Jump to content


  • Content Count

  • Joined

  • Last visited

  • Days Won


BrendenCleppe last won the day on April 11

BrendenCleppe had the most liked content!

Community Reputation

11 Good

My Information

  • Agent Count
    4000 - 6000 Agents


Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Here is a quick way to find the Service plans and the patching for workstations/servers for each location in a SQL format. SQL: SELECT clients.name AS ClientName, clients.clientid AS ClientID, locations.name AS LocationName, locations.locationid AS LocationID, v_extradatalocations.name AS EDFLocationName, v_extradatalocations.locationid AS EDFLocationID, `v_extradatalocations`.`Workstation Service Plan` AS `Workstation Service Plan`, `v_extradatalocations`.`Server Service Plan` AS `Server Service Plan`, `v_extradatalocations`.`Enable Patching Workstations` AS `Enable Patching Workstations`, `v_extradatalocations`.`Enable Patching Servers` AS `Enable Patching Servers` FROM v_extradatalocations LEFT JOIN locations ON v_extradatalocations.locationid = locations.locationid LEFT JOIN clients ON locations.clientid = clients.clientid Example Export:
  2. This worked very well in my test yesterday. Windows 7 to Windows 10 in about 2 hours. However, I uploaded Windows10 build 1909 onto our server and tried it. Do NOT have 2 hyphens in the ISO name. Like Windows10-x64-Build1909.ISO the download will fail. You can have 1 of those hyphens but not two.
  3. When we looked at this issue. We were told this information matches what is in Vsphere. So if Vsphere has the Unknown sensors then Virtualization manager will show them as well. Our troubleshooting is to make sure the customized ISO was used. So Dell customized ISO used for a Dell server, HP ISO with HP Server. We have been not using Virutalization manager and setting up IDRAC alerting as it's been very successful. https://www.dell.com/support/article/us/en/04/sln309388/dell-idrac-how-to-configure-the-email-notifications-for-system-alerts-on-idrac-7-8-and-9 We've gotten alot of bogus alerts due to the unknown sensors and creating alot of unneeded work. Our end goal is to switch to IDRAC alerting
  4. @TehArchitect You can certainly do that. It will encrypt the data within the database itself. so if you are doing any queries it will be encrypted. It might be an option if you have any external connection directly to the database. When you encrypt the entry, any view's from automate should be okay. At least that is what i remember from the articles on ExtraDatafields.
  5. @amw3000 We run and grab ALL the keys every 2 days and replaces the EDF for the device so we always have the latest information regardless if the key changes.
  6. Just to help the community. I have our system run a bitlocker get status script on all devices. I have made several EDF's for the device to store information: All of these are LOCKED so none of the techs can alter or adjust them. TPM Enabled. This runs the Powershell command: get-tpm | select -Expandproperty Autoprovisioning There is an IF statement where if the TPM is enabled it Marks the TPM EDF as enabled. This tells me if the device is able to be encrypted (we try to always have TPM) Checks if Bitlocker ProtectionStatus is on. Runs the Powershell command: Get-BitLockerVolume -MountPoint "C:" | Select -ExpandProperty ProtectionStatus There is an IF statement where if the Protectionstatus is ON it will check the 'BitlockerEnabled' box. The script will always run the 2 Powershell commands below regardless if bitlocker is enabled.. Bitlocker Recovery Key: Powershell command: manage-bde -protectors -get 😄 Get Bitlocker Status of C:. Powershell command: manage-bde -status 😄 The 'Date checked for Encryption' is a self diagnosing piece to tell me when the script was last ran. Example Contents of each EDF: Bitlocker Recovery Key: BitLocker Drive Encryption: Configuration Tool version 10.0.17134 Copyright (C) 2013 Microsoft Corporation. All rights reserved. Volume 😄 [] All Key Protectors TPM: ID: {E123456-E123-F123-F123-D123456789012} PCR Validation Profile: 0, 2, 4, 11 Numerical Password: ID: {1DDB4148-A123-B123-C123-B12345678901} Password: 123456-123456-123456-123456-123456-123456-123456-123456 Bitlocker Status of 😄 BitLocker Drive Encryption: Configuration Tool version 10.0.17134 Copyright (C) 2013 Microsoft Corporation. All rights reserved. Volume 😄 [] [OS Volume] Size: 475.49 GB BitLocker Version: 2.0 Conversion Status: Used Space Only Encrypted Percentage Encrypted: 100.0% Encryption Method: XTS-AES 128 Protection Status: Protection On Lock Status: Unlocked Identification Field: Unknown Key Protectors: TPM Numerical Password Attached is the SQL for importing the EDF files as well as the script used. Help this helps! Get Bitlocker Status of Device.xml Bitlocker-ComputerEDF.sql
  • Create New...