using vNext beta2 in a LAB – Part 3. Additional Configuration configuring discovery methods and more

In Part 1. of this series we Installed vNext, in Part 2
we started to configure it. In this part we will continue configuring
Beta 2 by enabling Active Directory discovery methods, adding some site
system roles, configuring the computer client agent and client push
settings and finally doing a manual client installation to verify it all

Perform the following on the vNext server as SMSadmin

Configuring Discovery Methods.

For information of Planning Discovery methods for SCCM 2012, please refer to this page on Technet.

Planning for Discovery in Configuration Manager 2012 – http://technet.micro…y/gg712308.aspx

Active Directory Discovery Methods


Manager 2012 Active Directory discovery methods can discover Active
Directory sites, subnets, users, and computers that are stored in Active
Directory Domain Services. To discover information from Active
Directory, Configuration Manager requires access to the Active Directory
locations that you specify and will use the computer account of the
site server that runs the Active Directory discovery method. Or, you can
specify a Windows account to run any Active Directory discovery method.

When any of the four Active Directory discovery methods run,
Configuration Manager contacts the nearest domain controller in the
Active Directory forest to locate Active Directory resources. The domain
and forest can be in any supported Active Directory mode, and the
account that runs the discovery method must have Read access to the
specified Active Directory containers. During discovery, the discovery
method searches the specified locations for objects and then collects
information about the object.

With the exception of Forest Discovery, all the Active Directory discovery methods support Delta Discovery.

Step 1. Enable Active Directory Security Group Discovery

Click on the Administration workspace, expand Overview, Site Hierarchy, Discovery Methods

Attached Image: monthly_06_2011/post-1-0-19346400-1309150367.png

You can see that we have already enabled Active Directory Forest Discovery (Heartbeat Discovery is automatically enabled), so let’s enable some additional discovery methods otherwise our computers (and users) will not appear in Assets and Compliance.

Double click on Active Directory Security Group Discovery, place a checkmark in enable active directory security group discovery

Attached Image: monthly_06_2011/post-1-0-81150300-1309153371.png

click on the yellow starburst to add an Active Directory container, once
done click on Browse and select your chosen active directory container
to search during the discovery process

Attached Image: monthly_06_2011/post-1-0-99357600-1309154079.png

click Ok when done

Attached Image: monthly_06_2011/post-1-0-87749500-1309155149.png

note that enabling discovery will trigger full polling to be run immediately

Attached Image: monthly_06_2011/post-1-0-50605100-1309155264.png

Step 2. Enable the other three Active Directory discovery methods

Repeat the above for the remaining discovery methods

  • Active Directory System Discovery
  • Active Directory System Group Discovery
  • Active Directory User Discovery

The following Discovery Methods should now be Enabled

Attached Image: monthly_06_2011/post-1-0-28217800-1309155644.png

Step 3. Verify that discovery is working

In the console, click on Assets and Compliance

Attached Image: monthly_06_2011/post-1-0-41063700-1309156427.png

Discovery of Computers

Click on Device Collections, then click on All Systems, you should now see both AD1 (was previously missing) and the vNext server listed.

Attached Image: monthly_06_2011/post-1-0-95668400-1309156612.png

Double click on AD1 (your Domain controller computer) and you should see details about the system including discovery details (it was discovered using Active Directory System Discovery and Active Directory System Group Discovery).

Attached Image: monthly_06_2011/post-1-0-27828300-1309156909.png

Click on Close.

Discovery of Users

Click on User Collections in the left pane, Click on All Users and in the Ribbon, click on Show Members

Attached Image: monthly_06_2011/post-1-0-91632400-1309157863.png

the contents of All Users are displayed (these are the users we created in Part 1 of this guide)

Attached Image: monthly_06_2011/post-1-0-53061400-1309158010.png

Double click on a user and you’ll see the discovery information listed, including discovery type (sms_ad_user_discovery_agent)

Attached Image: monthly_06_2011/post-1-0-94753200-1309159598.png

click ok to Close.

Using logs to verify discovery

In addtion to the visual verification we did above, you can browse the
Logs folder of where you installed SCCM 2012, eg: D:\Program
Files\Microsoft Configuration Manager\Logs
and find the following discovery logs


these log files can be opened with Trace64 and you’ll see lots of
interesting info in there such as starting the discovery and what type
of discovery it is (the below sample screenshot is from the first
discovery after enabling Active Directory User Discovery from

Attached Image: monthly_06_2011/post-1-0-04548200-1309158371.png

Step 4. Add the Catalog Web Service Point and Catalog Web Site Point roles

We will be setting some options in the next step which require certain roles to be installed, so in Administration, expand Site Operations, Servers and Site System Roles, right click on our site and choose Add site system role

Attached Image: monthly_06_2011/post-1-0-42799700-1309193786.png

create roles wizard appears, click next

Attached Image: monthly_06_2011/post-1-0-01131000-1309193961.png

select the following roles

  • Application Catalog Web Service Point
  • Application Catalog Web Site Point

and click next

Attached Image: monthly_06_2011/post-1-0-43619300-1309194103.png

accept the default values for the application catalog web service point

Attached Image: monthly_06_2011/post-1-0-21318700-1309194173.png

and add your organization name to the application catalog web site point

Attached Image: monthly_06_2011/post-1-0-38152700-1309194407.png

click next at the summary and review the completion

Attached Image: monthly_06_2011/post-1-0-56682400-1309194476.png

To read the entire post including screenshots, please see here on

This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.