Update Dell devices with Dell Command Update using Intune

8 minute read

UPDATED: 9th of August 2024 w. DCU 5.4

This topic is not sexy at all to talk about in IT, but it is nonetheless getting more important for security reasons, due to the many security updates now included in BIOS, Driver and firmware updates in newer times.

In todays day and age it’s super important to ensure your drivers and BIOS is up-to-date. Not only is there always a bunch of functionality fixes but security issues is also patched. Depending on your flavor of hardware vendor, Dell, HP or Lenovo, each of them have their own tools to manage and push driver and BIOS updates. However, it’s also worth mentioning, since the release of the driver update management module in Intune the reasons to use the hardware vendors own tools grows less and less, as the Intune Driver Update management module gets better.

The one reason you should still consider using the hardware vendors own tools. is speed of delivery. Driver and BIOS updates are released instantly, and depending on the hardware vendor, there can be several months delay before they are released via Windows Update. That’s not neccessarily the fault of Microsoft, it’s mostly the hardware vendors themselves that decides when and if to release updates via Windows Update.

In this blog post, we will go through what we can do with Dell devices using Dell’s own Dell Command Update.

Getting started - Packaging Dell Command Update

In case you don’t have Dell Command Update in Intune as a Win32 app, you can steal my .intunewin file here for version 5.4. Add the app into intune as a Win32 app:

  • Install command: Dell-Command-Update-Windows-Universal-Application_9M35M_WIN_5.4.0_A00.EXE /s /l=C:\Windows\Logs\Dell_Command_Update_5.4_exe_installer.log
  • Uninstall command: msiexec /X {C7922436-4088-4256-9C99-8E48CC89AA4E} /qn
  • Required disk space: 500MB
  • Detection, MSI String: {C7922436-4088-4256-9C99-8E48CC89AA4E}

Set return code 2 as “Success” as well, to ensure it doesn’t fail during ESP when deploying devices with autopilot.

DellDCUAPP

Importing ADMX Templates

To get the ADMX templates required from managing DCU, you will need to download Dell Command Update. You can always find the latest version here: https://www.dell.com/support/kbdoc/en-us/000177325/dell-command-update

Once you have it downloaded, open it and click extract. Extract to a folder of your choice.

DellDCUAPP

Navigate to the extracted folder and find the “Templates” folder. That would be your admx templates we need to import into intune now. Head on over to Intune -> Devices -> Configuration. Then click “Import ADMX” in the top.

DellDCUAPP DellDCUAPP DellDCUAPP

Start by importing the Dell.ADMX file. For the .ADML file, you can find it under the subfolder en-US. Then hit next and create. Wait 1-2 minutes, then hit “Refresh”.

DellDCUAPP

The Dell template should be “Available” (Sometimes it can be a bit sluggish, so be patient with this one). Once the Dell template is available, import the Dell Command Update.ADMX and ADML file similarly. Once finished, you should see “Dell.ADMX” and “Dell Command Update.ADMX”:

DellDCUAPP

Deploying update policies

Let’s go and create a new configuration profile. Select “Windows 10 and later” -> Templates -> Imported administrative templates (preview). Let’s give the policy a nice name like “Dell Command Update Settings”. Then hit next. Then you should be able to see the Dell folder with all the Dell Command Update settings. DellDCUAPP DellDCUAPP

All the settings we are looking for, is placed under the folder “Update Settings”. Lets configure our Dell Command Update Policy to adjust the following:

  1. “What do when updates are found”: Set this to “Enabled” and to “Download and install updates (Notify after complete)
  2. “Update Settings”: Set the “Update Interval to “Weekly”. “Time of day” to 1PM, and then “Day of the week” to “Monday” (If you set it to “Automatic” it will trigger every 3 days)
  3. “System Restart deferral”: “Enabled” and set it to 8 hours. Then assign 3 deferrals (This gives the user 8 hours to perform a reboot after updates are installed. They can defer up to 3 times)
  4. “Installation deferral”: “Enabled” and set it to 24 hours. Then assign 3 deferrals. (This gives the user 24 hours to start installing updates, and can postpone up to 3 times - Consider not setting this option, if you want to reduce the notifications/actions required for the end-user. If the end-user fails to install the updates within 24hours it will auto-install)
  5. “Maximum retry attempts”: Set this to “3”
  6. “Delay”:: Set this to “0” days. This is only for testing purpose for now, but this will delay any updates for X amount of days. This is similar to the policy we have in windows update known as “Quality update deferral period (days)” DellDCUAPP

Change these settings accordingly based on your testing and your orgs needs. The settings “System restart deferral”, “Installation Deferral” and “Delay” is the ones you can adjust based on your needs and deployment rings, that will have an impact to the end-user experience.

You can also check if the settings deployed by opening Dell Command Update on the device, hit the settings button in the top right corner. Then you should see a red text saying “Some settings are managed by your organization” in the top of the settings windows. DellDCUAPP

Based on the settings, the user will get various notifications, based on the settings you push to the users device. It can show notifications regarding installing updates, but you can also just choose to not show them notifications regarding installing updates, and then only show them reboot notifications, if updates has been installed that requires a reboot. The notifications will be shown as toast notifications, and will look like below:

DellDCUAPP DellDCUAPP

The final restart reminder, will linger in the system tray until the user clicks “restart now” or clicks the notification away.

If the user closes the last reboot reminder, there will be no “final” reminder.. it will abruptly reboot the device, without warning, after 30 minutes

Finally, all updates deployed via Dell Command Update is logged to C:\ProgramData\Dell\UpdateService\Log - Look for the “activity.log” log to see what updates has been downloaded along with the install status, success or failed, where the “service.log” is more for the app itself, to see connectivity to update servers and whether a reboot is pending or not.

Sample deployment rings - 1 policy pr. ring

Ring Sys. Restart Hours Sys. restart def. Install Hours Install Def. Delay Assignment group
Ring 0 8 hours 0 Def. 0 hours 0 Def. 0 days Modern Workplace Devices-Windows Autopatch-Test
Ring 1 36 hours 1 Def. 8 hours 1 Def. 3 days Modern Workplace Devices-Windows Autopatch-First
Ring 2 48 hours 2 Def. 12 hours 2 Def. 7 days Modern Workplace Devices-Windows Autopatch-Fast
Ring 3 72 hours 3 Def. 48 hours 3 Def. 15 days Modern Workplace Devices-Windows Autopatch-Broad

Apply a Dell Device filter if you use the autopatch groups for assignment, as shown in the above example DellDCUAPP

PROTIP: If you don’t have any deployment rings, consider reusing your autopatch groups as shown in the above sample, so you can deploy updates in a staggered approach, to avoid deploying big changes to all your devices at the same time. Autopatch automatically divides your devices in rings, so no need to do it manually. Default is 1% For Ring 1 (First), 9% for Ring 2 (Fast) and 90% for Ring 3 (Broad). Ring 0 (Test) can be reserved for members of your team, and needs to be manually assigned in autopatch. The default group names for autopatch starts with “Modern Workplace Devices-Windows Autopatch-“

DellDCUAPP

Bonus: Remediation and PowerShell script for on-demand updates

It’s possible to run a one-time update of all dell drivers/firmware, where we trigger dcu-cli.exe from Command Update, using a remediation or a PowerShell Script. The PowerShell script can be assigned to a group of devices, whilst the remediation the be run on-demand for troubleshooting purposes. Try this out on your Dell devices:

$currentdate = Get-Date -format 'ddMMyyyy_HHmmss'
$dcucli = "${env:ProgramFiles}\Dell\CommandUpdate\dcu-cli.exe"
$logsfolder = "$env:Programdata\Dell\Logs"

#Download and install Dell Command Update 5.4 if it doesn't exist
if (!(test-path $dcucli)) {
$uri = 'https://dl.dell.com/FOLDER11914128M/1/Dell-Command-Update-Windows-Universal-Application_9M35M_WIN_5.4.0_A00.EXE'
Write-Host "DCU Cli doesn't seem to be present.. Attempting to download and install now.."
Invoke-WebRequest -uri $uri -outfile 'C:\Windows\temp\dcu54.exe' 
Start-Process "C:\Windows\Temp\dcu54.exe" -ArgumentList '/s' -Wait
Start-Sleep -Seconds 10
}

#Create new folder for logs in ProgramData - Change this based on your environment
if (!(Test-path $logsfolder)) {New-item $logsfolder -ItemType Directory}

#Apply all updates if any is found - including BIOS
Start-Process $dcucli -Wait -ArgumentList "/ApplyUpdates -outputlog=$logsfolder\dcucli_applyupdates_$currentdate.log"

The script needs to run in 64-bit context and in SYSTEM context.

Find the docs for dcu-cli to experiment with different switches here

Final words

I hope you found this walkthrough useful. There is some pros/cons to using the Dell Command Update for managing updates compared to just using the Windows Update functionality to pushing drivers/BIOS. For instance, the notifications and snooze options you get with windows updates is much better for the end-user, but on the other hand if you use Dell Command Update as it is right now, you will get updates and fixes much faster, and with a bit of communication and user adoption of Dell Command Update, it could work. Just make sure your user don’t close the last reboot reminder, and teach your users to start closing their work, to prepare for the reboot.

Other thing worth mentioning is Dell is also looking into heavily modifying how updates are managed through Dell SupportAssist, that you can access through TechDirect. But I’m quite sure it will be locked down behind ProSupport Plus warranty or higher, so a lot of customers won’t be able to access it. Let’s see once we get it. We can kinda see they are preparing for it, in the release notes for DCU 5.2:

DellDCUAPP

Lastly, if you want some more inspiration for custom Dell tools in Intune, such as Prebaked Remediation scripts and custom compliance rules to check for things like Warranty, Missing Critical drivers, Battery health and other cool stuff, I would recommend you check out Sven Riebe’s github repository. He’s a very skilled fella working at Dell, and he likes sharing his work. You can find his repo here

That’s all folks :)