Additional Upgrade Assistant Feedback/feature requests.
Posted: Mon Mar 01, 2021 4:28 pm
First, just wanted to hilight this post to make sure this was addressed, and didn't get lost in the other issue that thread was for originally, as it is still present from what I see: http://support.plugins4labtech.com/view ... 8414#p8414
Second, based on feedback from a client where we tried making use of the "Allow user to cancel" functionality:
- Can we set a custom amount of time for the prompt to allow the user to cancel?
- Instead of or in addition to the above, can we have the option of an "ask then deny" equivalent, where it asks the user if we can proceed and if they don't answer it just does not kick off?
- The "we are now upgrading you" popup locks the user completely out of doing anything during the upgrade. Would it be possible to allow this to be minimized so they can continue to work? If the "user cancel" option is not selected in the policy, it apparently runs in the background with no notification from what I've gathered so there doesn't seem to be a "safety" reason to keep this.
Third, would it be possible to add either some sort of "deployment window" per policy or a check so that if a machine is scheduled, goes offline in the interim, then comes online the next morning after missing the start time, the upgrade script will not go ahead and kick off anyways? While it does help make sure the upgrade gets done, it is resulting in users having their computer rebooted with no real warning that it could be coming(if the "allow user to cancel" option isn't selected).
Fourth, would it be possible to add the ability for recurrence in the schedule? I've got some machines that have been persistently offline, and I'd prefer to schedule them once to try on a daily or weekly basis while the appropriate people try to reach the users or client, rather than have to constantly re-schedule them over and over in case we are able to reach the people using those computers to make sure they get turned on and/or stay on.
As an alternative or way to handle the above (or potentially solve points 3 and 4 in one go), what about a "automatic deployment" option? Instead of manually scheduling everything we can maybe configure a group per policy and it will automatically push that policy to the computers in that group on a set recurring schedule. Since the script would be running against the group and not individual computers, it can skip the offline machines at the time of running and solve the issue in 3 at the same time. This would also help for onboarding new clients who might not be fully up to date with a minimum of work.
Lastly, on a very minor note: while the script does try to pull fresh system info in line 298, I don't see anywhere that re-sets the @WIndows10Version@ variable to match the new data, (and based on what I've seen it doesn't refresh itself) so the log in 305 and 301 will always show what version the computer was on previously.
I want to say I've also had mixed success with just "Resend System Information" updating the Windows version, and I usually do a "Resend Everything" when I'm manually checking - this also has the benefit of updating patch data so Automate's patch manager is updated on what patches the machine is missing post-upgrade.
Second, based on feedback from a client where we tried making use of the "Allow user to cancel" functionality:
- Can we set a custom amount of time for the prompt to allow the user to cancel?
- Instead of or in addition to the above, can we have the option of an "ask then deny" equivalent, where it asks the user if we can proceed and if they don't answer it just does not kick off?
- The "we are now upgrading you" popup locks the user completely out of doing anything during the upgrade. Would it be possible to allow this to be minimized so they can continue to work? If the "user cancel" option is not selected in the policy, it apparently runs in the background with no notification from what I've gathered so there doesn't seem to be a "safety" reason to keep this.
Third, would it be possible to add either some sort of "deployment window" per policy or a check so that if a machine is scheduled, goes offline in the interim, then comes online the next morning after missing the start time, the upgrade script will not go ahead and kick off anyways? While it does help make sure the upgrade gets done, it is resulting in users having their computer rebooted with no real warning that it could be coming(if the "allow user to cancel" option isn't selected).
Fourth, would it be possible to add the ability for recurrence in the schedule? I've got some machines that have been persistently offline, and I'd prefer to schedule them once to try on a daily or weekly basis while the appropriate people try to reach the users or client, rather than have to constantly re-schedule them over and over in case we are able to reach the people using those computers to make sure they get turned on and/or stay on.
As an alternative or way to handle the above (or potentially solve points 3 and 4 in one go), what about a "automatic deployment" option? Instead of manually scheduling everything we can maybe configure a group per policy and it will automatically push that policy to the computers in that group on a set recurring schedule. Since the script would be running against the group and not individual computers, it can skip the offline machines at the time of running and solve the issue in 3 at the same time. This would also help for onboarding new clients who might not be fully up to date with a minimum of work.
Lastly, on a very minor note: while the script does try to pull fresh system info in line 298, I don't see anywhere that re-sets the @WIndows10Version@ variable to match the new data, (and based on what I've seen it doesn't refresh itself) so the log in 305 and 301 will always show what version the computer was on previously.
I want to say I've also had mixed success with just "Resend System Information" updating the Windows version, and I usually do a "Resend Everything" when I'm manually checking - this also has the benefit of updating patch data so Automate's patch manager is updated on what patches the machine is missing post-upgrade.