Jump to content


anyweb

Root Admin
  • Posts

    9175
  • Joined

  • Last visited

  • Days Won

    366

Everything posted by anyweb

  1. In Part 1 of this series we created our new LAB, we got the System Center 2012 Configuration Manager ISO and extracted it, then copied it to our Active Directory server. We then created the System Management container in AD, delegated permissions to the container, extended the Schema for Configuration Manager. We then opened TCP ports 1433 and 4022 for SQL replication between sites, installed some prerequisites like .NET Framework 4.0, added some features and then downloaded and installed SQL Server 2008 R2 SP1 CU6. We then configured SQL Server using SQL Server Management Studio for security and memory configurations prior to running the Configuration Manager 2012 setup to assess server readiness. Finally we installed a central administration site (CAS). In Part 2 we setup our Primary server with SQL Server 2008 R2 SP1 CU6. We then installed Configuration Manager 2012 on our primary server (P01) and verified that it was replicating to our central administration site (CAS) server. Now we will configure Discovery methods for our Hierarchy and then configure Boundaries and Boundary Groups. Planning for discovery in Configuration Manager Note: Planning for discovery in Configuration Manager is an important step, you need to discover objects that you want to manage (computers/users) so that you can target them with software and/or use client push. Please review the following information on Technet which is summarised below. The discovery types that we will use are listed below:- Active Directory Forest Discovery Active Directory Group Discovery Active Directory System Discovery Active Directory User Discovery System Center 2012 Configuration Manager discovery identifies computer and user resources that you can manage by using Configuration Manager. It can also discover the network infrastructure in your environment. Discovery creates a discovery data record (DDR) for each discovered object and stores this information in the Configuration Manager database. When discovery of a resource is successful, discovery puts information about the resource in a file that is referred to as a discovery data record (DDR). DDRs are in turn processed by site servers and entered into the Configuration Manager database where they are then replicated by database-replication with all sites. The replication makes discovery data available at each site in the hierarchy, regardless of where it was discovered or processed. You can use discovery information to create custom queries and collections that logically group resources for management tasks such as the assignment of custom client settings and software deployments. Computers must be discovered before you can use client push installation to install the Configuration Manager client on devices. Decide Where to Run Discovery When you plan to use discovery in Configuration Manager, you must consider where to run each discovery method. After Configuration Manager adds discovery data to a database, it is quickly shared between all sites in the hierarchy. Because there is no benefit to discovering the same information at multiple sites in your hierarchy, consider configuring a single instance of each discovery method that you use to run at a single site instead of running multiple instances of a single method at different sites. However, periodically it might help assign the same discovery method to run at multiple sites, each with a separate configuration and schedule. This is because at each site, all configurations for a single discovery method are evaluated every time that discovery method runs. If you do configure multiple instances of a single discovery method to run at different sites, plan the configuration of each carefully to avoid having two or more discovery processes discover the same resources. Discovering the same locations and resources at multiple sites can consume additional network bandwidth and create duplicate DDRs for resources that add no value and must still be processed by your site servers. Consider the following when you plan where to run discovery. When you use an Active Directory Discovery method for systems, users, or groups: Run discovery at a site that has a fast network connection to your domain controllers. Consider the Active Directory replication topology to ensure discovery can access the latest information. Consider the scope of the discovery configuration and limit discovery to only those Active Directory locations and groups that you have to discover. Step 1. Enable Active Directory Forest Discovery Note: Perform the following on the Central Administration Site server (CAS) as SMSadmin In the Configuration Manager console, click on Administration and select Hierarchy Configuration, click on Discovery Methods. The first discovery method listed is Active Directory Forest Discovery and this can be enabled on the CAS or Primary site(s), however we want to limit the discovery instances to one, and we also want this discovery method to occur at the top site in our hierarchy so we will enable this discovery method on our Central Administration Site (CAS). Unlike other discovery methods, Active Directory Forest Discovery does not discover resources that you can manage. Instead, this method discovers Active Directory network locations and can convert those locations into boundaries for use throughout your hierarchy. This is a cool new benefit of Configuration Manager 2012. You can use Active Directory Forest Discovery to do the following: Discover IP subnets in an Active Directory forest Discover Active Directory sites in an Active Directory forest Add the IP subnets and Active Directory sites that are discovered as boundaries in Configuration Manager Publish to the Active Directory Domain Services of a forest when publishing to that forest is enabled, and the specified Active Directory Forest Account has permissions to that forest Select Active Directory Forest Discovery for the Site CAS and right click, choose Properties. The General window appears with one option, Enable Active Directory Forest Discovery. Select it and two more choices are revealed: Automatically create active directory site boundaries when they are discovered Automatically create IP address range boundaries for IP subnets when they are discovered. Select both options and leave the default schedule for every 1 weeks. Tip: Selecting both options above is fine in a LAB. In Production however, you should strongly consider only selecting the second option which is IP Address range boundaries.For clarification about this point please review this post from Jason Sandys (Configuration Manager MVP) about why IP Subnet Boundaries are EVIL click Apply and answer yes when prompted to Run a discovery as soon as possible. Click ok to exit that discovery method. You can now see that the Active Directory Forest Discovery method is enabled on our CAS site server. Remember that we mentioned that this discovery method can enable publishing of information to AD ? When publishing is enabled for a forest and that forests schema is extended for Configuration Manager, the following information is published for each site that is enabled to publish to that Active Directory forest: SMS-Site-<site code> SMS-MP-<site code>-<site system server name> SMS-SLP-<site code>-<site system server name> SMS-<site code>-<Active Directory site name or subnet> To verify that you've enabled publishing browse to Administration, Site Configuration, Sites, and check the properties of your CAS site server. Click on the Publishing tab. Step 2. Enable Active Directory Group Discovery Note: Perform the following on the Primary Site server (P01) as SMSadmin Use Configuration Manager Active Directory Group Discovery to search Active Directory Domain Services (AD DS) to identify the group memberships of computers and users. This discovery method searches a discovery scope that you configure, and then identifies the group memberships of resources in that discovery scope. By default, only security groups are discovered. However, you can discover the membership of distribution groups when you select the checkbox for the option Discover the membership of distribution groups on the Option tab in the Active Directory Group Discovery Properties dialog box. When you discover a group, you can also discover limited information about its members. This does not replace Active Directory System or User Discovery and is usually insufficient to build complex queries and collections or serve as the bases of a client push installation. Use Active Directory Group Discovery to discover the following information: Groups Membership of Groups Limited information about a groups member computers and users, even when those computers and users have not previously been discovered by another discovery method On our Primary server (P01) right click on Active Directory Group Discovery and choose properties. Select the option to Enable Active Directory Group Discovery and click on Add to see two more choices, Groups and Location. Location: Use a location if you want to search one or more Active Directory containers. This scope option supports a recursive search of the specified Active Directory containers that also searches each child container under the container you specify. This process continues until no more child containers are found. Groups: Use groups if you want to search one or more specific Active Directory groups. You can configure the Active Directory Domain to use the default domain and forest, or limit the search to an individual domain controller. Additionally, you can specify one or more groups to search. If you do not specify at least one group, all groups found in the specified Active Directory Domain location are searched. Note: When you configure a discovery scope, select only the groups that you must discover. This is because Active Directory Group Discovery attempts to discover each member of each group in the discovery scope. Discovery of large groups can require extensive use of bandwidth and Active Directory resources. Select Location from the drop down menu. Give it a name like Active Directory Group Discovery - P01 and select browse to decide where to recurisively search. Now you get to select a container, in our LAB we have nothing interesting to select, but in production you probably have your Active Directory Security Groups neatly organised in specific containers, in that case select the top most container that contains your Active Directory Security Groups to narrow your search criteria. review your choices and click ok when you ready. Click on the Polling schedule tab and decide what is appropriate for your setup, the default is 7 days for a full Active Directory Group Discovery and you can enable Delta Discovery (enabled by default). This discovery method finds resources in Active Directory Domain services that are new or modified since the last discovery cycle in the time interval specified (default is 5 minutes). and select the Option tab, select all three options if appropriate. click Apply and when asked about running a full discovery as soon as possible click yes. The Active Directory Group Discovery method is now enabled on site P01. Tip: If you want to review what is happening in realtime in relation to this discovery method, you can review the adsgdis.log file on D:\Program Files\Microsoft Configuration Manager\Logs folder. Step 3. Enable Active Directory System Discovery Note: Perform the following on the Primary Site server (P01) as SMSadmin Use Configuration Manager Active Directory System Discovery to search the specified Active Directory Domain Services (AD DS) locations for computer resources that can be used to create collections and queries. You can then install the client to discovered computers by using client push installation. To successfully create a discovery data record (DDR) for a computer, Active Directory System Discovery must be able to identify the computer account and then successfully resolve the computer name to an IP address. By default, Active Directory System Discovery discovers basic information about the computer including the following: Computer name Operating system and version Active Directory container name IP address Active Directory site Last Logon Timestamp Right click Actve Directory System Discovery and choose Properties Place a checkmark in Enable Active Directory System Discovery and click on the yellow starburst to add some Active Directory containers. For path click on browse and browse to the container you want to discover systems in, in production you'd probably have your computers moved from the default Computers container to a custom container. Tip: You can add several containers by repeating this process and selecting different containers, but only add the containers you need to add as you don't want to generate un-needed network and cpu bandwidth. On the Polling schedule tab, stick to the defaults and then select the Active Directory Attributes tab, if you want to add an attribute to discover select one from the list and choose Add >> in the example below i'm adding an Active Directory attribute called msTPM-ownerinformation. There are many attributes to choose from, use only the ones you need to get your job done. click on the Option tab and select the options listed and click Apply and Ok and answer Yes to run a full discovery as soon as possible. Tip: At this point you can monitor the Active Directory System Discovery in the adsysdis.log file in D:\Program Files\Microsoft Configuration Manager\Logs folder. You can see when it writes DDR's by looking for the following line where XXX is some computername. Step 4. Enable Active Directory User Discovery Note: Perform the following on the Primary Site server (P01) as SMSadmin Use Configuration Manager Active Directory User Discovery to search Active Directory Domain Services (AD DS) to identify user accounts and associated attributes. You can view the default list of object attributes returned by Active Directory User Discovery, and configure additional attributes to be discovered in the Active Directory User Discovery Properties dialog box on the Active Directory Attributes tab. By default, Active Directory User Discovery discovers basic information about the user account including the following: User name Unique user name (includes domain name) Domain Active Directory container names Right click Actve Directory User Discovery and choose Properties select the Enable Active Directory User Discovery box and click on the yellow starburst to add some active directory containers to search for users browse to the location in AD where you want to discover users, you can repeat this process to add several containers if you wish You can configure the Polling tab and Active Directory Attributes tab settings if you wish, then click apply and answer yes to Run a Full Discovery now. Tip: At this point you can monitor the Active Directory System Discovery in the adusrdis.log file in D:\Program Files\Microsoft Configuration Manager\Logs folder. Step 5. Configure Boundaries and Boundary Groups Note: Perform the following on the Primary Site server (P01) as SMSadmin In System Center 2012 Configuration Manager, a boundary is a network location on the intranet that can contain one or more devices that you want to manage. Boundaries can be an IP subnet, Active Directory site name, IPv6 Prefix, or an IP address range, and the hierarchy can include any combination of these boundary types. To use a boundary, you must add the boundary to one or more boundary groups. Boundary groups are collections of boundaries. By using boundary groups, clients on the intranet can find an assigned site and locate content when they have to install software, such as applications, software updates, and operating system images When clients are on the Internet, or they are configured as Internet-only clients, they do not use boundary information. These clients cannot use automatic site assignment and always download content from any distribution point in their assigned site when the distribution point is configured to allow client connections from the Internet. Boundaries are no longer site specific, but defined once for the hierarchy, and they are available at all sites in the hierarchy. Each boundary must be a member of a boundary group before a device on that boundary can identify an assigned site, or a content server such as a distribution point. You no longer configure the network connection speed of each boundary. Instead, in a boundary group you specify the network connection speed for each site system server associated to the boundary group as a content location server. As we want our resources to use Automatic Site Assignment and Content Location we will configure our boundaries. This is quite easy for us as Active Directory Forest Discovery has already created a boundary for us to use, our Active Directory Site. In production you'll probably have several subnets and ip ranges listed in here, and that's a good thing as you didn't have to enter them manually. right click on our Default-First-Site-Name (active directory default name..) and choose properties, This boundary was added automatically via Forest discovery so we don't need to change it, however we do want to add it to a Boundary Group so that we can use it. Click on the Boundary Groups tab, it will appear empty and clicking on the Add button will show you an empty list, that tells you that you need to create a boundary group, so close the Boundary Properties window. Click on Boundary Groups and select Create Boundary Group in the ribbon. when the Create Boundary Group wizard appears, fill in some useful details and click on Add to add our boundary to our boundary group Tip: To make it easier to visualize where boundary groups are (for later exercises) you could make the name descriptive of the Geographical location, eg: change the name of the boundary group to Skane, Sweden, Europe, another boundary group could be Paris, France, Europe and so on. the Add Boundaries window appears, select our AD site name and click ok next click on the References tab, in here you have two main options, Automatic Site Assignment Content Location Note: When you plan for boundary groups, consider creating one set of boundary groups for content location and a second set of boundary groups for automatic site assignment. This separation can help you avoid overlapping boundaries for site assignment. When you have overlapping boundaries and use automatic site assignment, the site to which a client is assigned, might be to is nondeterministic. As we only have a LAB we will use both Automatic Site Assignment and Content Location in our boundary group, select the checkbox beside Use this boundary group for site assignment and you can pick an assigned site from the drop down menu. (we only have one primary so it's the only one listed, if you have more than one primary they will be listed in the drop down menu). Next we will configure Content Location for this Boundary Group, click on Add and place a checkmark in our site system that is listed. This will associate this site system with our boundary group. Click ok, apply and ok. All Done. Our boundary group is defined and our boundary has been added to it to verify this double click on our boundary and review it's properties, then click on the Boundary Groups Tab, this time you'll see our Boundary Group is listed. By doing the above we have defined which site our clients get assigned to via Automatic client assignment and we have defined their content location. In the next part of this series, we will add the Application Catalog roles and configure and then deploy Custom Client Device settings and Custom Client User Settings.
  2. hi Doug can you please post a screenshot or two of the steps in your task sequence that you are referring to, plus post the smsts.log file as an attachment
  3. it's best practise to apply drivers as part of the Deploy Task Sequence, you can use WMI queries to detect hardware and apply driver package steps to apply the correct drivers to the correct hardware. Having drivers in your captured image is not a good idea.
  4. that's not a good sign indeed, do you have more from the log where it actually tries to copy these files ?
  5. i would image that any of the current HTA's would work with minor modifications for ConfigMgr 2012, and MDT 2012 integrated, have you tried any yet Ben apart from Rons tools (which I havn't tried) ?
  6. yes, if you want to capture a 64 bit OS you need a 64 bit boot image, it will complain otherwise. however, you can then deploy that captured image using a 32 bit boot image (x86)
  7. Trends that influenced the design of Windows 8 As we started planning the user experience of Windows 8 in mid-2009, just around the time of Windows 7 RTM, we looked around and took note of some of the trends playing out around us. This was a pre-iPad world, a world before the recent proliferation of new form factors and device types. And although more than 93% of PCs run some version of Windows today, it was clear even then that the world we lived in and people’s expectations of computing devices were rapidly changing. Here are a few of the trends we noted that influenced the design of the Windows 8 user experience and features: 1. Connected all the time. Connectivity is becoming ubiquitous. While today’s file-centric Windows user interface was designed around assumptions of optional, limited, and sporadic connectivity, today, nearly everything people love to do on their PCs assumes they’re connected to the Internet. Wi-Fi is assumed in more and more public locations, and an increasing number of PCs also include the ability to connect to mobile broadband networks as well. Where connectivity was once the exception, it is now the rule. 2. People, not files, are the center of activity. There has been a marked change in the kinds of activities people spend time doing on the PC. In balance to “traditional” PC activities such as writing and creating, people are increasingly reading and socializing, keeping up with people and their pictures and their thoughts, and communicating with them in short, frequent bursts. Life online is moving faster and faster, and people are progressively using their PCs to keep up with and participate in that. And much of this activity and excitement is happening inside the web browser, in experiences built using HTML and other web technologies. 3. The rise of mobile PCs over desktop PCs. The kinds of PCs people are buying are rapidly moving towards mobile form factors like laptops and tablets, and away from traditional desktops. While powerful desktops will remain the form factor of choice for people who want to squeeze every ounce of performance out of a highly modular and extensible PC (for example video editors, financial analysts, scientists, gamers, PC enthusiasts…), most people want to have light, portable PCs. In 2009, desktops were 44% of the worldwide market and laptops were 56%. Just 3 years later, over 61% of the PCs sold are laptops and the trend is accelerating—this is globally, measuring all Windows PCs sold. Among consumers in the United States buying a PC this year, more than 76% will purchase laptops—the absolute number of all US desktops sold will be fewer than the number of tablets in 2012! That is a fairly stunning change in the role of different form factors. Even in businesses, laptops are now purchased more than half the time. Videos of the recent Windows 8 Consumer Preview event we hosted in Barcelona in February were shot, produced, edited, and controlled using only laptops. Many of these were very powerful laptops with secondary monitors plugged in for extra screen space, but even a few years ago we would have hauled around a truckload of desktop PCs for the event. Just because a PC is portable, light, and thin does not mean that it lacks the power or capability to do heavy-duty professional work. 4. Content is on the PC and in the cloud. Following from ubiquitous connectivity and the popularity of laptops is the fact that people’s content now spans the PC and cloud services. This includes not just purpose-built storage services like SkyDrive, but also photos in Facebook and Flickr, videos put up for family to watch in Vimeo, music stored in and streamed from cloud services. All of this is augmented by GBs, or in some cases even TBs, of videos, photos, and music on the PCs in the home. People’s content is spreading out everywhere, and as cameras are now high-resolution and always in your pocket (via your phone), the amount of content being generated every day is multiplying rapidly. A service like SkyDrive providing up to 100GB of cloud storage dramatically changes how you think about your PC and the resources you have access to. These are a few of the key things we took note of in 2009. What all of these trends have in common is that people had started to use their PCs with different expectations and scenarios in mind. Although the PC remains the world’s best tool for writing and typing and creating and making things, people increasingly were doing different kinds of things with the time they spent on their PCs. And they had started to expect PCs to behave more like their phones: connected, mobile, long battery life, centered on people and activities and keeping up with what’s going on. At the same time, apps have continued to get richer on mobile devices, as developers have had more time and experience developing apps. Along the way, mobile platforms continue to add APIs and functionalities that already exist in Windows. We realized that to enable Windows to lead with these trends emerging, we needed to reimagine the Windows experience. Like so many other times in our history, we needed to bring the Windows experience forward: not only to better service what people are doing today, but to anticipate and cultivate the ways they will be using PCs in the future; to modernize the experience of using Windows, and to set the stage for the next decade of platform and developer innovation; to make the PC the most desirable, useful, and loved device in the world. Windows 8 looks forward towards a new world of capabilities, new hardware, new apps, and new scenarios. Windows 8 is about a billion people doing new things, and the next billion people experiencing Windows for the first time. Goals of the Windows 8 user experience As we designed this new experience, a few clear goals emerged for the characteristics of what we wanted to create. 1. Fast and fluid. Those of you who have followed Windows 8 coverage over the last year have undoubtedly read or heard the phrase “fast and fluid.” This is not some "marketing" tagline we have recently created; these words are part of the design languagewe used to define what we intended as the soul of the new user experience in Windows 8. If Windows 8 were to be embodied in a phrase, this is it, and our goal is for this description to fit the product. Fast and fluid represents a few core things to us. It means that the UI is responsive, performant, beautiful, and animated. That every piece of UI comes in from somewhere and goes somewhere when it exits the screen. It means that the most essential scenarios are efficient, and can be accomplished without extra questions or prompts. It means that things you don’t need are out of the way. It also implies to us a certain feeling of fluidity or weightlessness in using Windows. For instance, swiping from the edge of the screen with your finger to bring up controls feels fluid and natural and pleasing. The human finger is designed for that kind of motion! For example, dragging down from the top of the screen to close an app, or dragging a tile to the bottom of the screen to invoke zoom and then moving it to a distant part of the Start screen feels satisfying to do, in addition to being efficient. 2. Long battery life. Because most Windows PCs are now battery powered (and soon the vast majority will be), great battery life is just a requirement. When the original Windows programming model was created, literally every PC was plugged in all the time. There was no concept of power management or battery drain. As a result, programs were free to do whatever they wanted. Once running, they ran constantly, regardless of whether you were interacting with them or not. Programs could consume all the memory on the system, or all the CPU, or write to disk every second. Basically they could, in a totally unbridled way, chew through your battery. Traditionally, the design of PC software was centered on using the CPU as much as possible, whenever possible, because “MIPS are cheap.” In contrast, now we heavily scrutinize usage of the CPU, and understand the role it plays in preserving or reducing battery life. In a mobile world, this is a new type of engineering tradeoff. Where Microsoft used to primarily focus on reducing memory consumption, now we are also laser-focused on improving battery life while still delivering a fast and fluid user experience. That means optimizing for memory consumption and CPU and GPU and performance and battery characteristics all at the same time, across a variety of platforms and hardware configurations. Therein lie the real engineering tradeoffs inherent in building a mobile OS, or just a modern OS that happens to be used on a mobile device. Once we understood how important great battery life was, certain aspects of the new experience became clear. For instance, it became obvious early on in the planning process that to truly reimagine the Windows experience we would need to reimagine apps as well. Thus, WinRT and a new kind of app were born. To help extend a device’s battery life, WinRT-based apps know how to save their state instantly. Windows can throttle them down to use no CPU or memory on a moment’s notice, but without the user losing anything they’ve been working on in the app. When the app resumes, it resumes in exactly the same place it left off. To the user, it has been running all the time—but technically the program has been suspended or terminated in the background. There’s a reason phones and tablets generally show only one app on the screen at a time. It is not just because of the traditionally small screens on these devices, or because doing one social update is all people do, or because "toy apps take up the whole screen." It is because "one-at-a-time" lets an OS manage the background activity on the device so that only apps you are actively using can drain the battery. Even with multitasking in the existing desktop still present (and improved), we did feel like only offering "one-at-a-time" in the Metro style experience was a bit of a constraint, and not totally true to the Windows history of multitasking. So we evolved Snap for Windows 8.This feature lets you run any two WinRT-based apps side-by-side, so that you can watch a video while you browse the web, or video chat while checking mail. And we created facilities for background processing of a wide class of apps, and background notification capabilities that are unique to Windows as well. In the below picture, you can see the Windows 8 Messaging app snapped next to the Maps app—two apps at once, even on a tablet. To read the entire (long) story go here
  8. did you follow the steps in my guide (part 11), did you review the logs to verify the reporting services point was installed ok ?
  9. in the environment you describe, you'd be fine with a standalone primary. Is the second domain going to be in the same forest or in another forest ?
  10. shouldn't it be OSDComputerName, checkout my example of doing just this here How can I easily prompt for a computer name in Configuration Manager 2012 Prompting for a computer name using the OSDComputerName variable [May 11th, 2012].
  11. you can use a webservice to do this and i use Michael Niehaus's webservice to do this in my example HTA here. The logic is stored in the task sequence and HTA frontend code, all you have to do is create the webservice.
  12. 1. depends on if you mean for client push, if so, then yes. 2. WSUS needs to be installed on your ConfigMgr server when adding the sup role to it, so you could add the sup role to the server hosting wsus already, except that it's already configured and we don't want that at all. ConfigMgr needs to take control of your WSUS installation so if I was you i'd decide if i really wanted updates from WSUS or from Configmgr. If you choose ConfigMgr then you need to start again with WSUS (new install, do not configure WSUS).
  13. yeah, this is one of those funny errors, i should make a Tee-shirt out of it :-)
  14. The supported versions of SQL Server 2008 and SQL Server 2008 R2 are listed here on Technet:- http://technet.micro...nfigSQLDBconfig SQL Server 2012 is not yet supported, when it is it'll be added to that list. cheers niall
  15. are you sure the updates are on your distribution points ? how many updates are deployed to your build and capture windows 7 X64 collection ?
  16. computername and mac is fine, you can have GUID plus ComputerName or MAC plus ComputerName or a combination of all three
  17. client push requires a lot of behind the scenes to work properly, if using auto client push then firewalls and local admin account access are needed amongst other things. on the server side check ccm.log (as Peter said) on the client side look at ccmsetup.log or if client installation fails client.msi.log if nothing happens on the client then verify that the firewall is allowing traffic through from the configmgr server, and that the client push installation account is a member of the local admin group
  18. computers that need updates which you make available to your organization are not compliant, computers that have all available updates installed are compliant, speaking of compliance, if you want to see what updates a computer needs then you could drill through the software update compliance reports and work out what it needs, but be prepared to take your time..
  19. take a look at Planning for Sites and Hierarchies in Configuration Manager here on Technet first. Then, if you decide against a standalone primary setup (which can have secondaries and dp's) you can read my hierarchy setup guide here to further understand the do's and don'ts.
  20. if you want to upgrade ConfigMgr 2007 then you have to use the side-by-side approach as I explain in this post. using Configuration Manager 2012 RC in a LAB - Part 14. Performing a side-by-side Migration from Configuration Manager 2007 Part 14. Performing a side-by-side Migration from Configuration Manager 2007. [January 27th, 2012]
  21. there is Cu6, look at my using System Center 2012 Configuration Manager - Part 1. Installation - CAS Part 1.Installation - CAS the download link is there
  22. CU6 is listed as the supported install version now
  23. D:\ is just a suggestion, you can put it wherever you want, but seeing as most people frequently run out of space on C:\ due to poor planning i'd suggest another drive letter other than C:\, also SQL is IO intensive (disk read/write) and if possible you should try and install on it's own hard disc. Also you don't want to mix SQL or other programs (Configuration Manager) with the operating system, think about performance ..
  24. well in my example above SMSadmin is the user running the configmgr console and that user is a local administrator of the same box, are you performing this as a user that has local administrative permissions on that server or has the user rights to read/write to that folder (the package source folder mentioned in your log file)
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.