Sccm 2012 overview - chris_estonina


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Sccm 2012 overview - chris_estonina

  1. 1.
  2. 2. What is in SCCM 2012?
  3. 3. What is in SCCM 2012? IT Asset Intelligence Software Update Management Software Metering Remote Control classic and App-V Support for Applications the Mobile Selfservice Portal Workforce Power OS Deployment Management Network Access Antivirus* Protection Settings Management (aka DCM)
  4. 4. Configuration Manager 2007: Configuration Manager 2012:• Optimized for Systems Management scenarios • Still committed and focused on System Management scenarios• Challenging to manage users: • Embrace User Centric scenarios: • Forced to translate a user to a device • Moving to a state based design, for apps, • Explicit: run a specific program on a specific deployments, content on DPs. device • Full application lifecycle model. Install,• Software Distribution is a glorified script Revision Mgt, Supersedence and Uninstall execution. • Understand and intelligently target the relationships between user systems • Management solution tailored for applications
  5. 5. Application InstallationApplication Uninstall Application Revision Application Retirement) Application Supersedence
  6. 6. Office 2000 and 2007 Eliminate Application-to- running Application Compatibility together… issues App-V applies to your custom applications as well…Run differentversions of Javatogether…
  7. 7. Peter as „ConfigMgr Admin‟has rights to entire consolePeter assigns ApplicationDeployment role to MegMeg is responsible fordeploying softwareMeg has a limited view
  8. 8. CENTRAL CENTRAL SITE SITE Desktop Security management management solution solution BRANCH BRANCH BRANCH BRANCH BRANCH BRANCH SITE SITE SITE SITE SITE SITE Security solutions such as Anti-Virus,Applications, OS and application Desktop Firewall, NAP, Host Intrusionpatches, Asset Inventory, etc Prevention, etc
  9. 9. Security + ManagementIMPROVED PROTECTION LOWER COSTS Security personnel have access One server infrastructure to to desktop configuration data maintain Healthstatus and protection A single mechanism to deploy status in a single interface, with software updates to clients consolidated reporting Central policy implementation Incident response (identify / for security and management patch / remediate) is more targeted One set of training for administrators Riga Stradins A single license to purchase University (Core CAL)“The integration of management and security makes our IT organization more agile. We‟re more efficient in the way that we use our personnel. We‟ve increased the number of people available to respond to security incidents by 20% with no increase in headcount.”
  10. 10. One infrastructure for desktop management and protection FEP is now part of Core CAL Slovenia Telecom “The integration of Forefront Endpoint Protection with System Center Configuration Manager lets us break down the silos within our organization and increase efficiency.”
  11. 11. Windows 7 Built-in Features Anti-Spyware Windows Defender Desktop Firewall Windows Firewall Host Intrusion Prevention (HIPS) User Access Protection (UAC) Network Access Control (NAC) Network Access Protection Hard Disk Encryption (new) BitLocker* and BitLocker to Go* Virtual Private Network (VPN) DirectAccess*Typically, your end point security solution Most of these features are already partalone will consume 500~600MB of disk of Windows 7. Windows 7 is secure byspace default. You basically need only one security agent – Anti-Virus . FEP is now part of Core CAL. *Windows Enterprise feature
  12. 12. Network Security Internet Explore 8 DirectAccess • Policy based networking Help protect users against: • Security enhanced, seamless, always on • Multi-Home Firewall Profiles • Social engineering, privacy, connection to corporate network • DNSSec Support Browser based, and Web server • Improved management of remote users • Multiple Active Firewalls exploits • Consistent security for all access • Internet Protocol security (IPSec) scenarios improvementsUser Account Control• Streamlined UAC• Standard user can do even more Network Access Protection • Ensure compliance upon accessAppLocker • Access remediation enforcement• Application “with listing” control• Enables application standardization BitLocker Right Management Encrypting File System • BitLocker encryption for local Services • User-based file and folder encryption HDD • Policy based, collaboration and • BitLocker To Go for USB document level rights • Group Policy enforcement management *Comparison to Enterprise Version
  13. 13. Unified compliance-settings management acrossservers, desktops laptops, and mobile devicesSimplify administrator experience Browse gold system when creating configuration items Simplified Baseline creation experienceDeployment of Baselines User and Device targeting of Baselines Define compliance SLAs for Baseline deployments and generate AlertsMonitoring Baseline deployment compliance statusAutomatic remediation (aka DCM “set”)CI revisioning and change control
  14. 14. Offline Servicing of Images Support for Component Based Servicing compatible updates Uses updates already approvedBoot Media Updates Hierarchy wide boot media – no longer need one per site Unattended boot media mode – no longer need to press “next” Use pre-execution hooks to automatically select a task sequence – no longer see many optional task sequencesUSMT 4.0 - UI integration and support for hard-link, offline and shadow copy features
  15. 15. IS BACK!
  16. 16.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.