ConfigMgr Console

Upgrade Operating System

Topics: ConfigMgr Console

Task Sequence Steps – Upgrade Operating System

This post is part of our Task Sequence – Beyond the Docs series.

This step is used during an in-place upgrade of your machine from and older version of windows to a newer version of windows, or in some cases, to the same version of windows. This step is the primary engine in an upgrade task sequence. Much of this step, you’re actually left blind to what is going on, as it fully hands off your machine to the Windows 10 Setup Engine, leaving you in the dark until after Setup is complete and it hands back control to the task sequence via the setupcomplete.cmd file that is triggered by the windows setup process. That’s about as long as an intro as I want, but buckle up, as this page is going to be long, because there is just so much ground to cover here.

MS Docs



Custom Actions

There are several command files you can create that get triggered through the Windows Setup Process, the Task Sequence uses a couple of them by default, and the rest are not used… but that doesn’t mean you can’t use them! Deep Dive Page about Custom Actions

  • Used by Task Sequence Dedicated Blog Post
    • SetupRollback.cmd – Used if Upgrade Fails, will trigger the Task Sequence to kick back in and sets the variable _SMSTSSetupRollback to True.
    • SetupComplete.cmd – Used to Trigger the Task Sequence after the successful upgrade. C:WindowsSMSTSPostUpgradeSetupComplete.cmd & the log File: C:WindowsSetupComplete.log Upgrade OS Image 10Upgrade OS Image 9
  • Windows Only MS Docs – Custom Actions
    • preinstall.cmd
    • precommit.cmd
    • postuninstall.cmd
    • success.cmd
    • failure.cmd

The Step

Upgrade OS Image 1

You have several options, only one required, your upgrade Media. After you’ve set that, then choose the other options to fit your needs.

Driver Content

  • You can pick an actual Driver Package, but this is just plain crazy talk. Unless you have one driver package that works for all your models, this would force you to have an upgrade step per model and control with conditions. This is why I’ve never seen this done, but I’ve seen “Staged Content” Selected, with a variable which contains the location of the drivers.Upgrade OS Image 2

OSDSetupAdditionalUpgradeOptions Variable

  • You can modify the setup command line by leveraging the OSDSetupAdditionalUpgradeOptions variable, using a “Set Task Sequence Variable” step. More info about Command line Arguments on MS Docs for Windows 10 Setup Commands
    Upgrade OS Image 43

Other Options

  • Time-out
    • I’ve not seen a good reason to use this, but it’s basically there by default
  • Perform Windows Setup compatibility scan without starting upgrade
    • This is useful to get an idea if there are any hard blockers on your systems before you run the upgrade. This is also a good way to pre-cache the content on the machines before you run the upgrade as it requires the same content. I’d highly recommend running this on all endpoints before upgrading, and using the results for reporting. (/Compat ScanOnly)
  • Ignore any dismissible compatibility messages
    • This will have the setup engine ignore any notifications that you would see if running the setup process manually when there are warnings about items on your system, and it tells you that setup will ignore those, or remove them as part of the upgrade. (/Compat IgnoreWarning)
  • Dynamically update Windows Setup with Windows Update

<div class=”NOTE alert alert-note”><h5>NOTE</h5><p><p>Enabling Dynamic Updates has the potential to do very bad things as it can literally download gigabytes of content per machine, which can slow down the upgrade process dramatically if the machine has a slow link, or bring down your network by utilizing your organization’s bandwidth by having many machines reaching out to microsoft at the same time.</p>

  • Override policy and use default Microsoft Update
    • This will ignore the settings on your machine and go right out to Microsoft
Upgrade OS Image 5

You can see the Windows 10 Setup Engine Command line is created based on those options along with the OSDSetupAdditionalUpgradeActions as I’ve highlighted above.

Ok, Demo time!

Demo 1 – Compatibility Scan

This first demo we’re going to dive into running the step in compatibility scan mode.
Upgrade OS Image 3

The Step starts out by gathering the information in the variables set that correspond to the step in the TS and options selected, then learning about the Image you’re about to use for the upgrade.

Upgrade OS Image 6
Upgrade OS Image 7
Upgrade OS Image 8

So in this set of logs, we see the basics of this step. The step starts out by determining what the step needs to do based on the options (variables) of the step. The Step then checks the Upgrade Package to make sure it’s compatible with the system you’re going to upgrade. The step then triggers the setup engine and does the task we told it to do. In this example, it runs the compat scan, and it’s pretty quick returning back no issue.

Demo 2 – Failed Compat Scan

In this demo, I have a software that is not compatible with the upgrade process and when installed actually blocks the machine from upgrading.
Upgrade OS Image11
In that log, the error comes back with the hex code, which you can look up some basic ones on the MS Doc Site. To get more details on the local machine, head over to the Panther folder.
Upgrade OS Image13
Once there, check out the newest CompatData XML file.
Upgrade OS Image12
Here the Hard Blocker will be listed.

Demo 3 – Upgrade from 1809 to 1909

This will be a regular successful upgrade from 1809 to 1909 to explain what the step is doing.

  • Step Starts in Online Stage (DownLevel Phase)
  • Confirms Upgrade Package is compatible
  • Installs CM Custom SetupComplete.cmd & SetupRollback.cmd
  • Disables the CCM Client and places in to Provisioning Mode
  • Builds and executes the Setup Command Line
  • Monitors the Registry “SetupProgress” Value and reports it in the UI
  • Reboots into SafeOS Phase
    • At this point ConfigMgr is “blind” for awhile, and if you have any issues, you’d need to look at the Windows Panther Setup Logs
  • Reboots into First Boot Phase
  • Reboots into Second Boot Phase
    • At this point, the Task Sequence is triggered by the SetupComplete.cmd file
      • As of CM 2006, the SetupComplete.cmd is no longer shown during the process. You’ll see it popup for about a second before it minimizes and you can no longer see it.
        • This was done by adding this to the SetupComplete.cmd
        powershell.exe -noprofile -executionpolicy bypass -window hidden -command ""
      • SetupComplete.cmd is triggered by having these registry keys:
          • CmdLine (REG_SZ = C:WindowsSMSTSPostUpgradeSetupComplete.cmd)
          • SetupType (DWord = 2)
        • Those keys are cleared out after SetupComplete.cmd runs
          • CmdLine (Blank)
          • SetupType (DWord = 0)

<div class=”TIP alert alert-tip”><h5>TIP</h5><p><p>You could totally hijack those registry values and use it to do your bidding.. probably not supported, more info on <a href=””>GARYTOWN Blog Post</a></p>

Upgrade OS Image15
Upgrade OS Image14
Upgrade OS Image18
Below I have the SetupComplete log showing when it triggered the “Wait” and when it then triggers the TS (TSMBootstrap.exe) and where it aligns to the smsts.log
Upgrade OS Image19
After the TS kicks back in, it triggers the repair of the CM Client, then waits for the CM Client to be come active. The Reason for the SetupComplete Pause was that sometimes, especially on slow machines, the WMI Namespace wasn’t fully migrated by the time the CM Client was being repaired, and then it would throw errors “Invalid name space”, so by adding a pause, it provided more time for the migration of the WMI Namespace to be completed so when the client is repaired, it would find the namespace and not error.
Upgrade OS Image20
Shortly after the client is working again, another restart is triggered. Below I’m showing the SetupComplete.cmd file (Bottom Right), along with the SetupComplete.log (TopRight), and the SMSTS.log (Left) to show how the logs line up with the command file.
There is an additional reboot that relies on the SetupComplete.cmd file, the first one exits with a specific exit code, which tells the SetupComplete.cmd file to stage the system to run TSMBootstrap again by setting a registry value, because a reboot is coming. The next time, it exits with a 0 code, and lets you know there is no reboot triggered and resets the registry. I’ve color coded the image to note the sections of the logs and command file that correspond to each other.
Upgrade OS Image21
All of that happens before the next step in the task sequence, in my test task sequence, the next step I had was to pause the TS, to make it easier to confirm logs and time lines.

Here back in the console, we can see the TS Progress UI. Below is right as the Setup Engine is ending, SetupComplete ran the first time, trigging the TSMBootstrap.exe to kick the TS Back in and the TS is slowing coming back to life.
Upgrade OS Image24
As the TS kicks in, it triggers a CM Client repair (ccmsetup.exe / remediate), it then stays on that screen until the client starts, if you were looking at the SMSTS.log during this image below, you’d see the client starting, then all of the red lines “Failed to start the CCM client 0x8007022”, over and over, until the service is started, which then triggers another reboot…
Upgrade OS Image22

Upgrade OS Image23
At this point, the system is rebooting and going to be triggering the SetupComplete.cmd file for the second time, this corresponds to the image above with the SetupComplete.log file. The System reboots into the black “Splash Screen” with the spinning wheel, where it stays for rest of the TS. The SetupComplete Runs again, and triggers the Task Sequence, and loads the ProgressUI, and it then continues into the next step, as shown below. In my Example, I have the step “Pause – Command Prompt” as the step directly following the upgrade, which made it easier for me look at logs and grab a screen capture.

Upgrade OS Image16
Upgrade OS Image17
After the upgrade and you logon, you’ll see the upgrade has removed all my customizations.

Demo 4 – Successful Upgrade with Drivers

This is 95% the same as the last situation, but I’ll show just the few changes to apply drivers.
Upgrade OS Image32
Upgrade OS Image31
Upgrade OS Image30
The Command Line CM Builds adds the /installdrivers switch with the location to the drivers, where were stored in the DRIVERS01 variable.
Then during the upgrade, the Setup Engine applies those drivers.

One thing to note, if you tell it to use drivers, and don’t provide drivers, bad things also happen:
Upgrade OS Image33
Most of the time I saw the error 0x80070003 it was because drivers didn’t download properly, or something with drivers went wrong. Build some additional logic into your TS to avoid this problem.

Demo 5 – Failed Upgrade Downlevel Phase

This demo will be a failure during the Downlevel Phase of the Setup Engine, to simulate failures, I’ll be doing hard resets during the upgrade.
Here I started the Upgrade, and at 12% I reset the machine
Upgrade OS Image25
After Restart and Logon:
Upgrade OS Image26
The CM Client is currently in Provisioning Mode, and the CM Client is Diabled.
To resolve that:

Invoke-WmiMethod -Namespace "rootccm" -Class "SMS_Client" -Name "SetClientProvisioningMode" $false


Those commands will restore the CM Client and allow you to launch Software Center:
Upgrade OS Image27
However, at this point the Task Sequence engine is hung and the Client won’t do much until you clear that out.

Get-WmiObject -Namespace RootCCMSoftMgmtAgent -Class CCM_TSExecutionRequest | Remove-WmiObject

Upgrade OS Image28
You can see that cleared out the TS and it doesn’t even show in software center currently.
But the SMSTSLogsmsts.log is still there! Lets clear that out too.

Set-Service smstsmgr -StartupType manual
Start-Service smstsmgr

Upgrade OS Image29
Here the smsts log has merged back into the parent folder and completely cleared out the task sequence. A quick refresh of software center now shows the TS there and that is has failed. At this point, you could trigger the upgrade again, but I’d still recommend a reboot before trying that.

Demo 6 – Failed Upgrade SafeOS / First or Second Boot Phase

This demo will be a failure during the other Phases of the Setup Engine, to simulate failures, I’ll be doing hard resets during the upgrade. Just to note, a failure in any of phases after the Downlevel phase, you get the same results from the Task Sequence.

For this test, I’ve added a Pause in the Rollback Group to confirm that Rollback is triggered:
Upgrade OS Image34
In the Image Below, I’ve kicked off the Upgrade and it is now past the reboot into the SafeOS phase. I’m now during a hard reset. (Unexpected Reboot)
Upgrade OS Image35
The OS starts it’s recovery of undoing changes:
Upgrade OS Image36
The Setup Engine triggers SetupRollback.cmd, which triggers the BootStrap and you’ll see the TS Progress UI reappear:
Upgrade OS Image37
While the TSProgressUI is showing above, this is what is going on in the logs:
Upgrade OS Image38
The SetupRollback.cmd kicks off, triggering the TSMBootstrap, which kicks the Task sequence back into gear. It also sets the Var _SMSTSSetupRollback = True.
The TS then checks the CM Client, finding that because the machine didn’t upgrade, but rolled back, it does not need to remediate the client, just enable it:
Upgrade OS Image39
Upgrade OS Image40
Now the the TS has “Successfully” Completed the OS Upgrade Step, it can continue on, and when it comes to the Rollback Group, now that_SMSTSSetupRollback is true, it will run that group and my Pause Step:
Upgrade OS Image41
Upgrade OS Image42

At this point, it would continue to run rest of your Task Sequence and exit gracefully.

You can see the difference between a reboot happening during the downlevel phase vs happening after that. You’d much rather it happen after the first reboot, as the TS recovers and the CM Client is ok. This is the reason we’ve chosen to use the “/MigNEO disabled” switch, to get the upgrade past the downlevel phase as fast as possible when running the upgrade via a Task Sequence.


Testing for yourself

  • If you want to understand this process more and run some tests yourself, I’d recommend following the basic outline of how I ran my tests.
  • Very Simple Task Sequence, set a few variables and options, and then set a pause after the upgrade step. Also consider using the Task Sequence Debugger
  • Delete the smsts.log file before you start the upgrade as well, making it easier to find the part of the log you want.
  • Open a “Remote CMTrace” to the machine (\ComputerNameC$ccmlogssmstslogsmsts.log) so you can watch the logs on another machine as the upgrade goes.

Use Updated Media

  • If you can’t enable the “Dynamic Updates” in the step, make sure you update the media offline using WimWitch or OSDBuilder.
  • Check VLSC for update media regularly, then use that for your Base that you update regularly.
  • Dynamic Updates, I can’t speak enough for the importance of including dynamic updates

Common issues

  • To be fair, this step doesn’t have issues, it performs as expected 100% of the time. The part that has issues, is the Windows 10 Setup engine. But since the Windows 10 Setup Engine is tied so closely to this step, lines often gets blurred and users / other IT folks often say “The TS Failed” when it was a Windows Setup issue due to an compatibility problem or something else that failed, but since it happened during the task sequence, the ConfigMgr admin is usually on the hook to figure it out.
    • Pre-Screen machines for upgrade, run reports to find machines with low disk space, or other low resources. Find machines with down level software.
  • Windows 10 Upgrade Issues
    • Get to know how Windows 10 upgrade works, look at generic Windows 10 documentation.
    • 3rd Party Security Software.
      • Full Disk Encryption software with Pre-Boot has really caused problems, and it’s often model specific issues. Stick to Bitlocker
      • AntiVirus / AntiMalware / Scanning Tools. We’ve had these block parts of the Upgrade Process, and also block files during migration. Make sure you have all of the exceptions in place
        • c:Windowsccmcache
        • C:_SMSTaskSequence
        • C:$Windows.~BT
        • C:WindowsPanther
        • C:Windows.old
        • C:WindowsServiceProfilesNetworkServiceAppDataLocalPeerDistPub


At this point, hopefully you have a good understanding of what the step does, and as a bonus, a bit more about the Windows 10 upgrade engine as well. The MS Docs have gotten really well, much better than even a couple years ago when we were first getting used to this Windows as a Service world. If you have any additional scenarios you’d like me to demo, reach out to me on twitter: @gwblok or @RecastSoftware.

More Task Sequence Steps – Beyond the Docs

Find all of our Task Sequence – Beyond the Docs series posts here.

About Recast Software

1 in 3 organizations using Microsoft Configuration Manager rely on Right Click Tools to surface vulnerabilities and remediate quicker than ever before.
Download Free Tools
Request Pricing

Back to Top