In reference your first point, we now copy paste a collection query into a 
query to check what the change does or put it into a temp collection. Once 
confirmed, we paste the update into the live collection.

A summary dialogue that pops up when you create or edit a collection or advert 
that's tied to each other which shows you the targets ... Would be good.

---- Scent form may moo boil. Police doughnut excerpt Annie breathe city.

On 20 May 2014 18:53, "Miller, Todd" <[email protected]> wrote:
For me, there are two things that would help tremendously.

First, I would like the option of automatically marking 
deployments/advertisements as disabled any time an underlying collection query 
was modified.
This would prevent you from accidentally expanding a collection when you did 
not know/understand  the consequences.  If the collection query is changed, you 
need to evaluate how the membership changed prior to the advertisement being 
valid again for that modified collection.  This has happened to me a few times. 
 I always try to disable advertisements prior to modifying their underlying 
collections, but sometimes there are domino effects and it is not always clear 
what collections feed into others. Or maybe there are multiple adverts to the 
same collections that you aren’t necessarily thinking about.

Second, I would like there to be a site-wide dashboard that as the Grand Poobah 
of SCCM, I could look at and see every pending deployment/advertisement.   What 
package is being deployed, to what collection, and how many clients are 
affected.  This is important not just from protecting from oopsies, but for 
resource contention too.  I would like to see what other kinds of large 
deployments are scheduled for a timeframe before deploying or permitting others 
to be scheduled.  Right now, there is no good way for me to look in SCCM and 
see what “stuff” is going to happen in the next 6 hours, 7 days etc.


This can get complicated….
Somehow the dashboard would need to take into account the way collections 
update on schedules.  There would need to be a way to tell what is going to 
happen when the collection updates at a certain time.  I don’t know how to 
explain that very well…
This is where most of my problems have occurred.

Let’s say I have a collection of “Machines eligible for Software X”
I have another collection called “Machines that need Software X” and it has as 
a limit collection “Machines eligible for Software X”

“Machines that need software X” is set to refresh membership daily at 9:00PM.  
There is a standing mandatory advertisement for Software X that occurs in the 
distant past.

When you look in the collection for “Machines that need software X” it should 
be mostly empty.  Machines that need the software have installed it and then 
they are out of scope for the collection query.

During the day, someone modifies the limiter collection incorrectly.  That 
mistake is not evident until 9:00PM when the “Machines that need software X” 
refreshes on schedule and the software starts to deploy immediately.

It would be difficult to see that that was going to happen.  There would need 
to be some way to compute that the limiter collection was updated and that the 
Software X collection was going to be flooded with new members at 9:00PM.

I hope that’s not too rambly and is understandable about the scenario that give 
me concern.  I really think there is limited times when software is deployed to 
the wrong collection.  For me it is standing advertisements that are deployed 
to a collection and then that collection gets modified or the limiting 
collection gets modified.  So really the mistakes come from unintentionally  
expanding collections.


From: [email protected] [mailto:[email protected]] On 
Behalf Of Aaron Czechowski
Sent: Tuesday, May 20, 2014 11:51 AM
To: [email protected]
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

Thanks all for the discussion. This is kind of how our internal debate proceeds 
every time it comes up…there’s really no bullet proof way to block this, but I 
don’t think that should be the intent. I’m a big proponent of a good default 
with control. For every scenario in which it should be blocked there are 
probably as many to have it on.

One more comment – in R2 we now have the Check Readiness step (which can also 
be achieved in previous versions through MDT integration and the Validate step) 
to at least fail a deployment to a server (or vice versa). We’re also looking 
at ways to potentially improve upon this in the future.

Aaron

p.s. as always, none of the above is committed future work – just ideas in my 
head. :)

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of elsalvoz
Sent: Tuesday, May 20, 2014 8:56 AM
To: [email protected]<mailto:[email protected]>
Subject: Re: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

I don't think taking the ability to do something like deploying to "All System" 
collection would fix the issue because there other ways to re-create them such 
as a bad WQL that adds all systems.

How about step in the TS to verify critical systems such as DCs, DNS, DHCPs, 
and others? I guess this can be accomplished right now though a script to 
identify these roles on a server
How about a mandatory pop-up window with a timer (hint: powershell deployment 
toolkit) on the client only critical infra systems?
How about a touch file that pauses the deployment like Johan does, use web 
services and/or orchestrator to send and email, receive a response and create 
the file?
How about a SCCM deployment tab where critical windows roles (DC, DNS, etc..) 
like OS selection in the "requirement tab" of a program? Default is set to skip 
those critical roles unless selected.

There are hundreds of innovative ways that can be provided currently to prevent 
such critical infra systems from getting imaged improperly at 'run-time'.


On Tue, May 20, 2014 at 6:36 AM, Sherry Kissinger 
<[email protected]<mailto:[email protected]>> wrote:
For all the reasons mentioned... it's really, really difficult to engineer 
against "oopsies" and/or just plain unfamiliarity with the tool... but you have 
full rights to everything (or close to everything).

"Most" things can be prevented with good RBA design, training, and not just 
having had a 16 hour work day.

But it's hard to engineer against little or no training, full rights to 
everything, and a long work day.  All or any combination of those can turn a 5 
second lack or attention to detail into a "oops".

Note it may be possible to engineer something using SCORCH and status filter 
rules... but you have to be careful about licensing then.  If you read the fine 
print of the Scorch licensing... it was meant for orchestrating server actions. 
 and the way Microsoft interpreted it was that if you did something based on 
status filter rules from CM and sending instructions back to CM; you are 
"affecting a client"--i.e., potentially every single client in CM that you 
have.  So pony up the $ for the expensive licensing for every single client.  
You may be able to negotiate something; but be aware of that if you are looking 
at status filter rule triggers and automation via scorch.  It could end up 
costing you more than if you sent your people to training instead!

Sherry Kissinger
On Tuesday, May 20, 2014 8:18 AM, Ben Glenz 
<[email protected]<mailto:[email protected]>> wrote:

Haha this reminds me on the first User Account Control Prompts i got.. :)

You’re absolutely right, there is no 100% protection.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]<mailto:[email protected]>] 
On Behalf Of Stephen Murley
Sent: Dienstag, 20. Mai 2014 14:51
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

Hmm, I’m pretty sure I could still mess things up even with that :)

Yes? Click. Are you sure? Absolutely. Really? Yes.

Oops.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Jimmy Martin
Sent: 20 May 2014 13:46
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

Maybe if there was an OS delivery require multiple admin logon to accomplish? 
Or deployment greater than certain % of env require same?  As you say, it’s 
pretty tough to eliminate the opportunity to screw up.

Jimmy Martin
(901) 227-8209<tel:%28901%29%20227-8209>

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Ben Glenz
Sent: Tuesday, May 20, 2014 2:26 AM
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

I think there are several ways of improvement to prevent issues like this.
In my opinion the All Systems collection shouldn’t be allowed in Deployments 
(all kinds)

However, you will never ever prevent issues. E.g. I create my own All Sys 
collections, Membership Rule include All Systems.
Same collection but without limitations.
What about an RBAC feature limiting a User to a specific number of deployments. 
UserA is only allowed to deploy to a maximum of 50 machines?


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Aaron Czechowski
Sent: Dienstag, 20. Mai 2014 03:08
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

We actually have several DCRs in a similar vein. Everything from what Damon 
suggests, to blocking deployments to “All Systems,” or blocking deployments to 
similarly large collections. Probably others that just aren’t occurring to me 
as well.

Not saying we have any definite plans to do anything, just that it’s on our 
radar.

Aaron


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Johns, Damon (DoJ)
Sent: Monday, May 19, 2014 3:10 PM
To: '[email protected]<mailto:[email protected]>'
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

Perhaps Microsoft need to introduce some form of change management control 
within Configuration Manager with respect to the Task Sequence Deployment types 
(or even all deployments really since an application or package can also cause 
problems when deployed to say all systems when you didn’t intend it to) – 
similar to what they have done with Advanced Group Policy Management available 
to those with SA.

I’m sure there have been more of this that has happened – it’s just not been 
made public knowledge.


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Mote, Todd
Sent: Tuesday, 20 May 2014 7:40 AM
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

True, there’s always a bigger fish, but at least with RBA while you might be 
able to do it to yourself, you wouldn’t be able to do it to the SCCM server and 
EVERY machine in your enterprise, domain controllers and exchange servers 
included.  No, those users wouldn’t be relieved that only their machines were 
ruined, but management might like to know that not EVERY machine was ruined, or 
could be ruined.  If you can’t completely mitigate a risk, which in this case 
you can’t, contain it as best you can.

Even the bigger fish shouldn’t be using the same account they used to install 
SCCM with.  Sherry said it a couple of years ago, even the Full Administrators 
should scope themselves out of seeing All Systems.  I think she put it 
somewhere along the lines of “…never open the console as god…” or something 
similar.

If they were still using 2007…  well, not much you can do there besides child 
primaries for security boundaries.


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Miller, Todd
Sent: Monday, May 19, 2014 1:23 PM
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

RBA can only mitigate the scope of affected machines.  So what if the damage 
were limited only to the machines you have rights to? Do you think your users 
would be relieved to find out only their machines were ruined?   Remember, 
there is always someone else higher up in the hierarchy that can do more damage 
than you can.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Mote, Todd
Sent: Monday, May 19, 2014 12:49 PM
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

RBA can help further here too.  if folks can’t see the all systems collection, 
they can’t deploy to it either…

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Matt Wilkinson
Sent: Monday, May 19, 2014 7:34 AM
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

In 2012/SP1/R2 you do have to go through several screens to deploy a required 
OSD TS. Picking the All systems Computer collection is probably what happened. 
I  only have access to test collections. I only deploy available applications 
for testing.

From: Bruce Hethcote [mailto:[email protected]]
Sent: 19 May 2014 12:29
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

+1  It’s easy enough to put a condition at the beginning that would prevent a 
desktop OS TS from executing on a server OS.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Jason Wallace
Sent: Saturday, May 17, 2014 10:39 AM
To: [email protected]<mailto:[email protected]>
Subject: Re: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything

Or I guess that people could use the features which exist in the product such 
as security scopes and security roles.

They could also do things like run a check via WMI or TSVs that a system is 
valid to have the TS run on it.

On 17 May 2014, at 15:35, "Miller, Todd" 
<[email protected]<mailto:[email protected]>> wrote:
This happens enough that you have to start wondering if the software could be 
improved in some way to help prevent it.

Maybe there should be alerts or limits or a wizard that summarizes any change 
that affects a deployment or target collection.

Like when you click OK, maybe there would be a "This change will result in NNNN 
systems receiving Package/Application "YYYYYYYY" with a mandatory time of 
12:20AM" or something like that.

The trouble is, you would need to do that every time you modify a collection 
too and that takes some computational time. - maybe that is computer in the 
background and you get this warning when you enable the deployment? Wouldn't it 
be nice if there was an option to create all deployments as disabled and then 
you had to enable them, and when enabling them you could see or were told how 
many systems are affected.

You could also automatically disable advertisements when the underlying 
collection query was modified.  So the advertisement would need to be reenabled 
after reviewing how that change affected the deployment.

You know how your DVR shows what programs are going to be recorded over the 
next couple of days/weeks?  Wouldn't it be great if SCCM showed a list like 
that of pending packages,  deadlines, the target collection, the number of 
affected machines, and the time?

With these kinds of events, there definitely is an established need to make the 
SCCM product harder to make unintentional blunders and easier to see what it is 
doing/going to do and when.

Often with these kinds of things there is a long chain of events that lead to 
an unanticipated result.  The worst part is that those machines that were 
ruined over night, SCCM probably "knew" it was going to happen all day long and 
could have warned the Admin if there was just a interface that computed what 
advertisements were pending, how many machines are affected etc....  I 
certainly would get more use from something like that than being able to manage 
iOS/MacOS/Linux/AntiVirus definitions/Android Apps/etc.  Maybe SCCM v.Next can 
focus on doing core competencies better rather than extending the product into 
areas few care about.

I dunno, I just don't think all or even half the blame falls on the guy that 
clicked "OK."   I certainly feel a great deal of empathy for him.  While this 
has never happened to me, it has sometimes been a recurring theme in bad 
dreams/nightmares.



From: [email protected]<mailto:[email protected]> 
[[email protected]<mailto:[email protected]>] on 
behalf of JONES, RICK J [[email protected]<mailto:[email protected]>]
Sent: Friday, May 16, 2014 5:33 PM
To: [email protected]<mailto:[email protected]>
Subject: RE: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything
EVERY person in IT has an OCM (Oh Crap Moment) that they remember or changed 
them.  If a new tech haven't had their OCM yet, I tend to lock down access and 
not trust because the OCM has a higher chance of happen in my environment.

And yes, I had my OCM, it changed how I add logging and build a back out to my 
scripts.

Rick J. Jones
Wireless from AT&T
Domestic Desktop Application Management
D: (425) 288-6240<tel:%28425%29%20288-6240>
C: (206) 419-1104<tel:%28206%29%20419-1104>
From: Murray, Mike<mailto:[email protected]>
Sent: ‎5/‎16/‎2014 4:22 PM
To: [email protected]<mailto:[email protected]>
Subject: [mssms] RE: Emory IT accidentally deploys Windows 7 to everything
Wow.... ouch. So there's an opening at Emory?

-----Original Message-----
From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of William Jackson
Sent: Friday, May 16, 2014 12:32 PM
To: [email protected]<mailto:[email protected]>
Subject: [mssms] Emory IT accidentally deploys Windows 7 to everything

I'm thankful that I do not work over there.

"A Windows 7 deployment image was accidentally sent to all Windows machines, 
including laptops, desktops, and even servers. This image started with a 
repartition / reformat set of tasks. As soon as the accident was discovered, 
the SCCM server was powered off – however, by that time, the SCCM server itself 
had been repartitioned and reformatted."

http://it.emory.edu/windows7-incident/

William


Notice: This UI Health Care e-mail (including attachments) is covered by the 
Electronic Communications Privacy Act, 18 U.S.C. 2510-2521, is confidential and 
may be legally privileged.  If you are not the intended recipient, you are 
hereby notified that any retention, dissemination, distribution, or copying of 
this communication is strictly prohibited.  Please reply to the sender that you 
have received the message in error, then delete it.  Thank you.





DISCLAIMER: This is a PRIVATE AND CONFIDENTIAL message for the ordinary user of 
this email address. If you are not the intended recipient, please delete 
without copying and kindly advise us by e-mail of the mistake in delivery. 
NOTE: Regardless of content, this e-mail shall not operate to bind 1E to any 
order or other contract unless pursuant to explicit written agreement or 
government initiative expressly permitting the use of e-mail for such purpose.

_____________________________________________________________________
This email has been scanned by the MessageLabs Email Security System on behalf
of Leeds College of Building.
For more information please visit http://www.symanteccloud.com/
_____________________________________________________________________


_____________________________________________________________________
This email has been scanned by the MessageLabs Email Security System on behalf
of Leeds College of Building.
For more information please visit http://www.symanteccloud.com/
_____________________________________________________________________



Notice: This UI Health Care e-mail (including attachments) is covered by the 
Electronic Communications Privacy Act, 18 U.S.C. 2510-2521, is confidential and 
may be legally privileged.  If you are not the intended recipient, you are 
hereby notified that any retention, dissemination, distribution, or copying of 
this communication is strictly prohibited.  Please reply to the sender that you 
have received the message in error, then delete it.  Thank you.




CONFIDENTIALITY NOTICE AND DISCLAIMER
The information in this transmission may be confidential and/or protected by 
legal professional privilege, and is intended only for the person or persons to 
whom it is addressed. If you are not such a person, you are warned that any 
disclosure, copying or dissemination of the information is unauthorised. If you 
have received the transmission in error, please immediately contact this office 
by telephone, fax or email, to inform us of the error and to enable 
arrangements to be made for the destruction of the transmission, or its return 
at our cost. No liability is accepted for any unauthorised use of the 
information contained in this transmission.



This message and any files transmitted with it may contain legally privileged, 
confidential, or proprietary information. If you are not the intended recipient 
of this message, you are not permitted to use, copy, or forward it, in whole or 
in part without the express consent of the sender. Please notify the sender of 
the error by reply email, disregard the foregoing messages, and delete it 
immediately.

P Please consider the environment before printing this email...


[Image removed by sender.]<http://www.plymouth.ac.uk/worldclass>

This email and any files with it are confidential and intended solely for the 
use of the recipient to whom it is addressed. If you are not the intended 
recipient then copying, distribution or other use of the information contained 
is strictly prohibited and you should not rely on it. If you have received this 
email in error please let the sender know immediately and delete it from your 
system(s). Internet emails are not necessarily secure. While we take every 
care, Plymouth University accepts no responsibility for viruses and it is your 
responsibility to scan emails and their attachments. Plymouth University does 
not accept responsibility for any changes made after it was sent. Nothing in 
this email or its attachments constitutes an order for goods or services unless 
accompanied by an official order form.









________________________________
Notice: This UI Health Care e-mail (including attachments) is covered by the 
Electronic Communications Privacy Act, 18 U.S.C. 2510-2521, is confidential and 
may be legally privileged.  If you are not the intended recipient, you are 
hereby notified that any retention, dissemination, distribution, or copying of 
this communication is strictly prohibited.  Please reply to the sender that you 
have received the message in error, then delete it.  Thank you.
________________________________

________________________________
[http://www.plymouth.ac.uk/images/email_footer.gif]<http://www.plymouth.ac.uk/worldclass>

This email and any files with it are confidential and intended solely for the 
use of the recipient to whom it is addressed. If you are not the intended 
recipient then copying, distribution or other use of the information contained 
is strictly prohibited and you should not rely on it. If you have received this 
email in error please let the sender know immediately and delete it from your 
system(s). Internet emails are not necessarily secure. While we take every 
care, Plymouth University accepts no responsibility for viruses and it is your 
responsibility to scan emails and their attachments. Plymouth University does 
not accept responsibility for any changes made after it was sent. Nothing in 
this email or its attachments constitutes an order for goods or services unless 
accompanied by an official order form.



Reply via email to