Secr Mms CCM
Secr Mms CCM
Version 9.8.9.0
(November 2017)
Protect your valuable data
secRMM SCCM Compliance Settings Administrator Guide
If you have any questions regarding your potential use of this material, contact:
Squadra Technologies, LLC
7575 West Washington Ave
Suite 127-252
Las Vegas, NV 89128 USA
www.squadratechnologies.com
email: [email protected]
Refer to our Web site for regional and international office information.
TRADEMARKS
Squadra Technologies, secRMM are trademarks and registered trademarks of Squadra Technologies, LLC. Other
trademarks and registered trademarks used in this guide are property of their respective owners.
Disclaimer
The information in this document is provided in connection with Squadra Technologies products. No license, express
or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection
with the sale of Squadra Technologies products. EXCEPT AS SET FORTH IN Squadra Technologies's TERMS AND
CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, Squadra Technologies ASSUMES
NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO
ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR
A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL Squadra Technologies BE LIABLE FOR ANY
DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING
OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF Squadra Technologies HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES. Squadra Technologies makes no representations or warranties with respect
to the accuracy or completeness of the contents of this document and reserves the right to make changes to
specifications and product descriptions at any time without notice. Squadra Technologies does not make any
commitment to update the information contained in this document.
Squadra Technologies Excel AddIn Administrator Guide
Created - August 2011
Page 2
secRMM SCCM Compliance Settings Administrator Guide
Contents
INTRODUCTION ..................................................................................................................................................... 5
INSTALLATION ....................................................................................................................................................... 7
Page 3
secRMM SCCM Compliance Settings Administrator Guide
TROUBLESHOOTING............................................................................................................................................. 78
Page 4
secRMM SCCM Compliance Settings Administrator Guide
Introduction
Security Removable Media Manager (secRMM) integrates into Microsoft System Center Configuration
Manager (SCCM) 2012 by providing a SCCM console extension which provides centralized configuration,
SCCM status messages and SCCM reports. secRMM can also be deployed into your domain using SCCM.
http://squadratechnologies.com/Products/secRMM/secRMMDocumentation.aspx
The SCCM secRMM console extension builds on top of the base SCCM
Compliance Settings feature. Implementing compliance settings for your
corporate removable media policy rounds out the endpoint protection
provided by Microsoft via:
1. Antimalware Policies
2. Windows Firewall Policies
3. BitLocker Policies (i.e. encryption technology)
4. Software updates/patching
The secRMM SCCM User Interface (UI) is identical to the secRMM UIs in
the Computer Management MMC and the Active Directory Group Policy
Object Editor (AD GPO).
Page 5
secRMM SCCM Compliance Settings Administrator Guide
secRMM records removable media events into an event log (named secRMM) and also into the default
security event log on each computer where secRMM is installed. You can setup SCCM so that the
secRMM events are displayed in the SCCM console as SCCM “status messages”. This allows you to see
all the removable media events in one central location. If you have System Center Operations Manager
(SCOM) installed in your environment, you can use the SCOM secRMM “Management Pack” to
centralize your removable media events as well.
Page 6
secRMM SCCM Compliance Settings Administrator Guide
If you setup SCCM to collect the removable media events from the secRMM event logs (i.e. SCCM status
messages), you can then also load the SCCM secRMM reports into SCCM.
Please follow the steps in the next section to perform the installation of the SCCM secRMM components
mentioned above.
Installation
Page 7
secRMM SCCM Compliance Settings Administrator Guide
If you have not already done so, please install the SCCM Console on the system where you want to run
the secRMM SCCM console extension.
Prerequisites
Page 8
secRMM SCCM Compliance Settings Administrator Guide
You can verify that “Compliance Settings” are enabled on the client Windows computer(s) by going into
the SCCM client program (in “Control Panel”->”System and Security”->Configuration Manager-
>[tab]Components):
To use the secRMM SCCM Console Extension to configure the secRMM settings, you need to have the
following SCCM Security Roles assigned to your SCCM account:
1. Compliance Settings Manager
2. Endpoint Protection Manager
Note that if you are an SCCM Administrator, you will have these SCCM Security Roles assigned to your
SCCM account.
Page 9
secRMM SCCM Compliance Settings Administrator Guide
Extending the SCCM Console is an easy task. It involves copying one XML file and four dlls into the
correct SCCM directory. There is an Install.cmd which will perform copying the files to the correct
directories for you.
1. Download the secRMMSCCMConsoleExtension.zip file from the Squadra Technologies web site.
a. On the Squadra Technologies Home Page, click the “System Center” logo
Page 10
secRMM SCCM Compliance Settings Administrator Guide
Page 11
secRMM SCCM Compliance Settings Administrator Guide
7. From the command window you opened in step 4 above, run the Install.cmd by typing
Install.cmd and then hitting the enter key.
The Install.cmd logic copies the RemovableMedia.xml, secRMMSCCM2012ConsoleExtension.dll,
secRMMMMCSnapInSelectUsers.dll, secRMMMMCSnapInSelectUsersLib.Interop.dll and
secRMM10.dll into the correct SCCM directories.
Page 12
secRMM SCCM Compliance Settings Administrator Guide
The secRMM SCCM Console Extension is now available in the SCCM Console on this particular Windows
Computer. If you want to use the secRMM SCCM Console on other Windows computers, you will repeat
this same process on the other Windows computer(s). Note, that you do not need to have the base
secRMM product installed to use the secRMM SCCM Console Extension (with one exception) although
we highly recommend that you install secRMM on each Windows computer in your environment. The
only time you would need to also install the secRMM product on the computer running the console
extension is if you want to use the SCCMConnection property (discussed below) “Test Connection”
feature. The “Test Connection” feature calls secRMM to perform the test connection to SCCM.
Page 13
secRMM SCCM Compliance Settings Administrator Guide
Once the SCCM console is open, open the “Endpoint Protection” folder and
verify that the “Removable Media Policies” node appears.
Page 14
secRMM SCCM Compliance Settings Administrator Guide
If you need to uninstall the secRMM SCCM Console Extension, open a command window (with “Run As
Administrator”). In the command window, change directory (CD) into the temporary directory where
you unzipped secRMMSCCMConsoleExtension.zip. Be sure you first close the SCCM console before the
next step. Run the Uninstall.cmd by typing Uninstall.cmd and then hitting the enter key. The
Uninstall.cmd logic deletes the files that were installed from the SCCM directories. Once you restart the
SCCM console on this particular Windows Computer, the “Removable Media Policies” node under the
“Endpoint Protection” will be removed.
Installation of the SCCM secRMM status messages requires 3 steps. Step 1 is performed on the SCCM
site server. Step 2 is configuring the secRMM property named SCCMConnection which you can do using
the SCCM secRMM Console Extension (or Active Directory Group Policy or locally using the Computer
Management MMC). Step 3 is adding a status message query in the SCCM console to see the
“Removable Media Activity” events generated by secRMM.
1. Please take a full database backup of your SCCM database before performing the steps below
since it modifies the SCCM site control file (which, since SCCM 2012, is now stored in the
database instead of a file). https://msdn.microsoft.com/en-us/library/hh948978.aspx
To see the SCCM site control file contents, you can run a SQL query against your SCCM database:
SELECT SiteControl FROM vSMS_SC_SiteControlXML WHERE SiteCode = 'XXX'
where XXX is the 3 letter site code for your SCCM environment. Then copy the XML into a text
editor (such as Visual Studio) to review your site control file (which is XML text).
Page 15
secRMM SCCM Compliance Settings Administrator Guide
a. On the Squadra Technologies Home Page, click the “System Center” logo
Page 16
secRMM SCCM Compliance Settings Administrator Guide
7. Run the Install.cmd by typing Install.cmd and then hitting the enter key. The Install.cmd calls
the program AddSecRMMToSCCMStatusMessages.exe which updates the SCCM site control file
and adds the secRMMSCCMMsgs.dll into the SCCM status messages directories. This program
will prompt you for your SCCM 3 letter site code1. When it prompts you for the server, make
sure to put a period (“.” – the period indicates you are running on the site server) and hit enter.
1
If you do not know the SCCM 3 letter site code, you can open the SCCM console, click Administration
(in the lower left hand corner), in the tree view, go to Overview->Site Configuration->”Servers and Site
System Roles”. Now, on the right hand side of the console, you will see a list of servers. There is a
column labeled “Site Code”.
Page 17
secRMM SCCM Compliance Settings Administrator Guide
Page 18
secRMM SCCM Compliance Settings Administrator Guide
10. To verify that SCCM is now using the secRMM messages dll, you can check the smsexec.log file
and search for the text saying:
Registered this process as a source of "secRMM" events.
11. Note that if you install the SCCM console on a remote computer (i.e. not the site server), you
will still need to copy the dll named secRMMSCCMMsgs.dll from the Win32 directory to
C:\Program Files(x86)\Microsoft Configuration Manager\AdminConsole\bin\i386\00000409. If
you do not perform this step and try to open the SCCM “Status Message Viewer” against the
“Removable Media Activity” query (described in Step 3 below), the “Status Message Viewer” will
crash. As a convenience, if you install the SCCM secRMM console extension on the remote
computer, the secRMM console extension installation will copy the secRMMSCCMMsgs.dll file
for you.
secRMM needs to be able to connect to SCCM with credentials from a valid SCCM user account. You
need an Active Directory userid for this step. There are 2 things to setup for this userid to allow the
secRMM to SCCM connection:
Page 19
secRMM SCCM Compliance Settings Administrator Guide
The SCCM user account has to belong to at least one of the following SCCM “Security Roles”:
1. Full Administrator
2. Asset Manager
3. Infrastructure Administrator
4. Operations Administrator
These are the SCCM “Security Roles” that are allowed to add and delete status messages.
If you do not use the “Full Administrator” role and you plan on using secRMM “User Configurations”,
then you must also add the “Compliance Settings Manager” SCCM “Security Role”.
So, as an example, in the two screen shots below, there is a userId named
CONTOSO\secRMMSCCMConnection. This userId has the security roles: “Asset Manager” and
“Compliance Settings Manager”. The “Asset Manager” will let secRMM create SCCM “Status Messages”
and the “Compliance Settings Manager” will let secRMM create SCCM “User Collection” Policies.
Page 20
secRMM SCCM Compliance Settings Administrator Guide
The user you use must also be a member of the “SMS Admins” Group. This group has local and remote
access to the WMI SMS Provider on the SCCM primary site server. Microsoft has a TechNet article that
tells you how to verify WMI permissions to the SMS Provider at https://technet.microsoft.com/en-
us/library/bb932151.aspx. You can add a user to the “SMS Admins” Group using the “Computer
Management” MMC on the SCCM primary site server as shown in the screen shot below.
Page 21
secRMM SCCM Compliance Settings Administrator Guide
Step 3 – Create a SCCM Status Message query for “removable media” events
Within the SCCM console, under the Monitoring->”System Status” node, you can create a “status
message” query for the secRMM event data. For naming consistency, we recommend you name the
query “Removable Media Activity”.
Component = secRMM
Page 22
secRMM SCCM Compliance Settings Administrator Guide
Page 23
secRMM SCCM Compliance Settings Administrator Guide
Page 24
secRMM SCCM Compliance Settings Administrator Guide
Page 25
secRMM SCCM Compliance Settings Administrator Guide
Page 26
secRMM SCCM Compliance Settings Administrator Guide
Page 27
secRMM SCCM Compliance Settings Administrator Guide
If you are not already using reporting in your SCCM environment, you will need to set up the
environment per Microsoft’s instructions at: https://technet.microsoft.com/en-us/gg712698.aspx
1. Download the secRMMSCCMReports.zip file from the Squadra Technologies web site.
a. On the Squadra Technologies Home Page, click the “System Center” logo
Page 28
secRMM SCCM Compliance Settings Administrator Guide
2. Unzip the secRMMSCCMReports.zip file into a temporary directory on the Windows computer
where you have installed the SCCM Report Server. SCCM uses SQL Server Reporting Services
(SSRS) as its reporting engine. The SSRS database may or may not be on the same computer as
the SCCM site server. You can find out where the SSRS for SCCM is installed within the SCCM
console. Go into the Monitoring view (lower left hand corner of the console), then click the
Reporting folder. Now, on the right-hand side of the screen, at the bottom, you will see the URL
for the Report Manager. This is shown in the screen shot below.
Page 29
secRMM SCCM Compliance Settings Administrator Guide
5. Check to make sure that all 4 files that were unzipped in the Assembly sub-directory (see
screenshot above) are unblocked (see screen shot below). Windows blocks these files because
they were downloaded from the Internet.
Page 30
secRMM SCCM Compliance Settings Administrator Guide
6. In the Assembly sub-directory, edit the file named InstallAssemblyForSCCM.cmd with a text
editor (notepad for example). On line 4, change the XXX to be your 3 letter site code. Save the
file.
Page 31
secRMM SCCM Compliance Settings Administrator Guide
7. Now (run the script named) type InstallAssemblyForSCCM.cmd and hit the enter key.
8. The output of executing the script is a file named InstallSCCM_Output.rpt (see screenshot
above). This file should look like:
This assembly that loaded into the SCCM database allows the reports to parse the secRMM
event data.
Page 32
secRMM SCCM Compliance Settings Administrator Guide
10. Click the “ConfigMgr_XXX” folder (where XXX is your 3 letter site code). Within the
ConfigMgr_XXX folder, click the “New Folder” link.
11. Create a folder for the “Removable Media” reports. You are fee to name this folder whatever
makes most sense for your environment.
Page 33
secRMM SCCM Compliance Settings Administrator Guide
12. Now click the folder you just created to go into it.
13. Click the “Upload file”
Page 34
secRMM SCCM Compliance Settings Administrator Guide
Page 35
secRMM SCCM Compliance Settings Administrator Guide
16. Select the report file (i.e file extension of .rdl) and click the OK button
17. Repeat steps 14-16 for each file in the Reports\SCCM_DB sub-directory (there are 5 files).
Page 36
secRMM SCCM Compliance Settings Administrator Guide
18. Next, we need to modify the “Data Sources” of each report to be the “Data Sources” for your
SCCM database. To do this, move your mouse to the right of the report so that you see a yellow
box with an arrow pointing down (see below). Click the drop down arrow and select “Manage”.
Page 37
secRMM SCCM Compliance Settings Administrator Guide
Page 38
secRMM SCCM Compliance Settings Administrator Guide
20. A warning shows on the page stating “The shared data source reference is no longer valid”.
Click the “Browse” button to the left of this warning.
21. Under the Home button, you will see your SCCM database (named ConfigMgr_XXX where XXX is
your 3 letter site code). Click the plus sign (+) to the left of your SCCM database so it expands.
Page 39
secRMM SCCM Compliance Settings Administrator Guide
22. Under the SCCM database folder will be a long list of subfolders. At the very bottom, you will
see an icon of a yellow cylinder (see below). It will likely not have the same letters and numbers
to the right but this is the “Data Source” for your SCCM database.
Page 40
secRMM SCCM Compliance Settings Administrator Guide
23. Click the “Data Source” so it is selected and then click the OK button.
24. Click the Apply button. Now the report will use the SCCM database to get data.
Page 41
secRMM SCCM Compliance Settings Administrator Guide
SCCM/InTune reports
Page 42
secRMM SCCM Compliance Settings Administrator Guide
The SCCM/Intune secRMM reports are installed the same way as the base SCCM reports (detailed in the
instructions above). If you have Intune configured in your SCCM environment, you should consider also
loading the SCCM/Intune secRMM reports. The zip file containing the reports is on the Squadra
Technologies web site and is named secRMMSCCMInTuneReports.zip. There are 2 reports to load into
your environment. Before you load these reports, you must make one change for your environment.
Edit the file named “Mobile device USB File Write Activity.rdl” using Notepad. This file is in the
Reports\SCCM_DB subfoler (created when you unzipped secRMMSCCMInTuneReports.zip). Go to line
(ctrl-g when “word wrap” is off) 1281 (you can also do a find for XXX to get to line 1281). On line 1281,
change the XXX to your 3 character SCCM site code.
The SCCM secRMM Console Extension lets you centrally configure and deploy the secRMM
rules/policies for the computers and users in your domain. This feature utilizes the base SCCM
“Compliance Settings” component. SCCM “Compliance Settings” give you several features:
1. Setting the secRMM rule(s) on each computer or user within your domain
2. For computer configurations, a recurring check is made of the current secRMM rule values on
each computer within your domain based on the SCCM deployment schedule. For user
configurations, at user logon time, a check of the current secRMM rules for the user logging into
the Windows computer. For both, the following operations are performed:
a. Reporting if a value is not in compliance
b. Resetting the value if it is not in compliance
3. Out of the box SCCM compliance reports
The subsections below describe how to use the SCCM secRMM Console Extension.
To create a “Removable Media Policy”, you can right mouse click on either the “Removable Media
Policies” node in the tree-view, right mouse click in the white space in the details view or use the SCCM
ribbon bar. For the node in the tree-view, make sure you first left-click the node so the right side
windows says “Removable Media Policies” before you right-mouse click it.
Page 43
secRMM SCCM Compliance Settings Administrator Guide
Clicking the “Create Removable Media Policy” function will open a window that lets you specify the
secRMM property values. For details on each secRMM property, you should review the secRMM
Administrators Guide. At the very top of the “Removable Media Policy” window, please specify a name,
an optional description for the “Removable Media Policy” and select whether this policy will be for
computers or users. Then, provide the values for one or more secRMM properties. To edit a property,
double click the row and another windows will open allowing you to specify a value. At a minimum, you
should always turn on the “FailWriteIfSourceFileUnknown” secRMM property. This sets secRMM in
“monitoring mode”. You need to specify at least one secRMM property before you can save the policy.
Below are two screen shots, the first one is a Computer policy and the second is a User policy. You must
define one Computer policy and at a minimum, specify the SCCMConnection property. The SCCM logon
credentials specified in the SCCMConnection property allows secRMM to send the secRMM event data
to SCCM. Once the secRMM events data is sent to SCCM, you can view this secRMM event data using
SCCM Status Messages and SCCM secRMM reports.
Page 44
secRMM SCCM Compliance Settings Administrator Guide
Page 45
secRMM SCCM Compliance Settings Administrator Guide
NOTE: It is highly recommended that, as a minimum, you always turn on: FailWriteIfSourceFileUnknown.
Once you have specified one or more secRMM properties, click the OK button to save your changes.
You will now see the “Removable Media Policy” in the list.
Page 46
secRMM SCCM Compliance Settings Administrator Guide
Page 47
secRMM SCCM Compliance Settings Administrator Guide
If you are familiar with the deployment options, you may set the values to best suit your environment.
An important value for you to consider on the deployment dialog is the “Run every” value. This is how
often SCCM will check that the policy is compliant.
Note that for Computer (i.e. not User) configurations, you MUST check the “Remediate noncompliant
rules when supported” and the “Allow remediation outside the maintenance window” checkboxes.
Failure to check these two checkboxes will result in the policy not being applied on the computers you
are deploying the policy to.
Page 48
secRMM SCCM Compliance Settings Administrator Guide
Before closing the “Deploy Configuration Baselines” window, you must select a collection to deploy to.
Click the “Browse” button (outlined in the blue box above).
For computer policies, select “Device Collections” and then select a collection from the available device
collections defined in your environment.
For user policies, please select a collection from the available user collections.
Page 49
secRMM SCCM Compliance Settings Administrator Guide
The “computer deployment” will run on a scheduled task where the time interval will be what you
specified in the deployment dialog. SCCM sends the “computer deployment” secRMM policy down to
the SCCM clients during a “Machine Policy Retrieval & Evaluation Cycle”. You can force a “Machine
Policy Retrieval & Evaluation Cycle” to happen on a client SCCM computer using the SCCM client GUI,
under the Actions tab. This is shown in the “Verifying the computer policy deployment” section below.
A “user deployment” will run whenever the user logs into a Windows computer with secRMM installed
on it. “User deployments” take effect immediately since it is triggered by the user logging into a
computer.
Page 50
secRMM SCCM Compliance Settings Administrator Guide
To make a user deployment run whenever the user logs on to a Windows computer, the Windows
computer must be generating a “successful logon event” (event id 4624) in the security event log. This
event triggers the SCCM user policy to be checked on the computer for the user. Microsoft
documentation for event id 4624 is located at https://technet.microsoft.com/en-
us/library/dn319080.aspx. You can enable auditing (i.e. generating) successful logon events using either
a SCCM Task Sequence or Active Directory Group Policy Object (AD GPO). You should first check in your
environment to see if this event is already being generated. It is typically a common event to generate
so you may not need to do anything if the event is already being generated. The setting is in Computer
Configuration/Windows Settings/Security Settings/Advanced Audit Policy
Configuration/Audit Policies/”Logon/Logoff” and is called Audit Logon. At a minimum,
you must set the “Success” value.
Page 51
secRMM SCCM Compliance Settings Administrator Guide
Each computer that will support user policies will need a secRMM “computer policy” defined on the
computer as well. There can only be one secRMM “computer policy” on a computer. The computer
policy should be very restrictive since it is the default policy that is used if the user is not assigned to a
“user policy”. For example, the “computer policy” might put secRMM in lockdown mode (meaning no
file copies to removable storage is allowed). Regardless of the authorization or lockdown policy you
choose for the “computer policy”, you will need to specify the SCCMConnection property. The SCCM
logon credentials specified in the SCCMConnection property will allow the user policy to retrieve the
policy from SCCM.
Go to one of the Windows computers that is in the collection that you selected in the deployment.
Open the SCCM client program (in “Control Panel”->”System and Security”).
Page 52
secRMM SCCM Compliance Settings Administrator Guide
Click the Actions tab. In the list of Actions, click the “Machine Policy Retrieval & Evaluation Cycle”. Click
the “Run Now” button. This will download the “Removable Media Policy” to the computer. Note that
depending on the size of your environment, this process could take a while to complete.
To verify that the “Removable Media Policy” has been downloaded, click the Configuration tab. You will
see the “Removable Media Policy” with the name you assigned it when it has been downloaded. Notice
in the left hand screen shot below, the “Last Evaluation” column has a value of N/A and the “Compliance
State” column has a value of Unknown. This means the “Removable Media Policy” has not run yet. To
run the “Removable Media Policy”, click the Evaluate button at the bottom of the window. Once the
“Removable Media Policy” has been evaluated, the “Last Evaluation” column and the “Compliance
State” column will have valid values as shown in the right hand screen shot below.
Please note that you do not need to click the “Evaluate” button on every computer you deploy to (that
would be unrealistic). Clicking it on your test computers just makes the evaluation run “right now”. The
SCCM client programmatically performs what the “Evaluate” button does at a repeating scheduled
interval. This interval value is specified when you deploy the “Removable Media Policy”.
Once the “Removable Media Policy” has been evaluated, you can view a report by clicking on the “View
Report” button at the bottom of the window.
You cannot use the verification process for the user policies as we did for the computer policies in the
section above. This is because SCCM does not really push down the user policy. secRMM has to pull it
from SCCM when the user logs in. The best way to verify the user policy is to use the secRMM event log
on the computer where the user logged in. If the policy was being defined for the first time or the policy
needed to be “remediated”, you will see an event for each secRMM property that was modified as in
the screen shot below:
Page 53
secRMM SCCM Compliance Settings Administrator Guide
If you study the data in the red box carefully, you will see that the secRMM property named
AllowedDirectories was set by the user policy named “User Policy 1”, Revision 1 for the user
CONTOSO\Angela.
Remediation
For computer policies, when you deploy the “Removable Media Policy”, you must select to correct any
property value that is not the value you specify in the “Removable Media Policy”. This is called
remediation. If remediation does occur, the SCCM report will show this as compliant because the value
was changed back to the compliant value. To see which properties were changed, you can look in the
secRMM event log. If remediation does occur, you will see an event in the secRMM event log. The
event contains the details of the property being changed. The event is shown below:
Below is the text taken from the screen shot above. Notice on the last line, it indicates that the value
was changed back by SCCM remediation.
Page 54
secRMM SCCM Compliance Settings Administrator Guide
You can edit an existing “Removable Media Policy” by using either the secRMM Console Extension or by
using the base Microsoft SCCM Compliance Settings windows. If you edit the “Removable Media Policy”
by using either the secRMM Console Extension, it will retain the existing values in the Configuration Item
Baseline (i.e. the values you specified for the deployment part).
If you do edit a Removable Media Policy, you must re-deploy it. We are looking into how to avoid this
for a future release.
You can delete an existing “Removable Media Policy” by using either the secRMM Console Extension or
by using the base Microsoft SCCM Compliance Settings windows. If you delete the “Removable Media
Policy” by using either the secRMM Console Extension, it will delete:
1. Configuration items
2. Configuration item folder for the “Removable Media Policy”
3. Configuration baseline
4. Configuration baseline folder for the “Removable Media Policy”
SCCM Reporting
SCCM has several “Compliance and Settings Management” reports. The reports are under Monitoring-
>Reporting->Reports. These reports will include the data from the Removable Media Policies.
Page 55
secRMM SCCM Compliance Settings Administrator Guide
In addition, you can view a report directly from a SCCM client computer by using the “Configuration
Manager” User Interface located in “Control Panel “->”System and Security” (on the client computer).
Page 56
secRMM SCCM Compliance Settings Administrator Guide
The SCCM Status Messages for secRMM data are dependent on the SCCM credentials provided in the
SCCMConnection property of secRMM. You specify the secRMMConnection from within one of the
secRMM User Interface dialogs.
Page 57
secRMM SCCM Compliance Settings Administrator Guide
Page 58
secRMM SCCM Compliance Settings Administrator Guide
Page 59
secRMM SCCM Compliance Settings Administrator Guide
Since you are reading this document, it is most likely that you will use the secRMM SCCM console
extension to set the SCCMConnection property.
You have the ability to perform a “Test Connection” operation. You should try to perform this test on a
computer that is not the SCCM site server if possible. The reason to perform the test on a computer
that is not the SCCM site server is because when performed on the SCCM site server, the
userid/password test does not get performed (because you are already on the SCCM site server).
Page 60
secRMM SCCM Compliance Settings Administrator Guide
Ultimately, the secRMM SCCMConnection property gets treated like all the other secRMM properties in
that it gets deployed down to the computers running secRMM. Once the SCCMConnection property is
set on the computers, they will start sending status messages (i.e. the secRMM event data) to the SCCM
site server.
Page 61
secRMM SCCM Compliance Settings Administrator Guide
The secRMM Console Extension also provides a call to the secRMM Excel AddIn. The secRMM Excel
AddIn can load the SCCM status messages. This allows you to view the SCCM status messages from
within Excel. Please refer to the Excel AddIn Administrator Guide to install the secRMM Excel AddIn.
Note that the Excel AddIn will be installed on the same computer where the SCCM Administrator
Console is installed. The Excel AddIn uses the secRMM SCCMConnection property to communicate with
SCCM.
If you try to use the secRMM Excel AddIn from with the SCCM console and you get an “Access Denied”,
simply reopen the SCCM console using “Run As Administrator”.
Page 62
secRMM SCCM Compliance Settings Administrator Guide
You can run the SCCM “Removable Media” (i.e. secRMM) reports from either a browser or directly
within the SCCM console. The Microsoft reporting engine (SQL Server Reporting Services, i.e. SSRS) has
many powerful features including scheduling reports to be delivered to your email inbox on a recurring
schedule (in various formats, including excel and pdf). You should follow the Microsoft documentation
on SSRS to gain the full benefits of the reporting component of SCCM.
Browser
The SCCM SSRS website has a default URL of http://ComputerName/reports. This may vary in your
environment. Once you are at the home page, click the link referencing your SCCM database.
Page 63
secRMM SCCM Compliance Settings Administrator Guide
Scroll down until you see the “Removable Media” subfolder. Click the “Removable Media” subfolder.
Page 64
secRMM SCCM Compliance Settings Administrator Guide
The above report shows there is currently only one authorization failure within the domain.
In addition to the reports provided by the secRMM product, you can run the Microsoft SCCM
“Compliance and Settings Management” reports as well.
Page 65
secRMM SCCM Compliance Settings Administrator Guide
SCCM console
The SCCM reports are located within the console under Monitoring->Reports. There are many reports
provided by Microsoft. The reports are listed in alphabetical order so scroll down to “R”. Under “R”,
you will see reports starting with “Removable Media”.
Page 66
secRMM SCCM Compliance Settings Administrator Guide
In this example, we will run a “Write Events” (i.e. files written from the domain to a removable media
device) report. Notice that the report dialog needs to specify a “User Name”. Click the “Values…” link
and select a value.
Page 67
secRMM SCCM Compliance Settings Administrator Guide
Page 68
secRMM SCCM Compliance Settings Administrator Guide
Here we can see a report that lists all the removable media write activity for the specific user. There are
too many columns in this report to show you all the valuable data within this report in a single screen
shot so please run the reports in your environment so you can see that value of the secRMM data!
SCCM/InTune reports
To associate the Intune mobile device definitions to the secRMM event data, you must run the
LinkMobileDevices.exe utility that is in the Utility subfoler (created when you unzipped
secRMMSCCMInTuneReports.zip). This program will list the mobile devices being managed by
SCCM/InTune. For each mobile device, you will need to provide the mobile devices serial number as
secRMM knows it. Unfortunately, InTune does not seem to be capable of recording the true/firmware
serial number of the mobile devices (we hope this will be fixed in later InTune releases). For now, you
will need to generated a secRMM ONLINE event for the mobile device by connecting the device to a
Windows computer running secRMM with a USB cable. Once Windows mounts the mobile device, you
will see an online event in the secRMM event log. Plug the serial number from secRMM into the
corresponding row in the LinkMobileDevices.exe utility.
Page 69
secRMM SCCM Compliance Settings Administrator Guide
You should also read the “secRMM Administrators Guide”, section titled “Managing the secRMM event
log”. This section discusses other options for archiving secRMM event data. In summary, the section
describes using the secRMM event log to archive the data versus using SCCM. If you chose that
archiving strategy, then in SCCM, you can simply delete the “secRMM SCCM Status Messages”
periodically. You could also utilize secRMMCentral. secRMMCentral uses Microsoft Event Forwarding
technology to forward the secRMM event data from the endpoint computers to a central event log
(named secRMMCentral). From the secRMMCentral event log, you can have a scheduled task import
the secRMMCentral event log into a standalone SQL server database. From the standalone SQL server
database, you can run secRMM predefined reports in addition to using SQL backups for archiving.
Page 70
secRMM SCCM Compliance Settings Administrator Guide
You can use the “SCCM Status Message Viewer” User Interface program to export and delete the
secRMM status messages. You invoke the “SCCM Status Message Viewer” from the SCCM console
“Monitoring mode” of SCCM as shown below.
Page 71
secRMM SCCM Compliance Settings Administrator Guide
Page 72
secRMM SCCM Compliance Settings Administrator Guide
Page 73
secRMM SCCM Compliance Settings Administrator Guide
VBScript
The secRMM product uses a VBScript to send SCCM Status Messages to SCCM. The VBScript accepts
parameters that allow you to list and delete the “secRMM SCCM Status Messages” in the SCCM
database.
The screen shot below that shows the command to list the “secRMM SCCM Status Messages” to the
screen (one page at a time).
The screen shot below that shows the command to list the “secRMM SCCM Status Messages” to a file.
Page 74
secRMM SCCM Compliance Settings Administrator Guide
Note that each record exported by the VBScript is contained in multiple lines. This may not be optimal
but you are still able to perform string finds/searches on the data.
PowerShell
The secRMM product has a PowerShell script for processing secRMM events. One of the options of this
PowerShell script is to retrieve the secRMM data from the “secRMM SCCM Status Messages” in the
SCCM database.
Page 75
secRMM SCCM Compliance Settings Administrator Guide
The screen shot below that shows the command to list the “secRMM SCCM Status Messages” to the
screen.
The screen shot below that shows the command to list the “secRMM SCCM Status Messages” to a file.
Page 76
secRMM SCCM Compliance Settings Administrator Guide
SQL
The SQL command below retrieves the “secRMM SCCM Status Messages” directly from the SCCM
database.
select all
SMS_StatusMessage.Component,
SMS_StatusMessage.MachineName,
SMS_StatusMessage.MessageID,
SMS_StatusMessage.MessageType,
SMS_StatusMessage.ModuleName,
SMS_StatusMessage.PerClient,
SMS_StatusMessage.ProcessID,
SMS_StatusMessage.RecordID,
SMS_StatusMessage.ReportFunction,
SMS_StatusMessage.Severity,
SMS_StatusMessage.SiteCode,
SMS_StatusMessage.SuccessfulTransaction,
SMS_StatusMessage.ThreadID,
SMS_StatusMessage.Time,
Page 77
secRMM SCCM Compliance Settings Administrator Guide
SMS_StatusMessage.TopLevelSiteCode,
SMS_StatusMessage.PartOfTransaction,
SMS_StatusMessage.Win32Error,
SMS_StatMsgInsStrings.InsStrIndex,
SMS_StatMsgInsStrings.InsStrValue,
SMS_StatMsgInsStrings.RecordID,
SMS_StatMsgAttributes.AttributeID,
SMS_StatMsgAttributes.AttributeTime,
SMS_StatMsgAttributes.AttributeValue,
SMS_StatMsgAttributes.RecordID from vStatusMessages AS SMS_StatusMessage
LEFT OUTER JOIN vStatusMessageInsStrs AS SMS_StatMsgInsStrings ON
SMS_StatMsgInsStrings.RecordID = SMS_StatusMessage.RecordID
LEFT OUTER JOIN vStatusMessageAttributes AS SMS_StatMsgAttributes ON
SMS_StatMsgAttributes.RecordID = SMS_StatusMessage.RecordID
where SMS_StatusMessage.Component = N'secRMM'
Troubleshooting
SCCM secRMM Console Extension
The SCCM secRMM Console Extension lets you centrally configure and deploy the secRMM
rules/policies for the computers and users in your domain. Since this feature utilizes the base SCCM
“Compliance Settings” component, the troubleshooting steps will be the same as any other “Compliance
Settings” issue. The way to troubleshoot any SCCM issue begins with knowing which SCCM log files to
look at. For “Compliance Settings” issues, you will need to look on an SCCM client computer (i.e. not the
site server but a computer running the SCCM agent). The log files on the SCCM client computer are
located at C:\Windows\CCM\Logs. For “Compliance Settings” issues, the log files you will want to look
at are:
1. CIAgent.log
2. DCMAgent.log
3. DCMReporting.log
4. DcmWmiProvider.log
5. CIDownloader.log
CMTrace has a very nice feature where you can view several log files at once. To use this feature, go to
File->Open on the main menu bar. The file open dialog will have a checkbox at the bottom of the dialog
labeled “Merge selected files”. Make sure you select that and then Ctrl-Click the logs you want to look
at (listed above).
When looking for errors, you can safely ignore the 2 errors from the CIDownloader.log that look like:
Page 78
secRMM SCCM Compliance Settings Administrator Guide
Troubleshooting
A few lines (5 lines) below that, you will see the SQL select statement that corresponds to the
ExecQueryAsyc command above. Note the record count is returned on the next line as well.
If you have SQL Management Studio available, starting with the “select”, copy the SQL query above and
paste it into a SQL query session that is mapped to your SCCM database. Ensure the record count
matches what is listed in the SMSProv log.
If you do find errors in the log files mentioned above, please contact Squadra Technologies support and
a support engineer will assist you in correcting the issue.
Page 79
secRMM SCCM Compliance Settings Administrator Guide
Known Issues
1. If you modify a secRMM policy (rules set), you must re-deploy the policy. We are looking into
how to correct this behavior.
2. Do not use XML characters (&, >, <) in the secRMM policy description text. If you do, the policy
generates an error when you save it. We are working to correct this issue.
Page 80