Can't you look in the registry under 
HKLM\software\policies\microsoft\windows\windowsupdate\wuserver ?

________________________________
From: Jonathan Link
To: NT System Admin Issues
Sent: Thu Mar 25 17:50:32 2010
Subject: Re: Detect Rogue WSUS Server

Or, if it's serving updates, wouldn't it be in a GPO?

 1.  In Group Policy Object Editor, expand Computer Configuration, expand 
Administrative Templates, expand Windows Components, and then click Windows 
Update.

 2.  In the details pane, click Specify Intranet Microsoft update service 
location.

 3.  Click Enabled and type the HTTP(S) URL of the same WSUS server in the Set 
the intranet update service for detecting updates box and in the Set the 
intranet statistics server box. For example, type http(s)://servername in both 
boxes.

 4.  Click OK.


On Thu, Mar 25, 2010 at 5:38 PM, Steve Ens 
<[email protected]<mailto:[email protected]>> wrote:
There is a log file that you can find on your machine (if you are on the group 
policy that gets updated)...
http://support.microsoft.com/kb/902093



On Thu, Mar 25, 2010 at 4:36 PM, Klint Price 
<[email protected]<mailto:[email protected]>> wrote:
A co-worker installed WSUS on a server in our environment, but never documented 
where it was installed to.  What are my options to detect where it is located 
if I do not have access to the LAN or FW (managed by another team in another 
office).

















________________________________
CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
Consider the environment. Please don't print this e-mail unless you really need 
to.

This email and any attached files are confidential and intended solely for the 
intended recipient(s). If you are not the named recipient you should not read, 
distribute, copy or alter this email. Any views or opinions expressed in this 
email are those of the author and do not represent those of the company. 
Warning: Although precautions have been taken to make sure no viruses are 
present in this email, the company cannot accept responsibility for any loss or 
damage that arise from the use of this email or attachments.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to