…or lack thereof? I wanted to add that in the title as well, but unless there is a competition for the longest blog titles, I don’t want to waste my skill right now. In this post, we are going to discuss if there is any relationship between a SUG and a Deployment Package. TLDR What […]
Category: SCCM
Automatic Deployment Rules (ADR) are great! They simplify so much of the patching process. That helps us save time, and also helps us in avoiding human errors. But they have a few minor inconveniences like: The SUG being generated does not have the best naming convention. We do not have a sophisticated deployment configuration as […]
Does your environment still have out-of-support operating systems like Windows 7 or Windows Server 2008? If yes, then one of the ways to keep supporting them with Security Updates is through the Extended Security Updates (ESU) program. This program kicks in after the Extended Support for an OS is over, and unlike Extended Support, the […]
If your organization uses MEMCM for configuration management, it’s more than likely that it is being managed by a team of people instead of a single person. And depending on how your organization works, you may have separate teams who creates collections, deploy the packages and applications, and the team that manages the infrastructure related […]
This is going to be a three-part series where I will try to explain some of the components behind Software Update reporting in MEMCM. Part 1 is focused on the building blocks of a report, the Views in the MEMCM database. If you’re looking for a query that you can directly use in your environment, […]
I built a Configuration Manager (MEMCM) lab in August 2020 as a means to learn more about it and assembled a desktop especially for the same purpose (and maybe a little bit of gaming as well). A couple of months later, I decided to move back to my hometown as we had an option to […]
After the SCCM has been installed on the Site Server, we need to make some configurations through which all the devices and users which we need to manage, get populated automatically into the console. This is done through the use of AD Discovery Methods in SCCM. In order to make use of these features, we […]
What is a Boundary? If you see the map of your country, you will notice that all the states are divided with a line, also known as the boundary. Why are they divided? Because every state may have its own policies and access to its own separate resources which are within that region. It is […]