July 2008 - Posts
What do people think of Windows Vista when they don't know it's Windows Vista?
Have you heard of the Mojave Experiment?
The basic gist is that Microsoft take a bunch of Vista haters and show them their "new" OS that is "in development" to see what they think. Really they are playing with Vista. Some very interesting results:
SCCM setup has a habit of placing components on the drive it finds that has the most space. if you're using a clustered SQL instance then this can often mean that components intended for non-shared disks end up on shared disks.
To prevent this from happening, place an empty file named NO_SMS_ON_DRIVE.SMS at the root of each drive where you DO NOT want it to install the components and it will avoid using those drives i.e. place it on all drives except where you want it to install the SCCM components.
Note we're talking about the SCCM components here, not the actual database itself. SCCM installs some components on each physical node to assist with things like backup.
Thanks to Jeff Gilbert for the original post.
“Before beginning the upgrade process to Configuration Manager 2007 SP1, the Windows AIK 1.0 should be uninstalled from the SMS Provider computer for the site to allow SP1 Setup to install Windows AIK 1.1 to support SP1 OSD WIM images.
If the Windows AIK 1.0 is not uninstalled prior to beginning SP1 Setup, and a PXE service point is installed in the site running the Windows Deployment Services (WDS) Server service, the upgrade might fail and result in an unexpected restart and post-upgrade SMS Executive service crashes.”
Some new documentation is now available on Technet: How to Configure ISA SSL Bridging for System Center Configuration Manager Internet-Based Client Management (http://go.microsoft.com/fwlink/?LinkId=122350). This has been a joint collaboration between the ISA Server product group and the Configuration Manager product group to provide guidance on how to configure the two products to work together to support Internet facing clients.
This provides a higher level of security for Internet traffic than the alternative method of tunnelling, or tunneling if you're in the US :). With ISA bridging traffic from Internet clients is authenticated and terminated at the ISA Server, inspected, and then new SSL connections are made to the Internet-based site system servers. This is as opposed to tunnelling, where the traffic from the Internet clients is forwarded to the site system servers without termination, so it cannot be inspected for nasty content.