Topic Hub
SCCM / MECM
Microsoft Configuration Manager for OS deployment, software distribution, patch management, and co-management with Intune. Operational guidance for teams running on-premises and hybrid endpoint management — and those planning migration.
Guides, scripts and analysis
Naming reference
SCCM, ConfigMgr, MECM, or Microsoft Intune? The name history explained.
The product has been renamed several times and is still searched under all previous names — they all refer to the same on-premises endpoint management platform:
Until 2011
System Center Configuration Manager (SCCM)
The original name — still the most widely searched term.
2011 – 2019
System Center Configuration Manager (still SCCM)
Product refreshed but name unchanged. Current branch introduced in 2015.
2019 – 2022
Microsoft Endpoint Configuration Manager (MECM)
Rebranded alongside the Microsoft Endpoint Manager umbrella (now discontinued as a brand).
2022 – present
Microsoft Configuration Manager (ConfigMgr)
Current official name. The product itself is unchanged — still the same on-premises tool.
On this site: SCCM/MECM and ConfigMgr are used interchangeably to match how practitioners search. The Intune management layer now sits in the Microsoft Intune admin centre (intune.microsoft.com).
Overview
What ConfigMgr Is Still Used For in Real Enterprise Environments
ConfigMgr is not a legacy product pending retirement. It receives bi-annual current branch releases and is actively developed. For specific workloads — particularly complex OSD, large-scale on-premises software distribution, and server management — it remains the stronger tool.
Complex OS deployment (OSD)
Task sequences in ConfigMgr support multi-phase deployments with driver injection, WIM capture, MDT integration, pre-staging content, and conditional steps based on hardware model or disk configuration. For large fleets with diverse hardware and complex imaging requirements, ConfigMgr OSD is significantly more flexible than Autopilot alone.
Large-scale software distribution
The ConfigMgr content library and distribution point infrastructure supports distributing large application packages (multi-GB installers, SQL, Visual Studio) across thousands of machines with bandwidth throttling, scheduled distribution windows, and BranchCache for branch office scenarios — without each device pulling from the cloud.
WSUS-integrated patch management
ConfigMgr Software Update Point integrates directly with WSUS for per-KB approval, ADR (Automatic Deployment Rules) for monthly Patch Tuesday automation, and phased deployment for update rings. The reporting and maintenance window integration is more granular than Intune update rings for environments with complex patching requirements.
On-premises compliance and reporting
Configuration baseline assessment in ConfigMgr evaluates device compliance against custom rules and reports results to SSRS (SQL Server Reporting Services). For environments where cloud reporting is not permitted or where compliance data must stay on-premises, ConfigMgr provides a full reporting stack without data leaving the datacenter.
Server management
ConfigMgr manages Windows Server endpoints — software distribution, patch management, hardware inventory, and software metering — alongside workstation fleets. Intune does not manage on-premises servers. For environments needing a unified management view across workstations and servers, ConfigMgr remains the only Microsoft-native option.
Co-management and migration staging
Co-management lets ConfigMgr and Intune share management authority simultaneously, with each workload explicitly assigned to one or the other. This makes ConfigMgr the practical bridge for organisations migrating to cloud-only management — you can slide workloads to Intune incrementally without a hard cutover.
Co-management
Co-management with Microsoft Intune
Co-management is the simultaneous management of Windows 10/11 devices by both ConfigMgr and Intune. Each management workload is explicitly assigned to one authority — you decide the pace of migration workload by workload.
What you need before enabling
Prerequisites
- ConfigMgr version
- Current branch 2103 or later recommended. Co-management was introduced in 1710 but later versions have significantly improved workload control and Intune integration.
- Device requirements
- Windows 10 1709 or later (Windows 11 supported). Devices must be hybrid Entra joined or Entra joined — purely domain-joined devices cannot use Intune workloads.
- Intune licence
- Each co-managed device needs an Intune licence assigned. Included in Microsoft 365 Business Premium, E3, E5, and available as a standalone add-on.
- Entra Connect
- Hybrid Entra join requires Entra Connect (or Cloud Sync) to sync the on-premises computer object to Entra ID. The device then registers a certificate used for Intune MDM enrolment.
- CMG (optional)
- Cloud Management Gateway allows ConfigMgr to manage internet-based devices — useful for co-managed devices that are not always on the corporate network or VPN.
Per-workload authority assignment
Workload sliding
- Compliance policies
- Slide to Intune to use Intune compliance baselines and feed device compliance state into Conditional Access. This is usually the first workload to migrate — low risk, high CA value.
- Device configuration
- Slide to Intune to replace ConfigMgr configuration items and baselines with Intune Settings Catalog profiles. Test on a Pilot Intune collection first.
- Windows Update policies
- Slide to Intune to use Intune update rings and Windows Autopatch. You cannot have both WSUS (via ConfigMgr SUP) and Intune update rings managing the same device — this is the highest-conflict workload to migrate.
- Endpoint Protection
- Slide to Intune to manage Defender AV, ASR rules, and firewall via Intune Endpoint security policies. ConfigMgr Endpoint Protection policies are then ignored for workloads in the Intune authority.
- Client apps
- The most complex workload to migrate. ConfigMgr application deployments stop applying once slid to Intune. Plan app re-packaging as Win32 .intunewin before sliding this workload.
Staged workload migration
Pilot Intune collections
- What Pilot Intune does
- Each workload can be set to ConfigMgr, Pilot Intune, or Intune. Pilot Intune applies the Intune authority only to devices in a designated ConfigMgr collection — the rest stay on ConfigMgr.
- Collection design
- Create a co-management pilot collection targeting IT staff machines, then specific business unit machines as confidence builds. Use a direct membership rule initially, not a query-based rule, to control scope precisely.
- Validating the slide
- After sliding a workload to Pilot Intune, verify the Intune policy applies in the Intune portal (Devices > Configuration) and that the ConfigMgr policy is no longer the effective setting on the device. Use the co-management dashboard in ConfigMgr to track slide status.
- Rollback
- Sliding a workload back from Intune to ConfigMgr is possible — change the authority in the co-management properties and ConfigMgr policies re-apply on the next client policy cycle (default 60 minutes). Test rollback before committing a broad workload migration.
- Dashboard
- ConfigMgr Monitoring > Co-management dashboard shows workload distribution, Intune enrolment status, and per-device authority. Use this to track progress across the fleet.
Latest from Patch Tuesday
May 2026 Patch Tuesday: admin deployment notes and checks
May 2026 Patch Tuesday deployment notes covering KB5089549 for Windows 11, Windows Server updates, BitLocker PCR7 known issue, Secure Boot certificate readiness, Intune Autopatch hotpatch, and WSUS deployment checks.
13 May 2026
April 2026 Patch Tuesday Breakdown – What Sysadmins Must Do This Month
Three zero-days confirmed exploited in the wild, plus KB5055523 fixes the Autopilot OOBE timeout regression on Dell and HP hardware that has been blocking zero-touch deployments for six weeks. Prioritise this month.
Apr 8, 2026
Core operations
Collections, Deployments, and Maintenance Windows
Collections and deployments are the operational core of ConfigMgr. Almost every action — software distribution, patch deployment, configuration baseline evaluation — is targeted at a collection and scheduled within a maintenance window.
Device vs User collections
Device collections target the machine — useful for OS-level deployments, patches, and configuration items that should apply regardless of who is logged on. User collections target the user object in AD — useful for application deployments that should follow the user across devices. Most patch deployments use device collections for predictable scheduling behaviour.
Query-based vs direct membership
Query-based collections use WQL queries against the ConfigMgr database to dynamically include devices matching criteria (OS version, installed software, last logon, hardware attributes). Direct membership adds specific devices explicitly. Hybrid: use a query rule as the base and direct membership for exceptions. Always test queries in the collection simulator before creating a production collection.
Limiting collections
Every collection must be limited by a parent collection. The limiting collection defines the maximum scope — a collection cannot include a device not in its limiting collection. Use "All Systems" as the limiting collection only at the top of the hierarchy. Create intermediate limiting collections per site, per department, or per management group to prevent accidental over-targeting.
Deployment purpose: Required vs Available
Required deployments install automatically at the deadline — the client enforces installation regardless of user activity (within maintenance window rules). Available deployments appear in Software Center for user-initiated install. For patches and security software, use Required. For productivity apps with user adoption considerations, Available is appropriate. Never use Required for software that needs user data migration.
Maintenance windows
Maintenance windows define when ConfigMgr is permitted to make changes to a device — install software, apply patches, or reboot. Without a maintenance window, deployments can run at any time. Configure non-overlapping windows for servers (weekend nights), shift workers (daytime), and office desktops (business hours + weekend). Software updates and all deployments have separate maintenance window overrides.
Phased deployments
ConfigMgr phased deployments automate multi-collection rollouts — starting with a pilot collection and automatically advancing to the production collection when the pilot success criteria are met (e.g., 95% deployment success rate with zero failure threshold). Use for major application updates and feature update deployments to reduce manual monitoring.
OS deployment
Task Sequences and OS Deployment
ConfigMgr task sequences are the most flexible OS deployment mechanism in the Microsoft stack. A task sequence is a series of ordered steps — partitioning, WIM application, driver injection, software installation, configuration, and domain join — that run in the Windows PE or full OS context.
Boot image and WinPE
Task sequences boot devices into Windows PE via PXE (via Distribution Point with PXE role) or bootable media. The boot image contains ConfigMgr client components, network drivers, and storage drivers needed to reach the distribution point. Customise boot images via the Windows ADK — add drivers for network adapters on new hardware before the boot image can reach SCCM content.
Driver management
ConfigMgr driver management imports driver packages into the driver catalogue, matched to hardware models via the Auto Apply Drivers step or explicit Apply Driver Package steps. The best practice for large fleets is model-based driver packages — one package per hardware model family — applied via a task sequence condition checking %Model% or Win32_ComputerSystem.Model.
MDT integration (Zero Touch Installation)
Microsoft Deployment Toolkit integration with ConfigMgr (ConfigMgr + MDT) adds the Use Toolkit Package and Gather steps, enabling MDT rules, the CustomSettings.ini variable engine, and offline domain join. MDT integration is the standard approach for environments that need complex conditional logic beyond what native task sequence conditions support.
In-place upgrade task sequences
The Upgrade Operating System step runs Windows Setup in an upgrade scenario, preserving user data, installed apps, and settings. In-place upgrade task sequences are lower-risk than wipe-and-reload OSD for feature update migrations (Windows 10 to Windows 11). Add pre-check steps to fail the task sequence early if the device does not meet hardware requirements.
Content pre-staging and BranchCache
For branch offices without a local distribution point, pre-stage content to a local server or enable BranchCache to allow devices to pull content from each other after the first download. Without pre-staging, large task sequences pull from a remote DP over WAN — causing slow deployments and potential deployment failures during the WIM apply phase.
Task sequence variables and conditions
Built-in variables (_SMSTSMachineName, OSDComputerName, SMSTSUserStatePath) and custom variables set via Set Task Sequence Variable steps control flow. Condition checks on steps (WMI query, file existence, task sequence variable match) allow hardware-specific or environment-specific branching without maintaining separate task sequences per scenario.
Patch management
Software Update Management and WSUS Integration
ConfigMgr software updates are built on WSUS — ConfigMgr provides the collection targeting, maintenance window enforcement, phased rollout, and reporting layer on top of the WSUS approval and distribution infrastructure.
Software Update Point (SUP) role
The SUP role installs and manages WSUS on the site server. It synchronises update metadata from Microsoft Update on a configurable schedule and downloads updates to the content library. WSUS still manages the approval database — ConfigMgr controls which updates are deployed to which collections, using WSUS approvals as the delivery mechanism.
Automatic Deployment Rules (ADRs)
ADRs automate monthly Patch Tuesday deployments. Configure an ADR to run on the second Tuesday of each month, filter by classification (Security Updates, Critical Updates), and deploy to a pilot collection with a 7-day deadline. A second ADR phase targets the broad production collection two weeks later. ADRs create deployment packages and software update groups automatically.
Software update groups
A software update group is a container of specific KBs targeted for deployment. ADRs add updates to a group automatically. Manual update groups are used for out-of-band patches (zero-day fixes between Patch Tuesdays). A single update group can be deployed to multiple collections with different maintenance windows and deadline offsets.
Deployment rings via collections
Create separate device collections for each ring (Pilot, IT, Early Adopter, Production). Deploy the same software update group to each collection with staggered deadlines — Pilot: 0 days, IT: 7 days, Early Adopter: 14 days, Production: 21 days. ConfigMgr compliance reports show deployment progress per collection, per update.
WSUS cleanup and maintenance
WSUS databases grow significantly without regular maintenance. Declined and superseded updates accumulate in the WSUS catalogue. Run the built-in WSUS Cleanup Wizard monthly, or use the WSUS maintenance tasks in ConfigMgr site maintenance. A WSUS database over 10GB often causes synchronisation timeouts — run the WSUS database maintenance script against the SUSDB to re-index and defragment.
Conflict with Intune update rings on co-managed devices
If Windows Update policies workload remains with ConfigMgr, Intune update ring policies are ignored on co-managed devices. If it is slid to Intune, ConfigMgr SUP policies are ignored. Running both simultaneously causes unpredictable behaviour — devices may defer updates based on ConfigMgr policy then receive them from the Windows Update cloud service via Intune, bypassing the ConfigMgr ring structure.
Scripts & Automation
Get-StaleDevices
Identifies devices inactive for a configurable threshold across Intune, Entra ID, and on-premises Active Directory. Outputs CSV and HTML reports with remediation actions.
PowerShell
Get-PatchComplianceReport
Queries WSUS or Windows Update for Business status via WMI and Graph API. Produces a per-device patch lag report with severity breakdown and exportable HTML dashboard.
PowerShell
Export-IntuneDeviceReport
Uses the Microsoft Graph API to export a full Intune device inventory including compliance state, OS version, last check-in, and primary user to CSV or JSON.
PowerShell
Client health
Client Health and Troubleshooting
ConfigMgr client problems fall into three categories: the client is not installed, the client is installed but not communicating with the management point, or the client is communicating but specific features (software updates, inventory) are not functioning. Each category has a different diagnostic path.
CCMSetup and client installation logs
CCMSetup.log (on the device, at C:\Windows\ccmsetup\Logs\) records the installation process. ccmsetup.exe failures are usually network (DP unreachable), prerequisite (missing .NET or VC++ runtime), or permissions issues. On the site server, client.msi.log records MSI installation detail. Use the Client Push Installation status in the console to identify devices where push installation failed and why.
Key client log files
C:\Windows\CCM\Logs\ contains all operational client logs. The most useful: LocationServices.log (DP and MP discovery), CcmMessaging.log (communication with MP), PolicyAgent.log (policy download and application), UpdatesDeployment.log (software update installation), AppDiscovery.log (application detection), and ExecMgr.log (program execution). CMTrace.exe (bundled with ConfigMgr) is the recommended viewer.
Client health check triggers
The ConfigMgr Client Health evaluation (CCMEval) runs daily and checks: WMI repository integrity, SMS Agent Host service state, Configuration Manager bits, client version currency, and hardware inventory cycle recency. If CCMEval detects a problem it attempts auto-remediation. Results appear in the Client Health dashboard under Monitoring > Client Health.
WMI repository corruption
A corrupt WMI repository is one of the most common causes of ConfigMgr client failure — inventory stops reporting, policies do not apply, and CCMEval flags the device. Repair with winmgmt /salvagerepository followed by a client reinstallation if salvage does not resolve. CCMEval auto-remediation handles this in most cases without manual intervention.
Management Point communication
If a client cannot reach the management point, it cannot download policies, report inventory, or receive deployments. Test MP reachability from the client with: Test-NetConnection -ComputerName <MP FQDN> -Port 80 (or 443 for HTTPS). Check LocationServices.log for MP detection failures. Common causes: DNS resolution failure, firewall blocking port 80/443, or the client boundary not being assigned to a boundary group containing the MP.
CMTrace vs OneTrace
CMTrace.exe is the classic ConfigMgr log viewer bundled since SCCM 2012. OneTrace is the successor, integrated into Support Center (installed via the ConfigMgr toolkit). OneTrace supports multiple log tabs, advanced filtering, and merged log views — useful when correlating events across UpdatesDeployment.log, WUAHandler.log, and RebootCoordinator.log simultaneously.
Visibility
CMPivot, Inventory, and Reporting
ConfigMgr's reporting stack — hardware inventory, software inventory, SSRS reports, and CMPivot — provides a level of fleet visibility that Intune's reporting does not yet match for on-premises environments. CMPivot in particular delivers real-time query capability that is unique in the on-premises toolchain.
CMPivot — real-time device queries
CMPivot runs WMI, registry, file system, and event log queries against live devices in real time — without waiting for hardware inventory cycles. Run a CMPivot query against a collection to get immediate results from all online devices: OS.Caption, InstalledSoftware where Name contains "VPN", File("C:\sensitive.txt").Exists, or EventLog("System") where EventID == 7036. Results appear within seconds for online devices.
Hardware inventory
Hardware inventory collects WMI class data from every client on a configurable cycle (default: 7 days). The collected data populates the ConfigMgr database and is queryable via collections, reports, and CMPivot. Extend hardware inventory to collect custom WMI classes or registry values not in the default set — useful for software licence audit, BIOS version reporting, or TPM state verification.
Software inventory and metering
Software inventory scans installed files for product metadata. Software metering tracks execution frequency and last-used date for configured executables — useful for identifying unused licences. Both are separate from hardware inventory and have independent cycles and enable/disable settings. Software metering data is held for a configurable retention period in the SSRS database.
SQL Server Reporting Services (SSRS)
ConfigMgr ships with hundreds of built-in SSRS reports covering hardware, software, deployment status, client health, update compliance, and asset intelligence. Reports run against the ConfigMgr database and are accessible via the reporting services point URL. Custom reports use SQL queries against the CM_* database views — the view schema is documented and queryable directly for custom dashboard development.
Asset Intelligence
Asset Intelligence catalogues installed software, hardware, and licence data against the Microsoft Asset Intelligence online catalogue. It identifies software titles, normalises names across hardware inventory, and produces licence reconciliation reports. Useful for software asset management and identifying unlicensed or unexpected software at scale across the fleet.
Tenant attach and cloud-connected CMPivot
Tenant attach (a co-management feature enabled separately from workload sliding) uploads ConfigMgr device inventory to Intune. This lets you run CMPivot queries from the Microsoft Intune admin centre against on-premises ConfigMgr-managed devices — without the devices being MDM-enrolled. Useful for security teams who primarily work in the cloud portals.
Tutorials & Guides
Migrating Intune Administrative Templates to Settings Catalog Without Breaking Policy Behaviour
A practical migration guide for moving Intune Administrative Templates and older configuration profiles to Settings Catalog, covering inventory, duplicate settings, assignments, Graph PowerShell checks, conflict detection, pilot design, validation, reporting, rollback, and prevention controls.
26 min read · Advanced
Deploy Windows 11 25H2 with Intune + Autopilot v2 (Zero-Touch, Production-Ready)
A production-grade walkthrough for deploying Windows 11 25H2 across existing x86/x64 fleets using Autopilot v2 Device Preparation policies. Covers tenant readiness, ESP configuration, app tiering, update rings, a phased rollout sequence, and a PowerShell pre-flight toolkit.
28 min read · Advanced
Understanding Autopilot v2: Enrollment Profiles, ESP, and Common Failure Modes
Windows Autopilot v2 changes how enrollment profiles work. This guide covers device preparation, the Enrollment Status Page, and a decision tree for diagnosing the most common deployment failures.
16 min read · Intermediate
Group Policy Troubleshooting with RSoP, gpresult, and Policy Scope Analysis
A practical troubleshooting methodology for Group Policy: reading RSoP, interpreting gpresult /h output, diagnosing WMI filter failures, and resolving OUlinking conflicts.
12 min read · Beginner
Troubleshooting
Windows Update for Business Deferral Policy Not Applying in Intune: Practical Diagnosis
A practical diagnostic guide for Windows Update for Business deferrals that are ignored, overwritten, or blocked by feature update policies, quality update policies, Group Policy, WSUS, MECM, or co-management.
18 min read · Intermediate
Group Policy Not Applying to Users or Computers: A Systematic Diagnosis
Before running gpupdate /force for the third time, follow this decision tree: scope filtering, link order, security filtering, loopback processing, and slow-link detection are all common culprits.
8 min read · Beginner
BitLocker Recovery Key Not Backed Up to Entra ID: Why and How to Fix It
BitLocker keys failing to escrow to Entra ID is a silent failure — no error on the device, no alert in Intune. Here is how to detect it, force escrow, and prevent it from recurring.
15 min read · Intermediate
Fixing the April 2026 BitLocker Recovery Loop (KB5082063 Secure Boot Issue)
KB5082063 rotates the Windows UEFI CA certificates, breaking PCR7 binding on Dell and Lenovo hardware and triggering BitLocker recovery loops fleet-wide. Here is how to stop it before it hits your next patch ring — and recover devices that are already stuck.
10 min read · Intermediate
Migration
Migration Paths from ConfigMgr to Intune
Migration from ConfigMgr to Intune is not a single event — it is a workload-by-workload progression. These are the most common migration patterns and their practical trade-offs.
Co-management first — slide workloads gradually
Enable co-management on existing ConfigMgr-managed hybrid-joined devices, then slide workloads to Intune one at a time — Compliance policies first, then Device configuration, then Windows Updates, then Endpoint Protection, and finally Client apps. This is the lowest-risk path because ConfigMgr remains the fallback authority until you are confident in the Intune configuration. The migration takes 12–24 months for most enterprises.
New device Autopilot — Intune-only for all new builds
Stop imaging new devices via ConfigMgr task sequence. Register new hardware in Autopilot, provision them as Entra-joined Intune-only devices, and leave the existing fleet on ConfigMgr co-management. Natural device refresh over 3–5 years progressively shifts the fleet to Intune. This is the most realistic path for large organisations that cannot afford a big-bang migration.
App re-packaging for Win32 Intune delivery
ConfigMgr applications must be re-packaged as .intunewin files using the Win32 Content Prep Tool before they can be deployed via Intune. Detection rules replace ConfigMgr detection methods. This is the highest-effort part of migration — plan 2–4 hours per application for packaging, detection rule authoring, and testing. Prioritise by deployment frequency: the 20 most-deployed apps cover 80% of your fleet.
Keeping ConfigMgr for servers and OSD
Intune does not manage on-premises Windows Server. Organisations that complete workstation migration to Intune often retain ConfigMgr specifically for server patch management, software deployment to servers, and complex OSD scenarios. A reduced ConfigMgr footprint — fewer distribution points, no full site redundancy — remains appropriate and is a supported long-term configuration.
Comparison
Intune vs SCCM / MECM — The Full Analysis
Co-management has blurred the lines, but the strategic direction is clear. Read the full breakdown to understand where ConfigMgr still earns its place and where Intune is the right call.
Microsoft Intune vs. SCCM/MECM in 2025: Which Should You Use?
For new cloud-managed endpoints, Intune is usually the right starting point. SCCM still has a role in complex OSD, large software distribution, detailed on-prem reporting, and restricted networks. Many estates need staged co-management rather than a rushed replacement.
Common problems
Where ConfigMgr Deployments Go Wrong
Most ConfigMgr failures are either infrastructure problems (WSUS, DP, MP, SQL) or targeting problems (collection scope, maintenance window, deployment purpose). These are the patterns that appear most often in production environments.
Software update deployment failing fleet-wide — WSUS sync broken
Updates are not reaching devices because WSUS synchronisation has failed or the Software Update Point role is unhealthy. Check wsyncmgr.log on the site server for sync errors. Common causes: WSUS certificate expiry, proxy configuration change, Windows Update endpoint blocked by firewall, or the WSUS application pool recycled under load. Run a manual sync from the ConfigMgr console: Software Library > Software Updates > Synchronise Software Updates.
Client not receiving policy — boundary group misconfiguration
Devices are enrolled in ConfigMgr but not receiving software deployments. The device's IP subnet or AD site is not assigned to a boundary group, or the boundary group does not have a distribution point or management point assigned. Check LocationServices.log on the client for "No MP found" or "No DP found" messages. Verify the device's IP appears in a boundary and that boundary is in a group with an assigned DP.
Deployment stuck at 0% — content not distributed to DP
The deployment exists and the device is in the target collection, but nothing downloads. The deployment package content has not been distributed to the distribution point serving the device's boundary group. Check the deployment's Content Status in the console — if the DP shows "In Progress" or "Failed," the content has not transferred. Trigger a content redistribution or check distmgr.log on the site server.
Co-management workload conflict — device getting policy from both authorities
A device on the Windows Update Policies workload receives both a ConfigMgr SUP-controlled update schedule and an Intune update ring policy. The resulting behaviour is unpredictable — devices may install updates outside the intended ring window or bypass ConfigMgr-controlled maintenance windows. Verify the workload assignment in co-management properties and confirm only one authority is active on the device via PolicyAgent.log.
WSUS database bloat causing timeout errors
WSUS synchronisation starts failing with timeout errors as the SUSDB grows beyond 10–15GB. Declined and superseded updates are never purged without explicit maintenance. Run the WSUS Database Maintenance SQL script (available from Microsoft) against SUSDB to re-index and purge orphaned data, then run the WSUS Cleanup Wizard from the ConfigMgr console. Schedule this as a recurring maintenance task.
Task sequence failing at Apply Driver Package — no matching driver
OSD task sequence fails during driver injection because the driver package does not contain a driver matching the hardware in the target device (new model, new NIC or storage controller). Check smsts.log in X:\Windows\Temp\SMSTSLog\ during the failure — it will show the device model and the driver query that returned no results. Add the missing driver to the driver catalogue and re-import to the affected driver package.
Client health shows healthy but updates not installing
CCMEval reports the client as healthy and the software update group shows as deployed, but updates are not applying. Check UpdatesDeployment.log on the device for the update evaluation cycle result and WUAHandler.log for the Windows Update Agent response. Common cause: the maintenance window is too short for the number of updates required, causing deployments to be skipped until the next window. Increase the maintenance window or reduce the update group size.
Hybrid Entra join failing — devices not appearing in Entra ID
Co-management requires hybrid Entra joined devices. If the Automatic-Device-Join scheduled task is failing, the device will not get an Entra device object and cannot enrol in Intune. Run dsregcmd /status on the device and check the "Join Info" section. Common causes: SCP not configured in AD, Entra Connect sync not running for the computer object, or network access to device registration endpoints blocked by proxy or firewall.
Reading path
Recommended AdminSignal Reading Path
Work through this content to strengthen ConfigMgr operations — with a migration and co-management thread running through it.
- 1
Microsoft Intune vs. SCCM/MECM in 2025: Which Should You Use?
Start with the strategic picture — understand where ConfigMgr still earns its place versus where Intune is the better tool for your specific workloads and environment.
- 2
Get-PatchComplianceReport — Script Library
Query WSUS and WUfB compliance state via PowerShell. Useful for ConfigMgr environments where SSRS patch reports are not available or you need a quick scriptable compliance export.
- 3
Patch Management hub
Diagnose policy conflicts between WSUS targeting GPOs, WUfB, Intune update rings, and ConfigMgr software update workloads.
- 4
Group Policy Troubleshooting with RSoP, gpresult, and Policy Scope Analysis
ConfigMgr co-managed environments often have overlapping GPO and Intune policy. Use RSoP and gpresult to identify which policy source is winning for a specific setting on a co-managed device.
- 5
Deploy Windows 11 25H2 with Intune + Autopilot v2
The Autopilot migration path for new devices — the practical alternative to ConfigMgr OSD for cloud-joined workstations, with a PowerShell pre-flight toolkit for tenant readiness.
- 6
Patch Management hub
The full patch management reference — covering WSUS, WUfB, and Intune update rings. Essential context for ConfigMgr admins managing the Windows Update workload migration.
Official docs
Key Microsoft Documentation
Authoritative references for ConfigMgr configuration, co-management, OSD, and software updates. Use alongside AdminSignal guides for product-specific syntax and role configuration details.
Microsoft Configuration Manager docs ↗
The full ConfigMgr documentation — infrastructure, client management, OSD, software updates, and reporting.
Co-management overview ↗
Prerequisites, workload definitions, Pilot Intune collection setup, and the co-management dashboard reference.
Task sequence steps reference ↗
Every task sequence step — description, variables, conditions, and supported contexts (WinPE vs full OS).
Software updates introduction ↗
SUP role architecture, WSUS integration, ADR configuration, and the update deployment workflow.
CMPivot overview ↗
CMPivot query syntax, entity reference, and examples for real-time device data collection.
Monitor clients in ConfigMgr ↗
Client health evaluation, CCMEval auto-remediation, and the client health dashboard reference.