How to add custom registry keys to the Windows Embedded / ThinPC Registry Filter

When running Windows Embedded Standard 7 or Windows ThinPC with the Enhanced Write Filter (volume based protection) or File Based Write Filter (File based protection) enabled, the system returns to its original state upon every reboot. This is a good Read More …

Group Policy changes included in the Windows Management Framework 3.0

While creating a new Group Policy object to enable WinRM (Windows Remote Management) on clients, I noticed some Group Policy changes that are introduced with the Windows Management Framework 3.0. The Windows Management Framework 3.0 contains the following updates: Windows Read More …

How to create a custom antimalware policy in SCCM 2012 for your App-V sequencing clients

Today I wanted to start sequencing an application for App-V within my lab environment where I have deployed SCCM 2012 SP1 including Endpoint Protection. As I went through the Sequencing Wizard I got the well-known warning that I have Antivirus Read More …

How to generate random computer names for lab deployments using SCCM OSD

For my lab environment I use the below described approach to generate random computernames for my clients. The script does the following: Read the Task Sequence Package Name Based on the name set the appropriate prefix Generate a random number Read More …

How to convert registry files (.reg) into XML for Group Policy Preferences import

Creating registry settings manually within the Group Policy Preferences editor can become a cumbersome task, especially when you need to create many of them. Although the Group Policy Management console allows you to import registry keys stored within an XML Read More …

How to create a SCCM 2012 SP1 Configuration Baseline with Security Compliance Manager (SCM) 3.0

Most enterprises take advantage of Group Policies to manage security configuration settings across their server and desktop infrastructure. Usually once tested and implemented it’s assumed they get applied correctly. But can we be 100% sure that our clients and servers Read More …