TPM chips can be cleared from the OS if enabled so in the bios .
This can be automated via a script.

You know your TPM password ?

From: listsadmin@lists.myitforum.com [mailto:listsadmin@lists.myitforum.com] On 
Behalf Of Miller, Todd
Sent: February 17, 2016 5:03 PM
To: mdt...@lists.myitforum.com
Subject: RE: [MDT-OSD] Can't Do Bare Metal on Bitlockered PC - Dell BIOS Issue

Hmm, well for me, when I have a NTFS partition that is encrypted, the task 
sequence stops when it tries to stage the WinPE boot onto the hard drive.  
Maybe I've modified my task sequence in some way that breaks proper formatting. 
 If your WinPE boot disk is different from the WinPE image that your chosen 
Task Sequence uses, then the WinPE image has to be staged even before the Task 
Sequence starts - so the idea that the repartitioning/formatting is taken care 
of exclusively by the task sequences doesn't make 100% sense to me.  SCCM Task 
Sequence engine might need to stage the WinPE image even before the TS really 
starts.  - For instance maybe you boot from a 32bit WinPE image, but your 
Windows 7 64bit Task Sequence calls for a 64bit  WinPE boot disk.  The Task 
Sequence engine (not the task sequence itself) will try to stage WinPE 64bit 
and reboot into it to START the task sequence--- that happens even before the 
first item in your task sequence runs.... And I am pretty sure will fail if you 
have an unwritable NTFS partition on your hard disk.  Sounds like others have 
it working, so I guess I will just say that it doesn't work for me and like you 
have experienced, I have had to run a diskpart/clean when trying to bare metal 
install to a previously encrypted disk.  We don't use bitlocker, but the 
problem should be the same - maybe bitlocker is easier/different since 
bitlocker has that readable partition on the disk where maybe the SCCM engine 
can stage the WinPE image.  My encryption tool (Intel Drive Encryption) only 
has a single encrypted partition and no separate unencrypted area.


On TPM...
Yes, I've tried using CCTK and the new Powershell scripts and neither can clear 
an owned TPM chip.  I have talked to Warren about it and he did say that it is 
against the TPM rules for a BIOS to support clearing TPM in an automated way.  
I think it can be cleared from inside of Windows though so not sure about all 
of that.

Maybe Warren will pop in with some advice and clarification soon.  You can turn 
on TPM programmatically but clearing ownership is the trouble.

If there is someone who has figured out how to clear ownership on a TPM chip on 
a Dell, in some automated way, please don't leave us in suspense.

From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
[mailto:listsadmin@lists.myitforum.com] On Behalf Of Marcum, John
Sent: Wednesday, February 17, 2016 1:32 PM
To: mdt...@lists.myitforum.com<mailto:mdt...@lists.myitforum.com>
Subject: RE: [MDT-OSD] Can't Do Bare Metal on Bitlockered PC - Dell BIOS Issue

Keith and John --- Bare metal from Configmgr. (on a side note the new XPS is 
amazing! I have one in my closet doing nothing. Not because it's bad but 
because I for the new 5510 which is even better)


Thanks Todd! I thought that one of the two partition steps in the initialize 
phase (or the format disk in preinstall) was supposed to know that it was 
booted from PXE therefore no data should be saved (thus it's bare metal 
install) and then blow away the partitions. From what you are saying that must 
not be true. Seems silly to have to manually delete the partitions. :(

When you say there is no way to clear it programmatically I assume you tried 
doing so with the Dell utility thingy?





________________________________
        John Marcum
            MCITP, MCTS, MCSA
              Desktop Architect
   Bradley Arant Boult Cummings LLP
________________________________

  [cid:image001.png@01D169B0.BE68E100]

From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
[mailto:listsadmin@lists.myitforum.com] On Behalf Of Miller, Todd
Sent: Wednesday, February 17, 2016 10:45 AM
To: mdt...@lists.myitforum.com<mailto:mdt...@lists.myitforum.com>
Subject: RE: [MDT-OSD] Can't Do Bare Metal on Bitlockered PC - Dell BIOS Issue

The bare metal task sequence will fail because it will have trouble staging the 
WinPE boot image to the hard disk.  The task sequence will fail any time it 
detects an NTFS primary partition that is is unable to write to.  The task 
sequence sees that there is an NTFS partition and assumes that it will be able 
to write to it to stage the WinPE image for reboot, but it cannot.  You might 
need to inject a check and format into the pre-execution hook stage.  The task 
sequence can't just blow away the partition because task sequences are also 
built for refresh scenarios where you would need to keep the existing NTFS 
partition for USMT to do its capture.  You might be able to rejigger some of 
the rules on the partition and format section at the top of the task sequence 
so that it runs more frequently.  But I would guess those rules are detecting 
that there is a reasonable NTFS partition (and there is not)

Regarding the TPM, chip.  Yeah, you have to clear that manually.  You could 
check to see if it is present and cleared in a pre-execution hook and notify 
the user, but there is no way to clear it programmatically.  Just give up on 
that right now.  I wish I could have those two weeks back.

From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
[mailto:listsadmin@lists.myitforum.com] On Behalf Of Keith Garner (hotmail)
Sent: Wednesday, February 17, 2016 10:00 AM
To: mdt...@lists.myitforum.com<mailto:mdt...@lists.myitforum.com>
Subject: RE: [MDT-OSD] Can't Do Bare Metal on Bitlockered PC - Dell BIOS Issue

MDT Lite Touch or Zero Touch?

>From what I recall, MDT Litetouch should be intelligent enough to just blow 
>away the existing Bitlockered partition and continue. Same with the TPM, but I 
>haven't had a Dell in a while (I get a new XPS 13 next week).

From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
[mailto:listsadmin@lists.myitforum.com] On Behalf Of Marcum, John
Sent: Wednesday, February 17, 2016 6:05 AM
To: mdt...@lists.myitforum.com<mailto:mdt...@lists.myitforum.com>
Subject: [MDT-OSD] Can't Do Bare Metal on Bitlockered PC - Dell BIOS Issue

Sorry if I've asked this before, it's been on my list of things to fix for a 
very long time and I'm just now actually getting to it.....

When doing at bare metal deployment on any PC that has had the disk encrypted 
with bitlocker I have two issues:


1.       I have to manually going into diskpart and blow away the partitions. 
Shouldn't the TS do that for me?

2.       I have to clear the TPM in the bios manually.

                                                               i.      On the 
newer Dell laptops this in itself is a challenge. I find that I must pray to 
Michael Dell, hold me tongue just right and stand on my head to start with. If 
I do all that just right I have to clear the TPM, activate the TPM and then 
clear it again and then load the bios defaults in the security node or I get an 
error when I try to setup the BIOS in my task sequence.  I see this problem on 
the currently shipping Latitudes, the 6400 takes one more step that I must 
completely power it off after doing all those steps and power it back on or it 
fails. Am I the only person seeing this issue?



________________________________
        John Marcum
            MCITP, MCTS, MCSA
              Desktop Architect
   Bradley Arant Boult Cummings LLP
________________________________

  [cid:image001.png@01D169B0.BE68E100]


________________________________

Confidentiality Notice: This e-mail is from a law firm and may be protected by 
the attorney-client or work product privileges. If you have received this 
message in error, please notify the sender by replying to this e-mail and then 
delete it from your computer.

________________________________
Notice: This UI Health Care e-mail (including attachments) is covered by the 
Electronic Communications Privacy Act, 18 U.S.C. 2510-2521, is confidential and 
may be legally privileged.  If you are not the intended recipient, you are 
hereby notified that any retention, dissemination, distribution, or copying of 
this communication is strictly prohibited.  Please reply to the sender that you 
have received the message in error, then delete it.  Thank you.
________________________________

________________________________
Notice: This UI Health Care e-mail (including attachments) is covered by the 
Electronic Communications Privacy Act, 18 U.S.C. 2510-2521, is confidential and 
may be legally privileged.  If you are not the intended recipient, you are 
hereby notified that any retention, dissemination, distribution, or copying of 
this communication is strictly prohibited.  Please reply to the sender that you 
have received the message in error, then delete it.  Thank you.
________________________________

Reply via email to