IT tutorials
 
Technology
 

System Center Configuration Manager 2007 : Client Management - Client Discovery (part 1) - Active Directory User Discovery

10/29/2013 9:32:55 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

With the agents configured, it is time to begin discovering potential clients. Before you enable client discovery, verify that Client Push Installation is configured properly. If you have Client Push enabled and run a system discovery, you will immediately begin to install the ConfigMgr client on all systems assigned to the site (based on site boundaries). Client Push is not a requirement for discovery. It is suggested you first use the Client Push Installation Wizard to install clients, and then enable Client Push.

Two common settings will appear through most discovery methods:

  • Recursive— When enabled, this specifies that the discovery method searches child objects.

  • Include Groups— Discovers objects within groups. When this is enabled, you will probably discover more objects, but this also increases the likelihood of discovering the same object more than once.

Another common element between most discovery methods is the Polling Schedule tab. Use this tab to create a recurring schedule. You can also enable the check box to run the discovery as soon as possible.

Active Directory System Group Discovery

Active Directory (AD) System Group Discovery is a discovery method that polls the domain controller for System Group objects in the domain or Lightweight Directory Access Protocol (LDAP) path specified on a schedule configured by the ConfigMgr administrator. Here are the default group account attributes returned by Active Directory System Group Discovery:

  • Organizational Unit

  • Global Groups

  • Universal Groups

  • Nested Groups

  • Nonsecurity Groups

AD System Group Discovery will only discover these attributes for systems that have previously been discovered by some other method (AD System Discovery, Heartbeat Discovery). After enabling AD System Group Discovery, click the starburst to configure the desired container to search. As displayed in Figure 1, you have the ability to select the local domain or local namespace or use a custom LDAP or GC query.

Figure 1. Active Directory System Group Discovery


Review the log file adsysgrp.log for detailed information when the discovery method executes.

Active Directory Security Group Discovery

Active Directory Security Group Discovery is a discovery method that polls the domain controller for Security Group objects in the domain or LDAP path, based on a schedule configured by the ConfigMgr administrator.

Configuring this discovery method is very similar to configuring AD System Group Discovery. AD Security Group Discovery will only discover these attributes for systems previously discovered by some other method (AD System Discovery, Heartbeat Discovery). Specify the container to discover, and determine if you want to discover recursively, and within groups. Finally, set a polling interval. Review the adsgdis.log file for detailed information when the discovery method executes.

Active Directory System Discovery

Active Directory System Discovery is the key discovery method used to create data discovery records (DDRs) for computers. DDRs contain data such as operating system (OS) name and version, Internet Protocol (IP) addresses and subnets, and AD site names. You can use these DDRs to target installations for client deployment. Active Directory System Discovery is agentless, and you can use it to discover what is in your environment before installing client agents on computers. This capability gives the administrator an understanding of the network infrastructure and deployment challenges in advance.

Configuring this discovery method is very similar to configuring AD System Group Discovery. Specify the container to discover, and determine if you want to discover recursively, and within groups. Finally, set a polling interval.

If you used Systems Management Server (SMS) 2003, you will also notice a new tab named Active Directory Attribute. This tab allows you to add more Active Directory attributes to the system discovery process. You can add any computer object attribute from Active Directory, such as OperatingSystemServicePack and terminalserver.

Active Directory User Discovery

Active Directory User Discovery is a discovery method that polls the domain controller for user objects in the domain or LDAP path specified on a schedule configured by the ConfigMgr administrator. Here are the default user attributes returned by Active Directory User Discovery:

  • User name

  • DNS host name

  • Object class

  • Active Directory domain

  • Active Directory container name

The first two tabs are configured the same as the other Active Directory discoveries—simply specify the container and polling interval. The most interesting tab is the Active Directory Attribute tab, shown in Figure 2.

Figure 2. Active Directory User Discovery Properties dialog box


The System Required column indicates whether the Attribute name is a required attribute. All the attributes where System Required is equal to No in Figure 2 are attributes manually added to discovery. As you can see, it is possible to discover much more information about users than the defaults. You can identify employeeID, mail (email address), manager, department, and more. You can find all available attributes using the ADSIEdit MMC snap-in.

Review the adusrdis.log file for detailed information when the discovery method executes.

Active Directory Discovery Methods

For all the AD discovery methods, if the Active Directory environment used by ConfigMgr is not well maintained, you can end up with a lot of garbage in your collections. Moreover, if you enable Push Install, your site will “spin” on those garbage systems when trying to install the ConfigMgr client. Because most AD environments are not copasetic, it is important to discover only those Organizational Units (OUs) that are known to be clean, or not enable Push Install.

 
Others
 
- Windows Vista : Providing User Data Protection (part 3) - Putting data protection in place - Enabling roaming profiles, Enabling folder redirection
- Windows Vista : Providing User Data Protection (part 2) - Putting data protection in place - Enabling the Distributed File System
- Windows Vista : Providing User Data Protection (part 1) - Completing a data protection strategy
- Windows Vista : Protecting User Data - Protecting User Profiles
- SharePoint 2013 : Associate a Workflow with a List or Library
- SharePoint 2013 : Track the Progress of a Workflow
- SharePoint 2013 : Start a Workflow
- What's New in Microsoft Lync Server 2013 : Voice Enhancements - Inter-Trunk Routing
- What's New in Microsoft Lync Server 2013 : Client Features - Tabbed Conversations, OneNote
- What's New in Microsoft Lync Server 2013 : Server Features - Hybrid and On-Premise Deployment Integration
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us