SCCM client site unsuccessful error

Posted on 2008-09-29
Last Modified: 2013-11-21
I am attemtping to get SCCM 2007 running on our domain but continue to get the error "Automatic site code discovery was unsuccessful" when manaully trying to set the site code since it did not on the client push.
This is a new install of SCCM, no upgrades from earlier versions and we are at svcpck1.
The install seemed to go smooth.
This is a single domain.
I have all systems populated as well as all users.
I am using active directory and have updated the schema and based on research all the items are present in AD.
SMS-MP-NWC-PHANTOM      mSSMSManagementPoint            
SMS-NWC-2304262662-2304262662      mSSMSRoamingBoundaryRange            
SMS-NWC-2304263680-2304278526      mSSMSRoamingBoundaryRange            
SMS-Site-NWC      mSSMSSite
I have boundaries currently set to our default first site.
Have also tried IP range. (No luck)
Their was NO SMS service account created for the SCCM server in the domain.
(assumed SMS&_PHANTOM)
The sitecomp.log states that my server,phantom, is the default management point.
I have not setup SLP in WINS because of using AD.
When manaually trying to assign the site code I have tried putting in our dns suffix for the assignment below section but it does not help.
I have tried finding the DCOM entry for client on the SCCM server to change the rights on it mentioned in several other threads but that entry does not exist. (Can't find that thread again to be more specififc).
Out of these logs:


Only the sitecomp.log exists.
Do I need the SMS&_PHANTOM account, if so can I just create it and the system will use it?
Should I add this account to the local admin group of each client?
Do I need to add this account to the AD items created when extending the schema?

Any help would be appreciated.
Question by:nwccsadmin
  • 2

Expert Comment

ID: 22605442
Did you extend the AD Schema? Even if you did when upgrading/Installing you must hace Schema Master rights for it to work properly.

Here's a link that might help.

Author Comment

ID: 22609708
Yes tha active directory schema was updated succesfully as mentioned above.
While the AD update was succesfull I did not log into the server and install CM as the SMS admin.
Mainly for the reason that it did not create and SMS admin.
Not sure what else that article does to help me based on the error I get.

Accepted Solution

reagan0405 earned 125 total points
ID: 22621935
you must have a slp and choose not to use wins.

Do I need the SMS&_PHANTOM account, if so can I just create it and the system will use it?
Should I add this account to the local admin group of each client?
Yes or you could use the machine account.
Do I need to add this account to the AD items created when extending the schema?
No but the SCCM machine needs to have full rights to the system container and all object underneath.
What did the log file say when you extended the schema? It will be in the root of c:


Author Closing Comment

ID: 31501292
This solution gave me clues to look for things I had not done like installing the necessary roles.

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After having deployed hundreds of thousands of Terminal Services seats worldwide, I still see all the time people asking me that same old question: "If TS/RDS is that reliable why are you telling me I should reboot it that often? My DC/SQL/Exchange/…
Welcome to my series of short tips on migrations. Whilst based on Microsoft migrations the same principles can be applied to any type of migration. My first tip Migration Tip #1 – Source Server Health can be found listed in my profile here: http:…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question