You are here:   Research
  |  Login

Welcome to my blog, quickest way to find articles is usually to search for them.

Search in All Title Contents

Introducing Peer PXE in ConfigMgr Technical Preview 1712

Dec 17 2017

Back in ConfigMgr Technical Preview 1706, Microsoft introduced IPv6 PXE, a feature you could enable not only on distribution points running on Windows Server OS, but also on Windows Client OS. Effectively having a Windows client configured as a DP also acting as a PXE server. Microsoft MVP Ronni Pedersen (@ronnipedersen), have a blog post on that:

SCCM: Enable Desktop Clients as PXE Servers

Now, in ConfigMgr Technical Preview 1712, there is a new feature: Peer PXE, that doesn’t require that you configure the client as a distribution point. Very cool.


Peer PXE – The Basics

As previously mentioned, the new Peer PXE feature in ConfigMgr Technical Preview 1712 is not connected to the distribution point role. Instead it’s a client setting that you deploy to the machines you want to have as PXE servers (event though it’s running a client operating system) in your remote sites.

In order to enable Peer PXE, you need to first enable the “Enable Configuration Manager client in full OS to share content option”, and provide a certificate either by creating a self-signed certificate or by importing one. The other PXE options are pretty self explanatory.

Note: Yes, it means that you, at least in this preview, need to enable Peer Cache for this to work. To learn more about Peer Cache, check out this post:

Reducing Network Impact - One Guide to rule them all


Configure client settings to enable Peer PXE.


Pre-cache boot images

To make sure the seven netboot files are being extracted into the C:\Windows\CCM\SMSBoot\x86 and C:\Windows\CCM\SMSBoot\x64 folders, create a task sequence that Pre-caches the boot images on the clients you want to have as PXE Servers. I recommend to distribute both a x86 and x64 boot image, even if you are deploying x64 systems only. The reason is that some hardware actually advertise themselves as x86, even when having x64 capability. You can see this process in the CAS.log file on the client, and there is a screen later in this post.

The extracted netboot files.

Here is a task sequence for Pre-caching boot images:

Task Sequence with a single Download Package Content action.

Behind the scene – Troubleshooting

Here are some quick tips for troubleshooting, first some common configuration issues.

If you get the below errors, you forgot to create (or import) a certificate:

Failed to create certificate store from encoded certificate..
An error occurred during encode or decode operation. (Error: 80092002; Source: Windows)    SMSPXE


If you get the below errors, the http and https ports are not set correctly (typically 80/443)

socket 'connect' failed; 8007274d
sending with winhttp failed; 80072efd
PXE::MP::InitializeTransport failed; 80072efd
PXE::MP::IsKnownMachine failed; 80070490


Anyway, to get more details about the deployment, you can review the C:\Windows\CCM\Logs\SMSPXE.log file. Don’t be too worried about any red lines, this is after all a technical preview :)

The SMSPXE.log file.

You can also review the settings in the registry, and even though the Peer PXE clients are not DPs (like when using the IPv6 PXE feature for client DPs), the settings are still stored in HKLM\SOFTWARE\Microsoft\SMS\DP. Please note the IsSuperPeerPXE setting.

The registry settings for the Peer PXE feature on a client.

As mentioned earlier, the CAS.log will show you what files got extracted from what boot image.

The CAS log file.


Written by Johan Arwidmark ( @jarwidmark)

Deployment News

Happy deployment, and thanks for reading!

What our lawyers makes us say:

This information is provided "AS IS" with no warranties, confers no rights and is not supported by the authors or Deployment Artist.

Copyright © 2017 by Deployment Artist (the company behind deployment research). All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don't pass off our work as yours, it's not nice.

Blog Archive


Where you can meet us!

Live Stream Recordings
ConfigMgr 1806 and W10 OSD

5 Days - Mega Geek Week 
(multiple classes, ConfigMgr, OSD etc.)
- Johan Arwidmark, Mikael Nystrom...
Jun 10, 2019, Chicago, IL, US

4 Days - Windows 10 OSD Classes
- Johan Arwidmark
May 20, 2019, San Diego, CA, US
Jun 17, 2019, Culemborg, NL
Jul 8, 2019, Phoenix, AZ, US

5 days - ConfigMgr Classes
- Johan Arwidmark and Kent Agerlund
Apr 8, 2019, Chicago, IL, US
Apr 22, 2019, Houston, TX, US

Video-based trainings

MDT, Windows 10 and ConfigMgr Books

Contact Info