Our last webinar was co-hosted by MVP rockstar Jörgen Nilsson. He and I were presented with over 50 questions during and after the session–all of which you can find the answers to in 2 blog posts available now. You can always re-watch the webinar on-demand! Let’s dive in:
None that I am aware of which provide the level of control that Dell, HP, etc. offer. Fujitsu has a tool that can manage at least some models, you need to contact their support to get it though.
When using BitLocker, I normally use a task sequence and suspend BitLocker before doing the BIOS upgrade, works pretty good.
None that I have figured out yet. Without a clear label such as “Recovery” or “WinRE”… you don’t have many options using the method I outlined. I am looking for ways to tap the “reagents /info” command but need more time to work with it in different scenarios.
Is there any way to combine two types of deployment for example: In my current project, we use two different TS, one for RefreshWipe and load work and one for system to system to migration from Win7 to Win10. For the system to system migration, we have use restore and capture TS and use User State Migration under Assets & Compliance So my question is, how can we collaborate both tasks in one single TS.
In many cases, you can use conditions on groups (sections) of the task sequence. You could launch a form up front that sets variables to determine which sections run. You could get creative with a query to the CM DB to determine if there is a computer association in the database (v_StateMigration) and run sections as required based on the presence of the data returned.
Yes, Drivers need to be updated as well during Windows 10->Windows 10 In-place upgrade. There are command switches that can be used together with the download package content to make that dynamic during the upgrade.
Just enabling the VT extension in the firmware will not create an issue. The conflict is when you enable Credential Guard and or Device Guard. For VMWare Workstation, VMWare has a KB article the topic explain this: Their recommendation is to turn off Credential Guard and or Device Guard which defeats the
Yes, maybe we should it is a hard blocker for an in-place upgrade
We will definitely have future blog posts covering this one! Stay tuned.
Why not utilize WMI Filtering in your GPOs? As for a computer rename (assuming you are referring to doing that while using PBA), you can keep the original name in a variable during the process to call when retrieving the data from the peer.
We are working on a blog post with that script.
That’s a lot of information in one post. Check out part 2 with more questions and answers–and don’t forget, you can re-watch the webinar on demand now.