Solved

Safe to Execute WSUS SUSClientID script fix on PDC domain controller?

Posted on 2014-12-10
3
178 Views
Last Modified: 2016-02-21
I have a bunch of VMs on our network that I had found out were provisioned using the same templates or are clones of each other, in a sort of base configuration golden image sense.  This has presented a problem when it comes to how these servers appear (or at times fail to) in our WSUS server.  The symptoms are, some VMs show up, then disappear, come back, change groups and names...etc.

I have been making a list of suspect VMs and correcting this problem using the following script, executed on a machine by machine basis.

Link to issue and script that fixes it...
http://blogs.technet.com/b/sus/archive/2009/05/05/resolving-the-duplicate-susclientid-issue-or-why-don-t-all-my-clients-show-up-in-the-wsus-console.aspx

Now, my problem, its seems our PDC Domain Controller is a clone of something, a long while back.  I want to fix it, but am very trepidatious about executing any kind of script on a PDC unless I absolutely have to or understand fully the ramifications of every line of code or command.  And since you cant take snapshots of non 2012 DCs I can't back out of this.

Does anyone know specifically the ramifications of executing this script on a PDC? Based on my experience, it seems like it will fix the WSUS console issue, but will it mess up anything on the DC.  IE stopping BITs service, changing the SUSclientID (which should be ok as its not the GUID of the server) or other things effect a PCDs ability to do its job in any kind of way, cause AD replication issues or corruption of any kind?

Thanks A LOT for the help.
0
Comment
Question by:CnicNV
  • 2
3 Comments
 
LVL 47

Accepted Solution

by:
dstewartjr earned 500 total points
Comment Utility
Perfectly safe, no ramifications.
0
 
LVL 47

Expert Comment

by:dstewartjr
Comment Utility
I use psexec \\* to distribute the script to the whole domain.
0
 

Author Closing Comment

by:CnicNV
Comment Utility
Ok thanks for the heads up.  Just wanted to double check.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now