Microsoft System Center Configuration Manager for Education Herman Arnedo
f you are looking at deploying Microsoft SCCM 2012 / Intune or want to make the most of your existing installation, System Professional will be running a 'Configuration Manager as a Service' 'hands-on' technical session at our London office in Shad Thames, SE1 on Weds 20th January.
This event is designed exclusively for technical staff in UK Education establishments (Schools and Colleges).
The session will be hosted by Herman Arnedo Mahr (Microsoft MCT), it runs from 9.30am - 1.30pm and will cover the following topics (including live demos);
Application Management
Packaging and Deployment
Operating System Deployment
Full Support of Windows 10
New Bare Metal / In Place Upgrade / Refresh / Replace
Offline Servicing OS Images
Patch Management
Microsoft Updates
3rd Party Software Updates
IT Asset Management
Hardware Inventory
Software Inventory
Asset Intelligence
Software Metering
Compliance Settings
Mobile Device Management with Microsoft Intune
Mobile Application Management
Protect data and devices
Retire data and devices
NB: Due to limited availability (6 x delegates per session only), these events are arranged for end user organisations only.
FAQs
What are my transport/parking options getting to the event?
London Bridge is the nearest tube / rail station. It is then a 15 mins walk to Maguire Street. Our offices are located next to The Design Museum in Shad Thames.
Do I have to bring my printed ticket to the event?
No - we will contact you beforehand to confirm your attendance on the day.
WHEN
Wednesday, 20 January 2016 from 09:30 to 13:30 (GMT) - Add to Calendar
WHERE
System Professional Ltd - The Clove Gallery . Maguire Street. London SE1 2NQ GB - View Map
Microsoft System Center Configuration Manager for Education Herman Arnedo
f you are looking at deploying Microsoft SCCM 2012 / Intune or want to make the most of your existing installation, System Professional will be running a 'Configuration Manager as a Service' 'hands-on' technical session at our London office in Shad Thames, SE1 on Weds 20th January.
This event is designed exclusively for technical staff in UK Education establishments (Schools and Colleges).
The session will be hosted by Herman Arnedo Mahr (Microsoft MCT), it runs from 9.30am - 1.30pm and will cover the following topics (including live demos);
Application Management
Packaging and Deployment
Operating System Deployment
Full Support of Windows 10
New Bare Metal / In Place Upgrade / Refresh / Replace
Offline Servicing OS Images
Patch Management
Microsoft Updates
3rd Party Software Updates
IT Asset Management
Hardware Inventory
Software Inventory
Asset Intelligence
Software Metering
Compliance Settings
Mobile Device Management with Microsoft Intune
Mobile Application Management
Protect data and devices
Retire data and devices
NB: Due to limited availability (6 x delegates per session only), these events are arranged for end user organisations only.
FAQs
What are my transport/parking options getting to the event?
London Bridge is the nearest tube / rail station. It is then a 15 mins walk to Maguire Street. Our offices are located next to The Design Museum in Shad Thames.
Do I have to bring my printed ticket to the event?
No - we will contact you beforehand to confirm your attendance on the day.
WHEN
Wednesday, 20 January 2016 from 09:30 to 13:30 (GMT) - Add to Calendar
WHERE
System Professional Ltd - The Clove Gallery . Maguire Street. London SE1 2NQ GB - View Map
What is Microsoft Azure used for?-Microsoft azure Zabeel Institute
Microsoft Azure, commonly described as Azure, is a cloud computing solution created by Microsoft for building, screening, deploying, and taking care of applications and services through Microsoft-managed data centers.
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
The cloud is all the rage. Does it live up to its hype? What are the benefits of the cloud? Join me as I discuss the reasons so many companies are moving to the cloud and demo how to get up and running with a VM (IaaS) and a database (PaaS) in Azure. See why the ability to scale easily, the quickness that you can create a VM, and the built-in redundancy are just some of the reasons that moving to the cloud a “no brainer”. And if you have an on-prem datacenter, learn how to get out of the air-conditioning business!
In this presentation, I have talked about Resiliency in Azure.
I have also talked about how you can do Azure VM Improvements and Maintenance. Along with that, I have also talked about Disaster Recovery with ASR.
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
Simplify management of apps & devices
Microsoft Intune provides mobile device management, mobile application management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure.
Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...Morgan Simonsen
Presentation given at the Nordic Infrastructure Conference (NIC) 2015 about migrating servers to Azure IaaS using the Microsoft Migration Accelerator (MA).
Azure Active Directory (AD) is a directory as a service on Microsoft Azure. More than the cloud identity Azure AD provides a platform to build cloud applications with multi tenancy support. A flexible authentication systems which enables developers to leverage the cloud identity model and develop applications at ease. The session will walk you through on the basics of Azure AD and how to develop .NET applications using Azure AD.
And here is the file I have distributed to my friends of net-workers. This PDF file explains the installation of Active Directory, SQL Server 2008, SQL Server 2012 and finally the step by step installation of the System Center Configuration Manager 2012 R2. This document also describes the prerequisite configuration required for the successful completion of installation of SCCM 2012 R2.
Administering and configuring System Center Configuration Manager 2012 R2 SP1Unitek Eduation
-Configuring and deploying SCCM 2012 R2
-Data Quering using WQL and gathering collections
-Configuring Software and Hardware Inventory, asset intelligence and software metering.
What is Microsoft Azure used for?-Microsoft azure Zabeel Institute
Microsoft Azure, commonly described as Azure, is a cloud computing solution created by Microsoft for building, screening, deploying, and taking care of applications and services through Microsoft-managed data centers.
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
The cloud is all the rage. Does it live up to its hype? What are the benefits of the cloud? Join me as I discuss the reasons so many companies are moving to the cloud and demo how to get up and running with a VM (IaaS) and a database (PaaS) in Azure. See why the ability to scale easily, the quickness that you can create a VM, and the built-in redundancy are just some of the reasons that moving to the cloud a “no brainer”. And if you have an on-prem datacenter, learn how to get out of the air-conditioning business!
In this presentation, I have talked about Resiliency in Azure.
I have also talked about how you can do Azure VM Improvements and Maintenance. Along with that, I have also talked about Disaster Recovery with ASR.
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
Simplify management of apps & devices
Microsoft Intune provides mobile device management, mobile application management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure.
Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...Morgan Simonsen
Presentation given at the Nordic Infrastructure Conference (NIC) 2015 about migrating servers to Azure IaaS using the Microsoft Migration Accelerator (MA).
Azure Active Directory (AD) is a directory as a service on Microsoft Azure. More than the cloud identity Azure AD provides a platform to build cloud applications with multi tenancy support. A flexible authentication systems which enables developers to leverage the cloud identity model and develop applications at ease. The session will walk you through on the basics of Azure AD and how to develop .NET applications using Azure AD.
And here is the file I have distributed to my friends of net-workers. This PDF file explains the installation of Active Directory, SQL Server 2008, SQL Server 2012 and finally the step by step installation of the System Center Configuration Manager 2012 R2. This document also describes the prerequisite configuration required for the successful completion of installation of SCCM 2012 R2.
Administering and configuring System Center Configuration Manager 2012 R2 SP1Unitek Eduation
-Configuring and deploying SCCM 2012 R2
-Data Quering using WQL and gathering collections
-Configuring Software and Hardware Inventory, asset intelligence and software metering.
SSDN Technology is a training institute located in Delhi Gurgaon, NCR & India which offer best MCSA - SQL SERVER 2012 training by our experienced trainer. We are providing live project training with full lab facility. For more details for a bright future call us at +91-9999-111-686.
http://www.ssdntech.com/sql-server-training.aspx
Explore the components of a simple web app and then see how Applications Manager helps you discover and map relationships between your apps and take a look at the wide range of business critical metrics monitored for every app/ server in your network. We will also explore how to logically group your apps so as to achieve maximum productivity from your IT department.
Microsoft Azure and Windows Application monitoringSite24x7
Monitor all your Microsoft applications and Azure services from a single console.
About Site24x7:
Site24x7 offers unified cloud monitoring for DevOps and IT operations. Monitor the experience of real users accessing websites and applications from desktop and mobile devices. In-depth monitoring capabilities enable DevOps teams to monitor and troubleshoot applications, servers and network infrastructure including private and public clouds. End user experience monitoring is done from 50+ locations across the world and various wireless carriers. For more information on Site24x7, please visit http://www.site24x7.com/.
Forums: https://forums.site24x7.com/
Facebook: http://www.facebook.com/Site24x7
Twitter: http://twitter.com/site24x7
Google+: https://plus.google.com/+Site24x7
LinkedIn: https://www.linkedin.com/company/site...
View Blogs: http://blogs.site24x7.com/
Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service
NPS provides support for the Remote Authentication Dial-In User Service (RADIUS) protocol, and can be configured as a RADIUS server or proxy. Additionally, NPS provides functionality that is essential for the implementation of Network Access Protection (NAP). This module explains how to install, configure, and troubleshoot NPS.
Lessons
Installing and Configuring a Network Policy Server
Configuring RADIUS Clients and Servers
NPS Authentication Methods
Monitoring and Troubleshooting a Network Policy Server
Lab : Configuring and Managing Network Policy Server
Installing and Configuring the Network Policy Server Role Service
Configuring a RADIUS Client
Configuring Certificate Auto-Enrollment
Configuring and Testing the VPN
After completing this module, students will be able to:
Install and configure NPS.
Configure RADIUS clients and servers.
Describe NPS authentication methods.
Monitor and troubleshoot NPS.
Project oriented online realtime training on sqlsssql
SQL Server Masters is known to be a reputed consulting firm for SQL SERVER related
Courses with top talented database professionals and software engineers
coming from some of the most established and most successful software developmentand
technology consulting firms around the globe for providing a tailored-made solutions to
their clients at the very best of their knowledge and liable time.
SQL Server Masters is known to be a reputed consulting firm for SQL SERVER related
Courses with top talented database professionals and software engineers
coming from some of the most established and most successful software developmentand
technology consulting firms around the globe for providing a tailored-made solutions to
their clients at the very best of their knowledge and liable time.
eMagic is an all-in-one solution to manage all the aspects of a server deployed within a Data Center. It is an automated system designed to make server management easy, efficient and quick. All the server logs and consumption details can be viewed through a GUI interface.
Now you can handle all aspects of server management like trouble shooting, bandwidth consumption monitoring, OS installation and server reboots with just a few clicks. eMagic allows you to manage your servers without contacting system administrator or ESDS for support services to cater to issues like Reboot, Power on, KVMoIP, IP requests.
eMagic has been fully designed and developed by the R&D Team at ESDS after in-depth research and evaluation. eMagic enables organizations to automatically manage and monitor servers and take corrective actions if required. This significantly eliminates chances of mismanagement and errors thus saving overall costs and efforts.
[Robert Vončina] With SharePoint 2016 there are a few new things that makes configuring SharePoint 2016 for BI a bit more challenging. This session will display how to configure your SharePoint 2016 environment for authentication delegation with Kerberos for different BI tools.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
2. SCCM 2016 R2
Administering and configuring System Center
Configuration Manager 2016 R2 SP1
Topics:
• Configuring and deploying SCCM 2016 R2
• Data Querying using WQL and gathering collections
• Configuring Software and Hardware Inventory, asset intelligence and
software metering.
3. Overview of the System Center 2016 Environment
Single admin console
Manage clients on
the organizational
network and the Internet
Configuration Manager
4. Overview of System Center 2016 R2
Application
Management
Software Update
Management
Operating System
Deployment
Content
Management
Asset
management
Hardware and
Software Inventory
Asset Intelligence
Software Metering
Remote Management
Reporting
Monitoring
Role-Based
Administration
Administrative features
Endpoint Protection
Compliance Settings
Power Management
Client
Health
Change management
5. SCCM Newer Features
• Support for clients that run Windows 8, Windows 8.1, Windows RT, Windows
8.1 RT, Windows 10, iOS, Mac OS X, and Android
• Support for Windows Server 2016 and Windows Server 2016 R2 to host site
system roles
• Support for SQL Server 2016 to host Configuration Manager databases
• Support for merging of System Center 2016 R2 Configuration Manager
hierarchies
• New site system roles for the certificate registration point
• Bulk reassignment of clients to alternate primary sites
• Configuration Manager Windows PowerShell cmdlets
6. Overview of the SCCM Hierarchy
SQL database
Central administration site
SQL database
Primary site
SQL database SQL database
SQL
database
Secondary
site
Primary site Primary site
• Each site is identified by a unique three-character code
• The central administration site is for reporting and
management only
• Primary sites can be parents of secondary sites only
• Secondary sites now have their own database
7. Site System Roles in Configuration Manager
• Default site system roles are installed when Configuration Manager setup is run
• Optional site system roles are added post-installation to support specific
features
Default site system roles
• Site server
• Site system
• Component server
• Site database server
• SMS Provider: does not display in the
console
Optional site system roles
• Certificate registration point
• Distribution point
• Management point
• Reporting services point
• Software update point
• State migration point
8. What Is a Central Administration Site?
A central administration site:
• Is required to use a multi-site hierarchy
• Is used for administration and reporting
• Requires an SQL database
• Does not process client data
• Does not support client assignment
• Has a limited number of site system roles
9. What Is a Primary Site?
• To use Configuration Manager, you must have at least one primary
site
• Primary sites:
• Can be in a child relationship to a central administration site, which
can only be set during installation
• Cannot be a child to another primary site
• Manage clients in well-connected networks
• Require a SQL Server database
• Replicate their data to a central administration site if part of a
hierarchy
• Support client assignment
• Consist of one or more systems that host various site system roles
10. What Is a Secondary Site?
A secondary site:
• Is optional
• Must be in a child relationship to a primary site, which is set in the secondary site during
installation
• Is used when you need to control network bandwidth
• Requires SQL Server Express or a SQL Server database to store configuration information
• Replicates its collected client data to its parent site by using file-based replication
• Does not support client assignment
• Consists of one or more systems that host various site system roles
11. Small- to Medium-Sized Organization
Small- to medium-sized organizations often use a single
primary site that includes:
• Mandatory:
• Site server
• Site database
• Management point
• Distribution point
• Optional:
• Reporting services point
• Software update point
• Fallback status point
• Other roles as required
Single Server
with All Site
Roles
12. Medium- to Large-Sized Organization
Medium- to large-sized organizations use primary and
secondary sites
• A primary site typically includes:
• Site server
• Site database
• Management point
• Distribution point
• Reporting services point
• Software update point
• Fallback status point
• Other roles as required
• Secondary sites include:
• Management point
• Distribution point
Site Server
Site
Database
Software Update
Point
Secondary
Site Server
Remote
Distribution
Point
13. Configuration Manager in a Global Organization
Example of a complex hierarchy implementation:
Central Administration Site
Primary Sites
Secondary Sites
Remote Distribution
Point
14. How Data Flows and Replicates in a Hierarchy
Primary
Site
Central Administration
Site
Primary
Site
Secondary
Site
Global Data
Site Data
Global data Site data
• Alert rules
• Client discovery
• Collections rules and count
• Configuration items metadata
• Deployments
• Operating system images
• Package metadata
• Program metadata
• Site control file
• Site security objects
• Software updates metadata
• System resource list
• Alert messages
• Asset intelligence CAL tracking
• Client Health data
• Client Health history
• Collection membership results
• Component and Site Status Summarizers
• Hardware inventory
• Software distribution status details
• Software inventory and metering
• Software updates site data
• Status messages
15. Considerations
Install a stand-alone primary site when you have:
Install secondary sites when you want:
Install multiple primary sites in a hierarchy when you have:
• A centralized administration approach
• No more than 100,000 clients
• More clients than can be managed using a single primary site
• Multiple administrative teams that require local connectivity for the Configuration Manager consoles
• A large number of remote locations
• Export regulations on content
• To offload the client communication from the primary site
• To provide tiered content routing between secondary sites with the same parent
16. Planning a Multiple-Site Hierarchy
A central administration site:
A primary site:
A secondary site:
• Supports up to 250 secondary sites
• Supports up to 250 distribution points
• Supports up to 10 management points
• Supports up to 50,000 clients when SQL Server is on the site server
• Supports up to 100,000 clients when SQL Server is on a separate computer
• Supports up to 25 child primary sites
• Supports up to 400,000 clients in the hierarchy when using SQL Server Enterprise for the site database
• Supports up to 50,000 clients in the hierarchy when using SQL Server Standard for the site database
• Supports up to 250 distribution points
• Supports a single management point located on site server
• Supports communications from up to 5,000 clients
17. Overview of the Administration Tools
• Configuration Manager console:
• Primary method of managing a Configuration Manager deployment
• You can install it on an administrator’s client computer
• Configuration Manager client:
• Trigger updates and retrieve information about individual client computers
• Windows PowerShell Configuration Manager cmdlets:
• Enable you to script Configuration Manager activities
• Orchestrator runbooks:
• Enable using runbook automation to perform Configuration Manager tasks
18. Using the Configuration Manager Console
Ribbon
Navigation
Pane
Results
Pane
Preview
Pane
Workspac
es
19. Overview of Client Installation Methods
• The client deployment installation methods include:
• Client push installation
• Group Policy installation
• Software update point installation
• Manual installation
• Logon script installation
• Upgrade installation (software deployment)
• Operating system deployment
• Computer imaging
20. Device Requirements to Support the Client Agent
Supported Windows-based clients include:
• Windows XP SP3, Windows XP x64 SP2, Windows Server 2003 SP2, and newer operating systems
Prerequisite software includes:
• Windows Installer version 3.1.4000.2435 or newer
• Installation process installs these additional prerequisites before client installation:
• Windows Update Agent
• Microsoft Core XML Services
• Microsoft Visual C++ Redistributable
• Microsoft Policy Platform
• Microsoft Silverlight
• Microsoft .NET Framework 4 Client
21. Considerations for Virtual Desktop Infrastructure
• RDS
• Configuration Manager client agent is installed only once on the Remote Desktop Session Host
• All features are supported
• Private virtual machines
• Configuration Manager client agent is installed in each virtual machine
• All features are supported
• Pooled virtual machines
• Configuration Manager client agent is installed on each virtual machine
• Software inventory, hardware inventory, and software metering data may not be relevant
22. Supporting Internet-Based Clients
• Considerations for supporting Internet-based clients:
• Internet-based clients require a PKI
• Microsoft Certificate Services certificate templates can simplify certificate enrollment
• All systems involved must trust the root CA
• Internet-facing roles require a certificate
• Client systems use a certificate for authentication
Secure web services
All utilized IIS-based site services
except fallback status point
(not an HTTPS service)
without PKI-issued server certificate
HTTPS connection
Client system
on Internet
with PKI-issued
client certificate
Primary site
Root CA
Issuing CA
PKI infrastructure
23. Supporting Mobile Devices
• Supported mobile devices include:
• Windows Phone 8, Windows 10, Windows RT, and iOS devices
• Windows Mobile 6.0 or newer
• Windows CE 5.0 or newer
• Nokia Symbian Belle
• Limited support for devices that use ActiveSync
• Android
• Client certificates are required on mobile devices for full support
• You can support and manage mobile devices by using:
• Windows Intune connector
• Configuration Manager client agent
• Legacy Configuration Manager client agent
• Exchange connector
24. Supporting Workgroup-based Clients
The prerequisites that workgroup-based computers must meet include:
• The Configuration Manager client agent must be installed manually on each workgroup-based
computer
• A network access account must be configured
The features that workgroup-based computers do not support include:
• Client push installation
• Targeting users for application deployment
• Global roaming
• Using AD DS to locate site systems
• Active Directory discovery
25. Supporting Mac Computers
The following features are supported in Mac OS X computers:
• Hardware inventory:
• Viewed in Resource Explorer
• Used to create queries, collections, and reports
• Software deployment. Deploy software packages in the following formats:
• Mac OS Installer Package (.PKG)
• Mac OS X Application (.APP)
• Apple Disk Image (.DMG)
• Meta Package File (.MPKG)
• Compliance settings. Configuration Manager supports:
• .plist files
• Shell scripts
26. Supporting Linux-based and UNIX-based Computers
The supported operating systems include:
• Red Hat Enterprise, Solaris, SUSE Linux Enterprise Server, Debian,
CentOS, Ubuntu Server, Oracle Linux
• IBM AIX, HP-UX
Linux-based and UNIX-based computers support the following features:
• Hardware inventory:
• Viewed in Resource Explorer
• Used to create queries, collections, and reports
• Software deployment:
• User interaction is not supported
• Maintenance windows are fully supported
29. Data Query
• Data Queries extract information related to
resource discovery or inventory data.
• In general the primary purpose of Data Queries
are to build collections.
30. Status Message Query
Status Message Query has a very specific use. The site
status and component status nodes show status messages
related to a very specific site system or component.
Although there are some filtering options these may not be
sufficient when troubleshooting an issue. In such case you
can use the status message queries to create custom
queries for status messages including status messages
from client.
The primary purpose of status message queries are to
locate stored status messages.
32. To create a data query:
Managing Data Queries
Import an existing query or build a query from scratch
2
Edit the query statement
3
Add search criterion on the Criteria tab
5
Complete the settings on the General page of the
Create Query Wizard
1
Edit the General tab of the query statement properties
to specify the criteria to display
4
When creating criterion, use the Values button
to display the related data currently stored in the
database
6
33. What Is Inventory Collection?
Inventory collection is:
• The process of gathering information that describes the hardware and
software installed on a client computer
• Configured by using client settings for the hierarchy or assigned on a per-
collection basis
Software
inventory data
Hardware
inventory data
Asset
intelligence data
34. Management Tasks That Use Inventory Data
Uses of hardware and software inventory data include:
• Building queries based upon hardware configuration or installed
software
• Building collections on the basis of queried inventory results
• Creating reports to display hardware configuration or installed software
details
• Maintaining corporate standards
• Troubleshooting client problems
• Collecting files (software inventory only)
35. The Process of Inventory Collection
View inventory information at a site after its
database is updated by this process:
1. Client gets settings and
collects inventory
2. Deliver data to
management point
3. Deliver data to site server
4. Update site database
5. Replicate to the central administration site
Site Database
Server
Site
Server
Management
Point Client
36. How Is Hardware Inventory Collected?
• A hardware inventory obtains information by
querying:
• WMI database on Windows client computers
• CMI database named OMI on Linux, UNIX, and
Mac OS X
•The hardware inventory agent collects:
• An initial full hardware inventory
• Subsequent delta inventories
38. How Is Software Inventory Collected?
The software inventory process:
• Collects data directly from files by reading the file header information
• Collects file system details even from unknown files that may not have
information in their file header
• Collects copies of files that you specify and stores them on the site server
• Enables you to view collected inventory and file information by using
Resource Explorer, or view software inventory information in reports
39. Software Inventory File Types
• To configure new software
inventory rules:
• Create a new inventory rule
• Type the file name or variable
• Specify the location
• Specify whether to exclude
encrypted and compressed
files
• Specify whether to exclude
files in the Windows directory
• Specify the reporting detail
for all rules
40. Overview of Asset Intelligence
Asset Intelligence:
• Extends hardware inventory
• License reporting
• Supports ISO/IEC 19770-2 tags
• Collect information about App-V apps
41. Benefits of Asset Intelligence
Asset Intelligence provides the following benefits
over software inventory:
• More accurate representation of software titles present on managed
computers.
• Information about the license usage for specific products, rather than just
information about the software itself.
• Asset intelligence retrieves information about installed software through the
Hardware Inventory Client Agent.
42. The Asset Intelligence Catalog
Asset Intelligence catalog
features:
• Includes more than 500,000
software titles
• Enables import of software license
information
• Provides information about hardware
requirements for some titles
• Is updated periodically through
System Center Online
43. Configuring Data Collection for Asset Intelligence
Configuring Asset Intelligence can include the following
tasks:
• Enabling Hardware Inventory and software metering
• Enabling Asset Intelligence inventory reporting classes
• Enabling Windows Event Log settings
• Importing software license information
• Installing an Asset Intelligence synchronization point
• Configuring Asset Intelligence maintenance tasks
• Configuring Asset Intelligence security
44. Overview of Software Metering
• Software metering is the process of gathering detailed
data on program usage from client computers in a
Configuration Manager site
• Types of data collected:
• Program usage information
• File information
• Program information
46. Configuring the Software Metering Agent and Rules
To create a software metering rule:
Navigate to the Software Metering node
1
Create a new software metering rule
2
Provide relevant information for the program
that you want to meter
3
Apply the rule to other sites if applicable
4