Muutke küpsiste eelistusi

System Center 2012 Configuration Manager (SCCM) Unleashed [Pehme köide]

  • Formaat: Paperback / softback, 1368 pages, kõrgus x laius x paksus: 231x178x42 mm, kaal: 1642 g
  • Ilmumisaeg: 02-Aug-2012
  • Kirjastus: Sams Publishing
  • ISBN-10: 0672334372
  • ISBN-13: 9780672334375
Teised raamatud teemal:
  • Pehme köide
  • Hind: 70,06 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 1368 pages, kõrgus x laius x paksus: 231x178x42 mm, kaal: 1642 g
  • Ilmumisaeg: 02-Aug-2012
  • Kirjastus: Sams Publishing
  • ISBN-10: 0672334372
  • ISBN-13: 9780672334375
Teised raamatud teemal:
This is the comprehensive reference and technical guide to Microsoft System Center Configuration Manager 2012. A team of expert authors offers step-by-step coverage of related topics in every feature area, organized to help IT professionals rapidly optimize Configuration Manager 2012 for their requirements, and then deploy and use it successfully. The authors begin by introducing Configuration Manager 2012 and its goals, and explaining how it fits into the broader System Center product suite. Next, they fully address planning, design, and implementation. Finally, they systematically cover each of Configuration Manager 2012's most important feature sets, addressing issues ranging from configuration management to software distribution. Readers will learn how to use Configuration Manager 2012's user-centric capabilities to provide anytime/anywhere services and software, and to strengthen both control and compliance. The first book on Configuration Manager 2012, System Center Configuration Manager 2012 Unleashed joins Sams' market-leading series of books on Microsoft's System Center product suite: books that have achieved go-to status amongst IT implementers and administrators worldwide.
Foreword xxix
Introduction 1(6)
Part I Configuration Manager Overview and Concepts
1 Configuration Management Basics
7(30)
Ten Reasons to Use Configuration Manager
8(1)
The Evolution of Systems Management
9(5)
Hurdles in the Distributed Enterprise
10(1)
The IT Automation Challenge
10(1)
Configuration "Shift and Drift"
11(1)
Lack of Security and Control
11(1)
Timeliness of Asset Data
12(1)
Lack of Automation and Enforcement
12(1)
Proliferation of Virtualization and Cloud Computing
12(1)
Lack of Process Consistency
13(1)
The Bottom Line
13(1)
Systems Management Defined
14(1)
Microsoft's Strategy for Service Management
15(14)
Microsoft's Dynamic Systems Initiative
16(3)
IT Infrastructure Library and Microsoft Operations Framework
19(5)
Total Quality Management: TQM
24(1)
Six Sigma
24(1)
Service Management Mastery: ISO 20000
24(1)
Optimizing Your Infrastructure
25(4)
Overview of Microsoft System Center
29(5)
Reporting in System Center
30(1)
Operations Management
31(1)
Service Management
31(1)
Protecting Data
32(1)
Virtual Machine Management
32(1)
Deploy and Manage in the Cloud
33(1)
Orchestration and Automation
33(1)
Cloud-Based Configuration Monitoring
34(1)
Endpoint Protection
34(1)
The Value Proposition of Configuration Manager
34(1)
Summary
35(2)
2 Configuration Manager Overview
37(42)
The History of Configuration Manager
37(5)
Systems Management Server 1.x
38(1)
Systems Management Server 2.0
38(1)
Systems Management Server 2003
39(2)
System Center Configuration Manager 2007
41(1)
System Center 2012 Configuration Manager
42(1)
Terminology in Configuration Manager
42(20)
Site Hierarchy
43(1)
Site
44(2)
Site Systems
46(2)
Senders
48(1)
Addresses
49(1)
Configuration Manager Discovery Types
49(1)
Configuration Manager Agent
50(1)
Configuration Manager Console
51(1)
Collections
52(1)
Queries
52(1)
Alerts
53(1)
Status System
53(1)
Managing Applications
54(3)
Content Management
57(2)
Software Update Management
59(1)
Compliance Settings
59(1)
BITS
59(1)
Software Metering
60(1)
Network Access Protection
60(1)
BranchCache
61(1)
Reporting
61(1)
What's New in This Version
62(13)
64-Bit Site System Requirements
62(1)
User-Centric Management
62(1)
Applications and Packages
63(1)
Hierarchy Changes
63(1)
New Configuration Manager Console
64(1)
Enhancements to BITS
64(1)
Application Catalog
64(1)
Extended Mobile Device Management
65(1)
Management Point Enhancements
65(1)
Boundary Changes
65(1)
Fallback Site
66(1)
Centrally Managed Client Settings
66(1)
Role-Based Administration
66(1)
Backup and Recovery
66(1)
Collection Changes
67(1)
Client Health Status Enhancements
68(1)
Compliance Settings Changes
68(1)
Remote Control Improvements
69(1)
Hardware Inventory Improvements
69(1)
Power Management Improvements
70(2)
Software Updates Improvements
72(1)
Improved End User Experience
73(1)
Content Library
73(1)
Operating System Deployment
73(1)
Distribution Point Changes
74(1)
System Center 2012 Endpoint Protection Integration
75(1)
Feature Dependencies of System Center 2012 Configuration Manager
75(2)
Summary
77(2)
3 Looking Inside Configuration Manager
79(82)
Design Concepts
80(1)
Active Directory Integration
81(10)
Schema Extensions
81(9)
Additional Active Directory Benefits
90(1)
A WMI Primer
91(20)
WMI Feature Set and Architecture
91(4)
Inside the WMI Object Model
95(3)
Managing WMI
98(5)
Looking Inside the CIMV2 Namespace
103(8)
WMI in ConfigMgr
111(13)
ConfigMgr Client Namespaces
111(1)
Hardware Inventory Through WMI
112(4)
Additional Client Operations Through WMI
116(4)
WMI on ConfigMgr Servers
120(4)
Components and Communications
124(9)
Inside the ConfigMgr Database
133(5)
ConfigMgr Tables and Views
133(1)
Using SQL Server Management Studio
134(4)
Viewing Detailed Process Activity
138(8)
SQL Replication Crash Course
146(2)
Configuration Manager Database Replication
148(6)
File-Based Replication
154(3)
Summary
157(4)
Part II Planning, Design, and Installation
4 Architecture Design Planning
161(44)
Developing the Solution Architecture
161(4)
Establishing Business Requirements
162(1)
Assessing Your Environment
163(2)
Planning for Licensing
165(2)
Hierarchy Planning
167(13)
Configuration Manager Sites
167(2)
Planning Your Hierarchy Structure
169(1)
Planning Boundaries and Boundary Groups
170(2)
Choosing Client Discovery and Installation Methods
172(2)
Defining Your Client Architecture
174(4)
Planning for User-Centric Management
178(1)
Planning Content Management
178(2)
Planning for Infrastructure Dependencies
180(6)
Active Directory Considerations
180(3)
Planning Certificate Services
183(3)
Site Planning
186(4)
Site Servers and Site Systems Planning
186(2)
Capacity Planning
188(1)
Developing the Server Architecture
189(1)
Planning for Solution Scenarios
190(7)
Software Update Planning
190(3)
Planning for Internet-Based Clients
193(2)
Out of Band Management Planning
195(2)
Testing and Stabilizing Your Design
197(7)
The Proof of Concept
198(6)
The Pilot Deployment
204(1)
Summary
204(1)
5 Network Design
205(56)
Understanding Your Network
206(1)
Configuration Manager Data Flow
206(2)
Intrasite Server Communications
208(6)
Communications with SQL Server
208(1)
Communications Using RPC
209(1)
Communications Using SMB
209(4)
Replication of Deployment Content Refresh Data
213(1)
Site System Communications Using HTTP and HTTPS
214(1)
Other Server Communications
214(1)
Client to Server Communications
214(11)
Client Ports and Protocols
215(1)
Reasons for Changing Ports
215(6)
Initial Communication
221(1)
Identifying and Contacting the Client's Assigned Site
222(1)
Client Protocols
222(2)
Planning for Network Access Protection
224(1)
Site-to-Site Communications
225(2)
Database Replication
225(1)
File-Based Replication
226(1)
Data Priorities
227(1)
Fast Network and Slow Network Boundaries
227(2)
Use of BITS
229(5)
BITS Versions for ConfigMgr Clients
230(1)
Modifying BITS Functionality Through Group Policy
231(1)
Modifying BITS Functionality Within ConfigMgr
232(1)
Comparative Advantages of Group Policy and ConfigMgr Settings for BITS
233(1)
Systems with Multiple Interfaces and File Integrity Checking
233(1)
ConfigMgr and BranchCache
234(2)
Server and Site Placement
236(1)
Deploying Servers to Support Internet-Based Clients
237(4)
Using a Dedicated Site for Internet Clients
238(1)
Allowing Site-to-Site Communications Across an Inner Firewall
239(1)
Having a Site Span the Internal Network and Perimeter Network
240(1)
Using Web Proxies and Proxy Enrollment Points
240(1)
Intermittently Connected Users
241(1)
Network Discovery
241(5)
Discovering Network Topology
243(2)
Topology and Client Discovery
245(1)
Discovering Topology, Client, and Client Operating Systems
245(1)
Troubleshooting ConfigMgr Network Issues
246(13)
Network Configuration Issues
247(1)
Basic Connectivity Problems
247(1)
Name Resolution Issues
248(1)
Blocked or Unresponsive Ports
249(1)
Timeout Issues
250(1)
Identifying Network Issues Affecting ConfigMgr
250(9)
Summary
259(2)
6 Installing System Center 2012 Configuration Manager
261(56)
Configuring Pre-Installation Requirements
261(9)
Windows Components
262(1)
Supported SQL Server Requirements
263(2)
Validating and Configuring Active Directory Requirements
265(1)
Windows Server Update Services
265(1)
Prerequisite Checker
265(4)
Using the Prerequisite Files Downloader
269(1)
Performing Site Installations
270(26)
Installing the Central Administration Site
271(7)
Installing Primary Sites
278(10)
Installing Secondary Sites
288(6)
Installation Validation
294(2)
Site Properties
296(13)
Initial Configuration
296(5)
Installing Optional Site Systems
301(8)
Uninstalling Sites
309(6)
Uninstalling Primary Sites
309(3)
Uninstalling Secondary Sites
312(2)
Uninstalling a Full Hierarchy
314(1)
Troubleshooting Site Installation
315(1)
Summary
316(1)
7 Migrating to System Center 2012 Configuration Manager
317(58)
About Migration
318(2)
Migration Background and Introduction
318(1)
Migration, Not an Upgrade
319(1)
Planning the Migration
320(18)
Central Site and Hierarchy Concepts in 2012
320(1)
About Site Mode
321(1)
What Is Migrated
321(2)
What Is Not Migrated
323(1)
Pre-Migration Activities
324(3)
Coexistence Considerations
327(1)
Migrating Your Configuration Manager Infrastructure
327(1)
Site Servers and Site Roles
328(4)
Security Considerations
332(5)
Boundaries and What's Changing
337(1)
Performing the Migration
338(31)
Migrating Features and Objects
338(1)
Migrating by Feature and Dependencies
338(1)
Migration Dependencies Configuration
339(4)
Configuring the Active Source Site
343(2)
Configuring Child Sites for Data Gathering
345(2)
Migration Jobs
347(19)
Shared Distribution Points
366(1)
Migration Clean Up
367(2)
Migrating Reports
369(1)
Legacy Reports
369(1)
SSRS Reports
369(1)
Custom Reports
369(1)
Client Migration and Methods
370(1)
Background and Client Migration Concepts
370(1)
Client Migration Strategies for Your Network
371(1)
Troubleshooting Migration Issues
371(1)
Summary
372(3)
Part III Configuration Manager Operations
8 The Configuration Manager Console
375(44)
Console Highlights
376(1)
Touring the Console
376(3)
Configuration Manager Console Panes
377(1)
Configuration Manager Console Bars
378(1)
Backstage
378(1)
ConfigMgr Workspaces
379(9)
Assets and Compliance Workspace
380(1)
Software Library Workspace
380(1)
Monitoring Workspace
381(2)
Administration Workspace
383(1)
Console Node Details
384(4)
Console Deployment
388(7)
Console Placement
389(1)
Supported Platforms
389(1)
ConfigMgr Console Prerequisites
390(1)
Installation Using the ConfigMgr Setup Wizard
391(3)
Unattended Console Installation
394(1)
Role-Based Administration
395(3)
Introducing the "Show Me" Behavior
395(2)
Behind the Scenes
397(1)
The Three States of Interaction
397(1)
Connecting to a Site
398(2)
Recent Connections
398(1)
Clearing Recent Connections
398(2)
Personalizing the Console
400(1)
The In-Console Alert Experience
401(3)
Viewing Alerts
401(1)
Managing Alerts
402(1)
Configuring Alerts
403(1)
Subscribing to Alerts
404(1)
Configuration Manager Service Manager
404(4)
Initiating the Configuration Manager Service Manager Console
406(1)
Operating the Configuration Manager Service Manager Console
407(1)
Security Considerations
408(3)
SMS Provider Permissions
409(1)
DCOM Permissions
409(1)
WMI Permissions
409(2)
Troubleshooting Console Issues
411(6)
Console Logging
411(1)
Verify Security
412(4)
Connectivity Issues
416(1)
Common Problems with the ConfigMgr Console
416(1)
Summary
417(2)
9 Configuration Manager Client Management
419(72)
Discovery
419(13)
Active Directory Forest Discovery
420(2)
Active Directory Group Discovery
422(2)
Active Directory User Discovery
424(2)
Active Directory System Discovery
426(1)
Heartbeat Discovery
427(2)
Network Discovery
429(2)
Manually Importing Clients into ConfigMgr
431(1)
ConfigMgr Client Requirements
432(3)
Hardware Dependencies
432(1)
Software Dependencies
433(1)
Supported Platforms
433(2)
ConfigMgr Client Installation
435(18)
Manual Installation
435(6)
Installing with Logon Scripts
441(1)
Client Push
442(5)
Group Policy
447(1)
Software Update Point
448(1)
Client Approval
449(1)
Blocking and Unblocking Clients
450(1)
Automatically Upgrading the Client
450(1)
Troubleshooting Client Installation
451(2)
Client Assignment
453(1)
Client Health
454(5)
Client Settings
459(24)
Defining Priority
461(1)
Background Intelligent Transfer Device Settings
461(2)
Client Policy Device Settings
463(1)
Compliance Settings Device Settings
463(1)
Computer Agent Device Settings
464(2)
Computer Restart Device Settings
466(1)
Endpoint Protection Device Settings
466(1)
Hardware Inventory Device Settings
467(3)
Network Access Protection (NAP) Device Settings
470(1)
Power Management Device Settings
471(1)
Remote Control Device Settings
471(5)
Software Deployment Device Settings
476(1)
Software Inventory Device Settings
477(2)
Software Metering Device Settings
479(2)
Software Updates Device Settings
481(1)
State Messaging Device Settings
482(1)
User and Device Affinity Settings
482(1)
Using the Resource Explorer
483(1)
Wake On LAN
484(4)
WOL Prerequisites
484(1)
Two Types of WOL
485(1)
Configuring WOL
486(1)
Using WOL
487(1)
Summary
488(3)
Part IV Software and Configuration Management
10 Managing Compliance
491(42)
New and Improved in System Center 2012 Configuration Manager
493(1)
Configuring Compliance Settings
493(2)
Configuration Items and Baselines
495(30)
Configuration Items
496(16)
Configuration Baselines
512(5)
Compliance Evaluation
517(2)
Versioning
519(2)
Configuration Packs
521(1)
Exporting Configuration Items and Baselines
522(1)
Compliance Authoring
523(2)
Compliance Strategy
525(4)
Reporting
526(1)
On-Demand Results
527(1)
Alerting
527(1)
Remediation
528(1)
Troubleshooting
529(2)
Summary
531(2)
11 Packages and Programs
533(32)
About Packages, Programs, Collections, Distribution Points, and Deployments
534(2)
Packages
534(1)
Programs
534(1)
Collections
535(1)
Distribution Points
535(1)
Deployments
536(1)
Combining the Use of Packages, Programs, Collections, and Deployments
536(1)
Creating a Package
536(27)
Creating a Package from the Package Definition Wizard
537(6)
Package Properties
543(16)
Creating a Package with the New Package Wizard
559(3)
Custom Packages
562(1)
Repackaging Software
562(1)
Avoiding Common ConfigMgr Software Packaging Issues
563(1)
Program and Package Properties
563(1)
Testing, Testing, Testing
563(1)
Summary
564(1)
12 Creating and Managing Applications
565(62)
ConfigMgr Applications Overview
566(5)
About Applications
566(1)
About Deployment Types
567(2)
About Detection Methods
569(1)
About User Device Affinity
569(2)
About Creating Applications
571(20)
Creating a Windows Installer (MSI)-Based Application
571(5)
Application Properties
576(15)
Creating Deployment Types
591(11)
Creating a Windows Installer-Based Deployment Type
592(3)
Creating an Application Virtualization Deployment Type
595(4)
Creating a Script-Based Deployment Type
599(3)
Creating Detection Methods
602(8)
Detection Methods for Windows Installer Applications
602(2)
Other Detection Methods
604(3)
Custom Script Detection Methods
607(3)
Managing and Creating Global Conditions
610(7)
Device Global Conditions
611(1)
User Global Conditions
612(1)
Custom Global Conditions
612(5)
More About Managing Applications
617(6)
Adding Dependencies
617(2)
Managing Revision History
619(1)
Exporting and Importing Applications
620(1)
Superseding Applications
621(1)
Retiring and Deleting Applications
622(1)
Package Conversion Manager
623(3)
Summary
626(1)
13 Distributing and Deploying Applications
627(42)
Creating and Managing Collections
628(7)
Direct Rule
630(1)
Query Rule
631(3)
Include Rule
634(1)
Exclude Rule
634(1)
About Incremental Updates
634(1)
User Collections Versus Device Collections
635(1)
About Distribution Points
635(19)
Installing Distribution Points
637(3)
Distribution Point Groups
640(1)
Associating Collections with Distribution Point Groups
641(1)
Sending Content to Distribution Points
642(1)
Monitoring Distribution Point Status
642(3)
Updating Content on Distribution Points
645(1)
Refreshing Content on Distribution Points
646(1)
Removing Content from Distribution Points
646(1)
Validating Content
647(1)
Using BranchCache
647(1)
Preferred Distribution Points
648(1)
Prestaging Content
648(4)
Importing and Exporting Content
652(2)
Troubleshooting Content Distribution
654(1)
About the Content Library
654(1)
Deploying Packages and Applications
654(6)
End User Experience
660(5)
Software Center
660(2)
Application Catalog
662(3)
Monitoring and Troubleshooting Deployments
665(2)
Simulated Deployments
667(1)
Summary
667(2)
14 Software Update Management
669(82)
What's New in 2012
670(1)
Planning Your Update Strategy
670(2)
Incorporated Tools
672(2)
The Windows Update Agent
673(1)
Windows Software Update Services
673(1)
Preparing for Software Updates with ConfigMgr
674(18)
Prerequisites for Software Updates
674(2)
Software Update Points
676(11)
Client Settings
687(2)
Group Policy Settings
689(3)
Software Update Building Blocks
692(19)
All Software Updates
692(4)
Software Update Groups
696(2)
Update Deployments
698(5)
Update Templates
703(1)
Deployment Packages
704(2)
Automatic Deployment Rules
706(2)
Maintenance Windows
708(3)
Superseded Updates
711(1)
The Software Updates Process in Action
711(3)
Software Update Decisions, Design, and Workflow
714(2)
Compliance Scanning
716(1)
End User Experience and Interaction
717(6)
Notifications
717(1)
Updates and Software Center
718(2)
Update Installation
720(1)
System Restarts and Restart Notifications
721(2)
Monitoring Software Updates
723(1)
Individual Update Status
723(1)
Update Deployment Status
723(1)
Reporting
724(1)
A Super-Quick Walkthrough
724(1)
Troubleshooting Software Updates
725(2)
WSUS and SUP
725(1)
Downloading Updates
726(1)
Client Update Scanning and Deployment
727(1)
Beyond the Built-In Update Process
727(1)
System Center Update Publisher
728(14)
SCUP Installation
728(1)
SCUP Configuration
729(4)
Catalogs
733(2)
Publications
735(1)
Updates
735(2)
Custom Updates
737(4)
Rules
741(1)
Quick Walkthrough
742(1)
Using NAP to Protect Your Network
742(6)
NAP Prerequisites
742(2)
Agent Settings
744(1)
System Health
744(3)
Client Compliance
747(1)
Remediation
748(1)
Summary
748(3)
15 Mobile Device Management
751(34)
Planning for Mobile Device Management
752(1)
Overview of Mobile Device Management
753(1)
Light Management
753(15)
Exchange Server Connector
754(8)
Access Rules
762(2)
Troubleshooting Light Management
764(1)
Working with Devices
764(3)
End User Experience
767(1)
In-Depth Management
768(15)
Public Key Infrastructure
771(1)
Heartbeat Discovery
771(1)
Mobile Device Management Site Roles
772(3)
Client Settings
775(4)
Enrolling Mobile Devices
779(1)
Software Deployment
780(2)
Compliance Settings
782(1)
Reporting
782(1)
Partner Extensibility
783(1)
Summary
784(1)
16 Endpoint Protection
785(48)
Prerequisites for Endpoint Protection
787(1)
Planning and Considerations
788(4)
Creating Custom Client Settings and Antimalware Policies
788(1)
Deciding from Where to Update and When
789(1)
Deploying to a Test Collection First
789(1)
Categorizing Client Remediation Status
790(1)
Targeting Collections with Custom Antimalware Policy and Client Settings
790(2)
Installing the Endpoint Protection Role
792(5)
Configuring the SUP for Endpoint Protection
797(7)
Configuring the SUP to Synchronize Definition Updates
797(2)
Creating Auto Deployment Rules for Definition Updates
799(5)
Working with Antimalware Policies
804(5)
Understanding the Default Antimalware Policy
804(3)
Creating Custom Antimalware Policy
807(1)
Importing and Merging Antimalware Policies
808(1)
Configuring Alerts for Endpoint Protection
809(7)
Configuring Email Notification
810(2)
Configuring Alerts for Device Collections
812(1)
Configuring Alert Subscriptions
813(1)
Configuring Custom Client Device Settings for Endpoint Protection
814(1)
Deploying Endpoint Protection Custom Client Agent Settings
815(1)
Monitoring Status in Endpoint Protection
816(3)
Configuring Collections to Appear in Collection View
816(1)
Security State View for the Selected Collection
816(2)
Operational State View for Clients and Computers in the Selected Collection
818(1)
Performing On-Demand Actions for Malware
819(1)
Reporting in Endpoint Protection
820(3)
Creating and Deploying Windows Firewall Policies
823(1)
Understanding the Endpoint Protection Client
824(3)
Installing the Endpoint Protection Client
827(3)
Understanding Endpoint Protection Client Settings
827(2)
Communication Between the Client and the Server
829(1)
Automatic Removal of Antimalware Software
829(1)
Removing the Endpoint Protection Client
830(1)
Delivery of Definition Updates
830(1)
Summary
831(2)
17 Configuration Manager Queries
833(38)
Introducing the Queries Node
834(4)
Organizing the Query List Pane
835(2)
Viewing Queries and Query Results
837(1)
Creating Queries
838(3)
WMI Query Language
838(1)
Objects, Classes, and Attributes
839(2)
ConfigMgr Query Builder
841(5)
Criterion Types, Operators, and Values
846(5)
Criterion Types
846(2)
Operators
848(2)
Values
850(1)
Writing Advanced Queries
851(7)
Limitations of Extended WQL in ConfigMgr
852(1)
Utilizing the Date and Time Functions in WQL Queries
853(1)
Examples of Advanced Queries
854(3)
Converting WQL to SQL
857(1)
Relationships, Operations, and Joins
858(5)
Querying Discovery Data
860(1)
Querying Inventory Data
861(2)
Using Query Results
863(3)
Exporting Query Results to a Text File
863(1)
Importing and Exporting Queries Between Sites
863(3)
Creating a Collection Based on Query Results
866(1)
Status Message Queries
866(4)
Viewing Status Messages
867(1)
Creating Status Message Queries
868(2)
Summary
870(1)
18 Reporting
871(88)
SQL Server Reporting Services Overview
871(1)
Implementing SSRS
872(13)
SQL Server Version Selection
872(1)
Server Placement Options
872(1)
SSRS Installation
873(3)
SSRS Configuration
876(6)
Backing Up SSRS
882(2)
Reporting Best Practices
884(1)
Interacting with Reports from the Console
885(8)
Search Capability
885(1)
Running Reports
886(1)
Creating Subscriptions
887(3)
Managing SSRS Report Security
890(1)
Creating a Report
890(3)
Authoring Custom Reports
893(19)
Development Tool Selection
893(1)
Building a Custom Report
893(9)
Interactive Features
902(1)
Advanced Reporting Techniques
903(1)
Advanced Custom Report Example
904(8)
Authoring Best Practices
912(1)
Built-in ConfigMgr Reports
912(33)
Troubleshooting SSRS
945(4)
SSRS Logs
945(1)
Report Server Event Errors
946(3)
Optimizing SSRS Performance
949(2)
Subscriptions
950(1)
Report Caching
950(1)
Report Snapshots
950(1)
Report Timeout Values
950(1)
Performance Best Practices
951(1)
Reporting on Reporting Services
951(6)
System Center Data Warehouse
957(1)
Summary
958(1)
19 Operating System Deployment
959(106)
What OSD Does
960(1)
What's New in OSD
961(2)
Deployment Scenarios
963(2)
Tools Incorporated into OSD
965(3)
Sysprep
965(1)
Windows Automated Installation Kit
966(2)
User State Migration Tool
968(1)
OSD Phases
968(2)
Planning
969(1)
Preparation
969(1)
Creation
970(1)
Testing
970(1)
Productionization
970(1)
OSD Building Blocks
970(50)
Drivers
971(4)
Driver Packages
975(1)
Operating System Images
976(1)
Operating System Installers
976(1)
Boot Images
977(7)
Task Sequences
984(36)
Site System Roles
1020(10)
Distribution Points
1020(5)
State Migration Point
1025(5)
Driver Management
1030(2)
Drivers in the Image
1031(1)
Drivers After the Image
1031(1)
User State
1032(7)
USMT
1034(2)
Computer Associations
1036(2)
User State Without SMP
1038(1)
Image Operations
1039(10)
Image Creation
1039(5)
Image Upkeep
1044(1)
Offline Software Updates
1045(2)
Image Deployment
1047(2)
User Device Affinity
1049(1)
Deployment Challenges
1050(7)
Application Compatibility
1051(1)
User Data
1052(1)
Image Maintenance
1052(2)
Hardware Considerations
1054(3)
Monitoring Task Sequence Deployments
1057(1)
Update Deployment Status
1057(1)
Reporting
1058(1)
Troubleshooting
1058(3)
Command Line Support
1058(2)
The Smsts.log File
1060(1)
Windows Setup Log Files
1061(1)
Troubleshooting USMT
1061(1)
Summary
1061(4)
Part V Administering System Center Configuration Manager
20 Security and Delegation in Configuration Manager
1065(60)
Planning for Security and Delegation
1065(2)
ConfigMgr Security Solutions
1067(1)
Role-Based Administration
1068(16)
Managing Administrative Users
1069(1)
Security Roles
1070(4)
Security Scopes
1074(3)
Associating Security Scopes and Collections with Individual Roles
1077(1)
Administrative Security Reports
1078(1)
RBA Under the Hood
1079(5)
Preventing Unauthorized Access to ConfigMgr
1084(5)
Securing Access at the Active Directory Level
1084(1)
Securing Access at the Database Level
1085(1)
Auditing ConfigMgr Administrative Actions
1086(3)
Securing the ConfigMgr Infrastructure
1089(34)
Building Security into Your Hierarchy
1089(1)
Securing Site Systems
1090(6)
ConfigMgr Cryptographic Controls
1096(1)
ConfigMgr Network Security
1097(18)
ConfigMgr Content Security
1115(1)
Securing ConfigMgr Accounts
1116(7)
Summary
1123(2)
21 Backup, Recovery, and Maintenance
1125(54)
Performing Site and SQL Server Backups
1125(15)
Backing Up ConfigMgr
1126(3)
Restoring ConfigMgr Backups
1129(7)
Site Maintenance Options
1136(3)
Using Backup and Restore to Migrate to New Environments
1139(1)
SQL Replication
1140(5)
Monitoring SQL Replication
1140(3)
Replication Link Analyzer
1143(1)
Alerts for SQL Replication
1144(1)
Site Maintenance
1145(20)
Site Maintenance Tasks
1145(10)
DDR Retention
1155(7)
Obsolete Records
1162(1)
How a Record Can Be Marked Obsolete
1163(2)
Database Maintenance
1165(1)
Making the Status Message System Work for You
1166(8)
Maintaining Status Data
1167(2)
Status Filter Rules
1169(3)
Status Summarizers
1172(2)
Monitoring Configuration Manager with Operations Manager
1174(1)
Services and Descriptions
1175(1)
Summary
1176(3)
Part VI Appendixes
A Configuration Manager Log Files
1179(32)
Related Documentation
1180(1)
Viewing Log Files
1180(1)
Enabling Logging
1181(2)
Client Logs
1183(5)
Server Logs
1188(6)
Functionality Logs
1194(13)
Software and Application Installation Logs
1207(2)
Log File Mining
1209(2)
B Extending Hardware Inventory
1211(14)
How to Extend Hardware Inventory
1212(1)
Example of Extending Inventory
1213(10)
Creating a Device Collection
1223(2)
C Reference URLs
1225(16)
General Resources
1225(4)
Microsoft's Configuration Manager Resources
1229(5)
Other Configuration Manager Resources
1234(1)
Blogs
1235(2)
Microsoft System Center
1237(1)
Public Forums
1237(1)
Utilities
1238(3)
D Available Online
1241(2)
SQL Profiler Template
1241(1)
Top 10 Most Executed Reports Query
1241(1)
OSD Starter Scripts
1241(1)
Live Links
1242(1)
Index 1243
Kerrie Meyler, System Center MVP, is the lead author of numerous System Center books in the Unleashed series, including System Center Operations Manager 2007 Unleashed (2008), System Center Configuration Manager 2007 Unleashed (2009), System Center Operations Manager 2007 R2 Unleashed (2010), System Center Opalis Integration Server 6.3 Unleashed (2011), and System Center Service Manager 2010 Unleashed (2011). She is an independent consultant and trainer with more than 15 years of Information Technology experience. Kerrie was responsible for evangelizing SMS while a Sr. Technology Specialist at Microsoft, and has presented on System Center technologies at TechEd and MMS.

Byron Holt, CISSP and an IT professional for more than 15 years, has been a lead SMS and Configuration Manager engineer for several Global 5000 corporations and was part of the Active Directory and Enterprise Manageability support teams while working at Microsoft. Byrons experience includes software development, security architecture, and systems management. He currently works for McAfee managing internal deployment and validation. Byron coauthored System Center Configuration Manager 2007 Unleashed (Sams, 2009).

Marcus Oh, System Center MVP, is IT Manager of Directory and Systems Management for a large telecommunications provider, running directory services and management infrastructure for ~30,000 systems. He has been a MVP since 2004 in System Center, specializing in Configuration Manager and Operations Manager. Marcus has written numerous articles for technology websites as well as his own blog. He coauthored Professional SMS 2003, MOM 2005, and WSUS (Wrox, 2006), and was a contributing author to System Center Opalis Integration Server 6.3 Unleashed (Sams, 2011). Marcus is also a coauthor to the upcoming System Center 2012 Orchestrator Unleashed (Sams).

Jason Sandys, ConfigMgr MVP, is currently the Director for Solutions Engineering for Adaptiva (Adaptive Protocols, Inc.) where he is responsible for delivery of ConfigMgrcentric solutions. Jason was formerly a managing consultant for Catapult Systems Inc. and has more than 15 years of experience in a wide range of technologies, environments, and industries with extensive experience implementing and supporting SMS and Configuration Manager beginning with SMS 2.0. Jason is also active in the online support community, was a contributing author to System Center Configuration Manager 2007 Unleashed (Sams, 2009), and is a frequent presenter at Microsoft TechEd and MMS.

Greg Ramsey, ConfigMgr MVP, has worked with SMS and desktop deployment since 1998. He currently works for Dell, Inc., as a ConfigMgr administrator, and previously was a sergeant in the United States Marine Corps. Greg is a columnist for myITforum.com, cofounder of the Ohio SMS User Group and Central Texas Systems Management User Group, and creator of SMS View. Greg previously coauthored SMS 2003 Recipes: A Problem-Solution Approach (Apress, 2006) and System Center Configuration Manager 2007 Unleashed (Sams, 2009).  

Contributing Authors:

Niall Brady, Samuel Erskine, Torsten Meringer, Stefan Schörling, Kenneth van Surksum, and Steve Thompson.