Microsoft Ignite 2022 Review | A good start, but hopefully not repeated

Before we talk about Ignite 2022, let’s layout my personal biases first. I have attended 16 Microsoft TechEd/Ignite Conferences, not having missed one starting in 2004. A fact I hold with a lot of pride. I largely attribute my professional achievements and skills to these events. While it’s always fun to watch newbies miss the important parts of the event for parties, free beer, expo swag, etc., the real professionals use these events to stay ahead of the constant state of change in the industry. One more bias, I do have a distaste for Microsoft Marketing in recent years. They overachieve to sell products that don’t exist yet, or ones that do, but don’t function at the levels they claim. More why that matters later. 

I am a Microsoft Administrator of 20 years who witnessed the fall of Novell, deployed NT4 and then AD2000+. Fast-forward to now:  ahead of the curve with thousands of Azure AD joined (not hybrid) workstation clients, over 200 SAML SSO apps via Azure AD, MFA with Number Matching (aka Password-less) as part of the onboarding process, and almost no VPN requirements for my end users. 

Sadly, I must admit I didn’t get enough out of the event. What upsets me most about this fact, is that next year is slated to be another two-day format which is core to why I didn’t get enough out of the event this year. 

“Two days isn’t enough.”

Both mornings had keynotes that consumed over 25% of the entire event. Those keynotes can help provide guidance on where Microsoft thinks it is going. However, it’s mostly just Microsoft Marketing laying groundwork for hopefully self-fulfilling prophecies. Increasingly, they are selling ideas or concepts of future features which aren’t even in private preview yet. The note on company direction is useful, but not at the cost of 25% of the event.

Mr. Nadella (Microsoft CEO) couldn’t even be bothered to deliver the keynote in person, even though the event was in his home state. This felt like a major smack in the face to those like me that flew 6 hours to attend the event in person and speaks to just how little importance that half day+ worth of keynote actually mattered. 

Let’s cover the three most critical components of Ignite. The deep technical sessions, the face time with product managers/engineers, and the networking with peers. 

Not enough Deep Technical Sessions

There is always an internal fight between event planners and speakers over the technical depth and time length of a session. Level 200 sessions are almost always useless to me. It’s a sales pitch, I don’t need the sales pitch, I’m already sold, I need to know how to deploy and manage the solution. 

Far too often the needed real-world knowledge doesn’t make it into (which is perpetually outdated, incorrect, or simply missing critical details as a byproduct of Microsoft’s newfound agility). The level 300/400 sessions are hosted by PMs, Engineers, and MVPs. These professionals always deliver value without the filter of marketing’s specter, and they provide enough tactical information to actually start deploying solutions (or avoiding the gotchas). 

There were not enough deep technical sessions. This gets back to my point that a day and a half isn’t enough time to cover all Microsoft product solutions that I need to be an expert in. There wasn’t even a specific session about Microsoft Teams Shared Channels, and that’s the exact kind of session I needed and expected this year.

Face time with Product teams” 

The next most important feature of these events is face time with product managers and engineers. It’s where I can really get straight answers. Its access so pure and helpful to solving our design issues or providing critical feedback that tends to have an impact on future releases. 

I had almost no face time this year, which was infuriating. There wasn’t enough expo space for each product team to have their own area. Instead, a scheme was devised to use that precious day and a half of session time to have “ask the expert” time windows where a given product team might be in a specific area for about 2 hours. If those two hours overlapped with a not-to-be-missed-session you ended up having to choose. 

Opportunities to Network with Peers wasn’t as prevalent as it should have been” 

There were very short periods of time between sessions. This left little time to strike up conversations with people I was sitting next to. Also, the meals were so basic that people didn’t spend a lot of time at meals nor was there even an hour to eat lunch. The lack of a proper vendor expo hall made this worse as there was no reason to stick around for the end of day free drinks and snacks. 

Cost and Time Constrained”

I gave the Microsoft events team a lot of leeway for this event. I wouldn’t be shocked if they didn’t know if they were going to put on the event at the start of 2022. This short window of time to throw the event together caused things like no swag. To be clear, I don’t care if I get a 17th backpack and in fact my wife will be thrilled to not have to make me pick one to toss this year. But a lot of people were wondering if Microsoft was being cheap with no swag. I don’t think so for that, I think logistically they couldn’t pull it off. 

But on the topic of cheap, I wonder how much the event budget played a part. Less attendees, far less vendors, perhaps many of the issues like length of event, lack of enough large session rooms, not enough space in the hub for all product teams to have a home base, or even lack of enough proper sessions – can these all be blamed on cost? 

“This was a v1 Hybrid Infant event”

Microsoft Event staff seem downright giddy about flushing out this half in person half online format. I had heard comments about perhaps future years would have multiple in person locations and sessions broadcasted to other locations and to remote users. 

While I think the idea is “cool”, I think the event staff are losing sight of what the event “should” be. I get this awful feeling the event is turning into one big sales pitch instead of what it “needs” to be for education. More now than ever before, the lack of authored books or proper documentation coming from the product teams means this event must fill the gap. That is, if Microsoft wants to see its customer deploy its new solutions. 

One misconception that was abundantly clear, was the idea that we would waste part of our day and a half of session time watching the online only content. While it’s true, many of the sessions were recorded or were online only, I think that skips an important fact:  after this week my carriage turns back into a pumpkin. I will be thrusted into never ending backlogs and my time for skills advancement will be over.

Speaking of the rushed chaotic nature of the event,  I was not the only person who thought there were sessions on Friday the 14th. With this misunderstanding, I booked my travel home on Saturday (#NoRedEyes). That left me in Seattle for the whole day with no event to go to. I ended up finding great spots in Starbucks Roastery and the Seattle public Library to get through as many recorded sessions as I could. At 1.25x play speeds, and armed with skip 10 seconds ahead, I did in fact get through 10 of them. That is far more than the other days. If we can’t persuade Microsoft to bring back the 4.5-day format, I would likely book through Saturday again next year, just so I have that one last day to learn more. 

For 2023 I would like to see the event restored to almost 5 days. This would ensure enough time to jam in all those level 200 keynotes / sales pitches and leave room for the level 300 sessions for my colleague’s needs. They also need a big enough hub so that each product team has a defined space, and they need to force those experts to be in that space during end of day drinks and food. They need larger session rooms, and more of them. They need to encourage more MVPs to submit technical session ideas. Better yet, they should open up to customers asking what sessions they would like to see (Microsoft Teams Shared Calendars cough cough). They need to make the gap in between sessions larger, at least 30 minutes, and a full hour for lunch so there is time to go into the hub. They need to run sessions until 6pm and start them earlier (like they did in past years).  

To be clear, I learned things, just not enough for a whole year. Almost like Moore’s law, the rate of change in M365/Azure is accelerating year after year, and I’m getting more staff to manage it all. I need more technical information to be as successful as in previous years. Like I said, this year was the first one back. Microsoft gets a pass this year, but next year can’t be like this year, or I fear I won’t be able to keep at the bleeding edge of innovation and security at my company. 

SCCM 2012 | Native Windows Update Client Not Working

Hey there, are you deploying the Microsoft System Center 2012 Client to your desktops and then like magic the native Windows Client stops working?

Perhaps you even checked the c:\windows\windowsupdate.log file and found this nugget:

2012-07-12    13:57:53:803     392    1220    Misc    WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\ are not trusted: Error 0x800b0001

Well then you had the same problem I did. The way I got it to work for me was by installing this hotfix from MS.

In a nutshell you installed .NET 4.0 and WSUS 3.0 With SP2 (as you were required to) and BAMM! Fail.

Hope it helps, if it does leave a comment, love to know when people are helped.

Installing SCCM 2012 RTM the hard way | Thoughts and Notes

I needed to get a SCCM 2012 lab setup for my company. As this was a newer MS product I figured the install wouldn’t be that bad. Well it’s a pre-req / pre-configure nightmare.

Here is my loose and possibly incorrect way that I got a lab running.

Few notes about my deployment

  • Dedicated Server for SQL Server
  • Dedicated Server for CAS Site


Prep SQL Server box:

  1. Installed SQL 2008 R2
  2. Installed SQL 2008 R2 SP1
  3. Installed SQL 2008 R2 SP1 CU5
  4. Add the Machine account for the CAS server to the local admin’s group of your SQL server (only needed if installing on dedicated SQL Server).
    • net localgroup administrators tprod\tmem03$ /add
      • Where tprod\tmem03$ is domain\machinename$

Prep CAS Box:

  1. Setup IIS (all checkboxes including ASP), .NET 3.5.1, and RSAT Tools on CAS Box
  2. Run the commands listed on this page:


I had the above mentioned pre-reqs after going through the installer. I will list out the things I did to reslove these so you don’t have to go through the installer only to cancel out and reslove this requirements. (I wish Microsoft had done a better job at this installer. I thought they had learned, I thought wrong)

Failed Items:

  1. Microsoft Remote Differential Compression (RDC) library required
    • Simply check off “Remote Differential Compression” under features in Server Manager.
  2. Site server computer account administrative rights
    • Self resolved after installing items 1 and 3 on this list.
  3. Minimum .NET Framework version for Configuration Manager
    • Resolved by installing .Net 4.0 Full Installer

Warning Items:

  • Schema Extensions
    • Resolved by installing Schema
      • Found here: mu_system_center_2012_configuration_manager_x86_x64_dvd_816412\SMSSETUP\BIN\I386
      • Run from command prompt: extadsch.exe
      • Then check log file at root of c:\ExtADSch.log
      • Look for:
        • <04-10-2012 13:26:53> Successfully extended the Active Directory schema.
  • WSUS SDK on Site Server
  • Verify site server permissions to publish to Active Directory
    • Get ready for this one….
    • OK first, open ADSIEdit.msc (if not installed, install it)
      • Right Click, Connect To
      • Take the detaults and click OK
      • Expand Default Naming context
      • Expand your domain
      • Expand CN=System
      • Right Click -> New -> Object
      • “Container” as the class


      • in VALUE put “System Management”


    • Then Click Finished
    • Right Click on new “CN=System Management” Folder -> Properties -> Security [TAB]
    • Click ADD
    • Click OBJECT TYPES
    • Uncheck everything, check only computers click ok


    • Type the NETBIOS name of the SCCM Server with a $ sign at the end of it. (Example: tmem03$)


    • Check off Full Control
    • Click APPLY (don’t close window)
    • Click Advanced
    • Find new ACL for our Computer Object


    • Click Edit
    • Change Apply To: from “This Object only” to “The object and all descendant objects”


    • Click OK three times to exit pop up windows.
    • Close ADSI Edit


  • SQL Server security mode
    • It was just warning me about SQL authentication, I ignored as it’s a lab
  • Configuration for SQL Server memory usage
    • It wants me to set a max limit on memory, I resolved this warning by setting the limit to 2GB (out of 4GB in my lab).
  • SQL Server process memory allocation
    • It tells me Configuration Manager 2012 REQUIRES that I set a minimum of 8GB for CMS and Primary sites (4GB for Secondary). I am just going to ignore it as it’s a “warning” and not a error.


Installing Configuration Manager:

  1. Run the unified installer
  2. Selected Custom Local Install
  3. Selected to install Configuration Manager
  4. Selected to install a Configuration Manager Central Administration Site
  5. Used Eval Licensing
  6. Accepted EULAs
  7. Selected a path for downloads
  8. Selected all Server Languages
  9. Selected all Client Languages
  10. Selected to use all Languages for mobile devices
  11. Setup CAS site code for a site named “Lab Central Admin Site”
  12. Kept default install folder
  13. Checked Install the Configuration Manager Console
  14. I put the dedicated SQL server
  15. Named the DB, “CM_CAS”
  16. Left the SSB Port at default
  17. Left the SMS Provider on the box I am going to install SCCM to.
    • I was debating if I should install directly to SQL or not.
  18. And clicked Next to install


Fix: The WinRM settings are not configured correctly | SCCM Unified Installer

Microsoft just released SCCM 2012 to VL customers. Very excited to tear into it. However I got stuck right in the beginning of the installer with:

The WinRM settings are not configured correctly


Well looking at the logs here:

\Users\<user>\AppData\Local\Microsoft System Center 2012\Unified Installer\LOGS

I discovered:

[4/10/2012 9:20:08 AM] DEBUG – Server: localhost, winrm\client\auth\CredSSP = False

All you need to do to fix this is run the following commands on the computer you are running the installer from:

winrm set winrm/config/client/auth @{CredSSP="True"}

winrm set winrm/config/client @{TrustedHosts="*"}

Also run these commands on the computer you are installing too (if it’s the same box just run all commands)

winrm qc -q
winrm set winrm/config/service/auth @{CredSSP="True"}
winrm set winrm/config/winrs @{AllowRemoteShellAccess="True"}
winrm set winrm/config/winrs @{MaxMemoryPerShellMB="2048"}

That should take care of you. Just in case it doesn’t the old other thing I had done was to add .Net 3.5.1, all RSAT Tools, and IIS from Roles and Features.

Hope it helps. If it does please leave a comment below and let me know this was worth my time posting 😉