Location of Task Sequence log smsts.log

Location of Task Sequence log smsts.log

The location of the task sequence log file smsts.log varies depending upon the phase of the task sequence:

  • In Windows PE BEFORE Format and Partition Disk step: X:\Windows\temp\smstslog\smsts.log (X is the Windows PE RAM drive)
  • In Windows PE AFTER Format and Partition Disk step: X:\smstslog\smsts.log, then copied to C:\_SMSTaskSequence\Logs\smstslog\smsts.log when drive is ready
  • In the new Windows OS BEFORE the client is installed: C:\_SMSTaskSequence\Logs\smstslog\smsts.log
  • In Windows AFTER the client is installed: C:\Windows\CCM\Logs\smstslog\smsts.log
  • In Windows AFTER the task sequence completes: C:\Windows\CCM\Logs\smsts.log

References

How to mount wim boot image with DISM command?

How to mount wim boot image with DISM command?

Sometimes you may want to customize your boot image. But you need a way to navigate through the boot image. Here is the way with DISM.

Steps:

  1. Determine the index of the image.
Dism /Get-WimInfo /WimFile:<Wim file path>

2. Mount image

Dism /Mount-Wim /WimFile:<Wim file path> /Index:<Index number> /MountDir:<Mount folder>

3. Unmount the image and commit/save the change

Dism /Unmount-Wim /MountDir:<Mount folder> /Commit

To discard changes:

Dism /Unmount-Wim /MountDir:<Mount folder> /Discard

You can also use PowerShell command Mount-WindowsImage to mount image and to Save-WindowsImage save changes to image and Dismount-WindowsImage to unmount image.

References

PXE OSD failed with “System partition not set”

PXE OSD failed with “System partition not set”

ISSUE

PXE OSD failed with “System partition not set”

The task sequence OSD goes into a legacy BIOS partition and failed at the partition step.

ERRORS

smsts.log

TSManager    800 (0x320)    The condition for the action (Partition Disk 0 - BIOS) is evaluated to be true
TSManager    800 (0x320)    Successfully completed the action (Partition Disk 0 - Physique 80/20) with the exit win32 code 0
ApplyOperatingSystem    1552 (0x610)    System root for target OS is C:\Windows, System drive is C:
ApplyOperatingSystem    1552 (0x610)    OSArchitecture=X64
ApplyOperatingSystem    1552 (0x610)    OS version is 10.0 ( OS system file version found to be 10.0.19041.1202 )
ApplyOperatingSystem    1552 (0x610)    Successfully loaded a source BCD boot system
ApplyOperatingSystem    1552 (0x610)    SetupNewOS: Loaded source boot system from target volume "C:\"
ApplyOperatingSystem    1552 (0x610)    System partition not set
ApplyOperatingSystem    1552 (0x610)    Unable to find the partition that contains the OS boot loaders. Please ensure the hard disks have been properly partitioned
Unspecified error (Error: 80004005; Source: Windows)
ApplyOperatingSystem    1552 (0x610)    Bcdboot failed! bcdboot.exe C:\Windows /l en-US failed (15299)

Generally, after partition completes we should see a System type volume. Verify this by running the command diskpart list volume. For example, the line in bold shows a partition of System type. It size is generally very small, eg. 500 M.

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
  Volume 0     C   :            NTFS   Partition    476 GB  Healthy    Boot
  Volume 1     D   Save Me      NTFS   Partition    475 GB  Healthy
  Volume 2         Windows RE   NTFS   Partition    499 MB  Healthy    Hidden
  Volume 3         SYSTEM       FAT32  Partition    499 MB  Healthy    System
  Volume 4                      NTFS   Partition    700 MB  Healthy    Hidden

This is exactly what happened in this case.

Solution

  1. Go to “Partition Disk 0 – BIOS
  2. Add one volume as shown in Figure 1 and Figure 2.
    • Disk type: Starndard(MBR)
    • Partition type: Primary
    • Tick Make this the boot partition
    • Tick Do not assign a drive letter to this partition
    • File system: NTFS

Figure 1

Figure 2

References

Install applications in OSD failed with 0x80072f0c

Install applications in OSD failed with 0x80072f0c

The customer used one https-enabled management point for OSD. Other management points are non https-enabled.

They created a bootable media with selecting Dynamic media, which allows a management point to redirect the media to another management point, based on the client location in the site boundaries. Refer to the document on how to create bootable media. That option brought application policy download issues afterwards as below.

CIDownloader.log:

CIDownloader    5416 (0x1528)    CIDownloaderJob({43C5526D-D617-40CF-8A8C-23E9C69267B4}): CI with ModelName ScopeId_1DE19AF0-FD8E-47D4-8739-F9CDDEC66C8A/RequiredApplication_f6e3dd75-4212-4c92-8945-30ff3f1e9a9a, Version 9. Model:(null) added to job.
CIDownloader    1568 (0x620)    Failed to read 'SecurityToken' from registry
CIDownloader    1732 (0x6c4)    CCIDownloader::ParseDtsMessage - Dts failed with error code: 0x80072f0c. CI Downloader will retry.
CIDownloader    1732 (0x6c4)    Failed to read 'SecurityToken' from registry
CIDownloader    1732 (0x6c4)    In provisioing mode without authenticator.
CIDownloader    1732 (0x6c4)    UpdateURLWithTransportSettings(): NEW URL - https://contosomp.lab.com:443/SMS_MP
CIDownloader    1568 (0x620)    CCIDownloader::ParseDtsMessage - Package download info - Pkg loader job id: {43C5526D-D617-40CF-8A8C-23E9C69267B4}
CIDownloader    1568 (0x620)    CIDownloaderJob({43C5526D-D617-40CF-8A8C-23E9C69267B4}): Received Dts failure message during CI download.
CIDownloader    1568 (0x620)    CIDownloaderJob({43C5526D-D617-40CF-8A8C-23E9C69267B4}): CCIDownloaderJob::QueueRetry - Job is set to fail immediately on error - no retries.
CIDownloader    1568 (0x620)    CIDownloaderJob({43C5526D-D617-40CF-8A8C-23E9C69267B4}): QueueRetry failed (0x87d00267).
CIDownloader    1568 (0x620)    CIDownloaderJob({43C5526D-D617-40CF-8A8C-23E9C69267B4}): NotifyClientOfJobFailure

Bits job history:

GUID: {F4F927D6-51D4-4FFA-AA5D-5CD0C0E2BA81} DISPLAY: 'CCMDTS Job'
TYPE: DOWNLOAD STATE: ERROR OWNER: NT AUTHORITY\SYSTEM
PRIORITY: LOW FILES: 0 / 126 BYTES: 0 / UNKNOWN
CREATION TIME: 18/01/2022 01:31:07 p. m. MODIFICATION TIME: 18/01/2022 01:31:08 p. m.
COMPLETION TIME: UNKNOWN ACL FLAGS:
NOTIFY INTERFACE: UNREGISTERED NOTIFICATION FLAGS: 11
RETRY DELAY: 60 NO PROGRESS TIMEOUT: 28800 ERROR COUNT: 2
PROXY USAGE: NO_PROXY PROXY LIST: NULL PROXY BYPASS LIST: NULL
ERROR FILE:    https://contosomp.lab.com:443/SMS_MP/.sms_dcm?Id&DocumentId=ScopeId_1DE19AF0-FD8E-47D4-8739-F9CDDEC66C8A/DeploymentType_4a55dd27-d452-4f6e-9afe-74f4e2f4f25b/3/PROPERTIES&Hash=F9B973D1862B2D5538F7CB560EBFAD3AECEF636FA6EB9CCF38F039C2B076F2CD&Compression=zlib -> C:\WINDOWS\CCM\CIDownloader\Staging\{A4F57BA7-C8A9-4902-87C0-074BFCCAD1B5}_2.zip
ERROR CODE:    0x80190191
ERROR CONTEXT: 0x00000005

The CIDownloader reports 0x80072f0c, meaning a certificate is required to complete the request.

Error Code: 0x80072F0C (2147954444)
Error Name: WININET_E_CLIENT_AUTH_CERT_NEEDED
Error Source: Windows
Error Message: A certificate is required to complete client authentication

Why is that? The reason is that the task sequence initially contacted a NON-HTTPS-Enabled management for OSD which completed OS deployment with success. When a non-https-enabled management point is used, there would be no authenticator created during the OSD process. Without authenticator, if the client tries to contact a https-enabled management point for application installation after OS is applied application installation will fail due to being unable to provide client authentication. That is the story the customer experienced. When it comes to the installing application period, the task sequence contacted the https-enabled management, which asks for a certificate for client authentication. But the client could not provide either an authenticator or a valid certificate. If the client had happened to contact the https-enabled management point it could have succeeded.

To resolve the application installation issue, there are two ways:

  • Provide a PKI client certificate after OS is applied which can then be used for application installation
  • Make the client contact https-enabled management during whole the OSD process so that an authenticator can be created during OSD phase and used later for application installation

We opted for the second option because it is difficult to add a PKI certificate to the client during OSD process. So, we created a new bootable media and selected Site-based media this time and chose the https-enabled management as the only management for this media.

The above error was gone but a new issue came up. See below.

smsts.log:

TSMBootstrap    1524 (0x5f4)    Adapter {42908ABB-7573-419A-A05A-A828050DBC0E} is DHCP enabled. Checking quarantine status.
TSMBootstrap    1524 (0x5f4)    Sending RequestBGRContentLocations for CAS0031D
TSMBootstrap    1524 (0x5f4)    ContentLocationRequest: <ContentLocationRequest SchemaVersion="1.00" BGRVersion="1.00" ExcludeFileList=""><Package ID="CAS0031D" Version="4" DeploymentFlags="9223373136366932978"/><AssignedSite SiteCode="PRI"/><ClientLocationInfo AllowMulticast="1" AllowSuperPeer="1" DPTokenAuth="1" UseAzure="1"><ADSite Name="?"/><IPAddresses><IPAddress SubnetAddress="10.36.68.0" Address="10.36.68.175"/></IPAddresses><Adapters><Adapter Name="Ethernet" IfType="6" PhysicalAddressExists="1" DnsSuffix="my.contoso.com" Description="Lenovo USB Ethernet"/></Adapters></ClientLocationInfo></ContentLocationRequest>
TSMBootstrap    1524 (0x5f4)    Setting the authenticator.
TSMBootstrap    1524 (0x5f4)    CLibSMSMessageWinHttpTransport::Send: WinHttpOpenRequest - URL: CONTOSOMP.LAB.COM:443  CCM_POST /ccm_system_AltAuth/request
TSMBootstrap    1524 (0x5f4)    SSL, using authenticator in request.
TSMBootstrap    1524 (0x5f4)    In SSL, but with no client cert.
TSMBootstrap    1524 (0x5f4)    Request was successful.
TSMBootstrap    1524 (0x5f4)    reply from server is 'NoReply'
TSMBootstrap    1524 (0x5f4)    content location request failed
TSMBootstrap    1524 (0x5f4)    Content location request failed for CAS0031D:4. (Code 0x80004005)

smsts.log says reply from server is ‘NoReply’ from the management. It was like the client threw a stone into a black hole without getting any feedback. The root cause is that the https-enable management contosomp.lab.com was set for only internet use, that is internet-only. When it received a request from an intranet client, it just dropped that request. To solve this issue, the solution is set the https-enabled management point to: Allow intranet and internet connections.

References

Client computer started with Bootable media does not show task sequence deployed to Unknown computers collection

Client computer started with Bootable media does not show task sequence deployed to Unknown computers collection

Issue description

Client computer boot with bootable media but does not show the task sequence deployed to Unknown computers collection.

smsts.log

The following messages come from the smsts.log. To find smsts.log location, refer to this guide.

08-11-2021 00:09:57.807 TSMBootstrap 1396 (0x574) Unknown machine GUIDs: 2d1d6e4c-77fe-4904-aed2-ed62c2727373 7d3568e0-7e41-4a62-96ea-dae7f9782877
08-11-2021 00:09:57.807 TSMBootstrap 1396 (0x574) Management Point specific X86 unknown machine GUID is received at run time
08-11-2021 00:09:57.807 TSMBootstrap 1396 (0x574) Management Point specific X64 unknown machine GUID is received at run time
08-11-2021 00:09:57.807 TSMBootstrap 1396 (0x574) Downloading policy from https://contoso.test.lab.
...
08-11-2021 00:09:57.854 TSMBootstrap 1396 (0x574) Client Identity: GUID:86C1936D-883C-450F-AC6B-43108FB09C43
08-11-2021 00:09:57.854 TSMBootstrap 1396 (0x574) Netbios name: TESTCLIENT-M123456L
08-11-2021 00:09:57.854 TSMBootstrap 1396 (0x574) Client GUID = GUID:86C1936D-883C-450F-AC6B-43108FB09C43, Netbios name = TESTCLIENT-M123456L, State = Known

While “Client GUID = GUID:86C1936D-883C-450F-AC6B-43108FB09C43, Netbios name = TESTCLIENT-M123456L, State = Known” suggests the target client is a known computer. The customer also confirmed that this computer was used by a user and managed by SCCM.

SOLUTION

Delete the client TESTCLIENT-M123456L from SCCM console and the policy should appear.

References

PXE boot issue – “no advertisements found” and “found optional advertisement”

PXE boot issue – “no advertisements found” and “found optional advertisement”

When it comes to PXE boot, various problems can occur. Recently a customer turned to me reporting that their testing physical machine failed to PXE boot. One of the key information was that the testing machine was in a different subnet than the pxe-enabled distribution point. So, I asked them to do a test in the same subnet of the distribution point. They did and told me that there was no problem in that case. It is obvious that there is a problem with the network between the two subnets, that is the subnet where the testing client was and the one which the distribution point belonged to.

I asked them to capture a network packet file from both the distribution point and the testing client. The network trace file capture on the distribution point showed that no DHCP request ever received from the testing client, though the testing client could send DHCP request to the DHCP server and could get a valid IP address. Coupled with the fact that their distribution point and the testing client computer were not on the same subnet, I asked them to verify if IP Helper was properly configured (refer here and here). It took days before they came back to me again telling me that IP Helper has been configured.

However, a new issue arose. The testing client shows the following page.

smspxe.log from the distribution point shows the following messages –

12-15-2020 15:57:39.943 SMSPXE 2744 (0xab8) 00:D8:61:AE:24:3D, 40364D80-1925-11EA-BB2A-98251BAD1100: Device is in the database.
12-15-2020 15:57:39.943 SMSPXE 2744 (0xab8)
Operation: BootReply (2) Addr type: 1 Addr Len: 6 Hop Count: 0 ID: 3D24AE64
Sec Since Boot: 16 Client IP: 010.138.001.168 Your IP: 000.000.000.000 Server IP: 192.168.210.121 Relay Agent IP: 000.000.000.000
Addr: 00:d8:61:ae:24:3d:
BootFile: smsboot\x86\wdsnbp.com
Magic Cookie: 63538263
Options:
Type=53 Msg Type: 5=Ask
Type=54 Svr id: 192.168.210.121
Type=97 UUID: 00804d36402519ea11bb2a98251bad1100
Type=60 ClassId: PXEClient
Type=250 02010105040000002903020014040200ba062c436f6e66696775726174696f6e204d616e61676572206973206c6f6f6b696e6720666f7220706f6c6963792e0b0101
12-15-2020 15:57:56.509 SMSPXE 2744 (0xab8) 00:D8:61:AE:24:3D, 40364D80-1925-11EA-BB2A-98251BAD1100: no advertisements found
12-15-2020 15:57:56.556 SMSPXE 2744 (0xab8) 00:D8:61:AE:24:3D, 40364D80-1925-11EA-BB2A-98251BAD1100: No boot action. Aborted.

Note that the log says the device is in the database but no advertisements found and thus boot action was aborted. This is an important hint indicating that the device was not in a proper collection to which the task sequence was deployed. After they put the testing client into a collection and initiated a reboot as I had suggested, the previous issue disappeared, but the testing client computer stopped at the screen below.

Spotting the message “Press F12 for network service boot“, I asked the customer if he did press on F12 and he replied with a firm “Yes”. Okay. Investigation had to continue. Turning to smspxe.log, which, however, showed no errors at all –

12-16-2020 15:05:00.957 SMSPXE 5828 (0x16c4) ============> Received from client:
12-16-2020 15:05:00.957 SMSPXE 5828 (0x16c4)
Operation: BootRequest (1) Addr type: 1 Addr Len: 6 Hop Count: 0 ID: B3C3303F
Sec Since Boot: 0 Client IP: 010.138.001.177 Your IP: 000.000.000.000 Server IP: 000.000.000.000 Relay Agent IP: 000.000.000.000
Addr: 04:0e:3c:30:c3:b3:
Magic Cookie: 63538263
Options:
Type=53 Msg Type: 3=Request
Type=60 ClassId: PXEClient
Type=97 UUID: 001b705596f4a6ea11b39e040e3c30c3b3
Type=93 Client Arch: Intel x86PC
Type=250 0d0208000e010101020006050400000038ff
Type=55 Param Request List: 03013c8081828384858687
12-16-2020 15:05:00.957 SMSPXE 2744 (0xab8) Getting boot action for unknown machine: item key: 2046820353
12-16-2020 15:05:00.972 SMSPXE 2744 (0xab8) Not in SSL.
12-16-2020 15:05:00.988 SMSPXE 2744 (0xab8) Request using architecture 9.
12-16-2020 15:05:00.988 SMSPXE 2744 (0xab8) Not in SSL.
12-16-2020 15:05:01.004 SMSPXE 2744 (0xab8) Client boot action reply:
12-16-2020 15:05:01.004 SMSPXE 2744 (0xab8) Request retry.
12-16-2020 15:05:01.004 SMSPXE 2744 (0xab8) Not in SSL.
12-16-2020 15:05:01.019 SMSPXE 2744 (0xab8) Client boot action reply: e26f306a-c738-41d2-aa83-9cb460ae18be
12-16-2020 15:05:01.019 SMSPXE 2744 (0xab8) 04:0E:3C:30:C3:B3, 9655701B-A6F4-11EA-B39E-040E3C30C3B3: found optional advertisement S012000B
12-16-2020 15:05:01.019 SMSPXE 2744 (0xab8) Looking for bootImage S0100002
12-16-2020 15:05:01.035 SMSPXE 2744 (0xab8) Not in SSL.
12-16-2020 15:05:01.050 SMSPXE 2744 (0xab8) Not in SSL.

But “found optional advertisement” caught my eye. This message told us that the task sequence was deployed as Available and so it will prompt a message asking you to press F12 (refer here).

Looking at the network trace file captured on the testing client end, we could see DHCP requests were sent to the distribution point for wdsnbp.com and pxeboot.com files. All looked quite good. However, no more DHCP requests! Noting seemed wrong here. I scratched my head, not knowing what actually happened.

Then, I called the customer again asking him how he pressed F12 and he told me that he pressed F12 only once at the sight of the “Press F12 for network service boot” message on the screen. Only once! That was not enough… That only-once press on F12 would only bring the client into pxe boot but would not kick off the optional advertisement. With that thought, I asked him to keep on pressing down and up on F12. As I had expected, the issue was gone and pxe boot succeeded in the end.

References

Design a site like this with WordPress.com
Get started