Foreword |
|
xxix | |
Introduction |
|
1 | (6) |
|
Part I Configuration Manager Overview and Concepts |
|
|
|
1 Configuration Management Basics |
|
|
7 | (30) |
|
Ten Reasons to Use Configuration Manager |
|
|
8 | (1) |
|
The Evolution of Systems Management |
|
|
9 | (5) |
|
Hurdles in the Distributed Enterprise |
|
|
10 | (1) |
|
The IT Automation Challenge |
|
|
10 | (1) |
|
Configuration "Shift and Drift" |
|
|
11 | (1) |
|
Lack of Security and Control |
|
|
11 | (1) |
|
|
12 | (1) |
|
Lack of Automation and Enforcement |
|
|
12 | (1) |
|
Proliferation of Virtualization and Cloud Computing |
|
|
12 | (1) |
|
Lack of Process Consistency |
|
|
13 | (1) |
|
|
13 | (1) |
|
Systems Management Defined |
|
|
14 | (1) |
|
Microsoft's Strategy for Service Management |
|
|
15 | (14) |
|
Microsoft's Dynamic Systems Initiative |
|
|
16 | (3) |
|
IT Infrastructure Library and Microsoft Operations Framework |
|
|
19 | (5) |
|
Total Quality Management: TQM |
|
|
24 | (1) |
|
|
24 | (1) |
|
Service Management Mastery: ISO 20000 |
|
|
24 | (1) |
|
Optimizing Your Infrastructure |
|
|
25 | (4) |
|
Overview of Microsoft System Center |
|
|
29 | (5) |
|
Reporting in System Center |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
Virtual Machine Management |
|
|
32 | (1) |
|
Deploy and Manage in the Cloud |
|
|
33 | (1) |
|
Orchestration and Automation |
|
|
33 | (1) |
|
Cloud-Based Configuration Monitoring |
|
|
34 | (1) |
|
|
34 | (1) |
|
The Value Proposition of Configuration Manager |
|
|
34 | (1) |
|
|
35 | (2) |
|
2 Configuration Manager Overview |
|
|
37 | (42) |
|
The History of Configuration Manager |
|
|
37 | (5) |
|
Systems Management Server 1.x |
|
|
38 | (1) |
|
Systems Management Server 2.0 |
|
|
38 | (1) |
|
Systems Management Server 2003 |
|
|
39 | (2) |
|
System Center Configuration Manager 2007 |
|
|
41 | (1) |
|
System Center 2012 Configuration Manager |
|
|
42 | (1) |
|
Terminology in Configuration Manager |
|
|
42 | (20) |
|
|
43 | (1) |
|
|
44 | (2) |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
49 | (1) |
|
Configuration Manager Discovery Types |
|
|
49 | (1) |
|
Configuration Manager Agent |
|
|
50 | (1) |
|
Configuration Manager Console |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (3) |
|
|
57 | (2) |
|
Software Update Management |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
Network Access Protection |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
What's New in This Version |
|
|
62 | (13) |
|
64-Bit Site System Requirements |
|
|
62 | (1) |
|
|
62 | (1) |
|
Applications and Packages |
|
|
63 | (1) |
|
|
63 | (1) |
|
New Configuration Manager Console |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
Extended Mobile Device Management |
|
|
65 | (1) |
|
Management Point Enhancements |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
Centrally Managed Client Settings |
|
|
66 | (1) |
|
Role-Based Administration |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
Client Health Status Enhancements |
|
|
68 | (1) |
|
Compliance Settings Changes |
|
|
68 | (1) |
|
Remote Control Improvements |
|
|
69 | (1) |
|
Hardware Inventory Improvements |
|
|
69 | (1) |
|
Power Management Improvements |
|
|
70 | (2) |
|
Software Updates Improvements |
|
|
72 | (1) |
|
Improved End User Experience |
|
|
73 | (1) |
|
|
73 | (1) |
|
Operating System Deployment |
|
|
73 | (1) |
|
Distribution Point Changes |
|
|
74 | (1) |
|
System Center 2012 Endpoint Protection Integration |
|
|
75 | (1) |
|
Feature Dependencies of System Center 2012 Configuration Manager |
|
|
75 | (2) |
|
|
77 | (2) |
|
3 Looking Inside Configuration Manager |
|
|
79 | (82) |
|
|
80 | (1) |
|
Active Directory Integration |
|
|
81 | (10) |
|
|
81 | (9) |
|
Additional Active Directory Benefits |
|
|
90 | (1) |
|
|
91 | (20) |
|
WMI Feature Set and Architecture |
|
|
91 | (4) |
|
Inside the WMI Object Model |
|
|
95 | (3) |
|
|
98 | (5) |
|
Looking Inside the CIMV2 Namespace |
|
|
103 | (8) |
|
|
111 | (13) |
|
ConfigMgr Client Namespaces |
|
|
111 | (1) |
|
Hardware Inventory Through WMI |
|
|
112 | (4) |
|
Additional Client Operations Through WMI |
|
|
116 | (4) |
|
|
120 | (4) |
|
Components and Communications |
|
|
124 | (9) |
|
Inside the ConfigMgr Database |
|
|
133 | (5) |
|
ConfigMgr Tables and Views |
|
|
133 | (1) |
|
Using SQL Server Management Studio |
|
|
134 | (4) |
|
Viewing Detailed Process Activity |
|
|
138 | (8) |
|
SQL Replication Crash Course |
|
|
146 | (2) |
|
Configuration Manager Database Replication |
|
|
148 | (6) |
|
|
154 | (3) |
|
|
157 | (4) |
|
Part II Planning, Design, and Installation |
|
|
|
4 Architecture Design Planning |
|
|
161 | (44) |
|
Developing the Solution Architecture |
|
|
161 | (4) |
|
Establishing Business Requirements |
|
|
162 | (1) |
|
Assessing Your Environment |
|
|
163 | (2) |
|
|
165 | (2) |
|
|
167 | (13) |
|
Configuration Manager Sites |
|
|
167 | (2) |
|
Planning Your Hierarchy Structure |
|
|
169 | (1) |
|
Planning Boundaries and Boundary Groups |
|
|
170 | (2) |
|
Choosing Client Discovery and Installation Methods |
|
|
172 | (2) |
|
Defining Your Client Architecture |
|
|
174 | (4) |
|
Planning for User-Centric Management |
|
|
178 | (1) |
|
Planning Content Management |
|
|
178 | (2) |
|
Planning for Infrastructure Dependencies |
|
|
180 | (6) |
|
Active Directory Considerations |
|
|
180 | (3) |
|
Planning Certificate Services |
|
|
183 | (3) |
|
|
186 | (4) |
|
Site Servers and Site Systems Planning |
|
|
186 | (2) |
|
|
188 | (1) |
|
Developing the Server Architecture |
|
|
189 | (1) |
|
Planning for Solution Scenarios |
|
|
190 | (7) |
|
|
190 | (3) |
|
Planning for Internet-Based Clients |
|
|
193 | (2) |
|
Out of Band Management Planning |
|
|
195 | (2) |
|
Testing and Stabilizing Your Design |
|
|
197 | (7) |
|
|
198 | (6) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (56) |
|
Understanding Your Network |
|
|
206 | (1) |
|
Configuration Manager Data Flow |
|
|
206 | (2) |
|
Intrasite Server Communications |
|
|
208 | (6) |
|
Communications with SQL Server |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (4) |
|
Replication of Deployment Content Refresh Data |
|
|
213 | (1) |
|
Site System Communications Using HTTP and HTTPS |
|
|
214 | (1) |
|
Other Server Communications |
|
|
214 | (1) |
|
Client to Server Communications |
|
|
214 | (11) |
|
Client Ports and Protocols |
|
|
215 | (1) |
|
Reasons for Changing Ports |
|
|
215 | (6) |
|
|
221 | (1) |
|
Identifying and Contacting the Client's Assigned Site |
|
|
222 | (1) |
|
|
222 | (2) |
|
Planning for Network Access Protection |
|
|
224 | (1) |
|
Site-to-Site Communications |
|
|
225 | (2) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
Fast Network and Slow Network Boundaries |
|
|
227 | (2) |
|
|
229 | (5) |
|
BITS Versions for ConfigMgr Clients |
|
|
230 | (1) |
|
Modifying BITS Functionality Through Group Policy |
|
|
231 | (1) |
|
Modifying BITS Functionality Within ConfigMgr |
|
|
232 | (1) |
|
Comparative Advantages of Group Policy and ConfigMgr Settings for BITS |
|
|
233 | (1) |
|
Systems with Multiple Interfaces and File Integrity Checking |
|
|
233 | (1) |
|
ConfigMgr and BranchCache |
|
|
234 | (2) |
|
Server and Site Placement |
|
|
236 | (1) |
|
Deploying Servers to Support Internet-Based Clients |
|
|
237 | (4) |
|
Using a Dedicated Site for Internet Clients |
|
|
238 | (1) |
|
Allowing Site-to-Site Communications Across an Inner Firewall |
|
|
239 | (1) |
|
Having a Site Span the Internal Network and Perimeter Network |
|
|
240 | (1) |
|
Using Web Proxies and Proxy Enrollment Points |
|
|
240 | (1) |
|
Intermittently Connected Users |
|
|
241 | (1) |
|
|
241 | (5) |
|
Discovering Network Topology |
|
|
243 | (2) |
|
Topology and Client Discovery |
|
|
245 | (1) |
|
Discovering Topology, Client, and Client Operating Systems |
|
|
245 | (1) |
|
Troubleshooting ConfigMgr Network Issues |
|
|
246 | (13) |
|
Network Configuration Issues |
|
|
247 | (1) |
|
Basic Connectivity Problems |
|
|
247 | (1) |
|
|
248 | (1) |
|
Blocked or Unresponsive Ports |
|
|
249 | (1) |
|
|
250 | (1) |
|
Identifying Network Issues Affecting ConfigMgr |
|
|
250 | (9) |
|
|
259 | (2) |
|
6 Installing System Center 2012 Configuration Manager |
|
|
261 | (56) |
|
Configuring Pre-Installation Requirements |
|
|
261 | (9) |
|
|
262 | (1) |
|
Supported SQL Server Requirements |
|
|
263 | (2) |
|
Validating and Configuring Active Directory Requirements |
|
|
265 | (1) |
|
Windows Server Update Services |
|
|
265 | (1) |
|
|
265 | (4) |
|
Using the Prerequisite Files Downloader |
|
|
269 | (1) |
|
Performing Site Installations |
|
|
270 | (26) |
|
Installing the Central Administration Site |
|
|
271 | (7) |
|
|
278 | (10) |
|
Installing Secondary Sites |
|
|
288 | (6) |
|
|
294 | (2) |
|
|
296 | (13) |
|
|
296 | (5) |
|
Installing Optional Site Systems |
|
|
301 | (8) |
|
|
309 | (6) |
|
Uninstalling Primary Sites |
|
|
309 | (3) |
|
Uninstalling Secondary Sites |
|
|
312 | (2) |
|
Uninstalling a Full Hierarchy |
|
|
314 | (1) |
|
Troubleshooting Site Installation |
|
|
315 | (1) |
|
|
316 | (1) |
|
7 Migrating to System Center 2012 Configuration Manager |
|
|
317 | (58) |
|
|
318 | (2) |
|
Migration Background and Introduction |
|
|
318 | (1) |
|
Migration, Not an Upgrade |
|
|
319 | (1) |
|
|
320 | (18) |
|
Central Site and Hierarchy Concepts in 2012 |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
321 | (2) |
|
|
323 | (1) |
|
|
324 | (3) |
|
Coexistence Considerations |
|
|
327 | (1) |
|
Migrating Your Configuration Manager Infrastructure |
|
|
327 | (1) |
|
Site Servers and Site Roles |
|
|
328 | (4) |
|
|
332 | (5) |
|
Boundaries and What's Changing |
|
|
337 | (1) |
|
|
338 | (31) |
|
Migrating Features and Objects |
|
|
338 | (1) |
|
Migrating by Feature and Dependencies |
|
|
338 | (1) |
|
Migration Dependencies Configuration |
|
|
339 | (4) |
|
Configuring the Active Source Site |
|
|
343 | (2) |
|
Configuring Child Sites for Data Gathering |
|
|
345 | (2) |
|
|
347 | (19) |
|
Shared Distribution Points |
|
|
366 | (1) |
|
|
367 | (2) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
Client Migration and Methods |
|
|
370 | (1) |
|
Background and Client Migration Concepts |
|
|
370 | (1) |
|
Client Migration Strategies for Your Network |
|
|
371 | (1) |
|
Troubleshooting Migration Issues |
|
|
371 | (1) |
|
|
372 | (3) |
|
Part III Configuration Manager Operations |
|
|
|
8 The Configuration Manager Console |
|
|
375 | (44) |
|
|
376 | (1) |
|
|
376 | (3) |
|
Configuration Manager Console Panes |
|
|
377 | (1) |
|
Configuration Manager Console Bars |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
379 | (9) |
|
Assets and Compliance Workspace |
|
|
380 | (1) |
|
Software Library Workspace |
|
|
380 | (1) |
|
|
381 | (2) |
|
|
383 | (1) |
|
|
384 | (4) |
|
|
388 | (7) |
|
|
389 | (1) |
|
|
389 | (1) |
|
ConfigMgr Console Prerequisites |
|
|
390 | (1) |
|
Installation Using the ConfigMgr Setup Wizard |
|
|
391 | (3) |
|
Unattended Console Installation |
|
|
394 | (1) |
|
Role-Based Administration |
|
|
395 | (3) |
|
Introducing the "Show Me" Behavior |
|
|
395 | (2) |
|
|
397 | (1) |
|
The Three States of Interaction |
|
|
397 | (1) |
|
|
398 | (2) |
|
|
398 | (1) |
|
Clearing Recent Connections |
|
|
398 | (2) |
|
Personalizing the Console |
|
|
400 | (1) |
|
The In-Console Alert Experience |
|
|
401 | (3) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
404 | (1) |
|
Configuration Manager Service Manager |
|
|
404 | (4) |
|
Initiating the Configuration Manager Service Manager Console |
|
|
406 | (1) |
|
Operating the Configuration Manager Service Manager Console |
|
|
407 | (1) |
|
|
408 | (3) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
409 | (2) |
|
Troubleshooting Console Issues |
|
|
411 | (6) |
|
|
411 | (1) |
|
|
412 | (4) |
|
|
416 | (1) |
|
Common Problems with the ConfigMgr Console |
|
|
416 | (1) |
|
|
417 | (2) |
|
9 Configuration Manager Client Management |
|
|
419 | (72) |
|
|
419 | (13) |
|
Active Directory Forest Discovery |
|
|
420 | (2) |
|
Active Directory Group Discovery |
|
|
422 | (2) |
|
Active Directory User Discovery |
|
|
424 | (2) |
|
Active Directory System Discovery |
|
|
426 | (1) |
|
|
427 | (2) |
|
|
429 | (2) |
|
Manually Importing Clients into ConfigMgr |
|
|
431 | (1) |
|
ConfigMgr Client Requirements |
|
|
432 | (3) |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
433 | (2) |
|
ConfigMgr Client Installation |
|
|
435 | (18) |
|
|
435 | (6) |
|
Installing with Logon Scripts |
|
|
441 | (1) |
|
|
442 | (5) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
449 | (1) |
|
Blocking and Unblocking Clients |
|
|
450 | (1) |
|
Automatically Upgrading the Client |
|
|
450 | (1) |
|
Troubleshooting Client Installation |
|
|
451 | (2) |
|
|
453 | (1) |
|
|
454 | (5) |
|
|
459 | (24) |
|
|
461 | (1) |
|
Background Intelligent Transfer Device Settings |
|
|
461 | (2) |
|
Client Policy Device Settings |
|
|
463 | (1) |
|
Compliance Settings Device Settings |
|
|
463 | (1) |
|
Computer Agent Device Settings |
|
|
464 | (2) |
|
Computer Restart Device Settings |
|
|
466 | (1) |
|
Endpoint Protection Device Settings |
|
|
466 | (1) |
|
Hardware Inventory Device Settings |
|
|
467 | (3) |
|
Network Access Protection (NAP) Device Settings |
|
|
470 | (1) |
|
Power Management Device Settings |
|
|
471 | (1) |
|
Remote Control Device Settings |
|
|
471 | (5) |
|
Software Deployment Device Settings |
|
|
476 | (1) |
|
Software Inventory Device Settings |
|
|
477 | (2) |
|
Software Metering Device Settings |
|
|
479 | (2) |
|
Software Updates Device Settings |
|
|
481 | (1) |
|
State Messaging Device Settings |
|
|
482 | (1) |
|
User and Device Affinity Settings |
|
|
482 | (1) |
|
Using the Resource Explorer |
|
|
483 | (1) |
|
|
484 | (4) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
486 | (1) |
|
|
487 | (1) |
|
|
488 | (3) |
|
Part IV Software and Configuration Management |
|
|
|
|
491 | (42) |
|
New and Improved in System Center 2012 Configuration Manager |
|
|
493 | (1) |
|
Configuring Compliance Settings |
|
|
493 | (2) |
|
Configuration Items and Baselines |
|
|
495 | (30) |
|
|
496 | (16) |
|
|
512 | (5) |
|
|
517 | (2) |
|
|
519 | (2) |
|
|
521 | (1) |
|
Exporting Configuration Items and Baselines |
|
|
522 | (1) |
|
|
523 | (2) |
|
|
525 | (4) |
|
|
526 | (1) |
|
|
527 | (1) |
|
|
527 | (1) |
|
|
528 | (1) |
|
|
529 | (2) |
|
|
531 | (2) |
|
|
533 | (32) |
|
About Packages, Programs, Collections, Distribution Points, and Deployments |
|
|
534 | (2) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
536 | (1) |
|
Combining the Use of Packages, Programs, Collections, and Deployments |
|
|
536 | (1) |
|
|
536 | (27) |
|
Creating a Package from the Package Definition Wizard |
|
|
537 | (6) |
|
|
543 | (16) |
|
Creating a Package with the New Package Wizard |
|
|
559 | (3) |
|
|
562 | (1) |
|
|
562 | (1) |
|
Avoiding Common ConfigMgr Software Packaging Issues |
|
|
563 | (1) |
|
Program and Package Properties |
|
|
563 | (1) |
|
Testing, Testing, Testing |
|
|
563 | (1) |
|
|
564 | (1) |
|
12 Creating and Managing Applications |
|
|
565 | (62) |
|
ConfigMgr Applications Overview |
|
|
566 | (5) |
|
|
566 | (1) |
|
|
567 | (2) |
|
|
569 | (1) |
|
About User Device Affinity |
|
|
569 | (2) |
|
About Creating Applications |
|
|
571 | (20) |
|
Creating a Windows Installer (MSI)-Based Application |
|
|
571 | (5) |
|
|
576 | (15) |
|
Creating Deployment Types |
|
|
591 | (11) |
|
Creating a Windows Installer-Based Deployment Type |
|
|
592 | (3) |
|
Creating an Application Virtualization Deployment Type |
|
|
595 | (4) |
|
Creating a Script-Based Deployment Type |
|
|
599 | (3) |
|
Creating Detection Methods |
|
|
602 | (8) |
|
Detection Methods for Windows Installer Applications |
|
|
602 | (2) |
|
|
604 | (3) |
|
Custom Script Detection Methods |
|
|
607 | (3) |
|
Managing and Creating Global Conditions |
|
|
610 | (7) |
|
|
611 | (1) |
|
|
612 | (1) |
|
|
612 | (5) |
|
More About Managing Applications |
|
|
617 | (6) |
|
|
617 | (2) |
|
Managing Revision History |
|
|
619 | (1) |
|
Exporting and Importing Applications |
|
|
620 | (1) |
|
|
621 | (1) |
|
Retiring and Deleting Applications |
|
|
622 | (1) |
|
Package Conversion Manager |
|
|
623 | (3) |
|
|
626 | (1) |
|
13 Distributing and Deploying Applications |
|
|
627 | (42) |
|
Creating and Managing Collections |
|
|
628 | (7) |
|
|
630 | (1) |
|
|
631 | (3) |
|
|
634 | (1) |
|
|
634 | (1) |
|
About Incremental Updates |
|
|
634 | (1) |
|
User Collections Versus Device Collections |
|
|
635 | (1) |
|
About Distribution Points |
|
|
635 | (19) |
|
Installing Distribution Points |
|
|
637 | (3) |
|
Distribution Point Groups |
|
|
640 | (1) |
|
Associating Collections with Distribution Point Groups |
|
|
641 | (1) |
|
Sending Content to Distribution Points |
|
|
642 | (1) |
|
Monitoring Distribution Point Status |
|
|
642 | (3) |
|
Updating Content on Distribution Points |
|
|
645 | (1) |
|
Refreshing Content on Distribution Points |
|
|
646 | (1) |
|
Removing Content from Distribution Points |
|
|
646 | (1) |
|
|
647 | (1) |
|
|
647 | (1) |
|
Preferred Distribution Points |
|
|
648 | (1) |
|
|
648 | (4) |
|
Importing and Exporting Content |
|
|
652 | (2) |
|
Troubleshooting Content Distribution |
|
|
654 | (1) |
|
About the Content Library |
|
|
654 | (1) |
|
Deploying Packages and Applications |
|
|
654 | (6) |
|
|
660 | (5) |
|
|
660 | (2) |
|
|
662 | (3) |
|
Monitoring and Troubleshooting Deployments |
|
|
665 | (2) |
|
|
667 | (1) |
|
|
667 | (2) |
|
14 Software Update Management |
|
|
669 | (82) |
|
|
670 | (1) |
|
Planning Your Update Strategy |
|
|
670 | (2) |
|
|
672 | (2) |
|
|
673 | (1) |
|
Windows Software Update Services |
|
|
673 | (1) |
|
Preparing for Software Updates with ConfigMgr |
|
|
674 | (18) |
|
Prerequisites for Software Updates |
|
|
674 | (2) |
|
|
676 | (11) |
|
|
687 | (2) |
|
|
689 | (3) |
|
Software Update Building Blocks |
|
|
692 | (19) |
|
|
692 | (4) |
|
|
696 | (2) |
|
|
698 | (5) |
|
|
703 | (1) |
|
|
704 | (2) |
|
Automatic Deployment Rules |
|
|
706 | (2) |
|
|
708 | (3) |
|
|
711 | (1) |
|
The Software Updates Process in Action |
|
|
711 | (3) |
|
Software Update Decisions, Design, and Workflow |
|
|
714 | (2) |
|
|
716 | (1) |
|
End User Experience and Interaction |
|
|
717 | (6) |
|
|
717 | (1) |
|
Updates and Software Center |
|
|
718 | (2) |
|
|
720 | (1) |
|
System Restarts and Restart Notifications |
|
|
721 | (2) |
|
Monitoring Software Updates |
|
|
723 | (1) |
|
|
723 | (1) |
|
|
723 | (1) |
|
|
724 | (1) |
|
A Super-Quick Walkthrough |
|
|
724 | (1) |
|
Troubleshooting Software Updates |
|
|
725 | (2) |
|
|
725 | (1) |
|
|
726 | (1) |
|
Client Update Scanning and Deployment |
|
|
727 | (1) |
|
Beyond the Built-In Update Process |
|
|
727 | (1) |
|
System Center Update Publisher |
|
|
728 | (14) |
|
|
728 | (1) |
|
|
729 | (4) |
|
|
733 | (2) |
|
|
735 | (1) |
|
|
735 | (2) |
|
|
737 | (4) |
|
|
741 | (1) |
|
|
742 | (1) |
|
Using NAP to Protect Your Network |
|
|
742 | (6) |
|
|
742 | (2) |
|
|
744 | (1) |
|
|
744 | (3) |
|
|
747 | (1) |
|
|
748 | (1) |
|
|
748 | (3) |
|
15 Mobile Device Management |
|
|
751 | (34) |
|
Planning for Mobile Device Management |
|
|
752 | (1) |
|
Overview of Mobile Device Management |
|
|
753 | (1) |
|
|
753 | (15) |
|
Exchange Server Connector |
|
|
754 | (8) |
|
|
762 | (2) |
|
Troubleshooting Light Management |
|
|
764 | (1) |
|
|
764 | (3) |
|
|
767 | (1) |
|
|
768 | (15) |
|
Public Key Infrastructure |
|
|
771 | (1) |
|
|
771 | (1) |
|
Mobile Device Management Site Roles |
|
|
772 | (3) |
|
|
775 | (4) |
|
|
779 | (1) |
|
|
780 | (2) |
|
|
782 | (1) |
|
|
782 | (1) |
|
|
783 | (1) |
|
|
784 | (1) |
|
|
785 | (48) |
|
Prerequisites for Endpoint Protection |
|
|
787 | (1) |
|
Planning and Considerations |
|
|
788 | (4) |
|
Creating Custom Client Settings and Antimalware Policies |
|
|
788 | (1) |
|
Deciding from Where to Update and When |
|
|
789 | (1) |
|
Deploying to a Test Collection First |
|
|
789 | (1) |
|
Categorizing Client Remediation Status |
|
|
790 | (1) |
|
Targeting Collections with Custom Antimalware Policy and Client Settings |
|
|
790 | (2) |
|
Installing the Endpoint Protection Role |
|
|
792 | (5) |
|
Configuring the SUP for Endpoint Protection |
|
|
797 | (7) |
|
Configuring the SUP to Synchronize Definition Updates |
|
|
797 | (2) |
|
Creating Auto Deployment Rules for Definition Updates |
|
|
799 | (5) |
|
Working with Antimalware Policies |
|
|
804 | (5) |
|
Understanding the Default Antimalware Policy |
|
|
804 | (3) |
|
Creating Custom Antimalware Policy |
|
|
807 | (1) |
|
Importing and Merging Antimalware Policies |
|
|
808 | (1) |
|
Configuring Alerts for Endpoint Protection |
|
|
809 | (7) |
|
Configuring Email Notification |
|
|
810 | (2) |
|
Configuring Alerts for Device Collections |
|
|
812 | (1) |
|
Configuring Alert Subscriptions |
|
|
813 | (1) |
|
Configuring Custom Client Device Settings for Endpoint Protection |
|
|
814 | (1) |
|
Deploying Endpoint Protection Custom Client Agent Settings |
|
|
815 | (1) |
|
Monitoring Status in Endpoint Protection |
|
|
816 | (3) |
|
Configuring Collections to Appear in Collection View |
|
|
816 | (1) |
|
Security State View for the Selected Collection |
|
|
816 | (2) |
|
Operational State View for Clients and Computers in the Selected Collection |
|
|
818 | (1) |
|
Performing On-Demand Actions for Malware |
|
|
819 | (1) |
|
Reporting in Endpoint Protection |
|
|
820 | (3) |
|
Creating and Deploying Windows Firewall Policies |
|
|
823 | (1) |
|
Understanding the Endpoint Protection Client |
|
|
824 | (3) |
|
Installing the Endpoint Protection Client |
|
|
827 | (3) |
|
Understanding Endpoint Protection Client Settings |
|
|
827 | (2) |
|
Communication Between the Client and the Server |
|
|
829 | (1) |
|
Automatic Removal of Antimalware Software |
|
|
829 | (1) |
|
Removing the Endpoint Protection Client |
|
|
830 | (1) |
|
Delivery of Definition Updates |
|
|
830 | (1) |
|
|
831 | (2) |
|
17 Configuration Manager Queries |
|
|
833 | (38) |
|
Introducing the Queries Node |
|
|
834 | (4) |
|
Organizing the Query List Pane |
|
|
835 | (2) |
|
Viewing Queries and Query Results |
|
|
837 | (1) |
|
|
838 | (3) |
|
|
838 | (1) |
|
Objects, Classes, and Attributes |
|
|
839 | (2) |
|
|
841 | (5) |
|
Criterion Types, Operators, and Values |
|
|
846 | (5) |
|
|
846 | (2) |
|
|
848 | (2) |
|
|
850 | (1) |
|
|
851 | (7) |
|
Limitations of Extended WQL in ConfigMgr |
|
|
852 | (1) |
|
Utilizing the Date and Time Functions in WQL Queries |
|
|
853 | (1) |
|
Examples of Advanced Queries |
|
|
854 | (3) |
|
|
857 | (1) |
|
Relationships, Operations, and Joins |
|
|
858 | (5) |
|
|
860 | (1) |
|
|
861 | (2) |
|
|
863 | (3) |
|
Exporting Query Results to a Text File |
|
|
863 | (1) |
|
Importing and Exporting Queries Between Sites |
|
|
863 | (3) |
|
Creating a Collection Based on Query Results |
|
|
866 | (1) |
|
|
866 | (4) |
|
|
867 | (1) |
|
Creating Status Message Queries |
|
|
868 | (2) |
|
|
870 | (1) |
|
|
871 | (88) |
|
SQL Server Reporting Services Overview |
|
|
871 | (1) |
|
|
872 | (13) |
|
SQL Server Version Selection |
|
|
872 | (1) |
|
|
872 | (1) |
|
|
873 | (3) |
|
|
876 | (6) |
|
|
882 | (2) |
|
|
884 | (1) |
|
Interacting with Reports from the Console |
|
|
885 | (8) |
|
|
885 | (1) |
|
|
886 | (1) |
|
|
887 | (3) |
|
Managing SSRS Report Security |
|
|
890 | (1) |
|
|
890 | (3) |
|
|
893 | (19) |
|
Development Tool Selection |
|
|
893 | (1) |
|
|
893 | (9) |
|
|
902 | (1) |
|
Advanced Reporting Techniques |
|
|
903 | (1) |
|
Advanced Custom Report Example |
|
|
904 | (8) |
|
|
912 | (1) |
|
Built-in ConfigMgr Reports |
|
|
912 | (33) |
|
|
945 | (4) |
|
|
945 | (1) |
|
Report Server Event Errors |
|
|
946 | (3) |
|
Optimizing SSRS Performance |
|
|
949 | (2) |
|
|
950 | (1) |
|
|
950 | (1) |
|
|
950 | (1) |
|
|
950 | (1) |
|
Performance Best Practices |
|
|
951 | (1) |
|
Reporting on Reporting Services |
|
|
951 | (6) |
|
System Center Data Warehouse |
|
|
957 | (1) |
|
|
958 | (1) |
|
19 Operating System Deployment |
|
|
959 | (106) |
|
|
960 | (1) |
|
|
961 | (2) |
|
|
963 | (2) |
|
Tools Incorporated into OSD |
|
|
965 | (3) |
|
|
965 | (1) |
|
Windows Automated Installation Kit |
|
|
966 | (2) |
|
User State Migration Tool |
|
|
968 | (1) |
|
|
968 | (2) |
|
|
969 | (1) |
|
|
969 | (1) |
|
|
970 | (1) |
|
|
970 | (1) |
|
|
970 | (1) |
|
|
970 | (50) |
|
|
971 | (4) |
|
|
975 | (1) |
|
|
976 | (1) |
|
Operating System Installers |
|
|
976 | (1) |
|
|
977 | (7) |
|
|
984 | (36) |
|
|
1020 | (10) |
|
|
1020 | (5) |
|
|
1025 | (5) |
|
|
1030 | (2) |
|
|
1031 | (1) |
|
|
1031 | (1) |
|
|
1032 | (7) |
|
|
1034 | (2) |
|
|
1036 | (2) |
|
|
1038 | (1) |
|
|
1039 | (10) |
|
|
1039 | (5) |
|
|
1044 | (1) |
|
|
1045 | (2) |
|
|
1047 | (2) |
|
|
1049 | (1) |
|
|
1050 | (7) |
|
Application Compatibility |
|
|
1051 | (1) |
|
|
1052 | (1) |
|
|
1052 | (2) |
|
|
1054 | (3) |
|
Monitoring Task Sequence Deployments |
|
|
1057 | (1) |
|
|
1057 | (1) |
|
|
1058 | (1) |
|
|
1058 | (3) |
|
|
1058 | (2) |
|
|
1060 | (1) |
|
|
1061 | (1) |
|
|
1061 | (1) |
|
|
1061 | (4) |
|
Part V Administering System Center Configuration Manager |
|
|
|
20 Security and Delegation in Configuration Manager |
|
|
1065 | (60) |
|
Planning for Security and Delegation |
|
|
1065 | (2) |
|
ConfigMgr Security Solutions |
|
|
1067 | (1) |
|
Role-Based Administration |
|
|
1068 | (16) |
|
Managing Administrative Users |
|
|
1069 | (1) |
|
|
1070 | (4) |
|
|
1074 | (3) |
|
Associating Security Scopes and Collections with Individual Roles |
|
|
1077 | (1) |
|
Administrative Security Reports |
|
|
1078 | (1) |
|
|
1079 | (5) |
|
Preventing Unauthorized Access to ConfigMgr |
|
|
1084 | (5) |
|
Securing Access at the Active Directory Level |
|
|
1084 | (1) |
|
Securing Access at the Database Level |
|
|
1085 | (1) |
|
Auditing ConfigMgr Administrative Actions |
|
|
1086 | (3) |
|
Securing the ConfigMgr Infrastructure |
|
|
1089 | (34) |
|
Building Security into Your Hierarchy |
|
|
1089 | (1) |
|
|
1090 | (6) |
|
ConfigMgr Cryptographic Controls |
|
|
1096 | (1) |
|
ConfigMgr Network Security |
|
|
1097 | (18) |
|
ConfigMgr Content Security |
|
|
1115 | (1) |
|
Securing ConfigMgr Accounts |
|
|
1116 | (7) |
|
|
1123 | (2) |
|
21 Backup, Recovery, and Maintenance |
|
|
1125 | (54) |
|
Performing Site and SQL Server Backups |
|
|
1125 | (15) |
|
|
1126 | (3) |
|
Restoring ConfigMgr Backups |
|
|
1129 | (7) |
|
|
1136 | (3) |
|
Using Backup and Restore to Migrate to New Environments |
|
|
1139 | (1) |
|
|
1140 | (5) |
|
Monitoring SQL Replication |
|
|
1140 | (3) |
|
Replication Link Analyzer |
|
|
1143 | (1) |
|
Alerts for SQL Replication |
|
|
1144 | (1) |
|
|
1145 | (20) |
|
|
1145 | (10) |
|
|
1155 | (7) |
|
|
1162 | (1) |
|
How a Record Can Be Marked Obsolete |
|
|
1163 | (2) |
|
|
1165 | (1) |
|
Making the Status Message System Work for You |
|
|
1166 | (8) |
|
|
1167 | (2) |
|
|
1169 | (3) |
|
|
1172 | (2) |
|
Monitoring Configuration Manager with Operations Manager |
|
|
1174 | (1) |
|
Services and Descriptions |
|
|
1175 | (1) |
|
|
1176 | (3) |
|
|
|
A Configuration Manager Log Files |
|
|
1179 | (32) |
|
|
1180 | (1) |
|
|
1180 | (1) |
|
|
1181 | (2) |
|
|
1183 | (5) |
|
|
1188 | (6) |
|
|
1194 | (13) |
|
Software and Application Installation Logs |
|
|
1207 | (2) |
|
|
1209 | (2) |
|
B Extending Hardware Inventory |
|
|
1211 | (14) |
|
How to Extend Hardware Inventory |
|
|
1212 | (1) |
|
Example of Extending Inventory |
|
|
1213 | (10) |
|
Creating a Device Collection |
|
|
1223 | (2) |
|
|
1225 | (16) |
|
|
1225 | (4) |
|
Microsoft's Configuration Manager Resources |
|
|
1229 | (5) |
|
Other Configuration Manager Resources |
|
|
1234 | (1) |
|
|
1235 | (2) |
|
|
1237 | (1) |
|
|
1237 | (1) |
|
|
1238 | (3) |
|
|
1241 | (2) |
|
|
1241 | (1) |
|
Top 10 Most Executed Reports Query |
|
|
1241 | (1) |
|
|
1241 | (1) |
|
|
1242 | (1) |
Index |
|
1243 | |