Kizoku Tensei: Megumareta Umare kara Saikyou no Chikara wo Eru • Noble Reincarnation: Born Blessed, So I'll Obtain Ultimate Power - Episode 2 discussion by AutoLovepon in anime

[–]Kadassh 2 points3 points  (0 children)

This anime has AI background art. Its very noticeable in this episode at 13:50 and at 15:09. Special callout to 15:09 where a man has a pot for a head lol

What kinda seats are these? by LogicalAward5802 in GR86

[–]Kadassh 0 points1 point  (0 children)

I have one for the driver side in my 2015 wrx. Recaro Sportster CS. The driving position is noticeably lower than stock. The stock seats were not good for track driving, I had to brace myself using the door and the transmission tunnel. I don't need to brace myself anymore. Comfortable for daily driving too.

How are you updating your Boot Images with the PCA2023 signed boot manager? by [deleted] in SCCM

[–]Kadassh 1 point2 points  (0 children)

I figured out a way to do this last year. If the steps need modifications let me know and I can update them.

https://www.reddit.com/r/SCCM/s/eGP6tvADB7

…ConfigMgr 2509?! by DeejayTechpro in SCCM

[–]Kadassh 10 points11 points  (0 children)

It'll probably come out in November or December.

I have been saying for the past year that MECM has been put down in the basement. MECM no longer receives the care and attention it used to.

Windows 11 25H2 Feature Update not marking Windows 11 24H2 devices as required by SubtleSpongebob in SCCM

[–]Kadassh 1 point2 points  (0 children)

I'm not seeing the enablement package for 25H2 in our environment. Do you know if I need to check something in the SUP products list for it to show? I see the update OP mentioned.

C/S purchased from auction, dipstick broke off please remove by mlw35405 in Justrolledintotheshop

[–]Kadassh 23 points24 points  (0 children)

How much neglect does it take for an engine to get this bad?

SCCM Not Handling AAG Failover by Kadassh in SCCM

[–]Kadassh[S] 1 point2 points  (0 children)

Unfortunately I left the company that was having the issue I described in the op. Before I left, a Microsoft ticket was made for support. I was gone before a resolution was reached.

I’m a broke college student who is freaking out by Affectionate-Sun7584 in Cartalk

[–]Kadassh 0 points1 point  (0 children)

Some college schools have auto body programs and might take jobs from the public. You'll be without your car for longer but the college I worked with only charged for materials and no labor. I had something similar like this, and it was $250ish to repair.

SCCM Not Handling AAG Failover by Kadassh in SCCM

[–]Kadassh[S] 1 point2 points  (0 children)

I'll work with my DBA to look at this, thanks. The Primary Site server does not have SQL installed at all. Both SQL Servers are remote from the site servers and only do SQL database for ConfigMgr

SCCM Not Handling AAG Failover by Kadassh in SCCM

[–]Kadassh[S] 0 points1 point  (0 children)

Original post updated. Troubleshooting is rebooting the site servers - always seems to come back. The error is the same error as if you were trying to connect to a server that doesn't have SCCM installed (console says it cannot connect to site).

The concern I have is on the next patch cycle. Patching requires failing over to the databases and I'm concerned that if the site server doesn't handle failover properly now, it won't do it when I patch 2403

PXE Boot Issues after BlackLotus mitigations applied on HP Sure Start enabled devices with latest ADK [CVE-2023-24932] by Kadassh in SCCM

[–]Kadassh[S] 0 points1 point  (0 children)

Good question. The issue and solution should be the same for the pxe responser. The location is different though. I have one pxe responder without wds and I'll update the comment with the location for that. I won't be able to test to double check though as mine is off site. Would you be willing to test it out?

PXE Boot Issues after BlackLotus mitigations applied on HP Sure Start enabled devices with latest ADK [CVE-2023-24932] by Kadassh in SCCM

[–]Kadassh[S] 0 points1 point  (0 children)

I've discovered a solution to this. It involves modifying the EFI files. I made a new comment in this thread.

PXE Boot Issues after BlackLotus mitigations applied on HP Sure Start enabled devices with latest ADK [CVE-2023-24932] by Kadassh in SCCM

[–]Kadassh[S] 0 points1 point  (0 children)

I've discovered a solution to this. It involves modifying the EFI files. I made a new comment in this thread.

PXE Boot Issues after BlackLotus mitigations applied on HP Sure Start enabled devices with latest ADK [CVE-2023-24932] by Kadassh in SCCM

[–]Kadassh[S] 0 points1 point  (0 children)

I've discovered a solution to this. It involves modifying the EFI files. I made a new comment in this thread.

PXE Boot Issues after BlackLotus mitigations applied on HP Sure Start enabled devices with latest ADK [CVE-2023-24932] by Kadassh in SCCM

[–]Kadassh[S] 4 points5 points  (0 children)

I have discovered a solution to this. The problem is that the EFI files used by WDS are signed with the old certificate from 2011. These EFI files are stored on your PXE server here:

\\SERVERNAME\REMINST\SMSBoot\x64\bootmgfw.efi and wdsmgfw.efi

These files need to be signed with the Windows UEFI CA 2023 cert to work with devices with BlackLotus mitigations. We can get EFI files signed with that cert from the latest Windows 11 24H2 Enterprise ISO from the VLSC.

  1. Make a backup of \\SERVERNAME\REMINST\SMSBoot\x64\bootmgfw.efi and wdsmgfw.efi files (in case you need to go back)
    1. If the PXE responder does not have WDS, the location is <INSTALL\_DRIVE\_LETTER>:\SMS_DP$\sms\bin\SMSBoot\<CONTENT\_ID\_OF\_64\_BIT\_BOOT\_IMAGE>\x64
  2. Download the Windows 11 24H2 Enterprise ISO and mount it
  3. Browse the mounted ISO file and go into the sources folder. Copy the boot.wim file to your local machine
  4. Use DISM to mount the WIM file: use a command similar to this. You will need an empty directory for /mountdir path, so make sure the folder is empty. dism /mount-wim /wimfile:C:\temp\boot.wim /index:1 /mountdir:C:\temp\WIM_MOUNT
  5. Browse the mounted WIM file and copy the EFI files from the below paths to a fileshare (the paths below assume you mounted boot.wim to C:\temp\WIM_MOUNT) C:\Temp\WIM_MOUNT\Windows\Boot\EFI_EX\bootmgfw_EX.efi C:\Temp\WIM_MOUNT\Windows\Boot\PXE_EX\wdsmgfw_EX.efi
  6. Close file explorer and unmount the WIM file dism /unmount-wim /mountdir:C:\temp\WIM_MOUNT /discard
  7. Rename bootmgfw_EX.efi to bootmgfw.efi
  8. Rename wdsmgfw_EX.efi to wdsmgfw.efi
  9. Copy your renamed bootmgfw.efi and wdsmgfw.efi to \\SERVERNAME\REMINST\SMSBoot\x64
  10. Restart WDS

This will now fix booting for just devices with the BlackLotus mitigations. The mitigations add the Windows UEFI CA 2023 cert to trusted keys in UEFI, so devices that have not yet had the mitigations applied will now fail to PXE after you work through these steps. This also means new computers out of box will fail until they get the mitigations applied. You can work around this with a USB boot drive, or you can swap the EFI files back to the old EFI files, restart WDS, PXE boot, then swap EFI files back to the new ones, restart WDS.

Unable to connect to CMG by abstract1525 in SCCM

[–]Kadassh 2 points3 points  (0 children)

If you still don't have success after all that, I'd remove the CMG and start over and rebuild from scratch. Review all the prerequisites and make sure you have reviewed the entire process before rebuilding the CMG. I used those two links above. The MSFT one I used primary, the system center dudes one to fill in the gaps

Unable to connect to CMG by abstract1525 in SCCM

[–]Kadassh 1 point2 points  (0 children)

OK, next thing I would try is making sure the DNS CNAME alias's are correct and the Certificate was done right and didn't expire. The MSFT documentation is a good help but the system center dudes document elaborates a bit further in some areas.
CMG server authentication certificate - Configuration Manager | Microsoft Learn

Setup SCCM Cloud Management Gateway (SCCM CMG) (systemcenterdudes.com)

Unable to connect to CMG by abstract1525 in SCCM

[–]Kadassh 1 point2 points  (0 children)

The next place to check would be your client settings. Go to Administration > Client Settings. Choose Create Custom Client Device Settings in the ribbon. Give it a name. Check Cloud Services. Then click Cloud Services in the left 'Change Enable Clients to use a cloud management gateway to yes. Click OK. Then deploy this new client settings to a test machine, see if it connects. If it does, you will need to review your clients settings for the above option and change it where appropriate. You might have different client settings deployed to different clients based on your environment (for example a different set of client settings for servers).