Solved

SCCM 2012 MP Assignment Overriding SCCM 2007 Secondary Site MP Assignment

Posted on 2013-06-19
2
1,049 Views
Last Modified: 2013-06-20
My enterprise is currently undergoing a large SCCM 2012 migration, however, we still have SCCM 2007 site servers that are in production use. When I went to go check out my locationservices.log file on my Secondary Site server, it stated that an entirely new MP server was assigned rather than my SCCM 2007 Primary MP. I already notified the SCCM 2012 project team about this, but I wanted to ask if anyone here knows how to go about getting my Secondary Site server re-assigned back to its proper SCCM 2007 MP? I already uninstalled the SCCM 2012 client and reinstalled the 2007 SCCM client and removed and re-added the MP role on my Secondary Site server, but it still is being re-directed to use this new SCCM 2012 MP instead. I'm assuming what is going on is that Active Directory Domain Services are at play here or something. Anyway, if someone can provide some info, I would appreciate it. Thanks
0
Comment
Question by:the_ratzenator
2 Comments
 
LVL 23

Accepted Solution

by:
Nagendra Pratap Singh earned 500 total points
Comment Utility
You seem to have overlapping boundaries.

Check for boundaries in both SCCM 2007 and 2012 and see which ones overlap.

Remove the clashing ones after consideration. You can re add them.

Also, sccm 2012 can create them automatically so you may want to discuss this with sccm 2012 project team. They should have the timeframe etc for this.
0
 

Author Comment

by:the_ratzenator
Comment Utility
After notifying the SCCM 2012 Project Team, I recieved an email back regarding the issue and someone had inadvertently set the "Use this boundary group for site assignment" check box when they were not supposed to since we still have SCCM 2007 sites in production.

By the way:

2012 clients can tell the difference between a 2007 and 2012 site, and will only communicate with a 2012 site.

2007 clients are unable to check the version of the site, and will communicate with either.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Over the years, I have had the opportunity to work with a sizeable contingent of CIO's, CTO's, VP's, and a variety of other IT professionals to improve their overall communication skills as well as their public speaking, presenting and messaging abi…
Not many admins are aware that GPOs can be activated and deactivated time-based. Time to change that :)
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now