows how much I like 1 liners. Why? Task Sequences! If I don’t have to have content to accomplish a step, all the better! I've been known to build scripts on the fly using echo >> script.bat then running the script.bat file just so I don't have to have content.
So what’s this magic 1 line of code? I'm getting to that.
So, you think you’re setting the lock screen, just to have OSD finish and be like “Why is the lock screen missing and showing a dark blueish color?” or “Argh, it’s the stinking Windows default lock screen, not the one I wanted”. Perhaps you have a lab, and don’t activate your PC’s, so you get the rotating Bing Picture of the day, which is actually pretty cool and all, unless you’re trying to test Lock Screens. Thanks to Doug (managedoug.com) for bringing this to my attention and having me dig into it a bit more.
I’ve got Several Steps to control this during OSD which include Copying Files over the default lock screen images, and setting registry keys, basically depends on exactly what outcome you’re looking for.
Scenario 1, you want to set the Lock Screen and NEVER allow the user to change it.
Scenario 2, you’re cool with the user changing it, but want to set it to your own custom default.
To accomplish both, there are several things in common you need to do, so I’ll start with the steps you need to do for either situation, then break apart the single additional step that enables scenario 1. Read more
So this will be the first of several posts, well, it’s sorta the second, this heavily relies on the Script I posted for writing values to registry & WMI a few posts ago, however I’ve made several modifications to it since then, and have done A LOT of testing. Hence my last post about testing Low Disk Space machines.
WaaS Process, as Designed by Mike Terrill & Keith Garner quick overview:
- PreAssessment: Set of Rules run against hardware inventory data to rule out machines that be known to fail the upgrade. Rules include:
- Hardware Checks
- Free Disk Space
- Software Checks (Software we know that needs to be at specific versions to survive IPU, or not block it)
- 3rd Party Encryption Version level
- 3rd Party AV Version level
- Several other Apps
- General Checks
- Last HWInv Date
- Last MP Checkin
- OS / Build / OS Arch
- CCM Cache Size
- PreCache / Compat Scan (Task Sequence): After it passes all of the rules, the computer then added to a collection targeted with this TS. The TS is setup as a Required Deployment, and set to Pre-Download Content, and Download all Content before starting the TS. Then will dynamically download the driver packages, run the Check Readiness, and then Compat Scan.
- Schedule for Upgrade: After it has been cached, and passes the compat scan, the machines can be schedule (added to collection targed with the upgrade).
That’s a really quick overview of how we’ve setup WaaS, we went over this in great detail @ MMS, and I’d expect Mike Terrill to eventually blog that detail, I just don’t want to steal all of this thunder, but felt you needed a little overview to explain where this TS fits in.