Your SlideShare is downloading. ×

Sccm 2012

4,544
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
4,544
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
416
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. What is in SCCM 2012?
  • 2. What is in SCCM 2012? IT Asset Intelligence Software Update Management Software Metering Remote Control classic and App-V Support for Applications the Mobile Workforce OS Deployment Power Selfservice Management Network Access Antivirus* Portal Protection Settings Management (aka DCM) * FEP 2012 has to be licensed separately
  • 3. Where is the focus on ?
  • 4. EMPOWER UNIFY CONTROLEnables IT to provide a Simplifies and consolidates Reduces the complexityflexible work environment the IT infrastructure to and improves visibility provide a new operational into systems compliance Users can connect from cost modelanywhere, on any device they Keeps assets available andchoose Integrates security to create helps keep the IT unified client management environment audit-readyAutomatically detects networkconditions and device New features around Simplifies and automatesconfigurations to determine administrative control to patch managementthe most appropriate services reduce infrastructure
  • 5. Configuration Manager 2007: Configuration Manager 2012:• Optimized for Systems Management • Still committed and focused on System scenarios Management scenarios• Challenging to manage users: • Embrace User Centric scenarios: • Forced to translate a user to a device • Moving to a state based design, for apps, deployments, content on DPs. • Explicit: run a specific program on a • Full application lifecycle model. specific device Install, Revision Mgt, Supersedence and• Software Distribution is a glorified script Uninstall execution. • Understand and intelligently target the relationships between user systems • Management solution tailored for applications
  • 6. Application Installation (beta1)Application Uninstall Application Revision(beta2) (beta1) Application Retirement Application Supersedence (beta1) (beta2)
  • 7. Simplified administration of security permissions Security Role Group sets of permissions together that collectively define an administrative span of control e.g. Read Program + Deploy Program + Read Collection + Advertise to Collection = Software Distribution Administrator Supports assignment of Security Roles to Users, once in a hierarchy Also supports instance level controls ConfigMgr provides out-of-the-box Security Roles Supports custom Security RolesRemoves clutter from the console Supports “Show me what‟s relevant to me” based on my Security Role and Scope
  • 8. Peter as „ConfigMgr Admin‟has rights to entire consolePeter assigns ApplicationDeployment role to MegMeg is responsible fordeploying softwareMeg has a limited view
  • 9. Unified compliance-settings mgmt across servers, desktops laptops, and mobiledevicesSimplify administrator experience Role-based administration built in “Compliance Settings Management Role” Browse gold system when creating configuration items Simplified Baseline creation experience Re-use of settings across CI boundaryDeployment of Baselines User and Device targeting of Baselines Define compliance SLAs for Baseline deployments and generate Alerts True per user evaluation and remediationMonitoring Baseline deployment compliance status In Console monitoring Updated reports to include remediation, conflict and error reportingAutomatic remediation (aka DCM “set”)CI revisioning and change controlMigration of existing Configuration Manager 2007 Baselines and CIs
  • 10. Targeting enterprises where: Windows clients and servers predominate UNIX/Linux management is important due to security, regulatory requirements Simplification and cost drivers demand a unified management solutionTargeting servers & server scenarios, not desktops &client scenariosMost comprehensive solution for heterogeneousenvironments,but is not “best-of-breed” for a specific UNIX/Linux OS ConfigMgr for UNIX/Linux “Just a “Best-of- Check-Box” Breed”
  • 11. Feature PlanDiscovery - AD and Network Push Install of Native Client Hardware Inventory Inventory of Installed Software (OS Native - like ARP)Software Dist: Classic Software and Patch InstallationMixed and Native Mode Security Software/File Inventory ?OS Deployment with OS native tools ?User Centric Software Installation Desired Configuration Management (DCM)Remote Control Internet-Based Client Management (IBCM) 
  • 12. Milestone Date Comment Start Nov-10 Project kicked-off. Development started.MMS 2011 Mar-11 Announce UNIX/Linux at MMS 2011 CTP Fall 2011 Red Hat 5 & Solaris 10 servers only Beta Early 2012 All supported OS variants RTW SP1 Timeframe On display at MMS 2012
  • 13. Offline Servicing of Images Support for Component Based Servicing compatible updates Uses updates already approvedBoot Media Updates Hierarchy wide boot media – no longer need one per site Unattended boot media mode – no longer need to press “next” Use pre-execution hooks to automatically select a task sequence – no longer see many optional task sequencesUSMT 4.0 - UI integration and support for hard-link, offline and shadow copy features
  • 14. IS BACK!
  • 15. 2012 willConfigMgr Create tiered primary sitesfor scale outLAN/WAN for: Primaries are needed to optimize onlyallow admins2007 -content distributionto minimize or -client inventoryscenarios -agent statusconsolidatewhere aConfigMgr Create separatecontent distribution:unique Options for primary sites (or hierarchies!) for:2007primary -Secondaries -different server and desktop client agentinfrastructuresettings -DPs with throttling/schedulingcould be -BranchCache,used Create a primarysettings configurable by collection see Client agent site boundary so admin roles only the data they need to see for their job Data Segmentation via Role Based Administration