Post by Michael P. QuinlanO.K. Let's try to break this down. I will try it one step at a time. It is
far to important to just write it off as "too-hard-to" install WSUS for all
of my clients. To start with I am on a Windows 2003 SBS Premium server with
ISA 2000. When I check in MMC under "Client Computers" in MMC they are all
there, so WSUS is clearly not picking up All computers from there.
No... WSUS gets "All Computers" from itself. "All Computers" is a rollup of
whatever is in "Unassigned Computers" along with whatever is in the rest of
the user-created target groups.
WSUS only gets computer information in one way. The client computer initiate
a detection and registers with the WSUS server by reporting its status.
Post by Michael P. QuinlanPost by Lawrence GarvinServer, and verify that anonymous access permissions are enabled on the
/selfupdate and /clientwebservice virtual directories in the Default Web
Serer.
Is this http://<domainname>:8530 or http://<domainname>/selfupdate?
Both..and then some more. First, understand that on SBS2003 you actually
have /two/ websites you need to be aware of for WSUS functionality.
The Default Web Site, on port 80, has the bare functionality necessary to
provide selfupdating capabilties for legacy AU clients. This consists of two
virtual directories, 'selfupdate' and 'clientwebservice' (technically,
'clientwebservice' is an application directory, but for our purposes the
moniker virtual directory will serve the purpose), and two files in the root
of the website: iuident.cab and wutrack.bin, which are copied from the
%programfiles%\update services\webservices\root folder into
C:\inetpub\wwwroot.
The second website is the WSUS virtual server, on port 8530, which is where
all of the functionality for WSUS is contained.
ALL virtual servers and ALL virtual directories must have anonymous access
permissions enabled /except/ the WSUSAdmin virtual directory, which should
only have "Integrated Authentication" enabled. (This is what ensure that
only admins can get to the WSUSAdmin site.)
Post by Michael P. QuinlanThey are both returning the same "HTTP Error 403 - Forbidden" errors.
'403' errors are quite often a sign that a proxy server is interfering.
Typically, if the client has connected to the web server, but is being
denied access because of permissions. I'm going to defer any more
information in this response, because I know you posted a message a couple
hours after this one, and it seems to indicate you're making good progress.
Post by Michael P. QuinlanI checked and Anonomous was enabled for both. I can get to
http://<domainname>:8530/WSUSAdmin with no problem.
Interesting. I also checked the WSUS Administration website in addition to
the Default website. selfupdate and clientwebservice did NOT have ANONOMOUS
LOGIN in the Permissions groups there.
This is definitely part of the problem.
Post by Michael P. QuinlanDid you mean for me to add it to the
WSUS Administration website, NOT the Default website?
It needs to be added to both websites (Default Web Site /and/ WSUS
Administration)
/and/ it also needs to be added to all of the directories in each of those
two websites,
which includes 'selfupdate', 'clientwebservice', 'simpleauthwebservice',
'content' at a minimum for client functionality.
Do not add anonymous access to the virtual directory named 'WSUSAdmin'.
Post by Michael P. QuinlanIf so, how long do I
have to wait? I tried adding ANONOMOUS LOGIN in Permissions there and it did
not change from the 403 Forbidden errors.
I notice my computer count is 0 and my unassigned computer count is 0 on
http://<domainname>/WSUSAdmin computers.