You are previewing Microsoft® System Center 2012 Unleashed.
O'Reilly logo
Microsoft® System Center 2012 Unleashed

Book Description

This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and techniques you just won’t find anywhere else.


You’ll learn how to use System Center’s powerful capabilities to build highly-efficient managed environments that encompass datacenters, cloud environments, client computers, mobile devices, and more. The authors address planning, design, implementation, integration, and administration, and cover every component, including Configuration Manager, Operations Manager, Data Protection Manager, Virtual Machine Manager, Service Manager, and Orchestrator.

  •  Use Configuration Manager 2012 to deliver software and updates in highly-distributed environments including datacenters, clouds, and mobile devices

  •   Reliably manage and report on assets with Configuration Manager 2012

  •   Perform monitoring, alerting, operations, and security reporting with Operations Manager 2012

  •   Use Data Protection Manager 2012to protect file systems, SQL, Microsoft Exchange, and SharePoint

  •   Leverage Data Protection Manager 2012’s improved central monitoring and remote recovery

  •   Run Hyper-V virtualized environments with VMM 2012—including new private clouds and mixed private/public fabrics

  •   Use Service Manager 2012 to provide top-down integration, and use Orchestrator 2012 for bottom-up process automation and integration “glue”

  •   Give users an efficient self-service portal for creating service and incident requests and browsing service catalogs

  •   Manage service offerings and implement enterprise-wide change control with Service Manager 2012

  •   Ensure compliance by creating, executing, and repeating auditable, documented processes with Orchestrator 2012

Table of Contents

  1. Title Page
  2. Copyright Page
  3. Contents at a Glance
  4. Table of Contents
  5. About the Authors
  6. Dedication
  7. Acknowledgments
  8. We Want to Hear from You!
  9. Reader Services
  10. Introduction
  11. Chapter 1. Overview of the System Center Suite
    1. What Is System Center?
      1. Systems Management in the Enterprise
      2. System Center Family of Products
    2. Understanding System Center Configuration Manager
      1. Business Solutions Addressed by System Center Configuration Manager
      2. Major Features of System Center Configuration Manager
      3. Background on System Center Configuration Manager
      4. What’s New in System Center 2012 Configuration Manager
      5. What to Expect in the System Center Configuration Manager Chapters
    3. Understanding System Center Operations Manager
      1. Business Solutions Addressed by System Center Operations Manager
      2. Major Features of System Center Operations Manager
      3. Background on System Center Operations Manager
      4. What’s New in System Center 2012 Operations Manager
      5. What to Expect in the System Center Operations Manager Chapters
    4. Understanding System Center Data Protection Manager
      1. Business Solutions Addressed by System Center Data Protection Manager
      2. Major Features of System Center Data Protection Manager
      3. Background on System Center Data Protection Manager
      4. What’s New in System Center 2012 Data Protection Manager
      5. What to Expect in the System Center Data Protection Manager Chapters
    5. Understanding System Center Virtual Machine Manager
      1. Business Solutions Addressed by System Center Virtual Machine Manager
      2. Major Features of System Center Virtual Machine Manager
      3. Background on System Center Virtual Machine Manager
      4. What’s New in System Center 2012 Virtual Machine Manager
      5. What to Expect in the System Center Virtual Machine Manager Chapters
    6. Understanding System Center Service Manager
      1. Business Solutions Addressed by System Center Service Manager
      2. Major Features of System Center Service Manager
      3. Background on System Center Service Manager
      4. What’s New in System Center 2012 Service Manager
      5. What to Expect in the System Center Service Manager Chapters
    7. Understanding System Center 2012 Orchestrator
      1. Business Solutions Addressed by System Center 2012 Orchestrator
      2. Major Features of System Center 2012 Orchestrator
      3. Background on System Center Orchestrator
      4. What’s New in System Center 2012 Orchestrator
      5. What to Expect in the System Center Orchestrator Chapter
    8. Understanding System Center Licensing
      1. Core Client Access Licenses
      2. Server Management Suite Volume Licensing
    9. Summary
    10. Best Practices
  12. Chapter 2. Configuration Manager 2012 Design and Planning
    1. What’s New in ConfigMgr 2012
      1. Redesigned Console
      2. Hierarchy Changes
      3. Site System Role Changes
      4. Operations Changes
      5. Administration Changes
    2. Explaining How Configuration Manager Works
      1. Understanding the Hierarchy
      2. Understanding Secondary Sites and Management Points
      3. Understanding AD Schema Extensions and Client Roaming
    3. Understanding Content Distribution
      1. Application Management
      2. Packages
      3. Applications
      4. Software Update Distribution
      5. Operating System Deployment
    4. Understanding Asset Management
      1. Hardware and Software Inventory
      2. Asset Intelligence
      3. Software Metering
      4. Compliance Management
    5. Reporting from Configuration Manager
    6. Configuration Manager Architecture Components
      1. Clients
      2. Central Administration Site Servers
      3. Primary Site Servers
      4. SMS Provider
      5. Site Server Database
      6. Wake On LAN
      7. Asset Intelligence Synchronization Point
      8. Distribution Point
      9. Fallback Status Point
      10. Health Validator Point
      11. Management Point
      12. Out-of-Band Service Point
      13. State Migration Point
      14. Reporting Services Point
      15. Software Update Point
      16. Mobile Device Management
    7. Securing Configuration Manager
      1. Securing Server Communication
      2. Securing the Management Console
      3. Understanding Port Requirements
      4. Understanding Service Account Security
    8. Understanding Component Requirements
      1. Exploring Hardware Requirements
      2. Determining Software Requirements
      3. Sizing the Databases
    9. Configuration Manager Design Considerations
      1. Designing Collections
      2. Discovering and Deploying Clients
      3. Provisioning Content to Users and Groups
      4. Considerations for a Multisite Configuration Manager Hierarchy
      5. Placement of PXE-Enabled Distribution Points and State Migration Points
      6. Establishing Boundaries
      7. Planning Configuration Manager Client Settings
      8. Understanding the Data Flow
      9. Disk Subsystem Performance
      10. Choosing Between SAN and DAS
      11. Choosing SQL Versions
    10. Understanding Client Schedules
    11. Planning for Internet-Based Client Management
      1. Understanding Requirements and Limitations
      2. Planning Site System Placement
      3. Understanding Client Site Assignment
      4. Understanding Certificate Requirements
      5. Planning the Public Key Infrastructure
      6. Using Certificate Templates
    12. Putting It All Together in a Design
      1. Small and Medium Enterprise
      2. Large Enterprise
    13. Summary
    14. Best Practices
  13. Chapter 3. Configuration Manager 2012 Implementation and Administration
    1. Sample Organization
      1. Existing Environment
      2. Developing a Configuration Manager 2012 Design
    2. Configuring Installation Prerequisites
      1. Extending the Active Directory Schema
      2. Configuring the System Management Container
      3. Adding Windows Roles and Features on Site Servers
    3. Implementing the Central Administration Site
      1. Installing the Central Administration Site Server
      2. Validating the Installation of the Central Administration Site
    4. Deploying the Primary Sites
      1. Installing a Primary Site Server
      2. Validating the Installation of the Primary Site
    5. Deploying the Secondary Sites
      1. Validating the Installation of the Secondary Site
    6. Configuring the Hierarchy
      1. Establishing Boundaries and Boundary Groups
      2. Configuring Discovery Methods
      3. Configuring Hierarchy and Geographic Views
      4. Configuring Exchange Connectors
    7. Configuring Sites
      1. Deploying the Fallback Status Point Role
      2. Deploying the Reporting Service Point Role
      3. Deploying Software Updates Point Role
      4. Deploying Endpoint Protection Point Role
      5. Deploying Asset Intelligence Synchronization Point Role
      6. Preparing for OS Deployment
    8. Configuring Client Settings
      1. Background Intelligent Transfer
      2. Client Policy
      3. Compliance Settings
      4. Computer Agent
      5. Computer Restart
      6. Endpoint Protection
      7. Hardware Inventory
      8. Remote Tools
      9. Software Deployment
      10. Software Inventory
      11. Software Metering
      12. Software Updates
      13. State Messaging
      14. User and Device Affinity
      15. Configuring the Client Installation Settings
    9. Implementing Internet-Based Client Management
      1. Creating a Public Key Infrastructure
      2. Deploying an Active Directory Enterprise Root CA
      3. Validating the Enterprise Root CA
      4. Deploying Certificates
      5. Configuring the Auto-Enrollment Group Policy Object
      6. Configuring Certificate Templates
      7. Publishing the Certificate Templates
      8. Configuring the Certificate Services Website for SSL
      9. Configuring the WSUS Website for SSL
      10. Requesting the OS Deployment Certificate
      11. Enabling Internet-Based Client Management
    10. Summary
    11. Best Practices
  14. Chapter 4. Using Configuration Manager 2012 to Distribute Applications, Updates, and Operating Systems
    1. Understanding Content Distribution
      1. Understanding How Clients Locate Content
      2. Understanding How Internet Clients Locate Content
      3. Understanding Distribution Points Selection
    2. Defining Collections
    3. Understanding Application Management
      1. Applications
      2. Packages
      3. Configuring a Windows Installer Package (MSI) Application
      4. Configuring an EXE Application
      5. Configuring a Complex Application Source
      6. Automating a Complex Application Installation
      7. Creating a Complex Application
      8. Getting Content to Distribution Points
    4. Managing Deployments
      1. Targeting Users
      2. Deploying Software Self-Service
      3. Deploying Software Automatically
      4. Monitoring Software Deployment
    5. Understanding Software Updates
      1. Viewing the Update Repository
      2. Identifying Updates and Creating Software Update Groups
    6. Deploying Software Updates
      1. Creating Deployment Packages
      2. Creating Software Updates Deployment
      3. Automatic Deployment Rules
      4. Monitoring Software Update Deployment
    7. Understanding Operating System Deployment
      1. Preparing Applications and Deployment Types
      2. Creating the User State Migration Package
      3. Managing Operating System Installers
      4. Managing Operating System Images
      5. Managing Drivers
      6. Managing Boot Images
      7. Creating Operating System Install Task Sequences
    8. Deploying Operating Systems
      1. Importing an Unknown Computer
      2. Creating the Task Sequence Deployment
      3. Monitoring the Operating System Deployment Process
    9. Extending with Microsoft Deployment Toolkit
      1. Installing MDT
      2. Integrating MDT with Configuration Manager
      3. Creating MDT Task Sequences
    10. Summary
    11. Best Practices
  15. Chapter 5. Using Configuration Manager 2012 for Asset Management and Reporting
    1. Understanding Asset Data
      1. Understanding the Database
      2. Understanding Inventory Collection
      3. Using IDMIF and NOIDMIF Files
    2. Configuring Client Settings for Inventory Collection
      1. Configuring the Software Inventory Client Agent
      2. Configuring the Hardware Inventory Client Agent
    3. Understanding Reporting
      1. Generating Reports
      2. Short List of Reports
      3. Scheduling Reports
      4. Editing Reports
    4. Customizing Hardware Inventory
      1. Creating Registry Keys on the Client
      2. Editing the configuration.mof File
      3. Manually Compiling configuration.mof on Test Client
      4. Adding the Hardware Class in Client Settings
      5. Validating Custom Inventory Data
      6. Viewing Custom Inventory Data
    5. Understanding Asset Intelligence
      1. Enabling and Synchronizing the AI Catalog
      2. Enabling the Asset Intelligence Reporting Classes
      3. Importing Software License Data
      4. Understanding Asset Intelligence Reporting
    6. Understanding Software Metering
      1. Configuring the Software Metering Client Agent
      2. Reporting on Software Metering Data
    7. Understanding Compliance Settings
      1. Desired Configuration Management Client Agent
      2. Defining Configuration Items to Monitor
      3. Defining a Configuration Baseline
      4. Applying a Baseline to a Collection
    8. Monitoring the Baselines and Compliance
    9. Summary
    10. Best Practices
  16. Chapter 6. Operations Manager 2012 Design and Planning
    1. What’s New With Operations Manager 2012
    2. Understanding How OpsMgr Works
      1. Processing Operational Data
      2. Generating Alerts and Responses
      3. Reporting from OpsMgr
    3. OpsMgr Architecture Components
      1. Agents
      2. Management Server
      3. Operations Manager Database
      4. Reporting Data Warehouse
      5. Reporting Server
      6. Operations Console
      7. Web Console
      8. Command Shell
      9. Gateway
      10. Audit Forwarder
      11. Audit Collector
      12. Audit Collection Database
      13. Audit Collection Services Reporting
    4. Securing OpsMgr
      1. Role-Based Security Model
      2. Securing OpsMgr Agents
      3. Understanding Firewall Requirements
      4. Action and RunAs Account Security
      5. Securing DMZ Servers with Certificates
    5. Fault Tolerance and Disaster Recovery
      1. Management Group Redundancy
      2. Resource Pools
      3. Clustering and Operations Manager
      4. Disaster Recovery
    6. Understanding OpsMgr Component Requirements
      1. Exploring Hardware Requirements
      2. Determining Software Requirements
      3. Network Bandwidth Requirements
      4. Sizing the OpsMgr Databases
      5. Monitoring Non–domain Member Considerations
    7. OpsMgr Design Considerations
      1. Defining Management Groups
      2. Understanding How OpsMgr Stores Captured Data
      3. Disk Subsystem Performance
      4. Choosing Between SAN and DAS
      5. Choosing SQL Versions
      6. Multiple Management Groups
      7. Deploying Geographic-Based Management Groups
      8. Deploying Political or Security-Based Management Groups
    8. Putting It All Together in a Design
      1. Small Enterprise Design
      2. Medium Enterprise Design
      3. Large Enterprise Design
    9. Planning an Operations Manager Deployment
      1. Design Principles Training
      2. Design and Planning Phase
      3. Proof of Concept Phase
      4. Pilot Phase
      5. Production Phase
      6. Time Estimates
    10. Summary
    11. Best Practices
  17. Chapter 7. Operations Manager 2012 Implementation and Administration
    1. Installing Operations Manager 2012
      1. Single-Server OpsMgr 2012 Install
      2. Multiserver OpsMgr 2012 Install
      3. Importing Management Packs
      4. OpsMgr 2012 Audit Collection Services Install
    2. Deploying OpsMgr Agents
      1. Installing Windows Agents
      2. Configuring Alert Forwarders
      3. Installing UNIX/Linux Agents
      4. Network Monitoring
    3. Monitoring DMZ Servers with Certificates
      1. Creating a Certificate Template
      2. Requesting the Root CA Server Certificate
      3. Requesting a Certificate from the Root CA Server
      4. Installing the Agent on the DMZ Server
      5. Configuring the Agent to Use the Certificate
    4. Configuring Operations Manager 2012
      1. Global Management Group Settings
      2. Agent Proxy Configuration
      3. Agent Restart Recovery
      4. Notifications and Subscriptions
    5. Administering Operations Manager 2012
      1. Dip Stick Health Check Tasks
      2. Management Pack Updates
      3. Notification and Alert Tuning
      4. File Exclusions for Antivirus and Defragmentation Applications
      5. Web Console Performance View Time Frame
    6. Backing Up OpsMgr 2012
      1. OperationsManager Database Backup
      2. OperationsManagerDW Database Backup
      3. OperationsManagerAC Database Backup
      4. IIS 7.x Configuration Backup
    7. Summary
    8. Best Practices
  18. Chapter 8. Using Operations Manager 2012 for Monitoring and Alerting
    1. Using OpsMgr Consoles
      1. Using the Operations Console
      2. Using the Web Console
    2. Working with Management Packs
      1. Importing a Management Pack from the Internet
      2. Downloading a Management Pack from the Internet
      3. Manually Installing a Management Pack from a Download
      4. Exporting a Management Pack
      5. Overrides and Override Management Packs
    3. Exploring the Operations Manager Management Pack
      1. Configuring the Operations Manager Management Pack
      2. Operations Manager Management Pack Views
      3. Operations Manager Management Pack Tasks
    4. Exploring the Windows Management Pack
      1. How to Configure the Windows Management Pack
      2. Tuning the Windows Management Pack
      3. Windows Management Pack Views
      4. Windows Management Pack Tasks
      5. Windows Management Pack Reports
    5. Exploring the Active Directory Management Pack
      1. Configuring the Active Directory Management Pack
      2. Active Directory Client Monitoring Configuration
      3. Active Directory Replication Monitoring Configuration
      4. Active Directory Domain Controller Performance Collection
      5. Active Directory Management Pack Views
      6. Active Directory Management Pack Tasks
      7. Active Directory Management Pack Reports
    6. Exploring the Exchange 2010 Management Pack
      1. Preparing to Install the Exchange 2010 Management Pack
      2. Correlation Engine Service
      3. Installing the Exchange 2010 Management Pack
      4. Test Mailbox Configuration
      5. Synthetic Transaction Event Collection
      6. Exchange 2010 Management Pack Views
      7. Exchange 2010 Management Pack Reports
    7. Exploring the SQL Server Management Pack
      1. Configuring the SQL Server Management Pack
      2. SQL Cluster Configuration
      3. What to Tune in the SQL Server Management Pack
      4. SQL Server Management Pack Views
      5. SQL Server Management Pack Tasks
      6. SQL Server Management Pack Reports
    8. Exploring the Cross Platform Management Packs
      1. How to Configure the Cross Platform Management Packs
      2. Cross Platform Management Pack Views
      3. Cross Platform Management Pack Reports
    9. Management Pack Templates
      1. Web Application Template
      2. Windows Service Template
      3. OLE DB Data Source Template
      4. Process Monitoring Template
      5. TCP Port Template
      6. UNIX/Linux Log File Template
      7. UNIX/Linux Service Template
    10. Custom Management Packs
      1. Authoring Console
      2. Creating a Custom Management Pack
      3. Modifying an Existing XML Management Pack File
      4. Sealing a Management Pack Via Command Line
    11. Summary
    12. Best Practices
  19. Chapter 9. Using Operations Manager 2012 for Operations and Security Reporting
    1. Reporting from OpsMgr
    2. Generating and Scheduling Reports
      1. Performance Reports
      2. Top X Performance Reports
      3. Windows Server Performance Reports
      4. Alerts Reports
      5. Availability Reports
      6. OpsMgr Scheduled Reports Don’t Show Charts
    3. OpsMgr 2012 Maintenance Reports
      1. Most Common Alerts Report
      2. Alert Logging Latency Report
      3. Send Queue % Used Top 10 Report
      4. Daily Alerts Report
      5. SQL Database Space Report
    4. Audit Collection Services Reporting
      1. Reports in the ACS Report Model
      2. Generating ACS Reports
      3. Creating Custom ACS Reports
    5. Service Level Tracking
      1. Service Level Objectives
      2. Service Level Tracking Reports
    6. OpsMgr 2012 Dashboards
      1. New Dashboard Functionality
      2. Creating Dashboards in OpsMgr 2012
      3. Viewing Dashboards
    7. Publishing Dashboards into SharePoint 2010
      1. Deploying the Web Part
      2. Configuring the Web Part to Connect to the Web Console
      3. Adding a Web Part to a SharePoint Page
    8. Summary
    9. Best Practices
  20. Chapter 10. Data Protection Manager 2012 Design, Planning, Implementation, and Administration
    1. What Is System Center Data Protection Manager?
      1. Understanding Modern Data Recovery Needs
      2. How Data Protection Manager Meets Today’s Data Recovery Needs
    2. Data Protection Manager Background
      1. Data Protection Manager 2006
      2. Data Protection Manager 2006 SP1
      3. Data Protection Manager 2007
      4. Data Protection Manager 2007 SP1
      5. Data Protection Manager 2010 and DPM 2010 Service Pack 1
      6. Data Protection Manager 2012
    3. Data Protection Manager Prerequisites
      1. Hardware Requirements
      2. Supported Operating Systems
      3. Remote SQL Instance Requirements
      4. Software Requirements
    4. Planning a Data Protection Manager Deployment
      1. Step One: Understand the Environment
      2. Step Two: Define the Project Scope
      3. Step Three: Design the Protection Groups
      4. Step Four: Calculate the Storage Requirements
      5. Step Five: Design the DPM Server
    5. Deploying Data Protection Manager
      1. Preparing the Data Protection Manager Server
      2. Preparing the Remote SQL Instance
      3. Running the Data Protection Manager Installation
    6. Completing Required Configuration Tasks
      1. Adding Disks to the Storage Pool
      2. Configuring Tape Libraries
      3. Deploying the Protection Agent Using the DPM Administration Console
      4. Deploying the Protection Agent Using a Manual Installation Process
      5. Deploying the Protection Agent Using Certificates
      6. Attaching a Protection Agent Using PowerShell
    7. Creating Protection Groups
      1. Creating a Protection Group with Short-Term or Long-Term Storage
      2. Using Tape both for Short- and Long-Term Protection
    8. Administrating Data Protection Manager
      1. DPM Administrator Console
      2. DPM Management Shell
      3. Using DPM Central Console for Administration
      4. Using Custom Volumes
      5. Recovering Data
    9. Summary
    10. Best Practices
  21. Chapter 11. Using Data Protection Manager 2012 to Protect File Systems, Exchange, SQL, and SharePoint
    1. Protecting File Servers
      1. Data in a DFS Namespace
      2. Data on a File Server Cluster
      3. Data on Mount Points
    2. Protecting System State
    3. Protecting Exchange Servers
      1. Protecting Exchange Databases
      2. Restoring an Exchange Database
      3. How to Restore a Mailbox
      4. Exchange High-Availability Caveats
      5. Additional Considerations
    4. Protecting SQL Servers
      1. How to Protect SQL Server Databases
      2. Restoring a SQL Server Database
      3. How to Conduct a Self-Service Restore
    5. Protecting SharePoint Farms
      1. Preparing SharePoint for Protection
      2. Protecting a SharePoint Farm
      3. Recovering a SharePoint Farm
      4. Recovering a Content Database
      5. Recovering Sites, Lists, and Items
    6. Protecting Virtualized Environments
      1. Protecting Hyper-V Virtual Machines
      2. Protecting Nondomain Joined Hyper-V Hosts
      3. Targeting a Hyper-V Host Across a Firewall
      4. Recovering Hyper-V Virtual Machines
      5. Performing Item-Level Recovery on Virtual Machines
    7. Summary
    8. Best Practices
  22. Chapter 12. Virtual Machine Manager 2012 Design, Planning, and Implementation
    1. Understanding Virtual Machine Manager
      1. The Value VMM Brings to the Enterprise
      2. Technical Problems Addressed by VMM
      3. Components of VMM
      4. PowerShell Support
      5. Heterogeneous VM Management
      6. Cluster Support in VMM
      7. Role-Based Access Control
    2. Virtual Machine Manager Background
      1. Early Virtualization Management Techniques
      2. Virtual Machine Manager 2007
      3. Virtual Machine Manager 2008
      4. Virtual Machine Manager 2008 R2
    3. What’s New in System Center Virtual Machine Manager 2012
    4. Virtual Machine Manager Prerequisites
      1. VMM Server
      2. VMM Administrator Console
      3. VMM Self-Service Portal
      4. Virtual Machine Hosts
    5. Planning a Virtual Machine Manager Deployment
      1. Step One: Understand the Environment
      2. Step Two: Define the Project Scope
      3. Step Three: Determine Operations Manager Integration
      4. Step Four: Determine the Number of VMM Instances
      5. Step Five: Design the VMM Server
      6. Step Six: Design the Database Server and Database
      7. Step Seven: Design the Self-Service Portal Web Server(s)
      8. Step Eight: Design the Infrastructure Fabric
      9. Step Nine: Design the Library Servers and Libraries
    6. Deploying Virtual Machine Manager
      1. Preparing the Virtual Machine Manager Server
      2. Installing the Virtual Machine Manager Server
      3. Installing the VMM Administrator Console
      4. Installing the Self-Service Portal
      5. Securing the Self-Service Portal
      6. Installing the VMM Agent
    7. Summary
    8. Best Practices
  23. Chapter 13. Managing a Hyper-V Environment with Virtual Machine Manager 2012
    1. Understanding the VMM Private Cloud
      1. VMM Fabric Resources
    2. Using the VMM Management Interfaces
      1. VMM Administrator Console
      2. VMM Command Shell
    3. Understanding Virtual Machine Conversions
      1. Working with P2V Conversions
      2. Performing a P2V Online Conversion
      3. Working with V2V Conversions
      4. Performing a V2V Conversion
    4. Managing VMM User Roles
      1. Managing the Administrator User Role
    5. Deploying Virtual Machines
      1. Virtual Machine Placement
      2. Deploying Virtual Machines Using the Administrator Console
      3. Creating a Virtual Machine Using the Self-Service Portal
    6. Migrating Virtual Machines
      1. Using the Migrate Action
      2. Using the Migrate Storage Action
      3. Dragging and Dropping the Virtual Machine onto a Host Server
      4. Dragging and Dropping the Virtual Machine onto a Host Group
    7. Understanding and Implementing Server App-V
      1. Server App-V Basics
      2. Server App-V Sequencer Installation
      3. Server App-V Agent Installation
      4. Creating a New Server Application Package
      5. Importing an Application Package into VMM
    8. Summary
    9. Best Practices
  24. Chapter 14. Service Manager 2012 Design, Planning, and Implementation
    1. What’s New in Service Manager 2012
    2. Explaining How Service Manager Works
      1. SvcMgr Processes
      2. SvcMgr Technologies
      3. SvcMgr Architecture Components
    3. Service Manager Design Parameters
      1. Exploring Hardware Requirements
      2. Determining Software Requirements
      3. Disk Subsystem Performance
      4. Choosing Between SAN and DAS
      5. Choosing SQL Versions
    4. Putting It All Together in a Service Manager Design
      1. Small Enterprise Design
      2. Medium Enterprise Design
      3. Large Enterprise Design
    5. Planning a Service Manager Deployment
      1. Design Principles Training Phase (Overview Of Service Manager Components and Integration)
      2. Design and Planning Phase (Plan the Service Manager Architecture)
      3. Proof of Concept Phase (Build the Service Manager Prototype Lab)
      4. Pilot Phase
      5. Production Phase
      6. Time Estimates
    6. Deploying Service Manager
      1. Deploying SvcMgr Components
      2. Deploying SvcMgr Data Warehouse
      3. Registering the SvcMgr Management Group
      4. Viewing Data Warehouse Job Schedules
      5. Deploying the Service Manager 2012 Self-Service Portal
    7. Deploying Service Manager Connectors
      1. Active Directory Connector Deployment
      2. Operations Manager Connector Deployment
      3. Configuration Manager Connector Deployment
      4. Orchestrator Connector Deployment
    8. Backing Up Service Manager 2012
      1. ServiceManager Database Backup
      2. Service Manager Encryption Key Backup
    9. Summary
    10. Best Practices
  25. Chapter 15. Using Service Manager 2012 for Incident Tracking and Help Desk Support
    1. Incidents and Problems
      1. Understanding Service Manager Incidents
      2. Understanding Service Manager Problems
    2. Configuring Incident Settings
      1. Incident Prefix
      2. File Attachment Limits
      3. Priority Calculation
      4. Resolution Times
      5. Operations Manager Web Console Setting
      6. Inbound Email Settings
    3. Service Manager Notifications
      1. Service Manager Notification Architecture
      2. Configuring the SMTP Notification Channel
      3. Creating Notification Templates
      4. Creating Notification Subscriptions
    4. Creating New Incidents
      1. Manually Created Incidents
      2. OpsMgr Alert Created Incidents
      3. Creating Incidents Using the Self-Service Portal
      4. Email-Created Incidents
    5. Working with Incidents
      1. Evaluating and Assigning Incidents
      2. Analyzing Incidents
      3. Publishing Announcements
      4. Running Troubleshooting Tasks
      5. Resolving Incidents
    6. Configuring Problem Settings
      1. Customizing the Problem Prefix String
      2. File Attachment Limits
      3. Customizing Values for Priority Calculation
    7. Working with Problems
      1. Creating a Problem Record
      2. Analyzing Problems
      3. Resolving Problems
    8. Incident and Problem Reports
      1. Service Manager Report Controls
      2. Exploring Incident Reports
      3. Exploring Problem Reports
    9. Summary
    10. Best Practices
  26. Chapter 16. Using Service Manager 2012 for Service Offerings and Change Control Management
    1. Service Manager 2012 and the Infrastructure Optimization Model
    2. Service Offerings and Request Offerings in SM 2012
      1. Publishing Service Offerings Through the Self-Service Web Portal
      2. Creating a Custom Management Pack for Service Offerings
      3. Creating a Folder for Service Catalog Knowledge-Base Articles
      4. Creating a Request Offering
      5. Creating a Service Offering
      6. Submitting a Request Using the Self-Service Web Portal
    3. Release Management in SM 2012
    4. Change Requests and Activities
      1. Understanding Service Manager Change Requests
      2. Understanding Service Manager Activities
    5. Configuring Change Settings
      1. Defining the Change Request Prefix
      2. File Attachment Limits
      3. Activity Prefixes
    6. Change Management Templates and Workflows
      1. Change Request Templates
      2. Change Request Workflows
    7. Initiating Change Requests
      1. Creating a Change Request from Scratch
      2. Creating a Change Request from a Configuration Item
      3. Creating a Change Request from an Incident or a Problem
    8. Working with and Approving Change Requests
      1. Investigating Change Requests
      2. Adding Reviewers to Change Requests
      3. Holding, Resuming, and Cancelling a Change Request
    9. Implementing Change Requests
      1. Approving and Rejecting Review Activities
      2. Completing and Failing Manual Activities
      3. Closing Change Requests
      4. Automatic User Notification of Change Request Status
    10. Managing Configuration Items
      1. Understanding Configuration Items
      2. Searching Configuration Items
      3. Deleting and Removing Configuration Items
    11. Working with Change, Activity, and Configuration Management Reports
      1. Service Manager Report Controls
      2. Exploring Change Management Reports
      3. Exploring Activity Management Reports
      4. Exploring Configuration Management Reports
    12. Summary
    13. Best Practices
  27. Chapter 17. System Center Orchestrator 2012 Design, Planning, and Implementation
    1. Overview of System Center Orchestrator
      1. Business Needs Addressed by System Center Orchestrator
      2. Orchestrator Components
    2. History of System Center Orchestrator
    3. System Center Orchestrator 2012 Installation Prerequisites
      1. Supported Operating Systems
      2. Supported Versions of SQL Server
      3. Hardware Requirements for a Single-Server Configuration
      4. Hardware and Software Requirements for a Multiserver Configuration
      5. High-Availability Considerations
    4. Orchestrator Security Planning
      1. Service Accounts
      2. Security Groups
      3. Firewall Requirements
    5. Installing System Center Orchestrator 2012 on a Single Server
      1. Preparing the System Center Orchestrator 2012 Server
      2. Preparing the SQL Database Instance
      3. Running the System Center Orchestrator Installation
    6. Installing System Center Orchestrator 2012 on Separate Systems
      1. Preparing a Server for Installation of an Orchestrator Feature
      2. Installing the Management Server
      3. Installing the Runbook Server
      4. Installing the Orchestrator Web Service
      5. Installing the Runbook Designer
    7. Additional Tasks Following Orchestrator Installation
      1. Enabling Network Discovery for the Runbook Designer
      2. Connecting Runbook Designer to a Management Server
      3. Enabling GNU Privacy Guard for the Runbook Designer
    8. Getting Familiar with the Orchestrator 2012 Management Consoles
      1. Runbook Designer
      2. Orchestration Console
    9. Installing Integration Packs
      1. Registering an Integration Pack
      2. Deploying an Integration Pack
      3. Connecting Runbook Designer to Active Directory
    10. Designing and Using Runbooks
      1. Standard Activities
      2. Building a Runbook
    11. Runbook Permissions
    12. Summary
    13. Best Practices
  28. Index