New Agents will not re-assign to ConfigMgr 2012 Site

Many are waiting for ConfigMgr 2012 SP1 before they actually go from ConfigMgr 2007 to ConfigMgr 2012. If you for some reason have a Group Policy that assigns clients to a specified Site code you will hit a barrier migrating your clients with the new Agent. The installation itself will go fine but it stops there. The Group Policy tattoo’s the Assigned Site Code locally on the machines that are hit by the policy. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Mobile Client] "GPRequestedSiteAssignmentCode"="PS1" What you can do from here is either change the Site Code in the same, or a new Group Policy hitting the migrated [...]

By |2012-12-11T14:23:06+01:00December 11th, 2012|Configuration Manager (SCCM)|5 Comments

Set-SCOMLicense : Requested registry access is not allowed

  My colleague Kåre has already blogged about how to set the Operations Manager 2012 license, to be read here. However, I have experienced this command fails – even when running from an elevated Operations Manager Shell – giving error about registry access:   Solution: Instead of spending hours messing up the the security in registry, simply run Windows Powershell as Administrator, and import the Operations Manager module, by using the “Import-Module OperationsManager” cmdlet. When this has been imported, run the Set-SCOMLicense command and you should succeed:

By |2012-12-11T13:38:37+01:00December 11th, 2012|Operations Manager (SCOM)|18 Comments

Role Based Administration change in ConfigMgr SP1

RBA or Role Based Administration is one of the many new features in ConfigMgr 2012. It’s a very powerful feature and has already helped lots of customers minimizing the need for having multiple primary sites. One annoying fact in RTM is that all collections (users and devices) shows up when running a report. This has changed in Service Pack 1 which makes the RBA feature even more powerful. In this example I have a user (DskAdmin) who is member of the Desktop Admins group in Active Directory. Desktop admins must all be granted Application Administrator permissions and allowed to work [...]