38,99 €
Get up to date quickly with clear, expert coverage of SCCM 2016 Mastering System Center Configuration Manager provides comprehensive coverage of Microsoft's powerful network software deployment tool, with a practical hands-on approach. Written by Santos Martinez, Peter Daalmans, and Brett Bennett, this guide walks you through SCCM 2016 with in-depth explanations anchored in real-world applications to get you up to speed quickly. Whether you're planning a new installation or migrating from a previous version of Configuration Manager, this book provides clear instruction and expert insight to get the job done right. Fully aligned with the latest release, the discussion covers the newest tools and features with examples that illustrate utility in a variety of contexts. System Center Configuration Manager (formerly SMS) is one of Microsoft's flagship products; the 2016 release has been updated with better Windows 10 and Windows Server 2016 compatibility, improved tools for managing non-Microsoft mobile devices in the cloud, and more. This book provides start-to-finish coverage and expert guidance on everything you need to get your system up to date. * Deploy software and operating systems * Automate processes and customize configurations * Monitor performance and troubleshoot issues * Manage security in the cloud and on Virtual Machines SCCM 2016 improves your ability to handle the bring-your-own-device influx in managing mobile, streamlining the latest hiccup right into the everyday workflow. Mastering System Center Configuration Manager provides the practical coverage you need to get up and running seamlessly.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 1276
Veröffentlichungsjahr: 2016
Santos Martinez
Peter Daalmans
Brett Bennett
Senior Acquisitions Editor: Kenyon Brown Development Editor: Kim Wimpsett Technical Editor: Matt Hinson Production Editor: Rebecca Anderson Copy Editor: Elizabeth Welch Editorial Manager: Mary Beth Wakefield Production Manager: Kathleen Wisor Executive Editor: Jim Minatel Book Designers: Maureen Forys, Happenstance Type-O-Rama; Judy Fung Proofreader: Amy Schneider Indexer: Ted Laux Project Coordinator, Cover: Brent Savage Cover Designer: Wiley Cover Image: ©Thomas Northcut/Getty Images, Inc.Copyright © 2017 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published by John Wiley & Sons, Inc. Indianapolis, Indiana Published simultaneously in Canada
ISBN: 978-1-119-25845-2 ISBN: 978-1-119-25894-0 (ebk.) ISBN: 978-1-119-25846-9 (ebk.)
Manufactured in the United States of America
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.
Library of Congress Control Number: 2016960166
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
I want to dedicate this book to the following: my wife Karla; you are my soul mate and I want to grow old with you. To my kids Bryan and Naomy, I hope this gives you some inspiration one day of what you can achieve. And finally to all my family and friends for their support in my craziness. —Santos Martinez
I dedicate this book to my father; since 1999 still deeply missed. To my mother, for all of your love and support in my life. To my girlfriend Samantha, our son Stef, and our upcoming newborn; thanks for putting up with me and for all of your love and support while writing this book. Love you all! —Peter Daalmans
I dedicate this book to my family and friends, and I greatly appreciate the support you provide. —Brett Bennett
I want to thank my colleagues across Microsoft for their support on this book, and our technical editor Matt Hinson for his commitment and great work. Thanks to the contributor authors, Nickolaj Andersen, Cliff Hobbs, and Alessandro Cesarini, for sharing some of their knowledge and experience with the readers.
To my coauthors, Brett Bennett and Peter Daalmans, thanks for staying on the project and giving the best of yourselves; I know the readers will enjoy learning from both of you.
Thanks to my friends for their support on the book and for providing a great elevator pitch to your customers.
Finally, I want to thank all the Configuration Manager and Enterprise Mobility + Security community, which has always been so passionate about the technology and willing to help us improve our writing. Let’s keep the conversation going.
—Santos Martinez
Special thanks to my family and friends. I had to balance my time with you with my commitment to writing this book. I couldn’t have done this without you guys!
I also want to thank Wiley/Sybex for giving me the opportunity to write this second book. It was again a great pleasure to work with the Wiley team; I’m looking forward to any new project! Also many thanks to the writing and editorial teams, you all rock!
Furthermore, many thanks to the Configuration Manager product team, who created this great product, and Cathy Moya especially, our great and dedicated MVP lead from within the product team. They all give us the opportunity to learn as much as we want about Configuration Manager and the Enterprise Mobility + Security products.
Also special thanks to my employer and colleagues at IT-Concern, for giving me the space to speak at conferences and to be of value for the community.
Finally, many thanks to the Configuration Manager and Enterprise Mobility communities and in particular all my fellow Enterprise Mobility MVPs; thanks for your support.
—Peter Daalmans
I would like to thank my wife Rosalie, and my children Brittany, Jamie, and Justin for the support they have provided me in my career. I would also like to thank Microsoft, both as my employer for the past 10 years and also for the amazing products they develop that have kept me gainfully employed for the past 30 years. I would also like to thank the coauthors Santos and Peter, the reviewers, and the entire team at Sybex/Wiley who helped put this book together.
—Brett Bennett
Santos Martinez was born in Caguas, Puerto Rico, in 1982, and grew up in Caguas. Santos has more than 16 years of experience in the IT industry. He has worked on major implementations and in support of Configuration Manager and Enterprise Mobility + Security for many customers in the United States and Puerto Rico. Santos was a Configuration Manager engineer for a Fortune 500 financial institution and an IT consultant before joining Microsoft. For the Fortune 500 companies, he helped with the implementation and support of more than 200 Configuration Manager Site Servers and support of more than 300,000 Configuration Manager and Intune device clients worldwide.
Santos was a SQL Server MVP from 2005 to 2009 and then a Configuration Manager MVP from 2009 to 2011. He is well known in the Microsoft communities as a mentor for other MVPs and Microsoft FTEs and for helping other IT community members. He has also participated in Midwest Management Summit, and Microsoft Ignite as a technical expert for Configuration Manager, SQL Server, and Microsoft Intune. Santos is also a former Puerto Rican martial arts champion and currently holds a fourth-degree black belt in TaiFu Shoi Karate Do; he earned the title of Shihan Sensei.
Santos and Karla, a pastry chef, have been married for 16 years and have two children, Bryan Emir and Naomy Arwen.
Santos currently is a senior premier field engineer for Microsoft in security infrastructure.
You can get in touch with Santos via his Twitter account @ConfigNinja or his blog at http://aka.ms/ConfigNinja.
Peter Daalmans is a senior technical consultant at IT-Concern, a Gold Certified Microsoft partner in the Netherlands. Peter has been awarded as an Enterprise Mobility MVP every year since 2012 for his work in the community. Peter worked with deployment tooling from Microsoft competitors since 1998; in 2005 Peter discovered (BDD) Business Desktop Deployment and (SMS) System Manamagent Server 2003 deployment tooling and has embraced them since then. In recent years, numerous (international) deployment projects have crossed Peter’s path.
Peter is one of the founders of the Windows Management User Group Netherlands and shares his Configuration Manager and Microsoft Intune experience with the community via his blog (http://ConfigMgrBlog.com).
Besides speaking at the Windows Management User Group Netherlands, Peter speaks every year at several events like user group meetings in Europe, TechDays Netherlands, and ExpertsLive. In 2013 he had the honor to speak at TechEd Australia and TechEd New Zealand. Peter has also been a speaker at conferences like BriForum in London, Denver, and Boston; IT/Dev Connections; and the Midwest Management Summit.
Peter resides in beautiful Breda, in the south of the Netherlands, with his girlfriend Samantha and his son Stef, with a newborn due Christmas 2016. In addition to his daily work, he is the chairman of the NAC Museum Foundation, which preserves the history of the soccer club NAC Breda. Australia is also a huge passion; he travels Down Under whenever he gets the chance to sniff the outback and the Aussie lifestyle.
You can reach Peter via @pdaalmans and [email protected] or look at https://ref.ms/aboutme for the latest information.
Brett Bennett lives in Texas and has been with Microsoft for over 10 years, currently as a Senior Premier Field Engineer. Brett has been in the computer industry for almost 30 years and has used every version of SMS/SCCM since SMS 1.0 beta was released in 1994. He has been involved with the development of several technical books over his career and has spoken at several technical conferences.
Brett is married to Rosalie Bennett and has three children (Brittany, Jamie, and Justin), three dogs (Yogi, Boo Boo, and Reeses), and one granddog (Rue). Brittany and Jamie are both graduates of Texas A&M and are now in the workforce, and Justin is currently finishing up his degree at A&M. Brett enjoys driving his Dodge Challenger, riding bikes, playing guitar, expanding his vinyl collection, and preparing tasty food in his Weber smoker (especially Texas-style beef brisket). You can reach Brett at [email protected], @texasmcse on Twitter, or on his blog at https://blogs.technet.microsoft.com/breben.
Nickolaj Andersen is a senior consultant at Lumagate in Sweden and has made a name for himself for all the tools and scripts that he has shared with the community over the past years. Experience-wise, he has been in the IT industry for almost 10 years. Nickolaj is originally from Denmark but moved to Sweden with his mother when he was six years old. Today, Nickolaj lives in Stockholm with his lovely wife and daughter. In 2015, Nickolaj was awarded PowerShell Hero by the PowerShell.org community, for his extensive PowerShell contributions and scripts related to Configuration Manager.
Cliff Hobbs is the founder (in 2003) and CEO of FAQShop.com, one of the longest running websites covering System Management Server/Configuration Manager. In 2004 Microsoft awarded Cliff their MVP status in SMS; he was the first recipient from the UK and has received the award every year since. Cliff’s passion is writing and sharing the knowledge he has gained working with the product since SMS 2.0 SP2 back in 1998. He has worked for some of the largest companies in the world, including Microsoft, HP, and Electronic Data Systems (EDS). Although Cliff currently lives in the UK with his wife Necy and his sons, he is looking for an opportunity that will allow him to emigrate with his family to Lisbon in Portugal, where he met his wife. Feel free to contact Cliff through FAQShop, where you can see the various ways Cliff can help you get the most from Configuration Manager.
Alessandro Cesarini is a premier field engineer at Microsoft and is based in Madrid. With more than 20 years of IT experience in multinational environments (Spain, the United Kingdom, France, Austria, Hungary, Poland, and Italy), he is helping customers with migration and deployment of Windows using Windows Assessment and Deployment Kit (ADK), Microsoft Deployment Toolkit (MDT), and System Center Configuration Manager. When he is not working or traveling, Alessandro is riding his bicycle, cooking at home, playing squash or Pádel, and spending time with his wife Eva.
Introduction:
The Mastering Series
What This Book Covers
What You Need to Get the Most Out of This Book
How We Structured This Book
Errata
Chapter 1: Overview of System Center Configuration Manager and Microsoft Intune:
A Brief History of Configuration Manager
Configuration Manager Features
Microsoft Intune Features
Overview of the New Servicing Model for Configuration Manager
Overview of the Servicing Model for System Center Configuration Manager
Summary
Chapter 2: Planning a Configuration Manager Infrastructure:
Gathering Deployment Intelligence
Planning the Configuration Manager Environment
Designing Your Configuration Manager Environment
The Bottom Line
Chapter 3: Migrating to Configuration Manager:
Introducing Migration
Migration Functionality in Configuration Manager
Planning a Migration
Performing the Migration
The Bottom Line
Chapter 4: Installation and Site Role Configuration:
Understanding Site Types
Implementing Site Servers
Installing Site System Roles
Understanding Configuration Manager Site System Roles
The Bottom Line
Chapter 5: Client Installation:
Creating Client Settings
Discovering Network Objects
Configuring Boundaries and Boundary Groups
Client Installation Methods
Verifying Client Installation
Troubleshooting a Client Installation
Ensuring Client Health
The Bottom Line
Chapter 6: Client Health:
Understanding the Client Health Mechanism
Client Health Evaluation: Results
The Bottom Line
Chapter 7: Application Deployment:
What’s New in Application Deployment?
Dependencies for Application Deployment
Elements of Application Deployment
The Application Deployment Process
The Bottom Line
Chapter 8: Software Updates:
Highlights in Software Updates
Prerequisites for Software Updates
Elements of Software Updates
The Software Update Process in Configuration Manager
Planning to Use Software Updates in Configuration Manager
Configuring Software Updates
Preparing Software Updates for Deployment
Deploying Software Updates with the Deploy Software Updates Wizard
Using System Center Updates Publisher
Monitoring Software Update Deployments
Windows Update Servicing
The Bottom Line
Chapter 9: Operating System Deployment:
What’s New in Operating System Deployment
Planning for OSD with Configuration Manager
Deployment Process
Preparing Configuration Manager for OSD
Adding Operating System Source
Developing a Task Sequence for Creating a Capture Image
Capturing an Operating System Image
Deploying an Image
Upgrading Operating System to Windows 10
Deploying the Operating System on Bare Metal
Installing Device Drivers into OSD
Using User Device Affinity
Microsoft Deployment Toolkit 2013
Deploying a Virtual Hard Drive
Servicing Your Operating System Images and VHDs Offline
Maintaining the User State
Windows 10 as a Service
The Bottom Line
Chapter 10: Inventory and Software Metering:
Inventory in Configuration Manager
Software Metering in Configuration Manager
The Bottom Line
Chapter 11: Asset Intelligence:
Requirements for Asset Intelligence
Elements of Asset Intelligence
Configuring Asset Intelligence
Import Software License into Asset Intelligence
The Bottom Line
Chapter 12: Reporting:
Installing SQL Server Reporting Services
Running a Report
Working with Reporting Security
Managing Reports
Creating Reports
Importing and Exporting Reports
The Bottom Line
Chapter 13: Compliance Settings:
Overview of Compliance Settings
Configuring Compliance Settings Client Settings
Creating Configuration Items
Building a Configuration Baseline
Compliance Settings Reporting
Configuring Windows Information Protection
Importing Configuration Packs
User Data and Profiles
Remote Connection Profiles
Compliance Policies
Conditional Access
Company Resource Access
Terms and Conditions
Windows 10 Edition Upgrade
The Bottom Line
Chapter 14: Endpoint Protection:
Benefits of Endpoint Protection
Endpoint Protection Point Site System Role
Endpoint Protection Client Agent
Endpoint Protection Policies
Definition Files
Alerts
Reporting
The Bottom Line
Chapter 15: Role-Based Administration:
Overview of Role-Based Administration
Security Roles
Security Scopes
Collections
Administrative Users
RBA Viewer
The Bottom Line
Chapter 16: Disaster Recovery:
Planning for Disaster Recovery
Backing Up Configuration Manager
Restoring Configuration Manager
Recovering Configuration Manager
Unattended Recovery of a Site
Other Site Maintenance Options
The Bottom Line
Chapter 17: Troubleshooting:
Creating the Maintenance Plan
Using Troubleshooting Tools
Troubleshooting a Configuration Manager Site Installation
Troubleshooting a Client Installation
Troubleshooting Inventory
Troubleshooting Mobile Devices
The Bottom Line
Chapter 18: Enterprise Mobility and Configuration Manager:
Mobile Devices in Configuration Manager
Lite Management
Depth Management via Microsoft Intune
On-Premises MDM
Terms and Conditions
Corporate-Owned iOS Devices
Corporate-Owned Windows Devices
Enrolling Devices
Troubleshooting
The Bottom Line
Appendix:
Chapter 2: Planning a Configuration Manager Infrastructure
Chapter 3: Migrating to Configuration Manager
Chapter 4: Installation and Site Role Configuration
Chapter 5: Client Installation
Chapter 6: Client Health
Chapter 7: Application Deployment
Chapter 8: Software Updates
Chapter 9: Operating System Deployment
Chapter 10: Inventory and Software Metering
Chapter 11: Asset Intelligence
Chapter 12: Reporting
Chapter 13: Compliance Settings
Chapter 14: Endpoint Protection
Chapter 15: Role-Based Administration
Chapter 16: Disaster Recovery
Chapter 17: Troubleshooting
Chapter 18: Enterprise Mobility and Configuration Manager
End User License Agreement
Chapter 1
TABLE 1.1:
Chapter 2
TABLE 2.1:
TABLE 2.2:
TABLE 2.3:
TABLE 2.4:
TABLE 2.5:
TABLE 2.6:
TABLE 2.7:
TABLE 2.8:
TABLE 2.9:
TABLE 2.10:
TABLE 2.11:
TABLE 2.12:
TABLE 2.13:
TABLE 2.14:
TABLE 2.15:
TABLE 2.16:
Chapter 3
TABLE 3.1:
Chapter 4
TABLE 4.1:
Chapter 5
TABLE 5.1:
Chapter 6
TABLE 6.1:
Chapter 7
TABLE 7.1:
TABLE 7.2:
TABLE 7.3:
Chapter 10
TABLE 10.1:
TABLE 10.2:
TABLE 10.3:
Chapter 11
TABLE 11.1:
Chapter 12
TABLE 12.1:
TABLE 12.2:
TABLE 12.3:
TABLE 12.4:
TABLE 12.5:
TABLE 12.6:
TABLE 12.7:
TABLE 12.8:
TABLE 12.9:
Chapter 13
TABLE 13.1
TABLE 13.2
Chapter 16
TABLE 16.1:
TABLE 16.2:
TABLE 16.3:
TABLE 16.4:
TABLE 16.5:
TABLE 16.6:
Chapter 17
TABLE 17.1:
TABLE 17.2:
TABLE 17.3:
TABLE 17.4:
TABLE 17.5:
TABLE 17.6:
TABLE 17.7:
TABLE 17.8:
TABLE 17.9:
TABLE 17.10:
Chapter 1
FIGURE 1.1
Microsoft System Center Configuration Manager Console
FIGURE 1.2
Servicing model in the Technical Preview
FIGURE 1.3
Servicing model in the Current Branch
FIGURE 1.4
Servicing model in the Technical Preview, prerequisites check
FIGURE 1.5
Servicing model in the Current Branch, prerequisites check
FIGURE 1.6
EasySetupPayload folder
FIGURE 1.7
Monitoring Workspace, Site Servicing Status
FIGURE 1.8
Prereq Only
FIGURE 1.9
Configuration Manager Updates Wizard in the Technical Preview
FIGURE 1.10
Features in Update Pack
FIGURE 1.11
Client update options
Chapter 2
FIGURE 2.1
A Configuration Manager hierarchy
FIGURE 2.2
Managing the content on the distribution point
Chapter 3
FIGURE 3.1
Specifying the Configuration Manager source hierarchy
FIGURE 3.2
Collections that cannot be migrated are automatically discovered.
FIGURE 3.3
Limit collections for which the scope will possibly be increased.
FIGURE 3.4
Replacing the discovered source site code with the new site code
FIGURE 3.5
The Migration dashboard
FIGURE 3.6
The first data-gathering process is complete.
FIGURE 3.7
Additional sources site discovered during the data-gathering process
FIGURE 3.8
Selecting the collections that need to be migrated
FIGURE 3.9
Select the objects that need to be migrated.
FIGURE 3.10
Select the changed objects that need to be re-migrated.
FIGURE 3.11
Be sure you have enough disk space for converting packages to the new content library.
FIGURE 3.12
Monitor the upgrade status.
FIGURE 3.13
Extracting the prestaged package file to the new distribution point
FIGURE 3.14
Deinstalling the secondary site from Configuration Manager 2007 SP2
FIGURE 3.15
Cleaning up the migration data of the source hierarchy
Chapter 4
FIGURE 4.1
The Administration workspace within the Configuration Manager console
FIGURE 4.2
Site systems and roles
FIGURE 4.3
ConfigMgr Prerequisites Tool version 1.4.2 running on Windows Server 2012 R2
FIGURE 4.4
Setup Wizard: Getting Started page, when installing on a system without Configuration Manager
FIGURE 4.5
Setup Wizard: Product Key after October 2016 Release
FIGURE 4.6
Setup Wizard: Prerequisite Downloads page
FIGURE 4.7
Setup Wizard: Site And Installation Settings page
FIGURE 4.8
Setup Wizard: Database Information page
FIGURE 4.9
Setup Wizard: Settings Summary page
FIGURE 4.10
Setup Wizard: Prerequisite Check page
FIGURE 4.11
Setup Wizard: Install page: installation complete
FIGURE 4.12
Setup Wizard: Getting Started page for a primary site
FIGURE 4.13
Setup Wizard: Database Information page for a primary site
FIGURE 4.14
Setup Wizard: Client Computer Communication Settings page for a primary site
FIGURE 4.15
Setup Wizard: Site System Roles page for a primary site
FIGURE 4.16
Secondary site installation
FIGURE 4.17
Create Secondary Site Wizard: General page
FIGURE 4.18
Create Secondary Site Wizard: SQL Server Settings page
FIGURE 4.19
Create Secondary Site Wizard: Distribution Point page
FIGURE 4.20
Create Secondary Site Wizard: Drive Settings page
FIGURE 4.21
Create Secondary Site Wizard: Content Validation page
FIGURE 4.22
Create Secondary Site Wizard: Summary page
FIGURE 4.23
Right-click the secondary site and choose Show Install Status to see this screen.
FIGURE 4.24
Administration console showing the Sites node
FIGURE 4.25
Post-installation Identification key
FIGURE 4.26
Post-installation CCM key
FIGURE 4.27
Post-installation ConfigMgr10 key
FIGURE 4.28
Post-installation Services key
FIGURE 4.29
Microsoft Configuration Manager installation folder
FIGURE 4.30
Management point SMS_CCM installation folder
FIGURE 4.31
SMS_ groups added as part of installation
FIGURE 4.32
WMI namespace validation
FIGURE 4.33
Services validation
FIGURE 4.34
Database validation
FIGURE 4.35
Use the Create Site System Server button on the ribbon to create a new server; use the context menu to assign a new role on an existing server.
FIGURE 4.36
Add Site System Roles Wizard: General page
FIGURE 4.37
Create Site System Server Wizard: distribution point selected
FIGURE 4.38
Create Site System Server Wizard: Distribution Point page
FIGURE 4.39
Create Site System Server Wizard: Drive Settings page
FIGURE 4.40
Create Site System Server Wizard: Pull Distribution Point page
FIGURE 4.41
Create Site System Server Wizard: PXE page
FIGURE 4.42
Create Site System Server Wizard: Multicast page
FIGURE 4.43
Create Site System Server Wizard: Content Validation page
FIGURE 4.44
Create Site System Server Wizard: Summary page
FIGURE 4.45
Distribution point structure
FIGURE 4.46
SCCMContentLib structure
FIGURE 4.47
PkgLib folder structure and INI files
FIGURE 4.48
DataLib folder structure, GUID folder, and configuration file
FIGURE 4.49
FileLib folder structure
FIGURE 4.50
Add Site System Roles Wizard: Management Point page
FIGURE 4.51
Add Site System Roles Wizard: Management Point Database page
FIGURE 4.52
Add Site System Roles Wizard: State migration point selected
FIGURE 4.53
Add Site System Roles Wizard: State Migration Point page
FIGURE 4.54
Add Site System Roles Wizard: Boundary Groups page
FIGURE 4.55
Add Site System Roles Wizard: Fallback Status Point page
FIGURE 4.56
Add Site System Roles Wizard: Reporting Services Point page
FIGURE 4.57
Add Site System Roles Wizard: Application Catalog website point and Application Catalog web service point selected
FIGURE 4.58
Add Site System Roles Wizard: Application Catalog Web Service Point page
FIGURE 4.59
Add Site System Roles Wizard: Application Catalog Website Point page
FIGURE 4.60
Add Site System Roles Wizard: Enrollment Point page
FIGURE 4.61
Add Site System Roles Wizard: Enrollment Proxy Point page
FIGURE 4.62
Add Site System Roles Wizard: System Role Selection page with Software Update Point selected
FIGURE 4.63
Add Site System Roles Wizard: Proxy And Account Settings page
FIGURE 4.64
Add Site System Roles Wizard: Synchronization Source page
FIGURE 4.65
Add Site System Roles Wizard: Supersedence Rules page
FIGURE 4.66
Add Site System Roles Wizard: Classifications page
FIGURE 4.67
Add Site System Roles Wizard: Products page
FIGURE 4.68
Add Site System Roles Wizard: Microsoft Active Protection Service page
FIGURE 4.69
Add Site System Roles Wizard: Asset Intelligence Synchronization Point Settings page
Chapter 5
FIGURE 5.1
Client settings
FIGURE 5.2
Creating custom client settings
FIGURE 5.3
New Active Directory Container search criteria
FIGURE 5.4
The Select New Container dialog box
FIGURE 5.5
Discovery methods
FIGURE 5.6
Configuring Active Directory Forest Discovery
FIGURE 5.7
Defining a new Active Directory forest
FIGURE 5.8
Custom Active Directory system attributes
FIGURE 5.9
Heartbeat Discovery Properties
FIGURE 5.10
Active Directory System Discovery polling schedule
FIGURE 5.11
The Custom Schedule dialog for Network Discovery
FIGURE 5.12
Creating a boundary
FIGURE 5.13
Boundary group configured for site assignment
FIGURE 5.14
The General tab of Client Push Installation Properties
FIGURE 5.15
The Accounts tab of Client Push Installation Properties
FIGURE 5.16
The Installation Properties tab of Client Push Installation Properties
FIGURE 5.17
Client push Install Configuration Manager Client Wizard settings
FIGURE 5.18
Linux/Unix client installation
FIGURE 5.19
Mac Computer Enrollment Wizard
FIGURE 5.20
Verifying that the site code has been obtained
FIGURE 5.21
CCM evaluation task
FIGURE 5.22
Client Status Settings Properties—General tab
FIGURE 5.23
Configuring alert settings on a collection
FIGURE 5.24
Automatic Client Upgrade configuration
Chapter 6
FIGURE 6.1
Scheduled task created by a client installation
FIGURE 6.2
Properties window for the scheduled task
FIGURE 6.3
Triggers tab for the scheduled task
FIGURE 6.4
Actions tab for the scheduled task
FIGURE 6.5
Conditions tab for the scheduled task
FIGURE 6.6
Settings tab for the scheduled task
FIGURE 6.7
History tab for the scheduled task
FIGURE 6.8
CCMEval executable in the %WINDIR%\CCM folder
FIGURE 6.9
CCMEval.xml example
FIGURE 6.10
CCMEval.log sample
FIGURE 6.11
Summary tab for specific device
FIGURE 6.12
Client Activity Detail tab for specific device
FIGURE 6.13
Client Check Detail tab for specific device
FIGURE 6.14
Client Status Settings Properties
FIGURE 6.15
Client Check node in the Monitoring workspace of the Configuration Manager console
FIGURE 6.16
Client Activity node in the Monitoring workspace of the Configuration Manager console
FIGURE 6.17
Client Status reports
FIGURE 6.18
Client health collection alerts
Chapter 7
FIGURE 7.1
Applications and Packages nodes
FIGURE 7.2
BITS settings
FIGURE 7.3
Computer Agent settings
FIGURE 7.4
Computer Restart settings
FIGURE 7.5
Software Deployment settings
FIGURE 7.6
User and Device Affinity settings
FIGURE 7.7
Network access account in Software Distribution Component Properties
FIGURE 7.8
Sample application properties
FIGURE 7.9
Sample deployment type properties
FIGURE 7.10
Sample deployment properties
FIGURE 7.11
General page of the Create Application Wizard
FIGURE 7.12
Import Information page of the Create Application Wizard
FIGURE 7.13
General Information page of the Create Application Wizard
FIGURE 7.14
Ribbon options for application deployment
FIGURE 7.15
Viewing revision history
FIGURE 7.16
Create Prestaged Content File Wizard
FIGURE 7.17
Simulate Application Deployment Wizard
FIGURE 7.18
Foxit Reader properties in the General tab of the Export Application Wizard
FIGURE 7.19
Foxit Reader 7.3 Properties—General Information tab
FIGURE 7.20
Foxit Reader 7.3 Properties—Application Catalog tab
FIGURE 7.21
Foxit Reader 7.3 Properties—Deployment Types tab
FIGURE 7.22
Foxit Reader 7.3 Properties—Content Locations tab
FIGURE 7.23
Foxit Reader 7.3 Properties—Supersedence tab
FIGURE 7.24
Displaying deployment type properties
FIGURE 7.25
Sample deployment type properties—General tab
FIGURE 7.26
Sample deployment type properties—Content tab
FIGURE 7.27
Sample deployment type properties—Programs tab
FIGURE 7.28
Sample deployment type properties—Detection Method tab
FIGURE 7.29
Sample deployment type’s properties—User Experience tab
FIGURE 7.30
Sample deployment type’s properties—Requirements tab
FIGURE 7.31
Sample deployment type’s properties—Return Codes tab
FIGURE 7.32
Sample deployment type’s properties—Dependencies tab
FIGURE 7.33
Deploy Software Wizard—General page
FIGURE 7.34
Deploy Software Wizard—Content page
FIGURE 7.35
Deploy Software Wizard—Deployment Settings page
FIGURE 7.36
Deploy Software Wizard—Scheduling page
FIGURE 7.37
Deploy Software Wizard—User Experience page
FIGURE 7.38
Deploy Software Wizard—Alerts page
FIGURE 7.39
Second deployment added, targeted to a user collection
FIGURE 7.40
Foxit Reader in the Software Center
FIGURE 7.41
Foxit Reader in the Application Catalog
FIGURE 7.42
Software Center Options tab
FIGURE 7.43
The new Software Center
FIGURE 7.44
Supersedence relationship added to Foxit Reader application
FIGURE 7.45
Supersedence reference
FIGURE 7.46
Dependency configuration
FIGURE 7.47
Requirements node completed
FIGURE 7.48
Global Conditions node
FIGURE 7.49
Reviewing the references of the Custom Global Condition
FIGURE 7.50
App-V virtual environment for Office 2010 and Visio 2010
FIGURE 7.51
Select an application from the Microsoft Store.
FIGURE 7.52
Adding sideloading keys
FIGURE 7.53
The DMG file is converted to a CMMAC file.
FIGURE 7.54
Detection method for a Mac OS X application
FIGURE 7.55
Select the platform for which the program is created.
FIGURE 7.56
User-configurable Device Affinity option
FIGURE 7.57
Import User Device Affinity Wizard screen
FIGURE 7.58
Configuring automatic user device affinity detection
FIGURE 7.59
Edit Primary Users
FIGURE 7.60
Deployments node of the Monitoring section
FIGURE 7.61
Deployment status
Chapter 9
FIGURE 9.1
Boot Image Properties
FIGURE 9.2
Software Distribution Component Properties dialog box
FIGURE 9.3
Add Site System Roles Wizard—State Migration Point page
FIGURE 9.4
Designating a storage folder
FIGURE 9.5
Review Required Ports For PXE dialog
FIGURE 9.6
PXE settings page
FIGURE 9.7
Enable the boot image to boot via PXE.
FIGURE 9.8
Add an install.wim file as an operating system image.
FIGURE 9.9
Creating an operating system upgrade package
FIGURE 9.10
Define which Windows operating system will be captured.
FIGURE 9.11
Install the Configuration Manager client task.
FIGURE 9.12
Captured image path and filename
FIGURE 9.13
Create Task Sequence Media Wizard—Select Media Type page
FIGURE 9.14
Create Task Sequence Media Wizard—Media Type page
FIGURE 9.15
Create Task Sequence Media Wizard—Boot Image page
FIGURE 9.16
High-risk deployment warning
FIGURE 9.17
Specify the deployment settings.
FIGURE 9.18
Selecting the task sequence
FIGURE 9.19
Image Capture Wizard—Image Destination page
FIGURE 9.20
Image capture success message
FIGURE 9.21
Create Task Sequence Wizard—Install Windows page
FIGURE 9.22
Create Task Sequence Wizard—State Migration page
FIGURE 9.23
Create Task Sequence Wizard—Install Applications page
FIGURE 9.24
Deploy Software Wizard—Deployment Settings page
FIGURE 9.25
Installation progress message box
FIGURE 9.26
Booting to WinPE
FIGURE 9.27
Monitoring the OSD deployment status
FIGURE 9.28
Review the task sequence steps in the Asset Message dialog screen.
FIGURE 9.29
Select an operating system upgrade package.
FIGURE 9.30
Import Computer Information Wizard—Single Computer page
FIGURE 9.31
Create Task Sequence Wizard—State Migration page
FIGURE 9.32
Import New Driver Wizard—Locate Driver page
FIGURE 9.33
Import New Driver Wizard—Add Driver To Packages page
FIGURE 9.34
Adding drivers to boot images
FIGURE 9.35
Searching for and selecting the primary user
FIGURE 9.36
Configuring client device settings
FIGURE 9.37
Checking the column mapping
FIGURE 9.38
Configuring deployment settings
FIGURE 9.39
Configuring the integration
FIGURE 9.40
Configure the platform and scratch space.
FIGURE 9.41
Create a new Microsoft Deployment Toolkit Files package.
FIGURE 9.42
Select or create the operating system image you want to deploy.
FIGURE 9.43
Specifying general information for the VHD
FIGURE 9.44
VHD creation process
FIGURE 9.45
The created virtual machine in Hyper-V
FIGURE 9.46
Modifying the VHD
FIGURE 9.47
Select the updates that you want to install.
FIGURE 9.48
View the installed updates in the Windows image.
FIGURE 9.49
Managing the user state
FIGURE 9.50
Windows 10 Servicing dashboard, part 1
FIGURE 9.51
Windows 10 Servicing Dashboard, part 2
FIGURE 9.52
Specifying the deployment ring
FIGURE 9.53
Selecting the property filters and search criteria
Chapter 10
FIGURE 10.1
Default hardware inventory settings
FIGURE 10.2
Default software inventory settings
FIGURE 10.3
Resource Explorer
FIGURE 10.4
Configuring hardware inventory
FIGURE 10.5
The configuration .mof file
FIGURE 10.6
Default Software Inventory settings
FIGURE 10.7
Scanning for EXE files
FIGURE 10.8
Collecting files
FIGURE 10.9
Specifying all *.sys files from a folder
FIGURE 10.10
Configure a new display name.
FIGURE 10.11
A custom display name
FIGURE 10.12
Software information in Resource Explorer
FIGURE 10.13
FileSystemFile .log
FIGURE 10.14
Files generated by the inventory and discovery processes
FIGURE 10.15
Reading a collected file in Resource Explorer
FIGURE 10.16
Default Software Metering settings
FIGURE 10.17
Software Metering Properties dialog box
FIGURE 10.18
Software Metering node with software metering rules
FIGURE 10.19
General page of the Create Software Metering Rule Wizard
FIGURE 10.20
Software metering maintenance tasks
FIGURE 10.21
Software Metering Summarization Progress report
FIGURE 10.22
Reading the mtrmgr .log file on the client
FIGURE 10.23
Running the Software Metering Usage Report Cycle action on the client
Chapter 11
FIGURE 11.1
Site Maintenance dialog
FIGURE 11.2
Asset Intelligence home page
FIGURE 11.3
Asset Intelligence Edit Inventory Classes dialog
FIGURE 11.4
Import Software Licenses Wizard
FIGURE 11.5
General License Statement import
FIGURE 11.6
General License Statement
Chapter 12
FIGURE 12.1
Creating the data source
FIGURE 12.2
Viewing the default reports
FIGURE 12.3
The Client Push status report opened from the console
FIGURE 12.4
Contents of the All application deployments (advanced) report
FIGURE 12.5
Report options for built-in security roles
FIGURE 12.6
Creating a Windows file-based report subscription
FIGURE 12.7
Creating a report using Report Builder 3.0
Chapter 13
FIGURE 13.1
Compliance Settings main page
FIGURE 13.2
The default client settings
FIGURE 13.3
The Create Configuration Item Wizard, General page
FIGURE 13.4
The Create Configuration Item Wizard's Manage Administrative Categories dialog box
FIGURE 13.5
Create Configuration Item Wizard, General page completed
FIGURE 13.6
CI application Detection Methods page
FIGURE 13.7
CI application Settings page
FIGURE 13.8
Create Setting dialog
FIGURE 13.9
General page of the Create Setting dialog box completed
FIGURE 13.10
The Compliance Rules page
FIGURE 13.11
The Compliance Rules, Create Rule dialog box
FIGURE 13.12
Application CI Summary page
FIGURE 13.13
Create Configuration Baseline Wizard, Create Configuration Baseline dialog
FIGURE 13.14
Add Configuration Items
FIGURE 13.15
Add Software Updates window
FIGURE 13.16
Deploy Configuration Baselines Wizard
FIGURE 13.17
Configuration Manager client configurations
FIGURE 13.18
Compliance report
FIGURE 13.19
Windows 10 Configuration Item
FIGURE 13.20
Selecting Windows Information Protection
FIGURE 13.21
Windows Information Protection Default allow rule
FIGURE 13.22
Creating a WIP rule based on AppLocker Policy files
FIGURE 13.23
Create a WIP rule by publisher, product name, binary name, and version
FIGURE 13.24
Create an AppLocker policy file (XML)
FIGURE 13.25
Configure Windows Information Protection Settings, part 1
FIGURE 13.26
Configure Windows Information Protection Settings, part 2
FIGURE 13.27
Enterprise Data Protection icon overlay (briefcase)
FIGURE 13.28
Configure Windows Information Protection Settings, part 3
FIGURE 13.29
Deploying a WIP policy with the remediate noncompliant rule
FIGURE 13.30
Overriding the behavior of WIP
FIGURE 13.31
Blocking the behavior of WIP
FIGURE 13.32
Microsoft Security Compliance Manager
FIGURE 13.33
Import Configuration Data Wizard, Select Files page
FIGURE 13.34
Import Configuration Data Wizard, Confirmation page
FIGURE 13.35
Create User Data And Profiles Configuration Item Wizard
FIGURE 13.36
Create User Data And Profiles Configuration Item Wizard, Folder Redirection screen
FIGURE 13.37
Create User Data And Profiles Configuration Item Wizard, Offline Files screen
FIGURE 13.38
Create User Data And Profiles Configuration Item Wizard, Roaming Profiles screen
FIGURE 13.39
Create User Data And Profiles Configuration Item Wizard, Summary screen
FIGURE 13.40
Deploy User Data And Profiles Configuration Policy dialog
FIGURE 13.41
Create Remote Connection Profile Wizard, General page
FIGURE 13.42
Create Remote Connection Profile Wizard, Profile Settings page
FIGURE 13.43
Create Compliance Policy Wizard, General page
FIGURE 13.44
Create Compliance Policy Wizard, Supported Platforms page
FIGURE 13.45
Create Compliance Policy Wizard, Rules page
FIGURE 13.46
Exchange Online action required message for noncompliant Android device
FIGURE 13.47
Exchange Online action required message for noncompliant iOS device
FIGURE 13.48
Configuring conditional access for Exchange Online
FIGURE 13.49
Exchange Online policy
FIGURE 13.50
Web redirect to install the Company Portal app on iOS
FIGURE 13.51
Web redirect to install the Company Portal app on Android
FIGURE 13.52
Company Access Setup on iOS
FIGURE 13.53
Company Access Setup on Android
FIGURE 13.54
Policy Compliance Status: In Compliance (iOS)
FIGURE 13.55
Policy Compliance Status: In Compliance (Android)
FIGURE 13.56
Compliance Settings, Company Resource Access
FIGURE 13.57
Create Certificate Profile Wizard, General page
FIGURE 13.58
Create Certificate Profile Wizard, Trusted CA Certificate page
FIGURE 13.59
Create Certificate Profile Wizard, Supported Platforms page
FIGURE 13.60
Create Certificate Profile Wizard, Completion page
FIGURE 13.61
Create Exchange ActiveSync Email Profile Wizard, Exchange ActiveSync page
FIGURE 13.62
Create Exchange ActiveSync Email Profile Wizard, Synchronization Settings page
FIGURE 13.63
Create VPN Profile Wizard, General page
FIGURE 13.64
Create VPN Profile Wizard, Connection page
FIGURE 13.65
Create VPN Profile Wizard, Authentication Method page
FIGURE 13.66
Create VPN Profile Wizard, Proxy Settings page
FIGURE 13.67
Create VPN Profile Wizard, Automatic VPN page
FIGURE 13.68
Create VPN Profile Wizard, Supported Platforms page
FIGURE 13.69
Create Wi-Fi Profile Wizard, General page
FIGURE 13.70
Create Wi-Fi Profile Wizard, Wi-Fi Profile page
FIGURE 13.71
Create Wi-Fi Profile Wizard, Security Configuration page
FIGURE 13.72
Create Wi-Fi Profile Wizard, Advanced Settings page
FIGURE 13.73
Create Wi-Fi Profile Wizard, Proxy Settings page
FIGURE 13.74
Windows Hello For Business Wizard, Settings page
FIGURE 13.75
Create Terms And Conditions Wizard, Terms page
FIGURE 13.76
Create Edition Upgrade Policy Wizard, General page
Chapter 14
FIGURE 14.1
Selecting the Endpoint Protection Point role
FIGURE 14.2
Endpoint Protection listed in Programs and Features
FIGURE 14.3
Selecting the Endpoint Protection custom setting
FIGURE 14.4
Configuring Endpoint Protection settings
FIGURE 14.5
Configuring the Scheduled Scans settings
FIGURE 14.6
Configuring the Scan Settings
FIGURE 14.7
Configuring the Default Actions settings
FIGURE 14.8
Configuring the Real-Time Protection settings
FIGURE 14.9
Configuring the Exclusion Settings
FIGURE 14.10
Configuring the Advanced settings
FIGURE 14.11
Configuring the Threat Overrides settings
FIGURE 14.12
Configuring the MAPS settings
FIGURE 14.13
Configuring the Definition Updates settings
FIGURE 14.14
Configuring Windows Firewall policy
FIGURE 14.15
Increasing policy priority
FIGURE 14.16
Obtaining the definition update version
FIGURE 14.17
Definition update status
FIGURE 14.18
Verifying the Endpoint Protection client definition version
FIGURE 14.19
Alerts tab in the collection properties
FIGURE 14.20
Antimalware Activity Report
FIGURE 14.21
Notification Agent log and Endpoint Protection log
Chapter 15
FIGURE 15.1
Built-in security roles
FIGURE 15.2
Application Administrator Properties
FIGURE 15.3
Security scopes
FIGURE 15.4
New security scope
FIGURE 15.5
New security scope and application
FIGURE 15.6
New security scope
FIGURE 15.7
Objects Secured By A Single Security Scope report
FIGURE 15.8
Assigned security scopes and collections
FIGURE 15.9
Create Security Scopes
FIGURE 15.10
Set Security Scopes
FIGURE 15.11
Security Scope List, In Use
FIGURE 15.12
Add Scope to User
FIGURE 15.13
User with RBA Rights Console View
FIGURE 15.14
User with RBA Rights Devices View
FIGURE 15.15
User with RBA Rights Applications View
FIGURE 15.16
User with RBA Rights Deployments View
FIGURE 15.17
User with RBA Rights Reports View
FIGURE 15.18
RBA Viewer Roles Similarity
FIGURE 15.19
RBA Viewer Console Review
FIGURE 15.20
Collection limiting
Chapter 16
FIGURE 16.1
A sample AfterBackup.bat file calling a PowerShell script
FIGURE 16.2
The Backup Site Server properties
FIGURE 16.3
Starting the site recovery process
FIGURE 16.4
Site Server And Database Recovery Options
FIGURE 16.5
The Site Recovery Information page
FIGURE 16.6
The Prerequisite Downloads page
FIGURE 16.7
Site And Installation Settings page
FIGURE 16.8
Database Information page
FIGURE 16.9
Database Information page
FIGURE 16.10
Prerequisite Check page
FIGURE 16.11
Install page
FIGURE 16.12
Finished page
FIGURE 16.13
Viewing ConfigMgrSetup .log
FIGURE 16.14
Selecting the Perform Site Maintenance Or Reset This Site option
FIGURE 16.15
Available Site Maintenance options
Chapter 17
FIGURE 17.1
Enabling the Backup Site Server task
FIGURE 17.2
CMTrace Error Lookup window
FIGURE 17.3
Highlighted error in CMTrace
FIGURE 17.4
The Site Status dashboard
FIGURE 17.5
The Show Messages menu
FIGURE 17.6
The Configuration Manager Status Message Viewer window
FIGURE 17.7
The Status Message Details dialog
FIGURE 17.8
Distribution Point Job Queue Manager
FIGURE 17.9
Collection Evaluation Viewer
FIGURE 17.10
Content Library Explorer
FIGURE 17.11
Security Configuration Wizard Template XML file
FIGURE 17.12
Content Library Transfer
FIGURE 17.13
Content Ownership Tool
FIGURE 17.14
RBA Viewer
FIGURE 17.15
Run Metering Summarization Tool
FIGURE 17.16
Client Troubleshooting Tool (CliSpy)
FIGURE 17.17
Deployment Monitoring Tool
FIGURE 17.18
PolicySpy
FIGURE 17.19
Power Viewer
FIGURE 17.20
Send Schedule Tool
FIGURE 17.21
WakeupSpy
FIGURE 17.22
System Center Support Center
FIGURE 17.23
SMS_Executive threads
FIGURE 17.24
SMS_Executive component status
FIGURE 17.25
smsexec.log file
FIGURE 17.26
Distribution Point Configuration, Distribution Status Node
FIGURE 17.27
The Database Replication node
FIGURE 17.28
RCMCtrl.log viewed in CMTrace.exe
FIGURE 17.29
Replication Link Analyzer
FIGURE 17.30
Exec SPDiagDRS in SQL Management Studio
FIGURE 17.31
Confirm Deletion of Resource in Collection
Chapter 18
FIGURE 18.1
Exchange Server Connectors location in the Configuration Manager console
FIGURE 18.2
Add Exchange Server Wizard—General page
FIGURE 18.3
Add Exchange Server Wizard—Account page
FIGURE 18.4
Add Exchange Server Wizard—Discovery page
FIGURE 18.5
Add Exchange Server Wizard—Settings page
FIGURE 18.6
Add Exchange Server Wizard—Settings page—General Settings
FIGURE 18.7
Add Exchange Server Wizard—Settings page—Password Settings
FIGURE 18.8
Add Exchange Server Wizard—Settings page—Email Management Settings
FIGURE 18.9
Add Exchange Server Wizard—Settings page—Security Settings
FIGURE 18.10
Add Exchange Server Wizard—Settings page—Application Settings
FIGURE 18.11
Lite-managed devices
FIGURE 18.12
Device context menu options
FIGURE 18.13
Domains page Admin center
FIGURE 18.14
Add an alternative UPN suffix.
FIGURE 18.15
Create a user for Azure AD Connect.
FIGURE 18.16
Connecting to Azure AD
FIGURE 18.17
Selecting domain and OUs
FIGURE 18.18
Setting the mobile device authority
FIGURE 18.19
Signing in with your Microsoft Intune organizational account
FIGURE 18.20
Create Microsoft Intune Subscription Wizard, General Configuration
FIGURE 18.21
A distribution point in Microsoft Intune is added.
FIGURE 18.22
Enabling Android support
FIGURE 18.23
Enabling iOS and Mac OS X (MDM) support
FIGURE 18.24
Create Configuration Item Wizard—General page
FIGURE 18.25
Create Configuration Item Wizard—Device Settings page
FIGURE 18.26
Create Configuration Item Wizard—Password page
FIGURE 18.27
Create Configuration Item Wizard—Device page
FIGURE 18.28
Create Configuration Item Wizard—Email Management page
FIGURE 18.29
Create Configuration Item Wizard—Store page
FIGURE 18.30
Create Configuration Item Wizard—Browser page
FIGURE 18.31
Create Configuration Item Wizard—Internet Explorer page
FIGURE 18.32
Create Configuration Item Wizard—Cloud page
FIGURE 18.33
Create Configuration Item Wizard—Security page
FIGURE 18.34
Create Configuration Item Wizard—Peak Synchronization page
FIGURE 18.35
Create Configuration Item Wizard—Roaming page
FIGURE 18.36
Create Configuration Item Wizard—Encryption page
FIGURE 18.37
Create Configuration Item Wizard—Wireless Communications page
FIGURE 18.38
Wireless Network Connection page
FIGURE 18.39
Create Configuration Item Wizard—Certificates page
FIGURE 18.40
Import Certificate dialog box
FIGURE 18.41
Create Configuration Item Wizard—System Security page
FIGURE 18.42
Create Configuration Item Wizard—Windows Server Work Folders page
FIGURE 18.43
Create Setting dialog box
FIGURE 18.44
Select your custom setting in the Browse Settings dialog box.
FIGURE 18.45
Create Rule dialog box
FIGURE 18.46
Paste the app’s URL from the App Store in the Apps URL field.
FIGURE 18.47
Create Configuration Item Wizard—Windows 10 Team page
FIGURE 18.48
Create Configuration Item Wizard—Microsoft Edge page
FIGURE 18.49
Create Configuration Item Wizard—Platform Applicability page
FIGURE 18.50
Create Configuration Item Wizard—Content Rating page
FIGURE 18.51
Create Configuration Item Wizard—Data Protection
FIGURE 18.52
Add App To The Noncompliant List dialog box
FIGURE 18.53
Create Configuration Item Wizard—Configure iOS And Mac OS X Custom Profile Settings page
FIGURE 18.54
Create Configuration Item Wizard—Configure Kiosk Mode Settings For iOS Devices
FIGURE 18.55
Create Configuration Item Wizard—Kiosk Mode – Samsung Knox page
FIGURE 18.56
Create Certificate Profile Wizard—Trusted CA Certificate page
FIGURE 18.57
Create Certificate Profile Wizard—SCEP Enrollment page
FIGURE 18.58
Create Certificate Profile Wizard—Certificate Properties page
FIGURE 18.59
Create VPN Profile Wizard—Connection page
FIGURE 18.60
Create VPN Profile Wizard—Automatic VPN page
FIGURE 18.61
Create Exchange ActiveSync Email Profile Wizard—Exchange ActiveSync page
FIGURE 18.62
Create Wi-Fi Profile Wizard—Wi-Fi Profile page
FIGURE 18.63
Create Wi-Fi Profile Wizard—Security Configuration page
FIGURE 18.64
Create Compliance Policy Wizard—Supported Platforms
FIGURE 18.65
Create Compliance Policy Wizard—Rules
FIGURE 18.66
Configuring conditional access policy
FIGURE 18.67
Enabling conditional access policy
FIGURE 18.68
Enabling conditional access policy
FIGURE 18.69
Configure Conditional Access Policy Wizard—Targeted Collections
FIGURE 18.70
Create Application Management Policy Wizard—application management policy for iOS
FIGURE 18.71
Microsoft Intune Subscription Properties dialog box
FIGURE 18.72
Creating the enrollment profile
FIGURE 18.73
System Center Configuration Manager logon page
FIGURE 18.74
Deploy Terms And Conditions
FIGURE 18.75
Setting the management authority
FIGURE 18.76
Open the Microsoft Intune company portal.
FIGURE 18.77
Beginning the company access setup
FIGURE 18.78
Enroll Windows Phone device
FIGURE 18.79
Turning on Workplace Join
FIGURE 18.80
Device enrolled in device management
FIGURE 18.81
Enrolled devices in Configuration Manager
Cover
Table of Contents
Chapter 1
iv
v
vi
vii
xxiii
xxiv
xxv
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
392
393
394
395
396
397
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
822
823
824
825
826
818
827
819
820
821
828
829
830
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
The Enterprise Mobility + Security product group has completed one of the most successful management products of all time. These folks work very hard to ensure that the product meets the higher standards and are always looking for feedback about it.
This book is written by a group of individuals who have endured the growing pains of this product, some even from day one, and who have helped Microsoft improve Configuration Manager with countless hours of real-world use and testing.
Welcome to Mastering System Center Configuration Manager. You will gain the knowledge you need to unlock Configuration Manager and Enterprise Mobility + Security to its full potential.
The Mastering series from Sybex provides outstanding instruction for readers with intermediate and advanced skills in the form of top-notch training and development for those already working in their field and provides clear, serious education for those aspiring to become pros. Every Mastering book includes the following:
Real-world scenarios, ranging from case studies to interviews that show how the tool, technique, or knowledge presented is applied in actual practice
Skill-based instruction, with chapters organized around real tasks rather than abstract concepts or subjects
Self-review questions, so you can be certain you’re equipped to do the job right
Mastering System Center Configuration Manager
