Today's topic is about the following new computer scenario with SCCM 2012 R2 and specifically, an MDT 2013 integrated Task Sequence: Lets...
Using Model variable for Lenovo systems in MDT
I have been pushing my customers for quite some time to use the Model variable in the task sequences for OS Deployment instead of using direct WMI...
Detect Client Connectivity and Trigger Machine Policy Evaluation
Hi. My name is Jesse, and I’m a script-aholic. I also enjoy sleep, which is typically what motivates me to automate many processes using Powershell....

BUG: SCCM 2012 Client fails to initialize for up to an hour
BUG: SCCM 2012 SP1 or R2 Client fails to initialize for up to an hour after installation The Issue: Consider the following scenario, - Upon...
Microsoft Intune – Notes from the Field
I recently ran into an issue during a Microsoft Intune implementation where certain iOS devices were unable to enroll in the Intune service via the...
All Recent Posts
Protecting Healthcare Data on Personal Devices: Strategies and Solutions
In the age of digital healthcare, the proliferation of Bring Your Own Device (BYOD) policies has...
The Essential Role of Intune Management and Patching Strategies in Healthcare IT
In healthcare IT, the management of devices and applications is paramount, more so today as IT...
Navigating Compliance and Cybersecurity in Healthcare IT with Co-Managed Services
In the rapidly evolving world of healthcare IT, Directors and Managers are increasingly confronted...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.