You asked why, so...

We're very federated here, one of the ways I keep department resources separate 
from each other in SCCM is by discovering the OU they are in then building an 
SCCM "environment" for that department.  I give each department an "All <dept> 
Systems" "top-level" collection built on an OU query, so when the admin in 
<dept> opens the SCCM console, all he sees is that top level collection with 
all the objects that has his OU in the query, and can then build other 
collections with that as the limiting collection.

On Windows if a computer is on and the SCCM client is alive and sending data, 
then it's also updating its domain password and stays discovered with the 
current OU info to keep it in its department, so admins can move it around and 
it still stay in their scope. (I currently have 'Only discover computers that 
have updated their computer account password in a given period of time' 
checked.)

On linux though, it doesn't regularly change its password on AD, so having that 
box checked will mean that those objects will fall out of discovery in that 
amount of time, meaning that those objects will have active SCCM clients, but 
could have outdated discovered OU data in the future, which can affect which 
collections it's in if they are based on OU path query, etc.

It wasn't a big deal before we were trying to put Linux on AD. I had written a 
powershell script to change the password on our 'dummy' linux objects to keep 
them discoverable for the OU info, but once I got SSSD working on linux, that 
script broke SSSD because the password on the domain object changed and wasn't 
what the linux box knew anymore, so broke AD auth.

Why do I care about excluding computers from discovery?  Because we are so 
federated, I don't control what departments do with their AD computer objects, 
or not, and would love to keep the number of discovered objects manageable in 
SCCM if I can, since I can't control that in AD.

So if using the password change age doesn't work for everything anymore, the 
other option is to only discover computers that have logged on to a domain in a 
given period of time.  I'm trying to figure out if I have to force it to logon 
through some process, or if SSSD will update the lastlogontimestamp to keep 
them discoverable, or not, even when no one is logged on for extended periods.

Time will tell I guess.  I'll just stay logged off my test linux machine and 
wait 3 weeks and see what happens with the attribute on AD.  If it updates, 
I'll switch to using that instead of password updates, if it doesn't, I'll have 
to come up with something.

I just wondered if anybody knew, to save me the two to three weeks I'd have to 
wait to find out, then try to come up with something if I needed to, since 
lastlogontimestamp is calculated with a 14 day +5% drift from the last logon.  
Logon events for people and Windows is easy enough, I'm just less sure about 
RHEL attached to AD with SSSD.




From: listsadmin@lists.myitforum.com [mailto:listsadmin@lists.myitforum.com] On 
Behalf Of Jason Sandys
Sent: Saturday, October 10, 2015 4:11 PM
To: ms...@lists.myitforum.com
Subject: [mssms] RE: computer account lastlogontimstamp

Why would they age of ConfigMgr? If they have the ConfigMgr agent on them, then 
they will successfully send heartbeat DDRs as well as policy requests and 
hardware inventory. AD discovery is only really significant if the system 
doesn't have an agent on it as far any timestamps go.

J

From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
[mailto:listsadmin@lists.myitforum.com] On Behalf Of Mote, Todd
Sent: Friday, October 9, 2015 4:00 PM
To: ms...@lists.myitforum.com<mailto:ms...@lists.myitforum.com>
Subject: [mssms] RE: computer account lastlogontimstamp

I get all that, but I'm trying to figure out if I might need to make a cron job 
to have something happen to keep it fresh.  I worry that if we have a linux 
machine on AD and in SCCM and it patches on a maintenance window, there may be 
a length of time that no actual AD user logs into it.  I don't want them to age 
out of SCCM.  At the same time, I don't want to turn off that feature in 
discovery either.  So I was trying to find something I could do on the linux 
side to poke that attribute...

From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
[mailto:listsadmin@lists.myitforum.com] On Behalf Of 
christopher.catl...@us.sogeti.com<mailto:christopher.catl...@us.sogeti.com>
Sent: Friday, October 9, 2015 3:20 PM
To: ms...@lists.myitforum.com<mailto:ms...@lists.myitforum.com>
Subject: [mssms] RE: computer account lastlogontimstamp


The lastLogontimeStamp attribute is not updated every time a user or computer 
logs on to the domain. The decision to update the value is based on the current 
date minus the value of the (ms-DS-Logon-Time-Sync-Interval attribute minus a 
random percentage of 5). If the result is equal to or greater than 
lastLogontimeStamp the attribute is updated. There are no special 
considerations for replication of lastLogontimeStamp. If the attribute is 
updated it is replicated like any other attribute update.





________________________________
From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
[listsadmin@lists.myitforum.com] on behalf of Krueger, Jeff [jkrue...@hfhs.org]
Sent: Friday, October 09, 2015 4:06 PM
To: ms...@lists.myitforum.com<mailto:ms...@lists.myitforum.com>
Subject: [mssms] RE: computer account lastlogontimstamp
Don't'have any specific experience with linux machines bound to AD, but the 
last LastLogonTimestamp is updated throughout the AD hierarchy for machines on 
a random interval that is between 9-14 day (if I remember correctly) by 
default.  When a machine logs on to AD there is a current time on the DC that 
machine authenticated with but that doesn't get synced each time a machine logs 
on.  So... if you can look for the DC that machine is logging on to and see if 
the date/time is current, then you can know that the LastLogonTimeStamp 
attributed will be updated some time within 9-14 days after the current value 
in the attribute.

From: listsadmin@lists.myitforum.com<mailto:listsadmin@lists.myitforum.com> 
[mailto:listsadmin@lists.myitforum.com] On Behalf Of Mote, Todd
Sent: Friday, October 9, 2015 2:47 PM
To: ms...@lists.myitforum.com<mailto:ms...@lists.myitforum.com>
Subject: [mssms] computer account lastlogontimstamp

Anybody know what will trigger a change in a computer account's last logon 
timestamp?  I'm trying to figure out how to keep my linux machines joined to AD 
via SSSD with the SCCM client on them, discovered.  They don't change their 
account password like windows machines do, so I'm trying to figure out how to 
make sure last logon timestamp works from linux. So live machines don't get 
culled by discovery.  Anybody know?

Todd

Todd Mote, MCP, MCSA+Messaging, MCSE | 
mo...@austin.utexas.edu<mailto:mo...@austin.utexas.edu>
Enterprise Systems Management | Information Technology Services | The 
University of Texas at Austin



________________________________

CONFIDENTIALITY NOTICE: This email contains information from the sender that 
may be CONFIDENTIAL, LEGALLY PRIVILEGED, PROPRIETARY or otherwise protected 
from disclosure. This email is intended for use only by the person or entity to 
whom it is addressed. If you are not the intended recipient, any use, 
disclosure, copying, distribution, printing, or any action taken in reliance on 
the contents of this email, is strictly prohibited. If you received this email 
in error, please contact the sending party by reply email, delete the email 
from your computer system and shred any paper copies.

Note to Patients: There are a number of risks you should consider before using 
e-mail to communicate with us. See our Privacy & Security page on 
www.henryford.com<http://www.henryford.com> for more detailed information as 
well as information concerning MyChart, our new patient portal. If you do not 
believe that our policy gives you the privacy and security protection you need, 
do not send e-mail or Internet communications to us.






Reply via email to