System Center 2012 Configuration Manager (SCCM) Unleashed

System Center 2012 Configuration Manager (SCCM) Unleashed

4.1 (39 ratings by Goodreads)
By (author)  , By (author)  , By (author)  , By (author)  , By (author) 

List price: US$59.99

Currently unavailable

We can notify you when this item is back in stock

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks


This is the comprehensive reference and technical guide to Microsoft System Center Configuration Manager 2012. A team of expert authors offers step-by-step coverage of related topics in every feature area, organized to help IT professionals rapidly optimize Configuration Manager 2012 for their requirements, and then deploy and use it successfully. The authors begin by introducing Configuration Manager 2012 and its goals, and explaining how it fits into the broader System Center product suite. Next, they fully address planning, design, and implementation. Finally, they systematically cover each of Configuration Manager 2012's most important feature sets, addressing issues ranging from configuration management to software distribution. Readers will learn how to use Configuration Manager 2012's user-centric capabilities to provide anytime/anywhere services and software, and to strengthen both control and compliance. The first book on Configuration Manager 2012, System Center Configuration Manager 2012 Unleashed joins Sams' market-leading series of books on Microsoft's System Center product suite: books that have achieved go-to status amongst IT implementers and administrators worldwide.
show more

Product details

  • Paperback | 1360 pages
  • 177.8 x 231.14 x 50.8mm | 1,655.6g
  • Pearson Education (US)
  • Sams Publishing
  • Indianapolis, United States
  • English
  • New.
  • 0672334372
  • 9780672334375
  • 233,743

Back cover copy

The comprehensive reference and technical guide to Microsoft System Center Configuration Manager 2012. Foreword by Wally Mead, Microsoft Corporation Leading System Center experts offer step-by-step coverage of every feature area, organized to help you rapidly optimize ConfigMgr 2012 for your specific requirements, deploy and use it successfully, and gain even more value by integrating it with the rest of System Center. Extensively revised to reflect major improvements in Configuration Manager 2012, this book fully addresses planning, design, and implementation, offering best practice processes for everything from software distribution to client security. Drawing on their unsurpassed "in-the-trenches" experience, the authors show how to use Configuration Manager 2012's user-centric capabilities to provide anytime/anywhere services and software, and to strengthen both control and compliance. - Understand Configuration Manager 2012's key concepts and components
- Plan your architecture, and design supporting network infrastructure
- Install Configuration Manager 2012 and integrate it with existing systems
- Leverage Configuration Manager 2012's major improvements in security and scalability
- Manage operations and clients through the new Outlook-style console
- Efficiently create, manage, distribute, deploy, and update applications
- Centrally manage all your mobile devices
- Simplify client security management with new Endpoint Protection capabilities
- Query and report on configurations throughout your enterprise
- Implement reliable backup and recovery
- Establish security accounts, groups, and requirements, and safely delegate security rights
show more

About Kerrie Meyler

Kerrie Meyler, System Center MVP, is the lead author of numerous System Center books in the Unleashed series, including System Center Operations Manager 2007 Unleashed (2008), System Center Configuration Manager 2007 Unleashed (2009), System Center Operations Manager 2007 R2 Unleashed (2010), System Center Opalis Integration Server 6.3 Unleashed (2011), and System Center Service Manager 2010 Unleashed (2011). She is an independent consultant and trainer with more than 15 years of Information Technology experience. Kerrie was responsible for evangelizing SMS while a Sr. Technology Specialist at Microsoft, and has presented on System Center technologies at TechEd and MMS.Byron Holt, CISSP and an IT professional for more than 15 years, has been a lead SMS and Configuration Manager engineer for several Global 5000 corporations and was part of the Active Directory and Enterprise Manageability support teams while working at Microsoft. Byron's experience includes software development, security architecture, and systems management. He currently works for McAfee managing internal deployment and validation. Byron coauthored System Center Configuration Manager 2007 Unleashed (Sams, 2009).Marcus Oh, System Center MVP, is IT Manager of Directory and Systems Management for a large telecommunications provider, running directory services and management infrastructure for ~30,000 systems. He has been a MVP since 2004 in System Center, specializing in Configuration Manager and Operations Manager. Marcus has written numerous articles for technology websites as well as his own blog. He coauthored Professional SMS 2003, MOM 2005, and WSUS (Wrox, 2006), and was a contributing author to System Center Opalis Integration Server 6.3 Unleashed (Sams, 2011). Marcus is also a coauthor to the upcoming System Center 2012 Orchestrator Unleashed (Sams).Jason Sandys, ConfigMgr MVP, is currently the Director for Solutions Engineering for Adaptiva (Adaptive Protocols, Inc.) where he is responsible for delivery of ConfigMgrcentric solutions. Jason was formerly a managing consultant for Catapult Systems Inc. and has more than 15 years of experience in a wide range of technologies, environments, and industries with extensive experience implementing and supporting SMS and Configuration Manager beginning with SMS 2.0. Jason is also active in the online support community, was a contributing author to System Center Configuration Manager 2007 Unleashed (Sams, 2009), and is a frequent presenter at Microsoft TechEd and MMS.Greg Ramsey, ConfigMgr MVP, has worked with SMS and desktop deployment since 1998. He currently works for Dell, Inc., as a ConfigMgr administrator, and previously was a sergeant in the United States Marine Corps. Greg is a columnist for, cofounder of the Ohio SMS User Group and Central Texas Systems Management User Group, and creator of SMS View. Greg previously coauthored SMS 2003 Recipes: A Problem-Solution Approach (Apress, 2006) and System Center Configuration Manager 2007 Unleashed (Sams, 2009). Contributing Authors:Niall Brady, Samuel Erskine, Torsten Meringer, Stefan Schoerling, Kenneth van Surksum, and Steve Thompson.
show more

Table of contents

Foreword by Wally Mead xxixIntroduction 1PART I: Configuration Manager Overview and ConceptsChapter 1 Configuration Management Basics 7Ten Reasons to Use Configuration Manager 8The Evolution of Systems Management 9 Hurdles in the Distributed Enterprise 10 The IT Automation Challenge 10 Configuration "Shift and Drift" 11 Lack of Security and Control 11 Timeliness of Asset Data 12 Lack of Automation and Enforcement 12 Proliferation of Virtualization and Cloud Computing 12 Lack of Process Consistency 13 The Bottom Line 13Systems Management Defined 14Microsoft's Strategy for Service Management 15 Microsoft's Dynamic Systems Initiative 16 IT Infrastructure Library and Microsoft Operations Framework 19 Total Quality Management: TQM 24 Six Sigma 24 Service Management Mastery: ISO 20000 24 Optimizing Your Infrastructure 25Overview of Microsoft System Center 29 Reporting in System Center 30 Operations Management 31 Service Management 31 Protecting Data 32 Virtual Machine Management 32 Deploy and Manage in the Cloud 33 Orchestration and Automation 33 Cloud-Based Configuration Monitoring 34 Endpoint Protection 34The Value Proposition of Configuration Manager 34Summary 35Chapter 2 Configuration Manager Overview 37The History of Configuration Manager 37 Systems Management Server 1.x 38 Systems Management Server 2.0 38 Systems Management Server 2003 39 System Center Configuration Manager 2007 41 System Center 2012 Configuration Manager 42Terminology in Configuration Manager 42 Site Hierarchy 43 Site 44 Site Systems 46 Senders 48 Addresses 49 Configuration Manager Discovery Types 49 Configuration Manager Agent 50 Configuration Manager Console 51 Collections 52 Queries 52 Alerts 53 Status System 53 Managing Applications 54 Content Management 57 Software Update Management 59 Compliance Settings 59 BITS 59 Software Metering 60 Network Access Protection 60 BranchCache 61 Reporting 61What's New in This Version 62 64-Bit Site System Requirements 62 User-Centric Management 62 Applications and Packages 63 Hierarchy Changes 63 New Configuration Manager Console 64 Enhancements to BITS 64 Application Catalog 64 Extended Mobile Device Management 65 Management Point Enhancements 65 Boundary Changes 65 Fallback Site 66 Centrally Managed Client Settings 66 Role-Based Administration 66 Backup and Recovery 66 Collection Changes 67 Client Health Status Enhancements 68 Compliance Settings Changes 68 Remote Control Improvements 69 Hardware Inventory Improvements 69 Power Management Improvements 70 Software Updates Improvements 72 Improved End User Experience 73 Content Library 73 Operating System Deployment 73 Distribution Point Changes 74 System Center 2012 Endpoint Protection Integration 75Feature Dependencies of System Center 2012 Configuration Manager 75Summary 77Chapter 3 Looking Inside Configuration Manager 79Design Concepts 80Active Directory Integration 81 Schema Extensions 81 Additional Active Directory Benefits 90A WMI Primer 91 WMI Feature Set and Architecture 91 Inside the WMI Object Model 95 Managing WMI 98 Looking Inside the CIMV2 Namespace 103WMI in ConfigMgr 111 ConfigMgr Client Namespaces 111 Hardware Inventory Through WMI 112 Additional Client Operations Through WMI 116 WMI on ConfigMgr Servers 120Components and Communications 124Inside the ConfigMgr Database 133 ConfigMgr Tables and Views 133 Using SQL Server Management Studio 134Viewing Detailed Process Activity 138SQL Replication Crash Course 146Configuration Manager Database Replication 148File-Based Replication 154Summary 157PART II: Planning, Design, and InstallationChapter 4 Architecture Design Planning 161Developing the Solution Architecture 161 Establishing Business Requirements 162 Assessing Your Environment 163Planning for Licensing 165Hierarchy Planning 167 Configuration Manager Sites 167 Planning Your Hierarchy Structure 169 Planning Boundaries and Boundary Groups 170 Choosing Client Discovery and Installation Methods 172 Defining Your Client Architecture 174 Planning for User-Centric Management 178 Planning Content Management 178Planning for Infrastructure Dependencies 180 Active Directory Considerations 180 Planning Certificate Services 183Site Planning 186 Site Servers and Site Systems Planning 186 Capacity Planning 188 Developing the Server Architecture 189Planning for Solution Scenarios 190 Software Update Planning 190 Planning for Internet-Based Clients 193 Out of Band Management Planning 195Testing and Stabilizing Your Design 197 The Proof of Concept 198 The Pilot Deployment 204Summary 204Chapter 5 Network Design 205Understanding Your Network 206Configuration Manager Data Flow . 206Intrasite Server Communications 208 Communications with SQL Server 208 Communications Using RPC 209 Communications Using SMB 209 Replication of Deployment Content Refresh Data 213 Site System Communications Using HTTP and HTTPS 214 Other Server Communications 214 Client to Server Communications 214 Client Ports and Protocols 215 Reasons for Changing Ports 215 Initial Communication 221 Identifying and Contacting the Client's Assigned Site 222 Client Protocols 222 Planning for Network Access Protection 224Site-to-Site Communications 225 Database Replication 225 File-Based Replication 226 Data Priorities 227Fast Network and Slow Network Boundaries 227Use of BITS 229 BITS Versions for ConfigMgr Clients 230 Modifying BITS Functionality Through Group Policy 231 Modifying BITS Functionality Within ConfigMgr 232 Comparative Advantages of Group Policy and ConfigMgr Settings for BITS 233 Systems with Multiple Interfaces and File Integrity Checking 233ConfigMgr and BranchCache 234Server and Site Placement 236Deploying Servers to Support Internet-Based Clients 237 Using a Dedicated Site for Internet Clients 238 Allowing Site-to-Site Communications Across an Inner Firewall 239 Having a Site Span the Internal Network and Perimeter Network 240 Using Web Proxies and Proxy Enrollment Points 240Intermittently Connected Users 241Network Discovery 241 Discovering Network Topology 243 Topology and Client Discovery 245 Discovering Topology, Client, and Client Operating Systems 245Troubleshooting ConfigMgr Network Issues 246 Network Configuration Issues 247 Basic Connectivity Problems 247 Name Resolution Issues 248 Blocked or Unresponsive Ports 249 Timeout Issues 250 Identifying Network Issues Affecting ConfigMgr 250Summary 259Chapter 6 Installing System Center 2012 Configuration Manager 261Configuring Pre-Installation Requirements 261 Windows Components 262 Supported SQL Server Requirements 263 Validating and Configuring Active Directory Requirements 265 Windows Server Update Services 265 Prerequisite Checker 265 Using the Prerequisite Files Downloader 269Performing Site Installations 270 Installing the Central Administration Site 271 Installing Primary Sites 278 Installing Secondary Sites 288 Installation Validation 294Site Properties 296 Initial Configuration 296 Installing Optional Site Systems 301Uninstalling Sites 309 Uninstalling Primary Sites 309 Uninstalling Secondary Sites 312 Uninstalling a Full Hierarchy 314Troubleshooting Site Installation 315Summary 316Chapter 7 Migrating to System Center 2012 Configuration Manager 317About Migration 318 Migration Background and Introduction 318 Migration, Not an Upgrade 319Planning the Migration 320 Central Site and Hierarchy Concepts in 2012 320 About Site Mode 321 What Is Migrated 321 What Is Not Migrated 323 Pre-Migration Activities 324 Coexistence Considerations 327 Migrating Your Configuration Manager Infrastructure 327 Site Servers and Site Roles 328 Security Considerations 332 Boundaries and What's Changing 337Performing the Migration 338 Migrating Features and Objects 338 Migrating by Feature and Dependencies 338 Migration Dependencies Configuration 339 Configuring the Active Source Site 343 Configuring Child Sites for Data Gathering 345 Migration Jobs 347 Shared Distribution Points 366 Migration Clean Up 367Migrating Reports 369 Legacy Reports 369 SSRS Reports 369 Custom Reports 369Client Migration and Methods 370 Background and Client Migration Concepts 370 Client Migration Strategies for Your Network 371Troubleshooting Migration Issues 371Summary 372PART III: Configuration Manager OperationsChapter 8 The Configuration Manager Console 375Console Highlights 376Touring the Console 376 Configuration Manager Console Panes 377 Configuration Manager Console Bars 378 Backstage 378ConfigMgr Workspaces 379 Assets and Compliance Workspace 380 Software Library Workspace 380 Monitoring Workspace 381 Administration Workspace 383 Console Node Details 384Console Deployment 388 Console Placement 389 Supported Platforms 389 ConfigMgr Console Prerequisites 390 Installation Using the ConfigMgr Setup Wizard 391 Unattended Console Installation 394Role-Based Administration 395 Introducing the "Show Me" Behavior 395 Behind the Scenes 397 The Three States of Interaction 397Connecting to a Site 398 Recent Connections 398 Clearing Recent Connections 398Personalizing the Console 400The In-Console Alert Experience 401 Viewing Alerts 401 Managing Alerts 402 Configuring Alerts 403 Subscribing to Alerts 404Configuration Manager Service Manager 404 Initiating the Configuration Manager Service Manager Console 406 Operating the Configuration Manager Service Manager Console 407Security Considerations 408 SMS Provider Permissions 409 DCOM Permissions 409 WMI Permissions 409Troubleshooting Console Issues 411 Console Logging 411 Verify Security 412 Connectivity Issues 416 Common Problems with the ConfigMgr Console 416Summary 417Chapter 9 Configuration Manager Client Management 419Discovery 419 Active Directory Forest Discovery 420 Active Directory Group Discovery 422 Active Directory User Discovery 424 Active Directory System Discovery 426 Heartbeat Discovery 427 Network Discovery 429 Manually Importing Clients into ConfigMgr 431ConfigMgr Client Requirements 432 Hardware Dependencies 432 Software Dependencies 433 Supported Platforms 433ConfigMgr Client Installation 435 Manual Installation 435 Installing with Logon Scripts 441 Client Push 442 Group Policy 447 Software Update Point 448 Client Approval 449 Blocking and Unblocking Clients 450 Automatically Upgrading the Client 450 Troubleshooting Client Installation 451Client Assignment 453Client Health 454Client Settings 459 Defining Priority 461 Background Intelligent Transfer Device Settings 461 Client Policy Device Settings 463 Compliance Settings Device Settings 463 Computer Agent Device Settings 464 Computer Restart Device Settings 466 Endpoint Protection Device Settings 466 Hardware Inventory Device Settings 467 Network Access Protection (NAP) Device Settings 470 Power Management Device Settings 471 Remote Control Device Settings 471 Software Deployment Device Settings 476 Software Inventory Device Settings 477 Software Metering Device Settings 479 Software Updates Device Settings 481 State Messaging Device Settings 482 User and Device Affinity Settings 482Using the Resource Explorer 483Wake On LAN 484 WOL Prerequisites 484 Two Types of WOL 485 Configuring WOL 486 Using WOL 487Summary 488PART IV: Software and Configuration ManagementChapter 10 Managing Compliance 491New and Improved in System Center 2012 Configuration Manager 493Configuring Compliance Settings 493Configuration Items and Baselines 495 Configuration Items 496 Configuration Baselines 512 Compliance Evaluation 517 Versioning 519 Configuration Packs 521 Exporting Configuration Items and Baselines 522 Compliance Authoring 523Compliance Strategy 525 Reporting 526 On-Demand Results 527 Alerting 527 Remediation 528Troubleshooting 529Summary 531Chapter 11 Packages and Programs 533About Packages, Programs, Collections, Distribution Points, and Deployments 534 Packages 534 Programs 534 Collections 535 Distribution Points 535 Deployments 536 Combining the Use of Packages, Programs, Collections, and Deployments 536Creating a Package 536 Creating a Package from the Package Definition Wizard 537 Package Properties 543 Creating a Package with the New Package Wizard 559 Custom Packages 562 Repackaging Software 562Avoiding Common ConfigMgr Software Packaging Issues 563 Program and Package Properties 563 Testing, Testing, Testing 563Summary 564Chapter 12 Creating and Managing Applications 565ConfigMgr Applications Overview 566 About Applications 566 About Deployment Types 567 About Detection Methods 569 About User Device Affinity 569About Creating Applications 571 Creating a Windows Installer (MSI)-Based Application 571 Application Properties 576Creating Deployment Types 591 Creating a Windows Installer-Based Deployment Type 592 Creating an Application Virtualization Deployment Type 595 Creating a Script-Based Deployment Type 599Creating Detection Methods 602 Detection Methods for Windows Installer Applications 602 Other Detection Methods 604 Custom Script Detection Methods 607Managing and Creating Global Conditions 610 Device Global Conditions 611 User Global Conditions 612 Custom Global Conditions 612More About Managing Applications 617 Adding Dependencies 617 Managing Revision History 619 Exporting and Importing Applications 620 Superseding Applications 621 Retiring and Deleting Applications 622Package Conversion Manager 623Summary 626Chapter 13 Distributing and Deploying Applications 627Creating and Managing Collections 628 Direct Rule 630 Query Rule 631 Include Rule 634 Exclude Rule 634 About Incremental Updates 634 User Collections Versus Device Collections 635About Distribution Points 635 Installing Distribution Points 637 Distribution Point Groups 640 Associating Collections with Distribution Point Groups 641 Sending Content to Distribution Points 642 Monitoring Distribution Point Status 642 Updating Content on Distribution Points 645 Refreshing Content on Distribution Points 646 Removing Content from Distribution Points 646 Validating Content 647 Using BranchCache 647 Preferred Distribution Points 648 Prestaging Content 648 Importing and Exporting Content 652 Troubleshooting Content Distribution 654 About the Content Library 654Deploying Packages and Applications 654End User Experience 660 Software Center 660 Application Catalog 662Monitoring and Troubleshooting Deployments 665Simulated Deployments 667Summary 667Chapter 14 Software Update Management 669What's New in 2012 670Planning Your Update Strategy 670Incorporated Tools 672 The Windows Update Agent 673 Windows Software Update Services 673Preparing for Software Updates with ConfigMgr 674 Prerequisites for Software Updates 674 Software Update Points 676 Client Settings 687 Group Policy Settings 689Software Update Building Blocks 692 All Software Updates 692 Software Update Groups 696 Update Deployments 698 Update Templates 703 Deployment Packages 704 Automatic Deployment Rules 706 Maintenance Windows 708 Superseded Updates 711The Software Updates Process in Action 711Software Update Decisions, Design, and Workflow 714Compliance Scanning 716End User Experience and Interaction 717 Notifications 717 Updates and Software Center 718 Update Installation 720 System Restarts and Restart Notifications 721Monitoring Software Updates 723 Individual Update Status 723 Update Deployment Status 723 Reporting 724A Super-Quick Walkthrough 724Troubleshooting Software Updates 725 WSUS and SUP 725 Downloading Updates 726 Client Update Scanning and Deployment 727Beyond the Built-In Update Process 727System Center Update Publisher 728 SCUP Installation 728 SCUP Configuration 729 Catalogs 733 Publications 735 Updates 735 Custom Updates 737 Rules 741 Quick Walkthrough 742Using NAP to Protect Your Network 742 NAP Prerequisites 742 Agent Settings 744 System Health 744 Client Compliance 747 Remediation 748Summary 748Chapter 15 Mobile Device Management 751Planning for Mobile Device Management 752Overview of Mobile Device Management 753Light Management 753 Exchange Server Connector 754 Access Rules 762 Troubleshooting Light Management 764 Working with Devices 764 End User Experience 767In-Depth Management 768 Public Key Infrastructure 771 Heartbeat Discovery 771 Mobile Device Management Site Roles 772 Client Settings 775 Enrolling Mobile Devices 779 Software Deployment 780 Compliance Settings 782 Reporting 782Partner Extensibility 783Summary 784Chapter 16 Endpoint Protection 785Prerequisites for Endpoint Protection 787Planning and Considerations 788 Creating Custom Client Settings and Antimalware Policies 788 Deciding from Where to Update and When 789 Deploying to a Test Collection First 789 Categorizing Client Remediation Status 790 Targeting Collections with Custom Antimalware Policy and Client Settings 790Installing the Endpoint Protection Role 792Configuring the SUP for Endpoint Protection 797 Configuring the SUP to Synchronize Definition Updates 797 Creating Auto Deployment Rules for Definition Updates 799Working with Antimalware Policies 804 Understanding the Default Antimalware Policy 804 Creating Custom Antimalware Policy 807 Importing and Merging Antimalware Policies 808Configuring Alerts for Endpoint Protection 809 Configuring Email Notification 810 Configuring Alerts for Device Collections 812 Configuring Alert Subscriptions 813 Configuring Custom Client Device Settings for Endpoint Protection 814 Deploying Endpoint Protection Custom Client Agent Settings 815Monitoring Status in Endpoint Protection 816Configuring Collections to Appear in Collection View 816Security State View for the Selected Collection 816Operational State View for Clients and Computers in the Selected Collection 818Performing On-Demand Actions for Malware 819Reporting in Endpoint Protection 820Creating and Deploying Windows Firewall Policies 823Understanding the Endpoint Protection Client 824Installing the Endpoint Protection Client 827 Understanding Endpoint Protection Client Settings 827 Communication Between the Client and the Server 829 Automatic Removal of Antimalware Software 829 Removing the Endpoint Protection Client 830Delivery of Definition Updates 830Summary 831Chapter 17 Configuration Manager Queries 833Introducing the Queries Node 834 Organizing the Query List Pane 835 Viewing Queries and Query Results 837Creating Queries 838 WMI Query Language 838 Objects, Classes, and Attributes 839ConfigMgr Query Builder 841Criterion Types, Operators, and Values 846 Criterion Types 846 Operators 848 Values 850Writing Advanced Queries 851 Limitations of Extended WQL in ConfigMgr 852 Utilizing the Date and Time Functions in WQL Queries 853 Examples of Advanced Queries 854 Converting WQL to SQL 857Relationships, Operations, and Joins 858 Querying Discovery Data 860 Querying Inventory Data 861Using Query Results 863 Exporting Query Results to a Text File 863 Importing and Exporting Queries Between Sites 863 Creating a Collection Based on Query Results 866Status Message Queries 866 Viewing Status Messages 867 Creating Status Message Queries 868Summary 870Chapter 18 Reporting 871SQL Server Reporting Services Overview 871Implementing SSRS 872 SQL Server Version Selection 872 Server Placement Options 872 SSRS Installation 873 SSRS Configuration 876 Backing Up SSRS 882 Reporting Best Practices 884Interacting with Reports from the Console 885 Search Capability 885 Running Reports 886 Creating Subscriptions 887 Managing SSRS Report Security 890 Creating a Report 890Authoring Custom Reports 893 Development Tool Selection 893 Building a Custom Report 893 Interactive Features 902 Advanced Reporting Techniques 903 Advanced Custom Report Example 904 Authoring Best Practices 912Built-in ConfigMgr Reports 912Troubleshooting SSRS 945 SSRS Logs 945 Report Server Event Errors 946Optimizing SSRS Performance 949 Subscriptions 950 Report Caching 950 Report Snapshots 950 Report Timeout Values 950 Performance Best Practices 951Reporting on Reporting Services 951System Center Data Warehouse 957Summary 958Chapter 19 Operating System Deployment 959What OSD Does 960What's New in OSD 961Deployment Scenarios 963Tools Incorporated into OSD 965 Sysprep 965 Windows Auto mated Installation Kit 966User State Migration Tool 968OSD Phases 968 Planning 969 Preparation 969 Creation 970 Testing 970 Productionization 970OSD Building Blocks 970 Drivers 971 Driver Packages 975 Operating System Images 976 Operating System Installers 976 Boot Images 977 Task Sequences 984Site System Roles 1020 Distribution Points 1020 State Migration Point 1025Driver Management 1030 Drivers in the Image 1031 Drivers After the Image 1031User State 1032 USMT 1034 Computer Associations 1036 User State Without SMP 1038Image Operations 1039 Image Creation 1039 Image Upkeep 1044 Offline Software Updates 1045 Image Deployment 1047User Device Affinity 1049Deployment Challenges 1050 Application Compatibility 1051 User Data 1052 Image Maintenance 1052 Hardware Considerations 1054Monitoring Task Sequence Deployments 1057 Update Deployment Status 1057 Reporting 1058Troubleshooting 1058 Command Line Support 1058 The Smsts.log File 1060 Windows Setup Log Files 1061 Troubleshooting USMT 1061Summary 1061PART V: Administering System Center Configuration ManagerChapter 20 Security and Delegation in Configuration Manager 1065Planning for Security and Delegation 1065ConfigMgr Security Solutions 1067Role-Based Administration 1068 Managing Administrative Users 1069 Security Roles 1070 Security Scopes 1074 Associating Security Scopes and Collections with Individual Roles 1077 Administrative Security Reports 1078 RBA Under the Hood 1079Preventing Unauthorized Access to ConfigMgr 1084 Securing Access at the Active Directory Level 1084 Securing Access at the Database Level 1085 Auditing ConfigMgr Administrative Actions 1086Securing the ConfigMgr Infrastructure 1089 Building Security into Your Hierarchy 1089 Securing Site Systems 1090 ConfigMgr Cryptographic Controls 1096 ConfigMgr Network Security 1097 ConfigMgr Content Security 1115 Securing ConfigMgr Accounts 1116Summary 1123Chapter 21 Backup, Recovery, and Maintenance 1125Performing Site and SQL Server Backups 1125 Backing Up ConfigMgr 1126 Restoring ConfigMgr Backups 1129 Site Maintenance Options 1136 Using Backup and Restore to Migrate to New 1139SQL Replication 1140 Monitoring SQL Replication 1140 Replication Link Analyzer 1143 Alerts for SQL Replication 1144Site Maintenance 1145 Site Maintenance Tasks 1145 DDR Retention 1155 Obsolete Records 1162 How a Record Can Be Marked Obsolete 1163Database Maintenance 1165Making the Status Message System Work for You 1166 Maintaining Status Data 1167 Status Filter Rules 1169 Status Summarizers 1172Monitoring Configuration Manager with Operations Manager 1174 Services and Descriptions 1175Summary 1176PART VI: AppendixesAppendix A Configuration Manager Log Files 1179Related Documentation 1180Viewing Log Files 1180Enabling Logging 1181Client Logs 1183Server Logs 1188Functionality Logs 1194Software and Application Installation Logs 1207Log File Mining 1209Appendix B Extending Hardware Inventory 1211How to Extend Hardware Inventory 1212Example of Extending Inventory 1213Creating a Device Collection 1223Appendix C Reference URLs 1225General Resources 1225Microsoft's Configuration Manager Resources 1229Other Configuration Manager Resources 1234Blogs 1235Microsoft System Center 1237Public Forums 1237Utilities 1238Appendix D Available Online 1241SQL Profiler Template 1241Top 10 Most Executed Reports Query 1241OSD Starter Scripts 1241Live Links 1242Index 1243
show more

Rating details

39 ratings
4.1 out of 5 stars
5 33% (13)
4 46% (18)
3 18% (7)
2 3% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X