Solved

WSUS 3.0 & SQL Server 2000 SP4

Posted on 2007-11-21
3
909 Views
Last Modified: 2010-05-18
Would like to run WSUS 3.0 on a box running WS2K3SP2 and host teh WSUS DB on a server running W2K3SP2 & SQL Server 2000 SP4.

Is this possible? The requirements for WSUS say to use SQL 2005, but I do not have it and do not want to pay for it. I also do not want to run poopy MSDE.

0
Comment
Question by:keatscon
  • 2
3 Comments
 
LVL 8

Expert Comment

by:rjwesley
ID: 20331102
Poopy MSDE works without issues on the three servers I run it on.

I'd say your simplest option is WSUS 3 and MDSE.

from reading:

http://technet2.microsoft.com/windowsserver/en/library/d7183651-b9fb-4288-a15f-33032c40ce2d1033.mspx?pf=true (Remote SQL limitations)

and

http://technet2.microsoft.com/windowsserver/en/library/9e01d057-6b39-4eb7-b151-dff7ad0cd6381033.mspx?pf=true

I'd say keep it simple.

Rob
0
 

Author Comment

by:keatscon
ID: 20331125
Thank you Rob, but I do not want to run MSDE on any of my servers, would rather run on SQL 2000 SP4, but do not want to pay for 2005, especially if it has nothing new to offer that we can use.

I do want to keep it simple, that is why I want to put the db on an existing server rather than mess with another sql.
0
 
LVL 8

Accepted Solution

by:
rjwesley earned 500 total points
ID: 20331625
Windows Server Update Services 2.0 with Service Pack 1 is your only option.

http://technet.microsoft.com/en-ca/wsus/bb466206.aspx

Rob
(Yes I agree upgrading is not always viable)
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Organizations create, modify, and maintain huge amounts of data to help their businesses earn money and generally function.  Typically every network user within an organization has a bit of disk space to store in process items and personal files.   …
by Batuhan Cetin Within the dynamic life of an IT administrator, we hold many information in our minds like user names, passwords, IDs, phone numbers, incomes, service tags, bills and the order from our wives to buy milk when coming back to home.…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now