Copy and paste this sample script and modify as needed for your environment:
<# .SYNOPSIS   GPO Deployment Script for Secure Boot Event Collection   Creates and links a GPO to deploy the collection script as a scheduled task
.DESCRIPTION   This script automates the deployment of Secure Boot event collection via Group Policy.   It creates a GPO with:   - A scheduled task that runs the collection script daily   - Proper permissions for writing to the central share   - WMI filters for targeting specific OS versions
.PARAMETER GPOName   Name for the new GPO
.PARAMETER DomainName   Target domain FQDN
.PARAMETER OUPath   Distinguished Name of the OU(s) to link the GPO to.   Accepts multiple OUs as an array. Not required if -AutoDetectOU is specified.
.PARAMETER AutoDetectOU Â Â Switch to interactively list and select OUs from Active Directory. Â Â When specified, -OUPath is optional.
.PARAMETER CollectionSharePath   UNC path where collection results will be stored
.PARAMETER ScriptSourcePath   Path where the collection script is stored (will be copied to SYSVOL)
.PARAMETER RandomDelayHours   Number of hours to randomly spread script execution across endpoints.   This prevents all machines from writing to the share simultaneously.   Default: 4 hours. Valid range: 1-24 hours.      Recommended values:   - 1-10K devices: 4 hours (default)   - 10K-50K devices: 8 hours   - 50K+ devices: 12-24 hours
.EXAMPLE Â Â .\Deploy-GPO-SecureBootCollection.ps1 -DomainName "contoso.com" -OUPath "OU=Workstations,DC=contoso,DC=com"
.EXAMPLE Â Â .\Deploy-GPO-SecureBootCollection.ps1 -DomainName "contoso.com" -OUPath "OU=Workstations,DC=contoso,DC=com" -RandomDelayHours 8
.EXAMPLE Â Â .\Deploy-GPO-SecureBootCollection.ps1 -DomainName "contoso.com" -AutoDetectOU Â Â Â Â Â Lists all OUs in the domain and prompts for selection.
.EXAMPLE Â Â .\Deploy-GPO-SecureBootCollection.ps1 -DomainName "contoso.com" -OUPath @("OU=Workstations,DC=contoso,DC=com", "OU=Laptops,DC=contoso,DC=com") Â Â Â Â Â Links GPO to multiple OUs in a single run.
.NOTES   Requires: Active Directory PowerShell module, Group Policy module   Must be run with Domain Admin or delegated GPO creation rights #>
[CmdletBinding()] param( Â Â [Parameter(Mandatory = $false)] Â Â [string]$GPOName = "SecureBoot-EventCollection", Â Â Â Â Â [Parameter(Mandatory = $false)] Â Â [string]$DomainName, Â Â Â Â Â [Parameter(Mandatory = $false)] Â Â [string[]]$OUPath, Â Â Â Â Â [Parameter(Mandatory = $false)] Â Â [switch]$AutoDetectOU, Â Â Â Â Â [Parameter(Mandatory = $false)] Â Â [string]$CollectionSharePath = "\\$DomainName\NETLOGON\SecureBootLogs", Â Â Â Â Â [Parameter(Mandatory = $false)] Â Â [string]$ScriptSourcePath = ".\Detect-SecureBootCertUpdateStatus.ps1", Â Â Â Â Â [Parameter(Mandatory = $false)] Â Â [ValidateSet("Daily", "Weekly", "AtStartup")] Â Â [string]$Schedule = "Daily", Â Â Â Â Â [Parameter(Mandatory = $false)] Â Â [string]$ScheduleTime = "14:00", Â Â Â Â Â [Parameter(Mandatory = $false)] Â Â [ValidateRange(1, 24)] Â Â [int]$RandomDelayHours = 4 )
#Requires -Modules ActiveDirectory, GroupPolicy #Requires -Version 5.1
$ErrorActionPreference = "Stop" $DownloadUrl = "https://aka.ms/getsecureboot" $DownloadSubPage = "Deployment and Monitoring Samples"
# ============================================================================ # DEPENDENCY VALIDATION # ============================================================================
function Test-ScriptDependencies {   param(     [Parameter(Mandatory = $true)]     [string]$ScriptDirectory,          [Parameter(Mandatory = $true)]     [string[]]$RequiredScripts   )      $missingScripts = @()      foreach ($script in $RequiredScripts) {     $scriptPath = Join-Path $ScriptDirectory $script     if (-not (Test-Path $scriptPath)) {       $missingScripts += $script     }   }      if ($missingScripts.Count -gt 0) {     Write-Host ""     Write-Host ("=" * 70) -ForegroundColor Red     Write-Host "  MISSING DEPENDENCIES" -ForegroundColor Red     Write-Host ("=" * 70) -ForegroundColor Red     Write-Host ""     Write-Host "The following required scripts were not found:" -ForegroundColor Yellow     foreach ($script in $missingScripts) {       Write-Host "  - $script" -ForegroundColor White     }     Write-Host ""     Write-Host "Please download the latest scripts from:" -ForegroundColor Cyan     Write-Host "  URL: $DownloadUrl" -ForegroundColor White     Write-Host "  Navigate to: '$DownloadSubPage'" -ForegroundColor White     Write-Host ""     Write-Host "Extract all scripts to the same directory and run again." -ForegroundColor Yellow     Write-Host ""     return $false   }      return $true }
# The Detect script is required - it gets deployed to endpoints via GPO $requiredScripts = @( Â Â "Detect-SecureBootCertUpdateStatus.ps1" )
if (-not (Test-ScriptDependencies -ScriptDirectory $PSScriptRoot -RequiredScripts $requiredScripts)) { Â Â exit 1 }
# ============================================================================ # AUTO-DETECT DOMAIN NAME # ============================================================================
if (-not $DomainName) {   $DomainName = $env:USERDNSDOMAIN   if (-not $DomainName) {     # Try to get from AD module     try {       Import-Module ActiveDirectory -ErrorAction Stop       $DomainName = (Get-ADDomain).DNSRoot     } catch {       Write-Host "ERROR: Could not auto-detect domain name." -ForegroundColor Red       Write-Host "Please specify -DomainName parameter." -ForegroundColor Yellow       Write-Host ""       Write-Host "Example:" -ForegroundColor Gray       Write-Host "  .\Deploy-GPO-SecureBootCollection.ps1 -DomainName contoso.com -AutoDetectOU" -ForegroundColor White       exit 1     }   }   Write-Host "Auto-detected domain: $DomainName" -ForegroundColor Green }
# Set CollectionSharePath default if not explicitly provided if (-not $PSBoundParameters.ContainsKey('CollectionSharePath')) { Â Â $CollectionSharePath = "\\$DomainName\NETLOGON\SecureBootLogs" }
Write-Host "============================================" -ForegroundColor Cyan Write-Host "Secure Boot Collection - GPO Deployment" -ForegroundColor Cyan Write-Host "============================================" -ForegroundColor Cyan
# Validate prerequisites Write-Host "`n[1/6] Validating prerequisites..." -ForegroundColor Yellow
if (-not (Get-Module -ListAvailable -Name ActiveDirectory)) { Â Â throw "ActiveDirectory module not found. Install RSAT tools." }
if (-not (Get-Module -ListAvailable -Name GroupPolicy)) { Â Â throw "GroupPolicy module not found. Install RSAT tools." }
Import-Module ActiveDirectory Import-Module GroupPolicy
# Validate domain connectivity try {   $domain = Get-ADDomain -Server $DomainName   Write-Host "  Connected to domain: $($domain.DNSRoot)" -ForegroundColor Green } catch {   throw "Cannot connect to domain: $DomainName. Error: $_" }
# Handle OU selection if ($AutoDetectOU) {   Write-Host "`n  Discovering OUs in domain..." -ForegroundColor Cyan   $allOUs = Get-ADOrganizationalUnit -Filter * -Server $DomainName |     Sort-Object DistinguishedName |     Select-Object @{N='Index';E={0}}, Name, DistinguishedName      # Assign indices   for ($i = 0; $i -lt $allOUs.Count; $i++) {     $allOUs[$i].Index = $i + 1   }      Write-Host "`n  Available OUs:" -ForegroundColor Yellow   Write-Host "  ---------------------------------------------------------------------" -ForegroundColor DarkGray   $allOUs | ForEach-Object {     Write-Host ("  {0,3}) {1}" -f $_.Index, $_.DistinguishedName) -ForegroundColor White   }   Write-Host "  ---------------------------------------------------------------------" -ForegroundColor DarkGray   Write-Host "  Tip: Enter comma-separated numbers to select multiple OUs (e.g., 1,3,5)" -ForegroundColor DarkGray   Write-Host "     Enter 'A' to select ALL OUs" -ForegroundColor DarkGray   Write-Host ""      $selection = Read-Host "  Select OU(s) to link GPO"      if ($selection -eq 'A' -or $selection -eq 'a') {     $OUPath = $allOUs.DistinguishedName     Write-Host "  Selected ALL $($OUPath.Count) OUs" -ForegroundColor Green   } else {     $indices = $selection -split ',' | ForEach-Object { [int]$_.Trim() }     $OUPath = @()     foreach ($idx in $indices) {       $selected = $allOUs | Where-Object { $_.Index -eq $idx }       if ($selected) {         $OUPath += $selected.DistinguishedName       } else {         Write-Warning "Invalid index: $idx - skipping"       }     }   }      if ($OUPath.Count -eq 0) {     throw "No OUs selected. Aborting."   }      Write-Host "`n  Selected $($OUPath.Count) OU(s):" -ForegroundColor Green   $OUPath | ForEach-Object { Write-Host "    - $_" -ForegroundColor Gray }    } elseif (-not $OUPath -or $OUPath.Count -eq 0) {   throw "Either -OUPath or -AutoDetectOU must be specified." } else {   # Validate each OU exists   foreach ($path in $OUPath) {     try {       $ou = Get-ADOrganizationalUnit -Identity $path -Server $DomainName       Write-Host "  Target OU found: $($ou.Name)" -ForegroundColor Green     } catch {       throw "OU not found: $path"     }   } }
# Validate source script exists if (-not (Test-Path $ScriptSourcePath)) { Â Â throw "Collection script not found: $ScriptSourcePath" }
# Step 2: Create collection share structure Write-Host "`n[2/6] Setting up collection share..." -ForegroundColor Yellow
$sysvolScriptPath = "\\$DomainName\SYSVOL\$DomainName\Scripts\SecureBootCollection"
# Create SYSVOL script folder if (-not (Test-Path $sysvolScriptPath)) {   New-Item -ItemType Directory -Path $sysvolScriptPath -Force | Out-Null   Write-Host "  Created SYSVOL script folder: $sysvolScriptPath" -ForegroundColor Green }
# Copy collection script to SYSVOL $destScript = Join-Path $sysvolScriptPath "Detect-SecureBootCertUpdateStatus.ps1"
# Remove existing destination if it's a directory (fix for Copy-Item bug) if (Test-Path $destScript -PathType Container) { Â Â Remove-Item $destScript -Recurse -Force }
Copy-Item -Path $ScriptSourcePath -Destination $destScript -Force Write-Host " Â Copied collection script to SYSVOL" -ForegroundColor Green
# Create a wrapper script that calls the main script with parameters $wrapperScript = @" # Secure Boot Event Collection Wrapper # Auto-generated by Deploy-GPO-SecureBootCollection.ps1
`$ErrorActionPreference = 'SilentlyContinue'
# Configuration `$CollectionShare = '$CollectionSharePath' `$ScriptPath = '$sysvolScriptPath\Detect-SecureBootCertUpdateStatus.ps1'
# Run collection with -OutputPath parameter if (Test-Path `$ScriptPath) { Â Â & `$ScriptPath -OutputPath `$CollectionShare } else { Â Â Write-EventLog -LogName Application -Source "SecureBootCollection" -EventId 1001 -EntryType Error -Message "Collection script not found: `$ScriptPath" } "@
$wrapperPath = Join-Path $sysvolScriptPath "Run-SecureBootCollection.ps1" $wrapperScript | Out-File -FilePath $wrapperPath -Encoding UTF8 -Force Write-Host " Â Created wrapper script" -ForegroundColor Green
# Create collection share (if on a file server) Write-Host " Â Collection share path: $CollectionSharePath" -ForegroundColor Cyan Write-Host " Â NOTE: Ensure this share exists with 'Domain Computers' write access" -ForegroundColor Yellow
# Step 3: Create the GPO Write-Host "`n[3/6] Creating Group Policy Object..." -ForegroundColor Yellow
# Check if GPO already exists $existingGPO = Get-GPO -Name $GPOName -Domain $DomainName -ErrorAction SilentlyContinue
if ($existingGPO) {   Write-Host "  GPO '$GPOName' already exists. Updating..." -ForegroundColor Yellow   $gpo = $existingGPO } else {   $gpo = New-GPO -Name $GPOName -Domain $DomainName -Comment "Deploys Secure Boot event collection script to endpoints"   Write-Host "  Created GPO: $GPOName" -ForegroundColor Green }
# Step 4: Configure Scheduled Task via GPO Preferences Write-Host "`n[4/6] Configuring scheduled task..." -ForegroundColor Yellow
# Build the scheduled task XML # RandomDelay spreads execution across endpoints to prevent server overload Write-Host " Â Random delay: $RandomDelayHours hours (spreads load across fleet)" -ForegroundColor Cyan
$taskTrigger = switch ($Schedule) {   "Daily" {     @"     <CalendarTrigger>      <StartBoundary>2024-01-01T${ScheduleTime}:00</StartBoundary>      <Enabled>true</Enabled>      <ScheduleByDay>       <DaysInterval>1</DaysInterval>      </ScheduleByDay>      <RandomDelay>PT${RandomDelayHours}H</RandomDelay>     </CalendarTrigger> "@   }   "Weekly" {     @"     <CalendarTrigger>      <StartBoundary>2024-01-01T${ScheduleTime}:00</StartBoundary>      <Enabled>true</Enabled>      <ScheduleByWeek>       <WeeksInterval>1</WeeksInterval>       <DaysOfWeek>        <Wednesday />       </DaysOfWeek>      </ScheduleByWeek>      <RandomDelay>PT${RandomDelayHours}H</RandomDelay>     </CalendarTrigger> "@   }   "AtStartup" {     # For startup triggers, use Delay to add random start time     # Each machine will start between 5 and (5 + RandomDelayHours*60) minutes after boot     $maxDelayMinutes = 5 + ($RandomDelayHours * 60)     @"     <BootTrigger>      <Enabled>true</Enabled>      <Delay>PT5M</Delay>      <RandomDelay>PT${RandomDelayHours}H</RandomDelay>     </BootTrigger> "@   } }
$scheduledTaskXML = @" <?xml version="1.0" encoding="UTF-16"?> <Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">  <RegistrationInfo>   <Description>Collects Secure Boot event data for enterprise census</Description>   <Author>Enterprise Security</Author>  </RegistrationInfo>  <Triggers>   $taskTrigger  </Triggers>  <Principals>   <Principal id="Author">    <UserId>S-1-5-18</UserId>    <RunLevel>HighestAvailable</RunLevel>   </Principal>  </Principals>  <Settings>   <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>   <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>   <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>   <AllowHardTerminate>true</AllowHardTerminate>   <StartWhenAvailable>true</StartWhenAvailable>   <RunOnlyIfNetworkAvailable>true</RunOnlyIfNetworkAvailable>   <IdleSettings>    <StopOnIdleEnd>false</StopOnIdleEnd>    <RestartOnIdle>false</RestartOnIdle>   </IdleSettings>   <AllowStartOnDemand>true</AllowStartOnDemand>   <Enabled>true</Enabled>   <Hidden>false</Hidden>   <RunOnlyIfIdle>false</RunOnlyIfIdle>   <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>   <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>   <WakeToRun>false</WakeToRun>   <ExecutionTimeLimit>PT1H</ExecutionTimeLimit>   <Priority>7</Priority>  </Settings>  <Actions Context="Author">   <Exec>    <Command>powershell.exe</Command>    <Arguments>-NoProfile -ExecutionPolicy Bypass -File "$wrapperPath"</Arguments>   </Exec>  </Actions> </Task> "@
# Save task XML to SYSVOL for reference/backup $taskXmlPath = Join-Path $sysvolScriptPath "SecureBootCollection-Task.xml" $scheduledTaskXML | Out-File -FilePath $taskXmlPath -Encoding Unicode -Force Write-Host " Â Saved scheduled task XML to SYSVOL (backup)" -ForegroundColor Green
# Inject scheduled task into GPO Preferences Write-Host " Â Injecting scheduled task into GPO Preferences..." -ForegroundColor Cyan
$gpoId = $gpo.Id.ToString() $gpoPrefPath = "\\$DomainName\SYSVOL\$DomainName\Policies\{$gpoId}\Machine\Preferences\ScheduledTasks"
# Create Preferences folder structure if (-not (Test-Path $gpoPrefPath)) { Â Â New-Item -ItemType Directory -Path $gpoPrefPath -Force | Out-Null }
# Generate unique GUID for the task $taskGuid = [guid]::NewGuid().ToString("B").ToUpper()
# Build GPO Preferences ScheduledTasks.xml format # This is different from standard Task Scheduler XML - it's GPP format $gppScheduledTasksXml = @" <?xml version="1.0" encoding="utf-8"?> <ScheduledTasks clsid="{CC63F200-7309-4ba0-B154-A71CD118DBCC}">  <TaskV2 clsid="{D8896631-B747-47a7-84A6-C155337F3BC8}" name="SecureBoot-EventCollection" image="0" changed="$(Get-Date -Format 'yyyy-MM-dd HH:mm:ss')" uid="$taskGuid" userContext="0" removePolicy="0">   <Properties action="C" name="SecureBoot-EventCollection" runAs="NT AUTHORITY\System" logonType="S4U">    <Task version="1.3">     <RegistrationInfo>      <Author>Enterprise Security</Author>      <Description>Collects Secure Boot certificate status for enterprise compliance monitoring</Description>     </RegistrationInfo>     <Principals>      <Principal id="Author">       <UserId>NT AUTHORITY\System</UserId>       <LogonType>S4U</LogonType>       <RunLevel>HighestAvailable</RunLevel>      </Principal>     </Principals>     <Settings>      <IdleSettings>       <Duration>PT10M</Duration>       <WaitTimeout>PT1H</WaitTimeout>       <StopOnIdleEnd>false</StopOnIdleEnd>       <RestartOnIdle>false</RestartOnIdle>      </IdleSettings>      <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>      <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>      <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>      <AllowHardTerminate>true</AllowHardTerminate>      <StartWhenAvailable>true</StartWhenAvailable>      <RunOnlyIfNetworkAvailable>true</RunOnlyIfNetworkAvailable>      <AllowStartOnDemand>true</AllowStartOnDemand>      <Enabled>true</Enabled>      <Hidden>false</Hidden>      <RunOnlyIfIdle>false</RunOnlyIfIdle>      <WakeToRun>false</WakeToRun>      <ExecutionTimeLimit>PT1H</ExecutionTimeLimit>      <Priority>7</Priority>     </Settings>     <Triggers>      $taskTrigger     </Triggers>     <Actions Context="Author">      <Exec>       <Command>powershell.exe</Command>       <Arguments>-NoProfile -ExecutionPolicy Bypass -File "$wrapperPath"</Arguments>      </Exec>     </Actions>    </Task>   </Properties>  </TaskV2> </ScheduledTasks> "@
# Write GPP ScheduledTasks.xml to GPO $gppXmlPath = Join-Path $gpoPrefPath "ScheduledTasks.xml" $gppScheduledTasksXml | Out-File -FilePath $gppXmlPath -Encoding UTF8 -Force Write-Host " Â [OK] Scheduled task injected into GPO" -ForegroundColor Green Write-Host " Â Task schedule: $Schedule at $ScheduleTime with $RandomDelayHours hour random delay" -ForegroundColor Gray
# Step 5: Link GPO to OU(s) Write-Host "`n[5/6] Linking GPO to OU(s)..." -ForegroundColor Yellow
$linkedCount = 0 $skippedCount = 0
foreach ($targetOU in $OUPath) { Â Â $existingLink = Get-GPInheritance -Target $targetOU -Domain $DomainName |Â Â Â Â Â Select-Object -ExpandProperty GpoLinks |Â Â Â Â Â Where-Object { $_.DisplayName -eq $GPOName }
  if (-not $existingLink) {     New-GPLink -Name $GPOName -Target $targetOU -Domain $DomainName -LinkEnabled Yes | Out-Null     Write-Host "  [OK] Linked to: $targetOU" -ForegroundColor Green     $linkedCount++   } else {     Write-Host "  - Already linked: $targetOU" -ForegroundColor Yellow     $skippedCount++   } }
Write-Host "`n  Summary: $linkedCount new links, $skippedCount already existed" -ForegroundColor Cyan
# Step 6: Create WMI Filter (optional - for Windows 10/11 only) Write-Host "`n[6/6] Creating WMI filter..." -ForegroundColor Yellow
$wmiFilterName = "Windows 10 and 11 Workstations" $wmiQuery = 'SELECT * FROM Win32_OperatingSystem WHERE Version LIKE "10.%" AND ProductType = "1"'
Write-Host @"     [NOTE] OPTIONAL: Create WMI Filter in GPMC     Filter Name: $wmiFilterName   Query: $wmiQuery     This filters the GPO to only apply to Windows 10/11 workstations.
"@ -ForegroundColor Yellow
# Summary Write-Host "`n============================================" -ForegroundColor Cyan Write-Host "DEPLOYMENT COMPLETE" -ForegroundColor Green Write-Host "============================================" -ForegroundColor Cyan Write-Host @"
Summary: - GPO Name: $GPOName - Target OU: $OUPath - Collection Share: $CollectionSharePath - Script Location: $sysvolScriptPath - Schedule: $Schedule at $ScheduleTime
Next Steps: 1. Create the collection share with proper permissions:   - Share: $CollectionSharePath   - Permissions: Domain Computers (Write), Domain Admins (Full)
2. Complete the scheduled task configuration in GPMC (see instructions above)
3. Run 'gpupdate /force' on a test machine to verify deployment
4. Monitor collection results in: $CollectionSharePath
5. Run aggregation script to generate reports: Â Â .\Aggregate-SecureBootData.ps1 -InputPath "$CollectionSharePath"
"@ -ForegroundColor White Â
​​​​​​​