Lenovo graphics driver for P51s and ThinInstaller detection issue

Oh I spend so much time troubleshooting Lenovo’s UpdateRetriever issues these days. Seems Lenovo really don’t test much at all. In the latest Win10 x64 Graphics driver release for the Lenovo ThinkPad P51s, the driver is no longer detected and installed.

I run ThinInstaller during an SCCM Task Sequence so only noticed this post build – the Microsoft default display driver was installed instead of the Intel HD 620.

The faulty Lenovo driver package is: n1ndt16w_10

The detection failure happens on an Lenovo ThinkPad P51s System Model 20HCS12D00

Intel HD Graphics 620 version:

Missing Hardware ID: PCI\VEN_8086&DEV_5916&SUBSYS_224817AA

Open the n1ndt16w_10 package in Update Retriever:


On the Define Dependencies tab, add a new PNP ID:


When ThinInstaller runs again, it will be able to detect the Intel HD 620 is installed in the laptop and run this package installer.

I found this issue by enabling debug in the ThinInstaller.exe.configuration file located in the ThinInstaller directory. I saw that none of the PNP ID’s matched.


SCCM Data Warehouse – SQL SSL certificates on AlwaysOn cluster

I was setting up the new Data Warehouse feature of SCCM on our corporate SQL 2016 AlwaysOn cluster.

You will notice that after you have installed the DW and try to run a report, you may get this error:

An error has occurred during report processing. (rsProcessingAborted) Cannot create a connection to data source ‘AutoGen__39B693BB_524B_47DF_9FDB_9000C3118E82_’. (rsErrorOpeningConnection) A connection was successfully established with the server, but then an error occurred during the pre-login handshake. (provider: SSL Provider, error: 0 – The certificate chain was issued by an authority that is not trusted.)

The Data Warehouse reporting data source has this parameter: TrustServerCertificate=false

You can change this to true – but it will get set back to false by SCCM 🙂

The correct way forward – in my my opinion, is to install trusted certificates from your root CA on the SQL Instances hosting the DW database. There are other posts on installing the self signed certificate as a trusted root CA onto the reporting server, but I don’t like using self signed certs as they are difficult to track and revoke.

This solution was tested on a 3 node AlwaysOn SQL 2016 cluster running on Server 2016 VMs in Azure.

The certificates are requested from the internal publishing CA’s using powershell.

The SQL instance where the Data Warehouse database exists will likely have >1 Availability Group and Availability Group Listener (AGL), therefore when requesting the certificate, ALL the AGLs netbios and fqdn’s should be included in the Subject Alternative Name (SAN) properties, as well as the hostname.

I ran this PowerShell on each of the 3 SQL nodes to request a unique certificate.

# Create and submit a request
$Hostname = [System.Net.Dns]::GetHostByName(($env:computerName)).Hostname
$template = "WebServer2008"
$SAN = $Hostname,"AGL1-INSTANCE1","AGL1-INSTANCE1.domain.local","AGL2-INSTANCE1","AGL2-INSTANCE1.domain.local","AGL3-INSTANCE1","AGL3-INSTANCE1.domain.local","AGL4-INSTANCE1","AGL4-INSTANCE1.domain.local"
Get-Certificate -Template $template -DnsName $SAN -CertStoreLocation cert:\LocalMachine\My

Now, hop onto your issuing CA and approve the pending request for the certificate.

Back on the SQL nodes, retrieve the requested certificate from the CA. It will be installed into the machines Personal store.

# Now the certificate is approved, you can retrieve the request:
Get-Certificate -Request (Get-ChildItem -Path cert:\LocalMachine\Request)

Open an MMC and add the Certificates snap-in targeted at the local computer store. Find the newly installed certificate (The one with the above SANs in it) and retrieve the certificate thumbprint.

On each of the SQL Nodes, change the following registry value so that it matches the thumbprint of the newly approved certificate:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft SQL Server\MSSQL13.INSTANCE1\MSSQLServer\SuperSocketNetLib]

The SQL Server service for the instance will need restarting following this Registry update.

Before testing the SCCM Data Warehouse reports, you can try in SQL Server Management Studio using these options:


SCCM Compliance – enforce Unified Write Filter on Windows 10

I am in the final stages of deploying a new solution to libraries across a borough in London. The solution involved replacing a Windows 7 physical desktop that had the Deep Freeze product, with Windows 10.

I didn’t want to use Deep Freeze as the console is clunky and it’s yet another agent to manage on the client OS. Windows 10 has the Unified Write Filter (UWF) built-in and this would do the job perfectly.

All the desktops are managed using SCCM and SCCM fully supports the Windows write filters.

I started off looking at basic batch files calling uwfmgr.exe, but things quickly got messy, so I switched to trusty old WMI, but managed using PowerShell and SCCM of course 🙂

I’ve tried to break it down into sections.

It is best practice to have the pagefile on a separate disk when using UWF as it cannot be added to the exclusions list, so here we have a function that we can pass in your new volume and remove the NTFS permissions to stop normal users from fiddling:

function Remove-NTFSPermissions($folderPath, $accountToRemove, $permissionToRemove) {

    $fileSystemRights = [System.Security.AccessControl.FileSystemRights]$permissionToRemove

    $inheritanceFlag = [System.Security.AccessControl.InheritanceFlags]"ContainerInherit, ObjectInherit"

    $propagationFlag = [System.Security.AccessControl.PropagationFlags]"None"

    $accessControlType =[System.Security.AccessControl.AccessControlType]::Allow

    $ntAccount = New-Object System.Security.Principal.NTAccount($accountToRemove)

    if($ntAccount.IsValidTargetType([Security.Principal.SecurityIdentifier])) {

        $FileSystemAccessRule = New-Object System.Security.AccessControl.FileSystemAccessRule($ntAccount, $fileSystemRights, $inheritanceFlag, $propagationFlag, $accessControlType)


        $oFS = New-Object IO.DirectoryInfo($folderPath)

        $DirectorySecurity = $oFS.GetAccessControl([System.Security.AccessControl.AccessControlSections]::Access)






        return "Permissions " + $permissionToRemove + " Removed on " + $folderPath + " folder"


    return 0


The main function to enable the Unified Write Filter, configure the overlay, exclusions and pagefile.

First part of the function is to check if UWF is currently enabled or not. If we need to enable it, it will require a restart before the write filter becomes active.

function Enable-UWF {

    # Global variables
    $NAMESPACE = "root\standardcimv2\embedded"

    # Get current state of UWF
    $objUWFFilter = Get-WmiObject -Namespace $NAMESPACE -Class UWF_Filter;
    if(!$objUWFFilter) {
        write-output "`nUnable to retrieve Unified Write Filter settings. from $NAMESPACE" | out-file -FilePath $env:temp\UWF.log -Append

    # Check if UWF is enabled
    if(($objUWFFilter.CurrentEnabled)-or($objUWFFilter.NextEnabled)) {
        write-output "`nUWF Filter is enabled" | out-file -FilePath $env:temp\UWF.log -Append
    } else {
        write-output "`nUWF Filter is NOT enabled, enabling now..." | out-file -FilePath $env:temp\UWF.log -Append

        # Call the method to enable UWF after the next restart.  This sets the NextEnabled property to false.
        $retval = $objUWFFilter.Enable();
        # Check the return value to verify that the enable is successful
        if ($retval.ReturnValue -eq 0) {
            write-output "Unified Write Filter will be enabled after the next system restart." | out-file -FilePath $env:temp\UWF.log -Append
        } else {
            "Unknown Error: " + "{0:x0}" -f $retval.ReturnValue


Once the computer has restarted, SCCM compliance will run again at your specified evaluation schedule, at which point the following (also still part of the Enable-UWF function) will run to protect the C drive:

    # Only perform config if after the next restart the UWF is enabled
    $objUWFFilter = Get-WmiObject -Namespace $NAMESPACE -Class UWF_Filter;
        write-output "UWF is set to enabled after next restart, continue to check config" | out-file -FilePath $env:temp\UWF.log -Append

        # Get volume protect state
        $objUWFVolumeC = Get-WmiObject -Namespace $NAMESPACE -Class UWF_Volume -Filter "CurrentSession = false" | ? {(get-volume -DriveLetter C).UniqueId -like "*$($_.VolumeName)*"}

        # Check if C is protected
            write-output "C Drive not protected, will enable protection now.." | out-file -FilePath $env:temp\UWF.log -Append
            #enable protection
            #$retval = $objUWFVolumeC.Protect()
            uwfmgr.exe volume protect c:
             # Check the return value to verify that it was successful
            #if ($retval.ReturnValue -eq 0) {
            #    write-host "Unified Write Filter will protect the C drive after the next system restart." -ForegroundColor Green
            #} else {
            #    "Unknown Error: " + "{0:x0}" -f $retval.ReturnValue

Set the overlay size based on the % of free space remaining on the disk:

    # Overlay size and type

        $objUWFOverlayConfig = Get-WmiObject -Namespace $NAMESPACE -Class UWF_OverlayConfig -Filter "CurrentSession = false"
        If($objUWFOverlayConfig.MaximumSize -le 1024){
            # need to set maximum size
            $OverlaySize = (Get-Volume -DriveLetter C).SizeRemaining-((Get-Volume -DriveLetter C).SizeRemaining/2) | % {[math]::truncate($_ /1MB)}
            write-output "`nTry to set overlay max size to $OverlaySize MB." | out-file -FilePath $env:temp\UWF.log -Append
            $WarningSize = [math]::Round($OverlaySize/10*8)
            $CriticalSize = [math]::Round($OverlaySize/10*9)
            uwfmgr.exe overlay set-warningthreshold $WarningSize
            uwfmgr.exe overlay set-criticalthreshold $CriticalSize

        If($objUWFOverlayConfig.Type -ne 1){
            # Set overlay type to Disk based
            write-host "`nTry to set overlay type to Disk based" -ForegroundColor Yellow

Set all the file and registry exclusions based on best practice and Microsoft recommendations (links included in the code below):

# File exclusions

        $objUWFVolumeC = Get-WmiObject -Namespace $NAMESPACE -Class UWF_Volume -Filter "CurrentSession = false" | ? {(get-volume -DriveLetter C).UniqueId -like "*$($_.VolumeName)*"}
        $FileExclusionList = @(
           #Exclusions for Defender and SCEP https://msdn.microsoft.com/en-us/library/windows/hardware/mt571986(v=vs.85).aspx
           "\ProgramData\Microsoft\Microsoft Security Client", `
           "\ProgramData\Microsoft\Windows Defender", `
           "\Program Files\Windows Defender", `
           "\Program Files (x86)\Windows Defender", `
           "\Users\All Users\Microsoft\Microsoft Security Client", `
           "\Windows\WindowsUpdate.log", `
           "\Windows\Temp\MpCmdRun.log", `
           #BITS: https://msdn.microsoft.com/en-us/library/windows/hardware/mt571989(v=vs.85).aspx
           "\Users\All Users\Microsoft\Network\Downloader", `

           "\Windows\wlansvc\Policies", `
           "\Windows\dot2svc\Policies", `
           "\ProgramData\Microsoft\wlansvc\Profiles\Interfaces", `


        write-host "`n"

        ForEach($File in $FileExclusionList){

                write-host "$File needs to be added to exclusions"


        # Reg exclusions
        $objUWFRegFilter = Get-WmiObject -Namespace $NAMESPACE -Class UWF_RegistryFilter -Filter "CurrentSession = false"
        $RegExclusionList = @(

            #Exclusions for Defender and SCEP https://msdn.microsoft.com/en-us/library/windows/hardware/mt571986(v=vs.85).aspx
            "HKLM\SOFTWARE\Microsoft\Windows Defender", `
            "HKLM\SOFTWARE\Microsoft\Microsoft Antimalware", 

            "HKLM\Software\Microsoft\Windows\CurrentVersion\BITS\StateIndex", `
            "HKLM\SOFTWARE\Policies\Microsoft\Windows\Wireless\GPTWirelessPolicy", `
            "HKLM\SOFTWARE\Policies\Microsoft\Windows\WiredL2\GP_Policy", `
            "HKLM\SYSTEM\CurrentControlSet\services\Wlansvc", `
            "HKLM\SYSTEM\CurrentControlSet\services\WwanSvc", `
            "HKLM\SYSTEM\CurrentControlSet\services\dot3svc", `
            "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Time Zones", `


        ForEach($Reg in $RegExclusionList){


                write-host "$Reg needs to be added to exclusions"



    } else {

        write-host "UWF is not set to enabled on the next restart, will not check config"


Create a new volume off of the free space on the disk which will will be used to host the pagefile. Once the volume is created, set the PageFileSetting to use this new drive:

 # Pagefile creation on a separate volume
    $PageFileDriveLetter = "P"
    $PageFileDriveSizeGB = 5
    # Check page file does not exist
    $PFUsage = Get-WmiObject -Class Win32_PageFileUsage -Property Name
    If(!($PFUsage) -or ($($PFUsage.Name) -eq "C:\pagefile.sys")){
        Write-Warning "Pagefile does not exist, will create one on a $PageFileDriveLetter drive"

        # create page file drive if does not exist
        $PageFileDrive = Get-CimInstance -ClassName CIM_StorageVolume -Filter "Name='$($PageFileDriveLetter):\\'"

            Write-Warning -Message "Failed to find the DriveLetter $PageFileDriveLetter specified, creating new volume now...."
            $CVol = get-volume -DriveLetter C
            $VolSizeRemaining = [int]($CVol.SizeRemaining /1GB).ToString(".")
            If($VolSizeRemaining -lt $PageFileDriveSizeGB){
                Write-Error "Not enough free space on the C drive to create a new volume for the page file"
            } else {
                write-host "Enough free space on the C drive is available to create the new $PageFileDriveLetter drive"
                #enable optimise drives service (defrag) otherwise resize fails
                Set-Service -Name defragsvc -StartupType Manual -ErrorAction SilentlyContinue

                $NewCDriveSize = $CVol.Size-"$($PageFileDriveSizeGB)GB"
                write-host "Resizing C: from $($CVol.Size) to $NewCDriveSize"
                Get-Partition -DriveLetter C | Resize-Partition -Size $NewCDriveSize -ErrorAction Stop
                write-host "Resized C to $NewCDriveSize. Now creating new $PageFileDriveLetter drive from the free space..."
                # Create new partition
                Get-Volume -DriveLetter C | Get-Partition | Get-Disk | New-Partition -UseMaximumSize -DriveLetter $PageFileDriveLetter | Format-Volume


        } else {
            write-host "$PageFileDriveLetter already exists"

        write-host "Creating page file on $PageFileDriveLetter drive"
        New-CimInstance -ClassName Win32_PageFileSetting -Property  @{Name= "$($PageFileDriveLetter):\pagefile.sys"} -ErrorAction Stop | Out-Null
        $InitialSize = [math]::Round((get-volume -DriveLetter $PageFileDriveLetter).SizeRemaining /1MB /10 *9)
        $MaximumSize = [math]::Round((get-volume -DriveLetter $PageFileDriveLetter).SizeRemaining /1MB /10 *9)
        # http://msdn.microsoft.com/en-us/library/windows/desktop/aa394245%28v=vs.85%29.aspx            
        Get-CimInstance -ClassName Win32_PageFileSetting -Filter "SettingID='pagefile.sys @ $($PageFileDriveLetter):'" -ErrorAction Stop | Set-CimInstance -Property @{
            InitialSize = $InitialSize ;
            MaximumSize = $MaximumSize ; 
        } -ErrorAction Stop
        Write-Verbose -Message "Successfully configured the pagefile on drive letter $DriveLetter"

    } else {

        write-host "Pagefile already exists: $($PFUsage.Name)"


Bringing it all together, calling the functions above, and installing the UWF feature if its not currently:

$UWF_Feature = (Get-WindowsOptionalFeature -Online -FeatureName Client-UnifiedWriteFilter -ErrorAction SilentlyContinue).State

If($UWF_Feature -eq "Disabled"){

    write-host "Not installed"
    Enable-WindowsOptionalFeature -Online -FeatureName Client-UnifiedWriteFilter -All -ErrorAction SilentlyContinue

    write-host "Please run this script again after a restart, to enable UWF filter" -ForegroundColor Yellow


    exit 3010

} else {

    write-host "`nClient-UnifiedWriteFilter WindowsOptionalFeature installed, now configure UWF" -ForegroundColor Green
    Enable-UWF -ErrorAction SilentlyContinue

    If(test-path p:){
        $folder = "P:\"
        Remove-NTFSPermissions $folder "Authenticated Users" "Modify"
        Remove-NTFSPermissions $folder "Users" "ReadAndExecute"


Download all Office 2016 updates with PowerShell and SCCM

Hi Guys,

Sorry for the delay, been working on a big project to rollout thin clients across libraries in a London borough. I will be writing up a collection posts which will make up the automation of a cloud based VDI solution in Azure, starting off today with keeping the Office 2016 MSI/Volume License edition app up to date in SCCM.

When deploying any modern Office version with SCCM, you want to keep it up to date by adding all the latest .msp files to the /updates folder.

I adapted some popular scripts found online  and added what I thought were cool additions.

This one: maintaining-your-office-2016-installation-source involved creating a new SUG and SU Package in SCCM, a bit yucky.

This one: download-office-2016-proplus-x86-updates had a static list that has to be maintained by the script owner and used custom guids to name the files.

Both these issues are ‘resolved’ using the following code.

    • Access to the ConfigManager PSD1 PoSh module. You can load the module in a Admin PoSh prompt like:
        $ConfigMgr_psd1_path = $Env:SMS_ADMIN_UI_PATH.Substring(0,$Env:SMS_ADMIN_UI_PATH.Length-5) + '\ConfigurationManager.psd1'

        Import-Module $ConfigMgr_psd1_path
  • SCCM Sofware Updates sync configured to download Office 2016 metadata
  • Full Administrator access to SCCM Primary Site Server
$siteserver = "srv-sccm.domain.local"
$sitecode = "AB0"
$class = "SMS_SoftwareUpdate"
$NameSpace = "root\SMS\Site_$sitecode"
$StagingLocation = "T:\O2016_Updates"
$MSPsFolder = "$StagingLocation\ready"</code>

Function ConvertFrom-Cab
    $comObject = "Shell.Application"
    Write-Verbose "Creating $comObject"
    $shell = New-Object -Comobject $comObject
    if(!$?) { $(Throw "unable to create $comObject object")}
    Write-Verbose "Creating source cab object for $cab"
    $sourceCab = $shell.Namespace("$cab").items()
    if(-not (Test-Path $destination))
        Write-Verbose "Creating destination folder object for $destination"
        new-item $destination -ItemType Directory
    $DestinationFolder = $shell.Namespace($destination)
    Write-Verbose "Expanding $cab to $destination"
    ForEach($Cabitem in $sourceCab){
        If($Cabitem.name -like "*.msp"){
            Rename-Item -Path "$destination\$($Cabitem.name)" -NewName ($fileName)

Remove-Item $StagingLocation -Force -Confirm:$False -Recurse
$Office2016Updates = Get-CMSoftwareUpdate -Name "*Microsoft*2016*32-Bit*" -Fast | ? {($_.IsExpired -ne "False") -and ($_.IsSuperseded -ne "False")}
md $StagingLocation

ForEach($Update in $Office2016Updates){
    $CI_ID = $Update.CI_ID
    $ContentID = (get-wmiobject -ComputerName $siteserver -Query "select * from SMS_CItoContent where ci_id=$CI_ID" -Namespace $NameSpace).ContentID
    $objContent = Get-WmiObject -ComputerName $siteserver -Namespace $NameSpace -Class SMS_CIContentFiles -Filter "ContentID = $ContentID"
    $Filename1 = "KB$((([uri]$Update.LocalizedInformativeURL).AbsolutePath -split "/")[2])"
    $CabFileName = $objContent.Filename
    $FileName2 = ($CabFileName -split ".cab")[0]
    $FileNameWithoutExtension = $FileName2 + "_" + $Filename1
    write-host "FileNameWithoutExtension will be: $FileNameWithoutExtension"
    $URL = $objContent.SourceURL
    write-host "$URL" -ForegroundColor Green
        $FileNamePath = "$StagingLocation\$CabFileName"
        write-host "FileNamePath = $FileNamePath"
        Start-BitsTransfer -Source $URL -Destination $FileNamePath
        If(Test-Path $FileNamePath)
            Write-Output "$FileNamePath found, extracting files from cab..."
            ConvertFrom-Cab -cab $FileNamePath -destination $MSPsFolder -filename $($FileNameWithoutExtension+".msp")
            write-host "Deleting items cabs from $StagingLocation"
            Get-ChildItem -Path $StagingLocation -File -Filter *.cab | Remove-Item -Force -Confirm:$false
            write-host "Deleting items xmls from $MSPsFolder"
            Get-ChildItem -Path $MSPsFolder -File -Filter *.xml | Remove-Item -Force -Confirm:$false
        write-host "stopping here"

In your output folder $MSPsFolder you will have all the MSPs you need to copy into the /updates folder in the Office 2016 app/package source.