James,

 

That log entry should only show up if you are using the Group Policy (not
Preferences) setting to configure the "Intranet update location." Are you
sure that there is no GPO applying this setting to the client?

 

Cheers,

Trevor Sullivan

 

From: [email protected] [mailto:[email protected]]
On Behalf Of Beardsley, James
Sent: Thursday, March 6, 2014 9:18 AM
To: [email protected]
Subject: RE: [mssms] Clients incorrectly looking to DMZ SUP

 

So I set up a GPP to do a WMI query to see if it could ping the internal SUP
and if it can, it changes the WUServer and WUStatusServer regkeys to the
internal SUP. That part is working correctly. However, now in the logs, I
get these messages.

 

Group policy settings were overwritten by a higher authority (Domain
Controller) to: Server https://wsus03.corp.local:8531 and Policy ENABLED

Failed to Add Update Source for WUAgent of type (2) and id
({56BF6422-9A17-4B0F-BC39-8BD3C053FA9C}). Error = 0x87d00692.

 

So it seems that setting it with GPP is going to cause this group policy
conflict. Any suggestions? 

 

From: [email protected] <mailto:[email protected]>
[mailto:[email protected]] On Behalf Of Beardsley, James
Sent: Tuesday, March 04, 2014 5:22 PM
To: [email protected] <mailto:[email protected]> 
Subject: RE: [mssms] Clients incorrectly looking to DMZ SUP

 

Ah I see. I was thinking that by default, clients in "Intranet" mode would
point to the internal SUP and "Internet" mode would go for the DMZ SUP. 

 

Thanks, I'll look into doing something with GPP's 

 

From: [email protected] <mailto:[email protected]>
[mailto:[email protected]] On Behalf Of Jason Sandys
Sent: Tuesday, March 04, 2014 4:03 PM
To: [email protected] <mailto:[email protected]> 
Subject: RE: [mssms] Clients incorrectly looking to DMZ SUP

 

OK, well then, there's no way to control which SUP client will use then. SUP
use, like MP use within a single primary site is not controlled by location
at all. The main use of multiple SUPs (and MPs) is availability. The process
for SUPs failing over from an inaccessible one to an accessible one is
different than that of MPs however and thus in this case, you need to use
group policy to manipulate the process.

 

These two blog posts discuss this details:

http://blogs.technet.com/b/configmgrteam/archive/2013/03/27/software-update-
points-in-cm2012sp1.aspx

http://blogs.technet.com/b/configmgrteam/archive/2013/03/27/group-policy-pre
ferences-and-software-updates-in-cm2012sp1.aspx

 

J

 

From: [email protected] <mailto:[email protected]>
[mailto:[email protected]] On Behalf Of Beardsley, James
Sent: Tuesday, March 4, 2014 2:27 PM
To: [email protected] <mailto:[email protected]> 
Subject: RE: [mssms] Clients incorrectly looking to DMZ SUP

 

Both

 

From: [email protected] <mailto:[email protected]>
[mailto:[email protected]] On Behalf Of Jason Sandys
Sent: Tuesday, March 04, 2014 3:18 PM
To: [email protected] <mailto:[email protected]> 
Subject: RE: [mssms] Clients incorrectly looking to DMZ SUP

 

Are both of your SUPs using HTTPS or just the one in the DMZ?

 

J

 

From: [email protected] <mailto:[email protected]>
[mailto:[email protected]] On Behalf Of Beardsley, James
Sent: Tuesday, March 4, 2014 1:56 PM
To: [email protected] <mailto:[email protected]> 
Subject: RE: [mssms] Clients incorrectly looking to DMZ SUP

 

That's what is odd. I used the same command line to install all clients.
That's why I don't understand the variation in configs

 

ccmsetup.exe /UsePKICert SMSSITECODE=DHG SMSMP=https://<Site Server FQDN>
CCMHOSTNAME=externalsccm.example.com FSP=sccmfsp.example.com
RESETKEYINFORMATION=TRUE CCMFIRSTCERT=1

 

From: [email protected] <mailto:[email protected]>
[mailto:[email protected]] On Behalf Of Trevor Sullivan
Sent: Tuesday, March 04, 2014 2:47 PM
To: [email protected] <mailto:[email protected]> 
Subject: RE: [mssms] Clients incorrectly looking to DMZ SUP

 

James,

 

You don't want to use a GPO to configure the SUP at all on 2007 or 2012. The
ConfigMgr client uses local Group Policy to set this.

 

If the internal clients were not installed as Internet clients, then they
should not be receiving the address for the Internet-based Software Update
Point. What command line did you use to install the internal (intranet)
clients? 

 

http://technet.microsoft.com/en-us/library/gg712696.aspx#BKMK_InternetSUP 

 

Cheers,

Trevor Sullivan

 

Internet-Based Software Update Point

The Internet-based software update point accepts communication from client
computers on the Internet. You can create the Internet-based software update
point only when the active software update point is not configured to accept
communication from client computers on the Internet. You must install the
Internet-based software update point on a site system that is remote from
the site server, located in a perimeter network, and accessible to
Internet-based client computers. The Internet-based software update point
synchronizes with the active software update point at the same site by
default. When the Internet-based software update point is disconnected from
the active software update point, you can manually synchronize software
updates by using the export and import process. For more information, see
the
<http://technet.microsoft.com/en-us/library/912bfec1-fd19-4f56-a840-4ecd643c
541b#SyncDisconnected> Synchronize Software Updates from a Disconnected
Software Update Point section in this topic.

 

 

From: [email protected] <mailto:[email protected]>
[mailto:[email protected]] On Behalf Of Beardsley, James
Sent: Tuesday, March 4, 2014 1:29 PM
To: [email protected] <mailto:[email protected]> 
Subject: [mssms] Clients incorrectly looking to DMZ SUP

 

I have a SUP internally and then a DMZ SUP that is configured to use the
internal SUP as its sync source. I'm coming across PC's that are on the
internal network where both the WUServer regkey and the WUAHandler log are
pointing to the DMZ SUP (and failing) instead of the internal SUP. What
could be causing that? In CM07, I had a GPO that configured the server but
when I migrated to 2012, I was under the impression that a GPO wasn't
required any longer. I thought about putting the GPO back in place but by
forcing all clients to look to the internal SUP, the external clients
wouldn't be able to access it for software updates. So I'm trying to figure
out where the mix-up is happening that is causing some clients on internal
subnets to look to the DMZ SUP for its SU's. Is it based on boundaries? Do I
have a boundary configuration issue?

 

Thanks,

James

 

  _____  

IRS Compliance: Any tax advice contained in this communication (including
any attachments) is not intended or written to be used, and cannot be used,
for the purpose of (i) avoiding penalties imposed under the Internal Revenue
Code or applicable state or local tax law or (ii) promoting, marketing, or
recommending to another party any transaction or matter addressed herein.

  _____  

Confidentiality Notice: This e-mail is intended only for the addressee named
above. It contains information that is privileged, confidential or otherwise
protected from use and disclosure. If you are not the intended recipient,
you are hereby notified that any review, disclosure, copying, or
dissemination of this transmission, or taking of any action in reliance on
its contents, or other use is strictly prohibited. If you have received this
transmission in error, please reply to the sender listed above immediately
and permanently delete this message from your inbox. Thank you for your
cooperation.

 

 

  _____  

IRS Compliance: Any tax advice contained in this communication (including
any attachments) is not intended or written to be used, and cannot be used,
for the purpose of (i) avoiding penalties imposed under the Internal Revenue
Code or applicable state or local tax law or (ii) promoting, marketing, or
recommending to another party any transaction or matter addressed herein.

  _____  

Confidentiality Notice: This e-mail is intended only for the addressee named
above. It contains information that is privileged, confidential or otherwise
protected from use and disclosure. If you are not the intended recipient,
you are hereby notified that any review, disclosure, copying, or
dissemination of this transmission, or taking of any action in reliance on
its contents, or other use is strictly prohibited. If you have received this
transmission in error, please reply to the sender listed above immediately
and permanently delete this message from your inbox. Thank you for your
cooperation.

 

 

  _____  

IRS Compliance: Any tax advice contained in this communication (including
any attachments) is not intended or written to be used, and cannot be used,
for the purpose of (i) avoiding penalties imposed under the Internal Revenue
Code or applicable state or local tax law or (ii) promoting, marketing, or
recommending to another party any transaction or matter addressed herein.

  _____  

Confidentiality Notice: This e-mail is intended only for the addressee named
above. It contains information that is privileged, confidential or otherwise
protected from use and disclosure. If you are not the intended recipient,
you are hereby notified that any review, disclosure, copying, or
dissemination of this transmission, or taking of any action in reliance on
its contents, or other use is strictly prohibited. If you have received this
transmission in error, please reply to the sender listed above immediately
and permanently delete this message from your inbox. Thank you for your
cooperation.

 

 

  _____  

IRS Compliance: Any tax advice contained in this communication (including
any attachments) is not intended or written to be used, and cannot be used,
for the purpose of (i) avoiding penalties imposed under the Internal Revenue
Code or applicable state or local tax law or (ii) promoting, marketing, or
recommending to another party any transaction or matter addressed herein.

  _____  

Confidentiality Notice: This e-mail is intended only for the addressee named
above. It contains information that is privileged, confidential or otherwise
protected from use and disclosure. If you are not the intended recipient,
you are hereby notified that any review, disclosure, copying, or
dissemination of this transmission, or taking of any action in reliance on
its contents, or other use is strictly prohibited. If you have received this
transmission in error, please reply to the sender listed above immediately
and permanently delete this message from your inbox. Thank you for your
cooperation.

 

  _____  

IRS Compliance: Any tax advice contained in this communication (including
any attachments) is not intended or written to be used, and cannot be used,
for the purpose of (i) avoiding penalties imposed under the Internal Revenue
Code or applicable state or local tax law or (ii) promoting, marketing, or
recommending to another party any transaction or matter addressed herein.

  _____  

Confidentiality Notice: This e-mail is intended only for the addressee named
above. It contains information that is privileged, confidential or otherwise
protected from use and disclosure. If you are not the intended recipient,
you are hereby notified that any review, disclosure, copying, or
dissemination of this transmission, or taking of any action in reliance on
its contents, or other use is strictly prohibited. If you have received this
transmission in error, please reply to the sender listed above immediately
and permanently delete this message from your inbox. Thank you for your
cooperation.

 



Reply via email to