Solved

Microsoft SUS Manager Client Config Without AD Policies

Posted on 2004-03-25
4
1,056 Views
Last Modified: 2013-12-03
We have installed a SUS Server working fine in a specific Domain. We have some clients in another Domain. Is there any choice to modify the Windows Update URL without using AD policies?
Changing Manually the Key in the registry? Any tool?

Thanks in advance.
0
Comment
Question by:CharlesRam
  • 3
4 Comments
 
LVL 82

Expert Comment

by:oBdA
Comment Utility
Without group (or system) policies, you need to edit the registry manually or with a script.
The necessary settings can be found here:

FAQs: Automatic Update client settings
http://www.susserver.com/FAQs/FAQ-AutoUpdateSettings.asp
0
 
LVL 7

Expert Comment

by:4auHuk
Comment Utility
SUS deployment white paper describes different deployment scenarios including workgroup environment(your case as you trying to setup automatic updates for computers from defferent domain)
You may also wish to create another SS in target domain and configure it to obtain updates as well as list of approved updates from your main SUS server. SUS server does not use much resources so you should be able to install it on one of servers in target domain.

Software Update Services Deployment White Paper:
http://www.microsoft.com/windowsserversystem/sus/susdeployment.mspx

4auHuk
0
 
LVL 7

Accepted Solution

by:
4auHuk earned 125 total points
Comment Utility
Ow, just missed obvious thing:
You can use AD policies on target domain to put that domain computers to SUS server in your domain.

4auHuk
0
 
LVL 7

Expert Comment

by:4auHuk
Comment Utility
Glad to help :)
Can I ask you a question, why "C" grade? Taking in account you give C all your questions - is it something of principle?

If you are not sure about grades to give you might want to read this EE help topic:
http://www.experts-exchange.com/Operating_Systems/Win2000/help.jsp#hi73

Regards,
4auHuk
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now