Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


Computers are not getting liseted in Computer groups WSUS

Posted on 2012-09-14
Medium Priority
Last Modified: 2012-09-15
Hello Experts,

 I am having WSUS Lab , where I am practicing the WSUS related stuff.

Below is my lab configuration

1 - Windows server 2008 (DC/WSUS/DNS)

2 , Windows server 2008 Client

3. WIndows server 2003 Client

 I have created a group policy and applied to the client as well as to my DC.

GPO seems to be applying fine , I have enabled the Client sided targeting as well.

When I check the WIndowsupdate.log file I am able to see the Target Group as well other WSUS server and its status.

BUt When I go to my WSUS console , ALl the comptuers are listed in ALL COmputers and Unassinged comptuer groups not in the LAB( Which is my computer client sided target group).

Attached is the windowsupdate.log fie.

I am not sure what I am missing? Can anyone help me with this?
Question by:Prashant Girennavar
LVL 47

Accepted Solution

Donald Stewart earned 2000 total points
ID: 38400653
Do you have the Target Groups Spelled exactly the same(Including any spacing) in both your GPO and WSUS console???

Within the WSUS console did you use the setting "Use the update services console" or "Use group policy or registry settings on computers" ???

LVL 10

Author Closing Comment

by:Prashant Girennavar
ID: 38401207
Link did the trick...


Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question