This new year brings a new challenge for us SCCM administrator. The Speculation Control vulnerability (aka Spectre and Meltdown) affects many modern processors and operating systems and is considered critical to patch. The first challenge is to monitor who is vulnerable in your organization. The second one is to understand this beast and to remediates it. The important thing to know here is that a machine needs more than only a Windows OS patch to be compliant. There’s also a hardware level firmware updates to apply. This blog post will focus on the monitoring part to be able to show your management if you’re compliant or not.
We also included a free report to download in order to track your Spectre and Meltdown compliance level. You can jump at the end of this post if you want to download it and skip the reading.
SCCM Spectre Meltdown Configuration Baseline Creation
Luckily for us, Microsoft PFEs, Ken Wygant make the dirty work for us and has created an incredible job in turning a detection Powershell script into a ready-to-import SCCM Configuration Item and Baseline. They did a pretty good blog post explaining their work and we’ll use their CAB file in order to show you the step-by-step process in order to use it in your organization.
The first step is to download the CAB file.
- [Edit 01/15] Microsoft has released a new Configuration Baseline available on Technet Gallery. The new cab file will create only 2 CIs instead of 8 but the blog post is still relevant.
- In the SCCM Console, go to Assets and Compliance / Compliance Settings / Configuration Items
- Right-Click Import Configuration Data
- In the Import Configuration Data Wizard, click on Add
- On the security warning, click Yes
- The Configuration Baseline appears in the file window, click Next
- Review the Summary, click Next and complete the wizard
- Back in the Configuration Item pane, the 8 CI are created
- In the Configuration Baseline pane, the Baseline is created. This baseline contains the 8 CI and is ready to be deployed
SCCM Spectre Meltdown Configuration Baseline Deployment
We will now deploy the Configuration Baseline to a test collection in order to validate it.
- In the SCCM Console, go to Assets and Compliance / Compliance Settings / Configuration Baseline
- Right-Click the ADV180002 – Speculative Execution Side-channel Vulnerabilities Baseline and select Deploy
- Select the collection which contains your test machines by clicking Browse, select your compliance evaluation schedule and click Ok
SCCM Spectre Meltdown Workstation Validation
On a machine that receives the configuration baseline :
- In Control Panel, open the Configuration Manager Properties application
- Initiate a Machine Policy Retrieval & Evaluation Cycle to receive the baseline
- In the Configuration tab, click Refresh until the baseline appears
- Once the baseline is available, select the ADV18002 Baseline, click Evaluate and wait a couple of minutes
- Once the Last Evaluation Date get populated, click View Report
- Your browser will open the report showing the compliance state of this machine. In our screenshot, my machine has a compliant state in 4 out 8 CIs. This is because I’ve applied the Windows 10 OS patches but the hardware level has not been patched
- In the SCCM console, the compliance statistics will begin to populate. This will confirm that your work has been well made.
SCCM Spectre Meltdown Configuration Baseline Report
The console statistics are basic and doesn’t permit to know which machines are compliant or not. We’ve created a simple report to let you know the list of machines and their compliance state. This report will ask which Baseline to show, just select the baseline we just created in this blog post to see you Spectre / Meltdown statistics.
You can download this free report by visiting our product page. The Asset – Compliance State report is available in the Report / Asset Section.
Share this Post
Founder of System Center Dudes. Based in Montreal, Canada, Senior Microsoft SCCM Consultant, 5 times Enterprise Mobility MVP. Working in the industry since 1999. His specialization is designing, deploying and configuring SCCM, mass deployment of Windows operating systems, Office 365 and Intunes deployments.