Hi All,
Well as you can see from my topic i seem to be having troubles with ghosted computers not registering to our wsus server.
Just for a little background i set up wsus a year or so back for our company but my maintaining of the service has been quite second rate. Because we run terminal sevices we just apply updates to the 4 servers and we are right. However all "dumb terminals" are xp or 2000 clients and auto login into the domain so i would still like for these to recieve updates. This really hit home for us when we needed a daylight savings patch rolled out to all 250 computers in the company. As terminal services pulls the time from the local machine (region) we neeed this fixed as it would then effect all outlook calendars.
So me trying to impress said to the itc manager ill roll it out via wsus. So i downloaded tha patch and set it to roll out and thats when i realised every computer i had ghosted had an identical SID and was not recognised. Whoops! Manually installing the patch on 250 systems locally and remotely was not very much fun!
So thats where i come to you all. Now i know a lot of you are going to say why dont you just use sysprep, and yes i do agree but being a small company we have our reasons

. So lets lust move on from there shall we.
After a search on the internet i found a few sources saying you can generate a new SID by making some registry changes. Just so everyone knows there was a script for this which was as follows;
@echo off
Echo Save the batch file "AU_Clean_SID.cmd". This batch file will do the following:
Echo 1. Stops the wuauserv service
Echo 2. Deletes the AccountDomainSid registry key (if it exists)
Echo 3. Deletes the PingID registry key (if it exists)
Echo 4. Deletes the SusClientId registry key (if it exists)
Echo 5. Restarts the wuauserv service
Echo 6. Resets the Authorization Cookie
Echo 7. More information on
http://msmvps.com/Athif
Pause
@echo on
net stop wuauserv
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v AccountDomainSid /f
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v PingID /f
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v SusClientId /f
net start wuauserv
wuauclt /resetauthorization /detectnow
Pause
So what i did was put this into a script - the pauses. And set it as the login script for the dumb terminals auto logging into the domian (we use a single account for this purpose). I let it run for a few days, as i didnt care if it deleted sids of computers already in there, i would just delete the double up in the wsus.
So here is the catch before i started the script there were 128 computers in wsus. A few days later i checked back and saw 220!! This looked promising, but then going through the list i noticed that yep they wre all just double ups. Not a single new computer had regsietred to the wsus server.
So i now find myself out of ideas and asking you all if anyone out there can give me any help into getting the remaining 120 computers that have been ghosted onto the wsus server. I am completely out of ideas????? Everywhere i looked say the script works but i can definitely tell you that if it does then it doesnt for me

Please any ideas??????