SCCM 2007 R3 Issue

Posted on 2011-04-20
Last Modified: 2012-05-11
Hey guys,

I have setup sccm 2007 as per
It was a great help but now I cannot install the client on the workstations and cant even get the machines to show up under the collections container.  I have made sure that the workstations are on and webdav is installed correctly.  I even have turned off the firewall.  What else do I need to look at?
I have copied the ccm log file below so someone might be able to offer some advice.

<SMS_CLIENT_CONFIG_MANAGER><Wed Apr 20 14:50:51.464 2011 Central Daylight Time><thread=5116 (0x13FC)>
---> Attempting to connect to administrative share '\\\admin$' using machine account.~  $$<SMS_CLIENT_CONFIG_MANAGER><Wed Apr 20 14:50:51.464 2011 Central Daylight Time><thread=5116 (0x13FC)>
 ERROR: Unable to access target machine for request: "STK2IM5T", machine name: "VIRTUAL-223039", access denied or invalid network path.  $$<SMS_CLIENT_CONFIG_MANAGER><Wed Apr 20 14:50:51.469 2011 Central Daylight Time><thread=5116 (0x13FC)>
Failed to connect to \\\admin$ using machine account (53)  $$<SMS_CLIENT_CONFIG_MANAGER><Wed Apr 20 14:50:51.468 2011 Central Daylight Time><thread=5116 (0x13FC)>
---> The device does not exist on the network. Giving

Question by:cjameson74
    LVL 1

    Accepted Solution

    You have to configure a Discovery Method. If the workstation are in a domain, i preferr the Active Directory System Discovery.
    You configure that under Site Database --> Site Management --> Site Name --> Site Setting--> Discovery Methods.
    In the Discovery Method Properties check the check box at the schedule tab. That will update the collection Membership as soon as possible.

    After that configure a Client Push Account under the Client Push Installation Properties that have administrative rights on the workstation and enable the Client Push.

    Under the Client Agent Tab, under Computer Client Agent define a Network Access Account to Access the share silently.

    Now your Installation via Client Push will work fine

    LVL 1

    Author Closing Comment


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    When replacing some switches recently I started playing with the idea of having admins authenticate with their domain accounts instead of having local users on all switches all over the place. Since I allready had an w2k8R2 NPS running for my acc…
    Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    6 Experts available now in Live!

    Get 1:1 Help Now