MDT 2010 WSUS deployment Error 0x80244019

I added so as always WSUSServer=http://ward-bh01 to customsettings.ini

When the deploying the image I get de following error

The Error

image

Solution:

Ad the Port number to de WSUSServer address in customsettings.ini. In my case it was 8530. Because the WSUS site was running on that port number see the pictures

clip_image002clip_image002[4]

WSUSServer=http://ward-bh01:8530

System Center Virtual Machine Manager 2012 Beta Evaluation

System Center Virtual Machine Manager 2012 delivers industry leading fabric managment, virtual machine management and services deployment in private cloud environments. Virtual Machine Manager 2012 offers key new features that include hypervisor creation and management, network management, storage management, private cloud creation, self-service usage and service creation. It features deep investments in server application virtualization, service design and service modeling all of which can be used to efficiently offer an on-premises private cloud.

Feature Summary

  • Fabric Management
    • Hyper-V and Cluster Lifecycle Management – Deploy Hyper-V to bare metal server, create Hyper-V clusters, orchestrate patching of a Hyper-V Cluster
    • Third Party Virtualization Platforms – Add and Manage Citrix XenServer and VMware ESX Hosts and Clusters
    • Network Management – Manage IP Address Pools, MAC Address Pools and Load Balancers
    • Storage Management – Classify storage, Manage Storage Pools and LUNs
  • Resource Optimization
    • Dynamic Optimization – proactively balance the load of VMs across a cluster
    • Power Optimization – schedule power savings to use the right number of hosts to run your workloads – power the rest off until they are needed
    • PRO – integrate with System Center Operations Manager to respond to application-level performance monitors
  • Cloud Management
    • Abstract server, network and storage resources into private clouds
    • Delegate access to private clouds with control of capacity, capabilities and user quotas
    • Enable self-service usage for application administrator to author, deploy, manage and decommission applications in the private cloud
  • Service Lifecycle Management
    • Define service templates to create sets of connected virtual machines, os images and applica tion packages
    • Compose operating system images and applications during service deployment
    • Scale out the number of virtual machines in a service
    • Service performance and health monitoring integrated with System Center Operations Manager
    • Decouple OS image and application updates through image-based servicing
    • Leverage powerful application virtualization technologies such as Server App-V

System Requirements

  • Supported Operating Systems:Windows 7 Enterprise;Windows 7 Professional;Windows 7 Ultimate;Windows Server 2008 R2;Windows Server 2008 R2 Datacenter;Windows Server 2008 R2 Enterprise
    • Windows Server 2008 R2 (full installation) Standard, Enterprise, Datacenter x64
    • Windows 7 Professional, Enterprise, Ultimate x32, x64
    • Windows Remote Management (WinRM) 2.0
    • Windows PowerShell 2.0
    • Microsoft .NET Framework 3.5 Service Pack 1 (SP1)
    • Windows Automated Installation Kit (AIK) for Windows 7
    • SQL Server 2008 or SQL Server 2008 R2 Standard, Enterprise, and Datacenter
    • Windows Deployment Services (WDS) – (Version on Windows Server 2008 R2)
    • Windows Software Update Services (WSUS) 3.0 SP2 64bit

Download System Center Virtual Machine Manager 2012 Beta Evaluation HERE

VMMUpdate Script to Check if all Hyper-V hosts & SCVMM Server are Up to Date

Jonathan has created a nice script. This script checks witch updates are missing from Hyper-V hosts and SCVMM Server.

What updates?

Updates are regularly released for SCVMM Server, Hosts, and the Admin Console. These updates must be applied to all Hosts no matter how many you have. Updates are also released for technologies SCVMM leverages:

  • Windows
  • Hyper-V
  • Failover Cluster

As well as components SCVMM cannot function without:

  • WinRM
  • BITS
  • WMI
  • VDS
  • VSS

The difficulty is in making sure all systems are fully updated. This is a time-consuming task.

WSUS takes care of this for me…

Not necessarily. There are certain Hotfixes that need to be downloaded manually, but for the most part Windows Update is the key. WSUS is Microsoft’s solution to distributing Windows Updates within an enterprise, and this pulls from Windows Update as well. Unfortunately, rules in WSUS are sometimes set up such that all updates required do not find their way to SCVMM systems. So, there are layers of complexity in keeping systems up to date.

Prevent problems with VMMUpdate

With this script you now or that your Hyper-V hosts & SCVMM Server are up to date.

To download the latest follow the link HERE

vmmupdate

Removing the Browser Choice option During deployment with MDT 2010

The Deployment Guys created a nice script to remove the Browser Choice option.

If you are in the European Union, you will have seen the installation of the Browser Choice option from Windows Update. This is a good thing if you are a consumer, however if you are managing Volume Licensed (VL) builds and you don’t want the Browser Choice in your deployment image.
But you do want to make use of the MDT 2010 ability to go off to Windows Update or your WSUS Server and install patches automatically during your deployment task sequence.

Check HERE how to config MDT to use your WSUS server

MDT 2010 comes with a number of task sequence templates. The one I used many times is the standard client task sequence template. As part of this template there are two tasks for applying Windows updates (Pre-Application Installation and Post-Application Installation).
These tasks are really useful as part of the deployment of a client machine because you have always an up to date image.

TS

As part of this automated Windows Update process KB976002 will be downloaded and installed giving the options shown below in your core image.

image

Recently KB2019411 has been released which provides information about the Browser Choice update for system administrators who are in managed environments that are under a Volume Licensing program . De Deploymentsguys have created a MDT based script for implementing the suggestions in the article KB2019411. Adding the registry entries to control the display of the Browser Choice screen and to remove the Browser Choice icon from the desktop.

The script (CFG-HideBrowserChoice.wsf) should be placed in the MDT Distribution Share\Scripts folder and then a “Run Command Line” task should be added to your image engineering task sequence (after the last Windows Update task but before the sysprep and image capture tasks). The command you should run is cscript.exe CFG-HideBrowserChoice.wsf.

An example of this is shown below.

ts2

When the task runs, the script will turn off the Browser Choice and removes the icon from the desktop. You will also find a log file that the script generates in the usual MDT log location (MININT\SMSOSD\OSDLOGS\CFG-HideBrowserChoice.log)

You can get the CFG-HideBrowserChoice.wsf script from the Deployment Guys SkyDrive by clicking HERE

Tested and I worked great

Source: blogs.technet.com

Best Practices Analyzer Updates for Server 2008 R2

Update for Best Practices Analyzer for HYPER-V for Windows Server 2008 R2 x64 Edition (KB977238) You can use Hyper-V Best Practices Analyzer to scan a server that is running the Hyper-V role, and help identify configurations that do not comply with the best practices of Microsoft for this role.

Update for Best Practices Analyzer for DHCP Server for Windows Server 2008 R2 x64 Edition (KB977236) You can use DHCP Best Practices Analyzer to scan a server that is running the DHCP role and help identify configurations that do not comply with the best practices from Microsoft for this role.

Update for Best Practices Analyzer for Network Policy and Access Services for Windows Server 2008 R2 x64 Edition (NPAS) (KB977239) You can use the Network Policy and Access Services update for Best Practices Analyzer to scan a server that is running one or more of following the role services: Network Policy Server, Health Registration Authority, and Routing and Remote Access Service.

Update for Best Practices Analyzer for File Services for Windows Server 2008 R2 x64 Edition (KB981111) You can use File Services Best Practices Analyzer to scan a server that is running the File Services role and one or more of following role services: DFS Namespaces, DFS Replication, File Server, File Server Resource Manager, Services for Network File System.

Update for Best Practices Analyzer for Active Directory Rights Management Services for Windows Server 2008 R2 x64 Edition (KB981391) You can use Active Directory Rights Management Services Best Practices Analyzer to scan a server that is running the AD RMS role and help identify configurations that do not comply with the best practices of Microsoft for this role.

Update for Best Practices Analyzer for Windows Server Update Services for Windows Server 2008 R2 x64 Edition (KB981390) You can use the Windows Server Update Services (WSUS) update for Best Practices Analyzer to scan a server that is running WSUS.

Update for Best Practices Analyzer for Application Server for Windows Server 2008 R2 x64 Edition (KB981392) You can use the Application Server update for Best Practices Analyzer to scan a server

Core Configurator 2.0 (Windows Server 2008 R2)

Core Configurator V2 is beschibaar voor Windows Server 2008 R2 Core editie

image

Core Configuration taken omvatten:

  • Product Licensing
  • Netwerkfuncties
  • Dcpromo
  • ISCSI Instellingen
  • Server rollen en functies
  • Gebruiker en Groepsrechten
  • Share aanmaken en Verwijderen
  • Dynamische Firewall-instellingen
  • Display | Screensaver Instellingen
  • Toevoegen & Verwijderen Drivers
  • Proxyinstellingen
  • Windows Updates (Inclusief WSUS)
  • Multipath I / O
  • Hyper-V inclusief virtuele machine
  • Join Domain en Computer her noemen
  • Toevoegen / verwijderen programma’s
  • Services
  • WinRM
  • Volledige logging van alle commando’s die worden uitgevoerd.

Downloaden doe je HIER

XP client geeft Deployment & Inventory error in SCE 2007

image

1. Client Agent verwijderen in System Center

2. Register key’s verwijderen (Alles) onder HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate

A Windows 2000-based, Windows Server 2003-based, or Windows XP-based computer that was set up by using a Windows 2000, Windows Server 2003, or Windows XP image does not appear in the WSUS console

3. Opnieuw opstarten

4. Inloggen als administrator

5. Firewall uitschakkelen

6. Controleren of de computer gekoppeld is aan SCE Managemed Computers security group

7. Agent installeren via System Center

8. wuauclt.exe /resetauthorization /detectnow /force

9. Even wachten 10min

10. Indien nog lang duurt wuauclt.exe /detectnow /force uitvoeren

11. Als het goed is moet nu Deployments & Inventory & Monitoring nu groen zijn.

12. Mocht het niet werken. Dan de volgende stappen opnieuw uitvoeren 2,3,4,5,8,9.10

image

MDT automatisch windows updates via WSUS laten installeren tijdens het deployen van het OS.

1. Ga naar je distributieshare:

2. Open de control map

3. Open CustomSettings.ini
image 
4. Voeg onder aan, het volgende toe
WSUSServer=http://jewsusserver

5. Download de volgende 2 bestanden:
x86 versions (WindowsUpdateAgent30-x86.exe) at http://go.microsoft.com/fwlink/?LinkID=100334.
x64 version (WindowsUpdateAgent30-x64.exe) at http://go.microsoft.com/fwlink/?LinkID=100335.

6. Kopieer WindowsUpdateAgent30-x64.exe in de x:\Distribution\Tools\x64\ map en de
WindowsUpdateAgent30-x64.exe in de x:\Distribution\Tools\x86\ map.
image 

7. Open elke task sequences die je aangemaakt hebt.
Haal de twee vinkjes weg bij:

image

Dit doe je door de taak aan te klikken en daarna options tab te klikken.
Vinkje weghalen bij Disable this step.

image

8. Nu kun je gaan testen of het werkt. Ik heb getest met Windows 2003 R2 X64 en het werkt als een trein. 😀

Skipping MDT Wizard Pages (CustomSettings.ini & Bootstrap.ini)

1. Open MDT

clip_image002
2. Ga naar Deployments Points
3. Rechter muis op je deployment point en kies properties
4. Ga naar Rules Tab.

clip_image004

5. Neem de onderstaande instellingen over.

[Settings]
Priority=Default
Properties=MyCustomProperty

[Default]
OSInstall=YES
_SMSTSORGNAME=WardVissers
SkipCapture=No
SkipAdminPassword=YES
SkipProductKey=YES
SkipDeploymentType=YES
DeploymentType=Newcomputer
SkipDomainMembership=NO
JoinDomain=wardvissers.local
DomainAdmin=helpdesk 
DomainAdminDomain=wardvissers.local
DomainAdminPassword=***********
SkipUserData=YES
SkipBuild=NO
SkipComputerName=NO
SkipPackageDisplay=NO
SkipLocaleSelection=YES
SkipTimeZone=YES
SkipApplications=NO
SkipBitLocker=YES
SkipBitLockerDetails=YES
SkipSummary=YES
SkipFinalSummary=YES
UserDataLocation=NONE
SkipAppsOnUpgrade=YES
TimeZoneName=W. Europe Standard Time
TimeZone=110
AreaCode=0413
UserLocale=nl-NL
Language=00000413
SystemLocale=00000413
UserLocale=00000413
InputLocale=0413:00020409
InputLocale=nl-US
KeyboardLocale=nl-US
WSUSServer=http://wsus
FinishAction=REBOOT

6. Klik vervolgens op Edit Bootstrap.ini & neem onderstaande settings over.

[Settings]
Priority=Default

[Default]
DeployRoot=\\servername\DeploymentShare$
SkipBDDWelcome=Yes
KeyboardLocale=nl-US
Userid=Helpdesk
UserPassword=********
Userdomain=wardvissers.local

7. Klik vervolgens op X en kies voor Save.
8. Klik op Apply & OK.
9. Rechtermuis op je deployment en kies voor update. Hij gaat nu het wim & iso bestand updaten.

Opmerking: Vergeet de bijgewerkte WIM image niet opnieuw te koppelen aan WDS anders moet je nog steeds door veel schermen heen klikken.

BRON1 BRON2 BRON3