System Center 2012 Configuration Manager Unleashed

Book description

This is the comprehensive reference and technical guide to Microsoft System Center Configuration Manager 2012. A team of expert authors offers step-by-step coverage of related topics in every feature area, organized to help IT professionals rapidly optimize Configuration Manager 2012 for their requirements, and then deploy and use it successfully. The authors begin by introducing Configuration Manager 2012 and its goals, and explaining how it fits into the broader System Center product suite. Next, they fully address planning, design, and implementation. Finally, they systematically cover each of Configuration Manager 2012's most important feature sets, addressing issues ranging from configuration management to software distribution. Readers will learn how to use Configuration Manager 2012's user-centric capabilities to provide anytime/anywhere services and software, and to strengthen both control and compliance. The first book on Configuration Manager 2012, System Center Configuration Manager 2012 Unleashed joins Sams' market-leading series of books on Microsoft's System Center product suite: books that have achieved go-to status amongst IT implementers and administrators worldwide.

Table of contents

  1. Title Page
  2. Copyright Page
  3. Contents at a Glance
  4. Table of Contents
  5. About the Authors
  6. About the Contributors
  7. Dedication
  8. Acknowledgments
  9. We Want to Hear from You!
  10. Reader Services
  11. Foreword
  12. Introduction
    1. Part I: Configuration Management Overview and Concepts
    2. Part II: Planning, Design, and Installation
    3. Part III: Configuration Manager Operations
    4. Part IV: Software and Configuration Management
    5. Part V: Administering System Center 2012 Configuration Manager
    6. Part VI: Appendixes
    7. Disclaimers and Fine Print
  13. Part I. Configuration Management Overview and Concepts
    1. Chapter 1. Configuration Management Basics
      1. In This Chapter
      2. Ten Reasons to Use Configuration Manager
      3. The Evolution of Systems Management
        1. Hurdles in the Distributed Enterprise
        2. The IT Automation Challenge
        3. Configuration “Shift and Drift”
        4. Lack of Security and Control
        5. Timeliness of Asset Data
        6. Lack of Automation and Enforcement
        7. Proliferation of Virtualization and Cloud Computing
        8. Lack of Process Consistency
        9. The Bottom Line
      4. Systems Management Defined
      5. Microsoft’s Strategy for Service Management
        1. Microsoft’s Dynamic Systems Initiative
        2. IT Infrastructure Library and Microsoft Operations Framework
        3. Total Quality Management: TQM
        4. Six Sigma
        5. Service Management Mastery: ISO 20000
        6. Optimizing Your Infrastructure
      6. Overview of Microsoft System Center
        1. Reporting in System Center
        2. Operations Management
        3. Service Management
        4. Protecting Data
        5. Virtual Machine Management
        6. Deploy and Manage in the Cloud
        7. Orchestration and Automation
        8. Cloud-Based Configuration Monitoring
        9. Endpoint Protection
      7. The Value Proposition of Configuration Manager
      8. Summary
    2. Chapter 2. Configuration Manager Overview
      1. In This Chapter
      2. The History of Configuration Manager
        1. Systems Management Server 1.x
        2. Systems Management Server 2.0
        3. Systems Management Server 2003
        4. System Center Configuration Manager 2007
        5. System Center 2012 Configuration Manager
      3. Terminology in Configuration Manager
        1. Site Hierarchy
        2. Site
        3. Site Systems
        4. Senders
        5. Addresses
        6. Configuration Manager Discovery Types
        7. Configuration Manager Agent
        8. Configuration Manager Console
        9. Collections
        10. Queries
        11. Alerts
        12. Status System
        13. Managing Applications
        14. Content Management
        15. Software Update Management
        16. Compliance Settings
        17. BITS
        18. Software Metering
        19. Network Access Protection
        20. BranchCache
        21. Reporting
      4. What’s New in This Version
        1. 64-Bit Site System Requirements
        2. User-Centric Management
        3. Applications and Packages
        4. Hierarchy Changes
        5. New Configuration Manager Console
        6. Enhancements to BITS
        7. Application Catalog
        8. Extended Mobile Device Management
        9. Management Point Enhancements
        10. Boundary Changes
        11. Fallback Site
        12. Centrally Managed Client Settings
        13. Role-Based Administration
        14. Backup and Recovery
        15. Collection Changes
        16. Client Health Status Enhancements
        17. Compliance Settings Changes
        18. Remote Control Improvements
        19. Hardware Inventory Improvements
        20. Power Management Improvements
        21. Software Updates Improvements
        22. Improved End User Experience
        23. Content Library
        24. Operating System Deployment
        25. Distribution Point Changes
        26. System Center 2012 Endpoint Protection Integration
      5. Feature Dependencies of System Center 2012 Configuration Manager
      6. Summary
    3. Chapter 3. Looking Inside Configuration Manager
      1. In This Chapter
      2. Design Concepts
      3. Active Directory Integration
        1. Schema Extensions
        2. Additional Active Directory Benefits
      4. A WMI Primer
        1. WMI Feature Set and Architecture
        2. Inside the WMI Object Model
        3. Managing WMI
        4. Looking Inside the CIMV2 Namespace
      5. WMI in ConfigMgr
        1. ConfigMgr Client Namespaces
        2. Hardware Inventory Through WMI
        3. Additional Client Operations Through WMI
        4. WMI on ConfigMgr Servers
      6. Components and Communications
      7. Inside the ConfigMgr Database
        1. ConfigMgr Tables and Views
        2. Using SQL Server Management Studio
      8. Viewing Detailed Process Activity
      9. SQL Replication Crash Course
      10. Configuration Manager Database Replication
      11. File-Based Replication
      12. Summary
  14. Part II. Planning, Design, and Installation
    1. Chapter 4. Architecture Design Planning
      1. In This Chapter
      2. Developing the Solution Architecture
        1. Establishing Business Requirements
        2. Assessing Your Environment
      3. Planning for Licensing
      4. Hierarchy Planning
        1. Configuration Manager Sites
        2. Planning Your Hierarchy Structure
        3. Planning Boundaries and Boundary Groups
        4. Choosing Client Discovery and Installation Methods
        5. Defining Your Client Architecture
        6. Planning for User-Centric Management
        7. Planning Content Management
      5. Planning for Infrastructure Dependencies
        1. Active Directory Considerations
        2. Planning Certificate Services
      6. Site Planning
        1. Site Servers and Site Systems Planning
        2. Capacity Planning
        3. Developing the Server Architecture
      7. Planning for Solution Scenarios
        1. Software Update Planning
        2. Planning for Internet-Based Clients
        3. Out of Band Management Planning
      8. Testing and Stabilizing Your Design
        1. The Proof of Concept
        2. The Pilot Deployment
      9. Summary
    2. Chapter 5. Network Design
      1. In This Chapter
      2. Understanding Your Network
      3. Configuration Manager Data Flow
      4. Intrasite Server Communications
        1. Communications with SQL Server
        2. Communications Using RPC
        3. Communications Using SMB
        4. Replication of Deployment Content Refresh Data
        5. Site System Communications Using HTTP and HTTPS
        6. Other Server Communications
      5. Client to Server Communications
        1. Client Ports and Protocols
        2. Reasons for Changing Ports
        3. Initial Communication
        4. Identifying and Contacting the Client’s Assigned Site
        5. Client Protocols
        6. Planning for Network Access Protection
      6. Site-to-Site Communications
        1. Database Replication
        2. File-Based Replication
        3. Data Priorities
      7. Fast Network and Slow Network Boundaries
      8. Use of BITS
        1. BITS Versions for ConfigMgr Clients
        2. Modifying BITS Functionality Through Group Policy
        3. Modifying BITS Functionality Within ConfigMgr
        4. Comparative Advantages of Group Policy and ConfigMgr Settings for BITS
        5. Systems with Multiple Interfaces and File Integrity Checking
      9. ConfigMgr and BranchCache
      10. Server and Site Placement
      11. Deploying Servers to Support Internet-Based Clients
        1. Using a Dedicated Site for Internet Clients
        2. Allowing Site-to-Site Communications Across an Inner Firewall
        3. Having a Site Span the Internal Network and Perimeter Network
        4. Using Web Proxies and Proxy Enrollment Points
      12. Intermittently Connected Users
      13. Network Discovery
        1. Discovering Network Topology
        2. Topology and Client Discovery
        3. Discovering Topology, Client, and Client Operating Systems
      14. Troubleshooting ConfigMgr Network Issues
        1. Network Configuration Issues
        2. Basic Connectivity Problems
        3. Name Resolution Issues
        4. Blocked or Unresponsive Ports
        5. Timeout Issues
        6. Identifying Network Issues Affecting ConfigMgr
      15. Summary
    3. Chapter 6. Installing System Center 2012 Configuration Manager
      1. In This Chapter
      2. Configuring Pre-Installation Requirements
        1. Windows Components
        2. Supported SQL Server Requirements
        3. Validating and Configuring Active Directory Requirements
        4. Windows Server Update Services
        5. Prerequisite Checker
        6. Using the Prerequisite Files Downloader
      3. Performing Site Installations
        1. Installing the Central Administration Site
        2. Installing Primary Sites
        3. Installing Secondary Sites
        4. Installation Validation
      4. Site Properties
        1. Initial Configuration
        2. Installing Optional Site Systems
      5. Uninstalling Sites
        1. Uninstalling Primary Sites
        2. Uninstalling Secondary Sites
        3. Uninstalling a Full Hierarchy
      6. Troubleshooting Site Installation
      7. Summary
    4. Chapter 7. Migrating to System Center 2012 Configuration Manager
      1. In This Chapter
      2. About Migration
        1. Migration Background and Introduction
        2. Migration, Not an Upgrade
      3. Planning the Migration
        1. Central Site and Hierarchy Concepts in 2012
        2. About Site Mode
        3. What Is Migrated
        4. What Is Not Migrated
        5. Pre-Migration Activities
        6. Coexistence Considerations
        7. Migrating Your Configuration Manager Infrastructure
        8. Site Servers and Site Roles
        9. Security Considerations
        10. Boundaries and What’s Changing
      4. Performing the Migration
        1. Migrating Features and Objects
        2. Migrating by Feature and Dependencies
        3. Migration Dependencies Configuration
        4. Configuring the Active Source Site
        5. Configuring Child Sites for Data Gathering
        6. Migration Jobs
        7. Shared Distribution Points
        8. Migration Clean Up
      5. Migrating Reports
        1. Legacy Reports
        2. SSRS Reports
        3. Custom Reports
      6. Client Migration and Methods
        1. Background and Client Migration Concepts
        2. Client Migration Strategies for Your Network
      7. Troubleshooting Migration Issues
      8. Summary
  15. Part III. Configuration Manager Operations
    1. Chapter 8. The Configuration Manager Console
      1. In This Chapter
      2. Console Highlights
      3. Touring the Console
        1. Configuration Manager Console Panes
        2. Configuration Manager Console Bars
        3. Backstage
      4. ConfigMgr Workspaces
        1. Assets and Compliance Workspace
        2. Software Library Workspace
        3. Monitoring Workspace
        4. Administration Workspace
        5. Console Node Details
      5. Console Deployment
        1. Console Placement
        2. Supported Platforms
        3. ConfigMgr Console Prerequisites
        4. Installation Using the ConfigMgr Setup Wizard
        5. Unattended Console Installation
      6. Role-Based Administration
        1. Introducing the “Show Me” Behavior
        2. Behind the Scenes
        3. The Three States of Interaction
      7. Connecting to a Site
        1. Recent Connections
        2. Clearing Recent Connections
      8. Personalizing the Console
      9. The In-Console Alert Experience
        1. Viewing Alerts
        2. Managing Alerts
        3. Configuring Alerts
        4. Subscribing to Alerts
      10. Configuration Manager Service Manager
        1. Initiating the Configuration Manager Service Manager Console
        2. Operating the Configuration Manager Service Manager Console
      11. Security Considerations
        1. SMS Provider Permissions
        2. DCOM Permissions
        3. WMI Permissions
      12. Troubleshooting Console Issues
        1. Console Logging
        2. Verify Security
        3. Connectivity Issues
        4. Common Problems with the ConfigMgr Console
      13. Summary
    2. Chapter 9. Configuration Manager Client Management
      1. In This Chapter
      2. Discovery
        1. Active Directory Forest Discovery
        2. Active Directory Group Discovery
        3. Active Directory User Discovery
        4. Active Directory System Discovery
        5. Heartbeat Discovery
        6. Network Discovery
        7. Manually Importing Clients into ConfigMgr
      3. ConfigMgr Client Requirements
        1. Hardware Dependencies
        2. Software Dependencies
        3. Supported Platforms
      4. ConfigMgr Client Installation
        1. Manual Installation
        2. Installing with Logon Scripts
        3. Client Push
        4. Group Policy
        5. Software Update Point
        6. Client Approval
        7. Blocking and Unblocking Clients
        8. Automatically Upgrading the Client
        9. Troubleshooting Client Installation
      5. Client Assignment
      6. Client Health
      7. Client Settings
        1. Defining Priority
        2. Background Intelligent Transfer Device Settings
        3. Client Policy Device Settings
        4. Compliance Settings Device Settings
        5. Computer Agent Device Settings
        6. Computer Restart Device Settings
        7. Endpoint Protection Device Settings
        8. Hardware Inventory Device Settings
        9. Network Access Protection (NAP) Device Settings
        10. Power Management Device Settings
        11. Remote Control Device Settings
        12. Software Deployment Device Settings
        13. Software Inventory Device Settings
        14. Software Metering Device Settings
        15. Software Updates Device Settings
        16. State Messaging Device Settings
        17. User and Device Affinity Settings
      8. Using the Resource Explorer
      9. Wake On LAN
        1. WOL Prerequisites
        2. Two Types of WOL
        3. Configuring WOL
        4. Using WOL
      10. Summary
  16. Part IV. Software and Configuration Management
    1. Chapter 10. Managing Compliance
      1. In This Chapter
      2. New and Improved in System Center 2012 Configuration Manager
      3. Configuring Compliance Settings
      4. Configuration Items and Baselines
        1. Configuration Items
        2. Configuration Baselines
        3. Compliance Evaluation
        4. Versioning
        5. Configuration Packs
        6. Exporting Configuration Items and Baselines
        7. Compliance Authoring
      5. Compliance Strategy
        1. Reporting
        2. On-Demand Results
        3. Alerting
        4. Remediation
      6. Troubleshooting
      7. Summary
    2. Chapter 11. Packages and Programs
      1. In This Chapter
      2. About Packages, Programs, Collections, Distribution Points, and Deployments
        1. Packages
        2. Programs
        3. Collections
        4. Distribution Points
        5. Deployments
        6. Combining the Use of Packages, Programs, Collections, and Deployments
      3. Creating a Package
        1. Creating a Package from the Package Definition Wizard
        2. Package Properties
        3. Creating a Package with the New Package Wizard
        4. Custom Packages
        5. Repackaging Software
      4. Avoiding Common ConfigMgr Software Packaging Issues
        1. Program and Package Properties
        2. Testing, Testing, Testing
      5. Summary
    3. Chapter 12. Creating and Managing Applications
      1. In This Chapter
      2. ConfigMgr Applications Overview
        1. About Applications
        2. About Deployment Types
        3. About Detection Methods
        4. About User Device Affinity
      3. About Creating Applications
        1. Creating a Windows Installer (MSI)-Based Application
        2. Application Properties
      4. Creating Deployment Types
        1. Creating a Windows Installer-Based Deployment Type
        2. Creating an Application Virtualization Deployment Type
        3. Creating a Script-Based Deployment Type
      5. Creating Detection Methods
        1. Detection Methods for Windows Installer Applications
        2. Other Detection Methods
        3. Custom Script Detection Methods
      6. Managing and Creating Global Conditions
        1. Device Global Conditions
        2. User Global Conditions
        3. Custom Global Conditions
      7. More About Managing Applications
        1. Adding Dependencies
        2. Managing Revision History
        3. Exporting and Importing Applications
        4. Superseding Applications
        5. Retiring and Deleting Applications
      8. Package Conversion Manager
      9. Summary
    4. Chapter 13. Distributing and Deploying Applications
      1. In This Chapter
      2. Creating and Managing Collections
        1. Direct Rule
        2. Query Rule
        3. Include Rule
        4. Exclude Rule
        5. About Incremental Updates
        6. User Collections Versus Device Collections
      3. About Distribution Points
        1. Installing Distribution Points
        2. Distribution Point Groups
        3. Associating Collections with Distribution Point Groups
        4. Sending Content to Distribution Points
        5. Monitoring Distribution Point Status
        6. Updating Content on Distribution Points
        7. Refreshing Content on Distribution Points
        8. Removing Content from Distribution Points
        9. Validating Content
        10. Using BranchCache
        11. Preferred Distribution Points
        12. Prestaging Content
        13. Importing and Exporting Content
        14. Troubleshooting Content Distribution
        15. About the Content Library
      4. Deploying Packages and Applications
      5. End User Experience
        1. Software Center
        2. Application Catalog
      6. Monitoring and Troubleshooting Deployments
      7. Simulated Deployments
      8. Summary
    5. Chapter 14. Software Update Management
      1. In This Chapter
      2. What’s New in 2012
      3. Planning Your Update Strategy
      4. Incorporated Tools
        1. The Windows Update Agent
        2. Windows Software Update Services
      5. Preparing for Software Updates with ConfigMgr
        1. Prerequisites for Software Updates
        2. Software Update Points
        3. Client Settings
        4. Group Policy Settings
      6. Software Update Building Blocks
        1. All Software Updates
        2. Software Update Groups
        3. Update Deployments
        4. Update Templates
        5. Deployment Packages
        6. Automatic Deployment Rules
        7. Maintenance Windows
        8. Superseded Updates
      7. The Software Updates Process in Action
      8. Software Update Decisions, Design, and Workflow
      9. Compliance Scanning
      10. End User Experience and Interaction
        1. Notifications
        2. Updates and Software Center
        3. Update Installation
        4. System Restarts and Restart Notifications
      11. Monitoring Software Updates
        1. Individual Update Status
        2. Update Deployment Status
        3. Reporting
      12. A Super-Quick Walkthrough
      13. Troubleshooting Software Updates
        1. WSUS and SUP
        2. Downloading Updates
        3. Client Update Scanning and Deployment
      14. Beyond the Built-In Update Process
      15. System Center Update Publisher
        1. SCUP Installation
        2. SCUP Configuration
        3. Catalogs
        4. Publications
        5. Updates
        6. Custom Updates
        7. Rules
        8. Quick Walkthrough
      16. Using NAP to Protect Your Network
        1. NAP Prerequisites
        2. Agent Settings
        3. System Health
        4. Client Compliance
        5. Remediation
      17. Summary
    6. Chapter 15. Mobile Device Management
      1. In This Chapter
      2. Planning for Mobile Device Management
      3. Overview of Mobile Device Management
      4. Light Management
        1. Exchange Server Connector
        2. Access Rules
        3. Troubleshooting Light Management
        4. Working with Devices
        5. End User Experience
      5. In-Depth Management
        1. Public Key Infrastructure
        2. Heartbeat Discovery
        3. Mobile Device Management Site Roles
        4. Client Settings
        5. Enrolling Mobile Devices
        6. Software Deployment
        7. Compliance Settings
        8. Reporting
      6. Partner Extensibility
      7. Summary
    7. Chapter 16. Endpoint Protection
      1. In This Chapter
      2. Prerequisites for Endpoint Protection
      3. Planning and Considerations
        1. Creating Custom Client Settings and Antimalware Policies
        2. Deciding from Where to Update and When
        3. Deploying to a Test Collection First
        4. Categorizing Client Remediation Status
        5. Targeting Collections with Custom Antimalware Policy and Client Settings
      4. Installing the Endpoint Protection Role
      5. Configuring the SUP for Endpoint Protection
        1. Configuring the SUP to Synchronize Definition Updates
        2. Creating Auto Deployment Rules for Definition Updates
      6. Working with Antimalware Policies
        1. Understanding the Default Antimalware Policy
        2. Creating Custom Antimalware Policy
        3. Importing and Merging Antimalware Policies
      7. Configuring Alerts for Endpoint Protection
        1. Configuring Email Notification
        2. Configuring Alerts for Device Collections
        3. Configuring Alert Subscriptions
        4. Configuring Custom Client Device Settings for Endpoint Protection
        5. Deploying Endpoint Protection Custom Client Agent Settings
      8. Monitoring Status in Endpoint Protection
        1. Configuring Collections to Appear in Collection View
        2. Security State View for the Selected Collection
        3. Operational State View for Clients and Computers in the Selected Collection
      9. Performing On-Demand Actions for Malware
      10. Reporting in Endpoint Protection
      11. Creating and Deploying Windows Firewall Policies
      12. Understanding the Endpoint Protection Client
      13. Installing the Endpoint Protection Client
        1. Understanding Endpoint Protection Client Settings
        2. Communication Between the Client and the Server
        3. Automatic Removal of Antimalware Software
        4. Removing the Endpoint Protection Client
      14. Delivery of Definition Updates
      15. Summary
    8. Chapter 17. Configuration Manager Queries
      1. In This Chapter
      2. Introducing the Queries Node
        1. Organizing the Query List Pane
        2. Viewing Queries and Query Results
      3. Creating Queries
        1. WMI Query Language
        2. Objects, Classes, and Attributes
      4. ConfigMgr Query Builder
      5. Criterion Types, Operators, and Values
        1. Criterion Types
        2. Operators
        3. Values
      6. Writing Advanced Queries
        1. Limitations of Extended WQL in ConfigMgr
        2. Utilizing the Date and Time Functions in WQL Queries
        3. Examples of Advanced Queries
        4. Converting WQL to SQL
      7. Relationships, Operations, and Joins
        1. Querying Discovery Data
        2. Querying Inventory Data
      8. Using Query Results
        1. Exporting Query Results to a Text File
        2. Importing and Exporting Queries Between Sites
        3. Creating a Collection Based on Query Results
      9. Status Message Queries
        1. Viewing Status Messages
        2. Creating Status Message Queries
      10. Summary
    9. Chapter 18. Reporting
      1. In This Chapter
      2. SQL Server Reporting Services Overview
      3. Implementing SSRS
        1. SQL Server Version Selection
        2. Server Placement Options
        3. SSRS Installation
        4. SSRS Configuration
        5. Backing Up SSRS
        6. Reporting Best Practices
      4. Interacting with Reports from the Console
        1. Search Capability
        2. Running Reports
        3. Creating Subscriptions
        4. Managing SSRS Report Security
        5. Creating a Report
      5. Authoring Custom Reports
        1. Development Tool Selection
        2. Building a Custom Report
        3. Interactive Features
        4. Advanced Reporting Techniques
        5. Advanced Custom Report Example
        6. Authoring Best Practices
      6. Built-in ConfigMgr Reports
      7. Troubleshooting SSRS
        1. SSRS Logs
        2. Report Server Event Errors
      8. Optimizing SSRS Performance
        1. Subscriptions
        2. Report Caching
        3. Report Snapshots
        4. Report Timeout Values
        5. Performance Best Practices
      9. Reporting on Reporting Services
      10. System Center Data Warehouse
      11. Summary
    10. Chapter 19. Operating System Deployment
      1. In This Chapter
      2. What OSD Does
      3. What’s New in OSD
      4. Deployment Scenarios
      5. Tools Incorporated into OSD
        1. Sysprep
        2. Windows Automated Installation Kit
        3. User State Migration Tool
      6. OSD Phases
        1. Planning
        2. Preparation
        3. Creation
        4. Testing
        5. Productionization
      7. OSD Building Blocks
        1. Drivers
        2. Driver Packages
        3. Operating System Images
        4. Operating System Installers
        5. Boot Images
        6. Task Sequences
      8. Site System Roles
        1. Distribution Points
        2. State Migration Point
      9. Driver Management
        1. Drivers in the Image
        2. Drivers After the Image
      10. User State
        1. USMT
        2. Computer Associations
        3. User State Without SMP
      11. Image Operations
        1. Image Creation
        2. Image Upkeep
        3. Offline Software Updates
        4. Image Deployment
      12. User Device Affinity
      13. Deployment Challenges
        1. Application Compatibility
        2. User Data
        3. Image Maintenance
        4. Hardware Considerations
      14. Monitoring Task Sequence Deployments
        1. Update Deployment Status
        2. Reporting
      15. Troubleshooting
        1. Command Line Support
        2. The Smsts.log File
        3. Windows Setup Log Files
        4. Troubleshooting USMT
      16. Summary
  17. Part V. Administering System Center 2012 Configuration Manager
    1. Chapter 20. Security and Delegation in Configuration Manager
      1. In This Chapter
      2. Planning for Security and Delegation
      3. ConfigMgr Security Solutions
      4. Role-Based Administration
        1. Managing Administrative Users
        2. Security Roles
        3. Security Scopes
        4. Associating Security Scopes and Collections with Individual Roles
        5. Administrative Security Reports
        6. RBA Under the Hood
      5. Preventing Unauthorized Access to ConfigMgr
        1. Securing Access at the Active Directory Level
        2. Securing Access at the Database Level
        3. Auditing ConfigMgr Administrative Actions
      6. Securing the ConfigMgr Infrastructure
        1. Building Security into Your Hierarchy
        2. Securing Site Systems
        3. ConfigMgr Cryptographic Controls
        4. ConfigMgr Network Security
        5. ConfigMgr Content Security
        6. Securing ConfigMgr Accounts
      7. Summary
    2. Chapter 21. Backup, Recovery, and Maintenance
      1. In This Chapter
      2. Performing Site and SQL Server Backups
        1. Backing Up ConfigMgr
        2. Restoring ConfigMgr Backups
        3. Site Maintenance Options
        4. Using Backup and Restore to Migrate to New Environments
      3. SQL Replication
        1. Monitoring SQL Replication
        2. Replication Link Analyzer
        3. Alerts for SQL Replication
      4. Site Maintenance
        1. Site Maintenance Tasks
        2. DDR Retention
        3. Obsolete Records
        4. How a Record Can Be Marked Obsolete
      5. Database Maintenance
      6. Making the Status Message System Work for You
        1. Maintaining Status Data
        2. Status Filter Rules
        3. Status Summarizers
      7. Monitoring Configuration Manager with Operations Manager
      8. Services and Descriptions
      9. Summary
  18. Part VI. Appendixes
    1. Appendix A. Configuration Manager Log Files
      1. In This Appendix
      2. Related Documentation
      3. Viewing Log Files
      4. Enabling Logging
        1. Debug and Verbose Logging
        2. Using ConfigMgr Service Manager
        3. Admin Console Logs
        4. NAL Logging
        5. Role-Based Administration
        6. SQL Logging
      5. Client Logs
        1. Client Installation Logs
        2. Client Operations Logs
        3. Mobile Device Management Client Logs
        4. Windows Update Agent Logs
      6. Server Logs
        1. Server Setup Logs
        2. Site Server Common Logs
        3. Backup Log Files
        4. Content Management
        5. Discovery
        6. Inventory
        7. MP Log Files
        8. Migration
        9. WSUS Server Log Files
      7. Functionality Logs
        1. Application Management
        2. Asset Intelligence
        3. Compliance Management Log Files
        4. Endpoint Protection Log Files
        5. Metering
        6. Mobile Device Management Log Files
        7. Network Access Protection Log Files
        8. OSD Log Files
        9. Out of Band Management Log Files
        10. Power Management
        11. Remote Control
        12. Reporting
        13. Software Updates Log Files
        14. Wake On LAN Log Files
      8. Software and Application Installation Logs
      9. Log File Mining
    2. Appendix B. Extending Hardware Inventory
      1. In This Appendix
      2. How to Extend Hardware Inventory
      3. Example of Extending Inventory
      4. Creating a Device Collection
    3. Appendix C. Reference URLs
      1. In This Appendix
      2. General Resources
      3. Microsoft’s Configuration Manager Resources
      4. Other Configuration Manager Resources
      5. Blogs
      6. Microsoft System Center
      7. Public Forums
      8. Utilities
    4. Appendix D. Available Online
      1. In This Appendix
      2. SQL Profiler Template
      3. Top 10 Most Executed Reports Query
      4. OSD Starter Scripts
      5. Live Links
  19. Index

Product information

  • Title: System Center 2012 Configuration Manager Unleashed
  • Author(s): Kerrie Meyler, Byron Holt, Marcus Oh, Jason Sandys, Greg Ramsey.
  • Release date: July 2012
  • Publisher(s): Sams
  • ISBN: 9780132731645