Mastering System Center Configuration Manager - Santos Martinez - E-Book

Mastering System Center Configuration Manager E-Book

Santos Martinez

0,0
38,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Get up to date quickly with clear, expert coverage of SCCM 2016 Mastering System Center Configuration Manager provides comprehensive coverage of Microsoft's powerful network software deployment tool, with a practical hands-on approach. Written by Santos Martinez, Peter Daalmans, and Brett Bennett, this guide walks you through SCCM 2016 with in-depth explanations anchored in real-world applications to get you up to speed quickly. Whether you're planning a new installation or migrating from a previous version of Configuration Manager, this book provides clear instruction and expert insight to get the job done right. Fully aligned with the latest release, the discussion covers the newest tools and features with examples that illustrate utility in a variety of contexts. System Center Configuration Manager (formerly SMS) is one of Microsoft's flagship products; the 2016 release has been updated with better Windows 10 and Windows Server 2016 compatibility, improved tools for managing non-Microsoft mobile devices in the cloud, and more. This book provides start-to-finish coverage and expert guidance on everything you need to get your system up to date. * Deploy software and operating systems * Automate processes and customize configurations * Monitor performance and troubleshoot issues * Manage security in the cloud and on Virtual Machines SCCM 2016 improves your ability to handle the bring-your-own-device influx in managing mobile, streamlining the latest hiccup right into the everyday workflow. Mastering System Center Configuration Manager provides the practical coverage you need to get up and running seamlessly.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 1276

Veröffentlichungsjahr: 2016

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Mastering

System Center Configuration Manager

Santos Martinez

Peter Daalmans

Brett Bennett

Senior Acquisitions Editor: Kenyon Brown Development Editor: Kim Wimpsett Technical Editor: Matt Hinson Production Editor: Rebecca Anderson Copy Editor: Elizabeth Welch Editorial Manager: Mary Beth Wakefield Production Manager: Kathleen Wisor Executive Editor: Jim Minatel Book Designers: Maureen Forys, Happenstance Type-O-Rama; Judy Fung Proofreader: Amy Schneider Indexer: Ted Laux Project Coordinator, Cover: Brent Savage Cover Designer: Wiley Cover Image: ©Thomas Northcut/Getty Images, Inc.Copyright © 2017 by John Wiley & Sons, Inc., Indianapolis, Indiana

Published by John Wiley & Sons, Inc. Indianapolis, Indiana Published simultaneously in Canada

ISBN: 978-1-119-25845-2 ISBN: 978-1-119-25894-0 (ebk.) ISBN: 978-1-119-25846-9 (ebk.)

Manufactured in the United States of America

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Control Number: 2016960166

TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

I want to dedicate this book to the following: my wife Karla; you are my soul mate and I want to grow old with you. To my kids Bryan and Naomy, I hope this gives you some inspiration one day of what you can achieve. And finally to all my family and friends for their support in my craziness. —Santos Martinez

 

I dedicate this book to my father; since 1999 still deeply missed. To my mother, for all of your love and support in my life. To my girlfriend Samantha, our son Stef, and our upcoming newborn; thanks for putting up with me and for all of your love and support while writing this book. Love you all! —Peter Daalmans

 

I dedicate this book to my family and friends, and I greatly appreciate the support you provide. —Brett Bennett

Acknowledgments

I want to thank my colleagues across Microsoft for their support on this book, and our technical editor Matt Hinson for his commitment and great work. Thanks to the contributor authors, Nickolaj Andersen, Cliff Hobbs, and Alessandro Cesarini, for sharing some of their knowledge and experience with the readers.

To my coauthors, Brett Bennett and Peter Daalmans, thanks for staying on the project and giving the best of yourselves; I know the readers will enjoy learning from both of you.

Thanks to my friends for their support on the book and for providing a great elevator pitch to your customers.

Finally, I want to thank all the Configuration Manager and Enterprise Mobility + Security community, which has always been so passionate about the technology and willing to help us improve our writing. Let’s keep the conversation going.

—Santos Martinez

Special thanks to my family and friends. I had to balance my time with you with my commitment to writing this book. I couldn’t have done this without you guys!

I also want to thank Wiley/Sybex for giving me the opportunity to write this second book. It was again a great pleasure to work with the Wiley team; I’m looking forward to any new project! Also many thanks to the writing and editorial teams, you all rock!

Furthermore, many thanks to the Configuration Manager product team, who created this great product, and Cathy Moya especially, our great and dedicated MVP lead from within the product team. They all give us the opportunity to learn as much as we want about Configuration Manager and the Enterprise Mobility + Security products.

Also special thanks to my employer and colleagues at IT-Concern, for giving me the space to speak at conferences and to be of value for the community.

Finally, many thanks to the Configuration Manager and Enterprise Mobility communities and in particular all my fellow Enterprise Mobility MVPs; thanks for your support.

—Peter Daalmans

I would like to thank my wife Rosalie, and my children Brittany, Jamie, and Justin for the support they have provided me in my career. I would also like to thank Microsoft, both as my employer for the past 10 years and also for the amazing products they develop that have kept me gainfully employed for the past 30 years. I would also like to thank the coauthors Santos and Peter, the reviewers, and the entire team at Sybex/Wiley who helped put this book together.

—Brett Bennett

About the Authors

Santos Martinez was born in Caguas, Puerto Rico, in 1982, and grew up in Caguas. Santos has more than 16 years of experience in the IT industry. He has worked on major implementations and in support of Configuration Manager and Enterprise Mobility + Security for many customers in the United States and Puerto Rico. Santos was a Configuration Manager engineer for a Fortune 500 financial institution and an IT consultant before joining Microsoft. For the Fortune 500 companies, he helped with the implementation and support of more than 200 Configuration Manager Site Servers and support of more than 300,000 Configuration Manager and Intune device clients worldwide.

Santos was a SQL Server MVP from 2005 to 2009 and then a Configuration Manager MVP from 2009 to 2011. He is well known in the Microsoft communities as a mentor for other MVPs and Microsoft FTEs and for helping other IT community members. He has also participated in Midwest Management Summit, and Microsoft Ignite as a technical expert for Configuration Manager, SQL Server, and Microsoft Intune. Santos is also a former Puerto Rican martial arts champion and currently holds a fourth-degree black belt in TaiFu Shoi Karate Do; he earned the title of Shihan Sensei.

Santos and Karla, a pastry chef, have been married for 16 years and have two children, Bryan Emir and Naomy Arwen.

Santos currently is a senior premier field engineer for Microsoft in security infrastructure.

You can get in touch with Santos via his Twitter account @ConfigNinja or his blog at http://aka.ms/ConfigNinja.

Peter Daalmans is a senior technical consultant at IT-Concern, a Gold Certified Microsoft partner in the Netherlands. Peter has been awarded as an Enterprise Mobility MVP every year since 2012 for his work in the community. Peter worked with deployment tooling from Microsoft competitors since 1998; in 2005 Peter discovered (BDD) Business Desktop Deployment and (SMS) System Manamagent Server 2003 deployment tooling and has embraced them since then. In recent years, numerous (international) deployment projects have crossed Peter’s path.

Peter is one of the founders of the Windows Management User Group Netherlands and shares his Configuration Manager and Microsoft Intune experience with the community via his blog (http://ConfigMgrBlog.com).

Besides speaking at the Windows Management User Group Netherlands, Peter speaks every year at several events like user group meetings in Europe, TechDays Netherlands, and ExpertsLive. In 2013 he had the honor to speak at TechEd Australia and TechEd New Zealand. Peter has also been a speaker at conferences like BriForum in London, Denver, and Boston; IT/Dev Connections; and the Midwest Management Summit.

Peter resides in beautiful Breda, in the south of the Netherlands, with his girlfriend Samantha and his son Stef, with a newborn due Christmas 2016. In addition to his daily work, he is the chairman of the NAC Museum Foundation, which preserves the history of the soccer club NAC Breda. Australia is also a huge passion; he travels Down Under whenever he gets the chance to sniff the outback and the Aussie lifestyle.

You can reach Peter via @pdaalmans and [email protected] or look at https://ref.ms/aboutme for the latest information.

Brett Bennett lives in Texas and has been with Microsoft for over 10 years, currently as a Senior Premier Field Engineer. Brett has been in the computer industry for almost 30 years and has used every version of SMS/SCCM since SMS 1.0 beta was released in 1994. He has been involved with the development of several technical books over his career and has spoken at several technical conferences.

Brett is married to Rosalie Bennett and has three children (Brittany, Jamie, and Justin), three dogs (Yogi, Boo Boo, and Reeses), and one granddog (Rue). Brittany and Jamie are both graduates of Texas A&M and are now in the workforce, and Justin is currently finishing up his degree at A&M. Brett enjoys driving his Dodge Challenger, riding bikes, playing guitar, expanding his vinyl collection, and preparing tasty food in his Weber smoker (especially Texas-style beef brisket). You can reach Brett at [email protected], @texasmcse on Twitter, or on his blog at https://blogs.technet.microsoft.com/breben.

About the Contributing Authors

Nickolaj Andersen is a senior consultant at Lumagate in Sweden and has made a name for himself for all the tools and scripts that he has shared with the community over the past years. Experience-wise, he has been in the IT industry for almost 10 years. Nickolaj is originally from Denmark but moved to Sweden with his mother when he was six years old. Today, Nickolaj lives in Stockholm with his lovely wife and daughter. In 2015, Nickolaj was awarded PowerShell Hero by the PowerShell.org community, for his extensive PowerShell contributions and scripts related to Configuration Manager.

Cliff Hobbs is the founder (in 2003) and CEO of FAQShop.com, one of the longest running websites covering System Management Server/Configuration Manager. In 2004 Microsoft awarded Cliff their MVP status in SMS; he was the first recipient from the UK and has received the award every year since. Cliff’s passion is writing and sharing the knowledge he has gained working with the product since SMS 2.0 SP2 back in 1998. He has worked for some of the largest companies in the world, including Microsoft, HP, and Electronic Data Systems (EDS). Although Cliff currently lives in the UK with his wife Necy and his sons, he is looking for an opportunity that will allow him to emigrate with his family to Lisbon in Portugal, where he met his wife. Feel free to contact Cliff through FAQShop, where you can see the various ways Cliff can help you get the most from Configuration Manager.

Alessandro Cesarini is a premier field engineer at Microsoft and is based in Madrid. With more than 20 years of IT experience in multinational environments (Spain, the United Kingdom, France, Austria, Hungary, Poland, and Italy), he is helping customers with migration and deployment of Windows using Windows Assessment and Deployment Kit (ADK), Microsoft Deployment Toolkit (MDT), and System Center Configuration Manager. When he is not working or traveling, Alessandro is riding his bicycle, cooking at home, playing squash or Pádel, and spending time with his wife Eva.

CONTENTS

Introduction:

The Mastering Series

What This Book Covers

What You Need to Get the Most Out of This Book

How We Structured This Book

Errata

Chapter 1: Overview of System Center Configuration Manager and Microsoft Intune:

A Brief History of Configuration Manager

Configuration Manager Features

Microsoft Intune Features

Overview of the New Servicing Model for Configuration Manager

Overview of the Servicing Model for System Center Configuration Manager

Summary

Chapter 2: Planning a Configuration Manager Infrastructure:

Gathering Deployment Intelligence

Planning the Configuration Manager Environment

Designing Your Configuration Manager Environment

The Bottom Line

Chapter 3: Migrating to Configuration Manager:

Introducing Migration

Migration Functionality in Configuration Manager

Planning a Migration

Performing the Migration

The Bottom Line

Chapter 4: Installation and Site Role Configuration:

Understanding Site Types

Implementing Site Servers

Installing Site System Roles

Understanding Configuration Manager Site System Roles

The Bottom Line

Chapter 5: Client Installation:

Creating Client Settings

Discovering Network Objects

Configuring Boundaries and Boundary Groups

Client Installation Methods

Verifying Client Installation

Troubleshooting a Client Installation

Ensuring Client Health

The Bottom Line

Chapter 6: Client Health:

Understanding the Client Health Mechanism

Client Health Evaluation: Results

The Bottom Line

Chapter 7: Application Deployment:

What’s New in Application Deployment?

Dependencies for Application Deployment

Elements of Application Deployment

The Application Deployment Process

The Bottom Line

Chapter 8: Software Updates:

Highlights in Software Updates

Prerequisites for Software Updates

Elements of Software Updates

The Software Update Process in Configuration Manager

Planning to Use Software Updates in Configuration Manager

Configuring Software Updates

Preparing Software Updates for Deployment

Deploying Software Updates with the Deploy Software Updates Wizard

Using System Center Updates Publisher

Monitoring Software Update Deployments

Windows Update Servicing

The Bottom Line

Chapter 9: Operating System Deployment:

What’s New in Operating System Deployment

Planning for OSD with Configuration Manager

Deployment Process

Preparing Configuration Manager for OSD

Adding Operating System Source

Developing a Task Sequence for Creating a Capture Image

Capturing an Operating System Image

Deploying an Image

Upgrading Operating System to Windows 10

Deploying the Operating System on Bare Metal

Installing Device Drivers into OSD

Using User Device Affinity

Microsoft Deployment Toolkit 2013

Deploying a Virtual Hard Drive

Servicing Your Operating System Images and VHDs Offline

Maintaining the User State

Windows 10 as a Service

The Bottom Line

Chapter 10: Inventory and Software Metering:

Inventory in Configuration Manager

Software Metering in Configuration Manager

The Bottom Line

Chapter 11: Asset Intelligence:

Requirements for Asset Intelligence

Elements of Asset Intelligence

Configuring Asset Intelligence

Import Software License into Asset Intelligence

The Bottom Line

Chapter 12: Reporting:

Installing SQL Server Reporting Services

Running a Report

Working with Reporting Security

Managing Reports

Creating Reports

Importing and Exporting Reports

The Bottom Line

Chapter 13: Compliance Settings:

Overview of Compliance Settings

Configuring Compliance Settings Client Settings

Creating Configuration Items

Building a Configuration Baseline

Compliance Settings Reporting

Configuring Windows Information Protection

Importing Configuration Packs

User Data and Profiles

Remote Connection Profiles

Compliance Policies

Conditional Access

Company Resource Access

Terms and Conditions

Windows 10 Edition Upgrade

The Bottom Line

Chapter 14: Endpoint Protection:

Benefits of Endpoint Protection

Endpoint Protection Point Site System Role

Endpoint Protection Client Agent

Endpoint Protection Policies

Definition Files

Alerts

Reporting

The Bottom Line

Chapter 15: Role-Based Administration:

Overview of Role-Based Administration

Security Roles

Security Scopes

Collections

Administrative Users

RBA Viewer

The Bottom Line

Chapter 16: Disaster Recovery:

Planning for Disaster Recovery

Backing Up Configuration Manager

Restoring Configuration Manager

Recovering Configuration Manager

Unattended Recovery of a Site

Other Site Maintenance Options

The Bottom Line

Chapter 17: Troubleshooting:

Creating the Maintenance Plan

Using Troubleshooting Tools

Troubleshooting a Configuration Manager Site Installation

Troubleshooting a Client Installation

Troubleshooting Inventory

Troubleshooting Mobile Devices

The Bottom Line

Chapter 18: Enterprise Mobility and Configuration Manager:

Mobile Devices in Configuration Manager

Lite Management

Depth Management via Microsoft Intune

On-Premises MDM

Terms and Conditions

Corporate-Owned iOS Devices

Corporate-Owned Windows Devices

Enrolling Devices

Troubleshooting

The Bottom Line

Appendix:

Chapter 2: Planning a Configuration Manager Infrastructure

Chapter 3: Migrating to Configuration Manager

Chapter 4: Installation and Site Role Configuration

Chapter 5: Client Installation

Chapter 6: Client Health

Chapter 7: Application Deployment

Chapter 8: Software Updates

Chapter 9: Operating System Deployment

Chapter 10: Inventory and Software Metering

Chapter 11: Asset Intelligence

Chapter 12: Reporting

Chapter 13: Compliance Settings

Chapter 14: Endpoint Protection

Chapter 15: Role-Based Administration

Chapter 16: Disaster Recovery

Chapter 17: Troubleshooting

Chapter 18: Enterprise Mobility and Configuration Manager

End User License Agreement

List of Tables

Chapter 1

TABLE 1.1:

Chapter 2

TABLE 2.1:

TABLE 2.2:

TABLE 2.3:

TABLE 2.4:

TABLE 2.5:

TABLE 2.6:

TABLE 2.7:

TABLE 2.8:

TABLE 2.9:

TABLE 2.10:

TABLE 2.11:

TABLE 2.12:

TABLE 2.13:

TABLE 2.14:

TABLE 2.15:

TABLE 2.16:

Chapter 3

TABLE 3.1:

Chapter 4

TABLE 4.1:

Chapter 5

TABLE 5.1:

Chapter 6

TABLE 6.1:

Chapter 7

TABLE 7.1:

TABLE 7.2:

TABLE 7.3:

Chapter 10

TABLE 10.1:

TABLE 10.2:

TABLE 10.3:

Chapter 11

TABLE 11.1:

Chapter 12

TABLE 12.1:

TABLE 12.2:

TABLE 12.3:

TABLE 12.4:

TABLE 12.5:

TABLE 12.6:

TABLE 12.7:

TABLE 12.8:

TABLE 12.9:

Chapter 13

TABLE 13.1

TABLE 13.2

Chapter 16

TABLE 16.1:

TABLE 16.2:

TABLE 16.3:

TABLE 16.4:

TABLE 16.5:

TABLE 16.6:

Chapter 17

TABLE 17.1:

TABLE 17.2:

TABLE 17.3:

TABLE 17.4:

TABLE 17.5:

TABLE 17.6:

TABLE 17.7:

TABLE 17.8:

TABLE 17.9:

TABLE 17.10:

List of Illustrations

Chapter 1

FIGURE 1.1

Microsoft System Center Configuration Manager Console

FIGURE 1.2

Servicing model in the Technical Preview

FIGURE 1.3

Servicing model in the Current Branch

FIGURE 1.4

Servicing model in the Technical Preview, prerequisites check

FIGURE 1.5

Servicing model in the Current Branch, prerequisites check

FIGURE 1.6

EasySetupPayload folder

FIGURE 1.7

Monitoring Workspace, Site Servicing Status

FIGURE 1.8

Prereq Only

FIGURE 1.9

Configuration Manager Updates Wizard in the Technical Preview

FIGURE 1.10

Features in Update Pack

FIGURE 1.11

Client update options

Chapter 2

FIGURE 2.1

A Configuration Manager hierarchy

FIGURE 2.2

Managing the content on the distribution point

Chapter 3

FIGURE 3.1

Specifying the Configuration Manager source hierarchy

FIGURE 3.2

Collections that cannot be migrated are automatically discovered.

FIGURE 3.3

Limit collections for which the scope will possibly be increased.

FIGURE 3.4

Replacing the discovered source site code with the new site code

FIGURE 3.5

The Migration dashboard

FIGURE 3.6

The first data-gathering process is complete.

FIGURE 3.7

Additional sources site discovered during the data-gathering process

FIGURE 3.8

Selecting the collections that need to be migrated

FIGURE 3.9

Select the objects that need to be migrated.

FIGURE 3.10

Select the changed objects that need to be re-migrated.

FIGURE 3.11

Be sure you have enough disk space for converting packages to the new content library.

FIGURE 3.12

Monitor the upgrade status.

FIGURE 3.13

Extracting the prestaged package file to the new distribution point

FIGURE 3.14

Deinstalling the secondary site from Configuration Manager 2007 SP2

FIGURE 3.15

Cleaning up the migration data of the source hierarchy

Chapter 4

FIGURE 4.1

The Administration workspace within the Configuration Manager console

FIGURE 4.2

Site systems and roles

FIGURE 4.3

ConfigMgr Prerequisites Tool version 1.4.2 running on Windows Server 2012 R2

FIGURE 4.4

Setup Wizard: Getting Started page, when installing on a system without Configuration Manager

FIGURE 4.5

Setup Wizard: Product Key after October 2016 Release

FIGURE 4.6

Setup Wizard: Prerequisite Downloads page

FIGURE 4.7

Setup Wizard: Site And Installation Settings page

FIGURE 4.8

Setup Wizard: Database Information page

FIGURE 4.9

Setup Wizard: Settings Summary page

FIGURE 4.10

Setup Wizard: Prerequisite Check page

FIGURE 4.11

Setup Wizard: Install page: installation complete

FIGURE 4.12

Setup Wizard: Getting Started page for a primary site

FIGURE 4.13

Setup Wizard: Database Information page for a primary site

FIGURE 4.14

Setup Wizard: Client Computer Communication Settings page for a primary site

FIGURE 4.15

Setup Wizard: Site System Roles page for a primary site

FIGURE 4.16

Secondary site installation

FIGURE 4.17

Create Secondary Site Wizard: General page

FIGURE 4.18

Create Secondary Site Wizard: SQL Server Settings page

FIGURE 4.19

Create Secondary Site Wizard: Distribution Point page

FIGURE 4.20

Create Secondary Site Wizard: Drive Settings page

FIGURE 4.21

Create Secondary Site Wizard: Content Validation page

FIGURE 4.22

Create Secondary Site Wizard: Summary page

FIGURE 4.23

Right-click the secondary site and choose Show Install Status to see this screen.

FIGURE 4.24

Administration console showing the Sites node

FIGURE 4.25

Post-installation Identification key

FIGURE 4.26

Post-installation CCM key

FIGURE 4.27

Post-installation ConfigMgr10 key

FIGURE 4.28

Post-installation Services key

FIGURE 4.29

Microsoft Configuration Manager installation folder

FIGURE 4.30

Management point SMS_CCM installation folder

FIGURE 4.31

SMS_ groups added as part of installation

FIGURE 4.32

WMI namespace validation

FIGURE 4.33

Services validation

FIGURE 4.34

Database validation

FIGURE 4.35

Use the Create Site System Server button on the ribbon to create a new server; use the context menu to assign a new role on an existing server.

FIGURE 4.36

Add Site System Roles Wizard: General page

FIGURE 4.37

Create Site System Server Wizard: distribution point selected

FIGURE 4.38

Create Site System Server Wizard: Distribution Point page

FIGURE 4.39

Create Site System Server Wizard: Drive Settings page

FIGURE 4.40

Create Site System Server Wizard: Pull Distribution Point page

FIGURE 4.41

Create Site System Server Wizard: PXE page

FIGURE 4.42

Create Site System Server Wizard: Multicast page

FIGURE 4.43

Create Site System Server Wizard: Content Validation page

FIGURE 4.44

Create Site System Server Wizard: Summary page

FIGURE 4.45

Distribution point structure

FIGURE 4.46

SCCMContentLib structure

FIGURE 4.47

PkgLib folder structure and INI files

FIGURE 4.48

DataLib folder structure, GUID folder, and configuration file

FIGURE 4.49

FileLib folder structure

FIGURE 4.50

Add Site System Roles Wizard: Management Point page

FIGURE 4.51

Add Site System Roles Wizard: Management Point Database page

FIGURE 4.52

Add Site System Roles Wizard: State migration point selected

FIGURE 4.53

Add Site System Roles Wizard: State Migration Point page

FIGURE 4.54

Add Site System Roles Wizard: Boundary Groups page

FIGURE 4.55

Add Site System Roles Wizard: Fallback Status Point page

FIGURE 4.56

Add Site System Roles Wizard: Reporting Services Point page

FIGURE 4.57

Add Site System Roles Wizard: Application Catalog website point and Application Catalog web service point selected

FIGURE 4.58

Add Site System Roles Wizard: Application Catalog Web Service Point page

FIGURE 4.59

Add Site System Roles Wizard: Application Catalog Website Point page

FIGURE 4.60

Add Site System Roles Wizard: Enrollment Point page

FIGURE 4.61

Add Site System Roles Wizard: Enrollment Proxy Point page

FIGURE 4.62

Add Site System Roles Wizard: System Role Selection page with Software Update Point selected

FIGURE 4.63

Add Site System Roles Wizard: Proxy And Account Settings page

FIGURE 4.64

Add Site System Roles Wizard: Synchronization Source page

FIGURE 4.65

Add Site System Roles Wizard: Supersedence Rules page

FIGURE 4.66

Add Site System Roles Wizard: Classifications page

FIGURE 4.67

Add Site System Roles Wizard: Products page

FIGURE 4.68

Add Site System Roles Wizard: Microsoft Active Protection Service page

FIGURE 4.69

Add Site System Roles Wizard: Asset Intelligence Synchronization Point Settings page

Chapter 5

FIGURE 5.1

Client settings

FIGURE 5.2

Creating custom client settings

FIGURE 5.3

New Active Directory Container search criteria

FIGURE 5.4

The Select New Container dialog box

FIGURE 5.5

Discovery methods

FIGURE 5.6

Configuring Active Directory Forest Discovery

FIGURE 5.7

Defining a new Active Directory forest

FIGURE 5.8

Custom Active Directory system attributes

FIGURE 5.9

Heartbeat Discovery Properties

FIGURE 5.10

Active Directory System Discovery polling schedule

FIGURE 5.11

The Custom Schedule dialog for Network Discovery

FIGURE 5.12

Creating a boundary

FIGURE 5.13

Boundary group configured for site assignment

FIGURE 5.14

The General tab of Client Push Installation Properties

FIGURE 5.15

The Accounts tab of Client Push Installation Properties

FIGURE 5.16

The Installation Properties tab of Client Push Installation Properties

FIGURE 5.17

Client push Install Configuration Manager Client Wizard settings

FIGURE 5.18

Linux/Unix client installation

FIGURE 5.19

Mac Computer Enrollment Wizard

FIGURE 5.20

Verifying that the site code has been obtained

FIGURE 5.21

CCM evaluation task

FIGURE 5.22

Client Status Settings Properties—General tab

FIGURE 5.23

Configuring alert settings on a collection

FIGURE 5.24

Automatic Client Upgrade configuration

Chapter 6

FIGURE 6.1

Scheduled task created by a client installation

FIGURE 6.2

Properties window for the scheduled task

FIGURE 6.3

Triggers tab for the scheduled task

FIGURE 6.4

Actions tab for the scheduled task

FIGURE 6.5

Conditions tab for the scheduled task

FIGURE 6.6

Settings tab for the scheduled task

FIGURE 6.7

History tab for the scheduled task

FIGURE 6.8

CCMEval executable in the %WINDIR%\CCM folder

FIGURE 6.9

CCMEval.xml example

FIGURE 6.10

CCMEval.log sample

FIGURE 6.11

Summary tab for specific device

FIGURE 6.12

Client Activity Detail tab for specific device

FIGURE 6.13

Client Check Detail tab for specific device

FIGURE 6.14

Client Status Settings Properties

FIGURE 6.15

Client Check node in the Monitoring workspace of the Configuration Manager console

FIGURE 6.16

Client Activity node in the Monitoring workspace of the Configuration Manager console

FIGURE 6.17

Client Status reports

FIGURE 6.18

Client health collection alerts

Chapter 7

FIGURE 7.1

Applications and Packages nodes

FIGURE 7.2

BITS settings

FIGURE 7.3

Computer Agent settings

FIGURE 7.4

Computer Restart settings

FIGURE 7.5

Software Deployment settings

FIGURE 7.6

User and Device Affinity settings

FIGURE 7.7

Network access account in Software Distribution Component Properties

FIGURE 7.8

Sample application properties

FIGURE 7.9

Sample deployment type properties

FIGURE 7.10

Sample deployment properties

FIGURE 7.11

General page of the Create Application Wizard

FIGURE 7.12

Import Information page of the Create Application Wizard

FIGURE 7.13

General Information page of the Create Application Wizard

FIGURE 7.14

Ribbon options for application deployment

FIGURE 7.15

Viewing revision history

FIGURE 7.16

Create Prestaged Content File Wizard

FIGURE 7.17

Simulate Application Deployment Wizard

FIGURE 7.18

Foxit Reader properties in the General tab of the Export Application Wizard

FIGURE 7.19

Foxit Reader 7.3 Properties—General Information tab

FIGURE 7.20

Foxit Reader 7.3 Properties—Application Catalog tab

FIGURE 7.21

Foxit Reader 7.3 Properties—Deployment Types tab

FIGURE 7.22

Foxit Reader 7.3 Properties—Content Locations tab

FIGURE 7.23

Foxit Reader 7.3 Properties—Supersedence tab

FIGURE 7.24

Displaying deployment type properties

FIGURE 7.25

Sample deployment type properties—General tab

FIGURE 7.26

Sample deployment type properties—Content tab

FIGURE 7.27

Sample deployment type properties—Programs tab

FIGURE 7.28

Sample deployment type properties—Detection Method tab

FIGURE 7.29

Sample deployment type’s properties—User Experience tab

FIGURE 7.30

Sample deployment type’s properties—Requirements tab

FIGURE 7.31

Sample deployment type’s properties—Return Codes tab

FIGURE 7.32

Sample deployment type’s properties—Dependencies tab

FIGURE 7.33

Deploy Software Wizard—General page

FIGURE 7.34

Deploy Software Wizard—Content page

FIGURE 7.35

Deploy Software Wizard—Deployment Settings page

FIGURE 7.36

Deploy Software Wizard—Scheduling page

FIGURE 7.37

Deploy Software Wizard—User Experience page

FIGURE 7.38

Deploy Software Wizard—Alerts page

FIGURE 7.39

Second deployment added, targeted to a user collection

FIGURE 7.40

Foxit Reader in the Software Center

FIGURE 7.41

Foxit Reader in the Application Catalog

FIGURE 7.42

Software Center Options tab

FIGURE 7.43

The new Software Center

FIGURE 7.44

Supersedence relationship added to Foxit Reader application

FIGURE 7.45

Supersedence reference

FIGURE 7.46

Dependency configuration

FIGURE 7.47

Requirements node completed

FIGURE 7.48

Global Conditions node

FIGURE 7.49

Reviewing the references of the Custom Global Condition

FIGURE 7.50

App-V virtual environment for Office 2010 and Visio 2010

FIGURE 7.51

Select an application from the Microsoft Store.

FIGURE 7.52

Adding sideloading keys

FIGURE 7.53

The DMG file is converted to a CMMAC file.

FIGURE 7.54

Detection method for a Mac OS X application

FIGURE 7.55

Select the platform for which the program is created.

FIGURE 7.56

User-configurable Device Affinity option

FIGURE 7.57

Import User Device Affinity Wizard screen

FIGURE 7.58

Configuring automatic user device affinity detection

FIGURE 7.59

Edit Primary Users

FIGURE 7.60

Deployments node of the Monitoring section

FIGURE 7.61

Deployment status

Chapter 9

FIGURE 9.1

Boot Image Properties

FIGURE 9.2

Software Distribution Component Properties dialog box

FIGURE 9.3

Add Site System Roles Wizard—State Migration Point page

FIGURE 9.4

Designating a storage folder

FIGURE 9.5

Review Required Ports For PXE dialog

FIGURE 9.6

PXE settings page

FIGURE 9.7

Enable the boot image to boot via PXE.

FIGURE 9.8

Add an install.wim file as an operating system image.

FIGURE 9.9

Creating an operating system upgrade package

FIGURE 9.10

Define which Windows operating system will be captured.

FIGURE 9.11

Install the Configuration Manager client task.

FIGURE 9.12

Captured image path and filename

FIGURE 9.13

Create Task Sequence Media Wizard—Select Media Type page

FIGURE 9.14

Create Task Sequence Media Wizard—Media Type page

FIGURE 9.15

Create Task Sequence Media Wizard—Boot Image page

FIGURE 9.16

High-risk deployment warning

FIGURE 9.17

Specify the deployment settings.

FIGURE 9.18

Selecting the task sequence

FIGURE 9.19

Image Capture Wizard—Image Destination page

FIGURE 9.20

Image capture success message

FIGURE 9.21

Create Task Sequence Wizard—Install Windows page

FIGURE 9.22

Create Task Sequence Wizard—State Migration page

FIGURE 9.23

Create Task Sequence Wizard—Install Applications page

FIGURE 9.24

Deploy Software Wizard—Deployment Settings page

FIGURE 9.25

Installation progress message box

FIGURE 9.26

Booting to WinPE

FIGURE 9.27

Monitoring the OSD deployment status

FIGURE 9.28

Review the task sequence steps in the Asset Message dialog screen.

FIGURE 9.29

Select an operating system upgrade package.

FIGURE 9.30

Import Computer Information Wizard—Single Computer page

FIGURE 9.31

Create Task Sequence Wizard—State Migration page

FIGURE 9.32

Import New Driver Wizard—Locate Driver page

FIGURE 9.33

Import New Driver Wizard—Add Driver To Packages page

FIGURE 9.34

Adding drivers to boot images

FIGURE 9.35

Searching for and selecting the primary user

FIGURE 9.36

Configuring client device settings

FIGURE 9.37

Checking the column mapping

FIGURE 9.38

Configuring deployment settings

FIGURE 9.39

Configuring the integration

FIGURE 9.40

Configure the platform and scratch space.

FIGURE 9.41

Create a new Microsoft Deployment Toolkit Files package.

FIGURE 9.42

Select or create the operating system image you want to deploy.

FIGURE 9.43

Specifying general information for the VHD

FIGURE 9.44

VHD creation process

FIGURE 9.45

The created virtual machine in Hyper-V

FIGURE 9.46

Modifying the VHD

FIGURE 9.47

Select the updates that you want to install.

FIGURE 9.48

View the installed updates in the Windows image.

FIGURE 9.49

Managing the user state

FIGURE 9.50

Windows 10 Servicing dashboard, part 1

FIGURE 9.51

Windows 10 Servicing Dashboard, part 2

FIGURE 9.52

Specifying the deployment ring

FIGURE 9.53

Selecting the property filters and search criteria

Chapter 10

FIGURE 10.1

Default hardware inventory settings

FIGURE 10.2

Default software inventory settings

FIGURE 10.3

Resource Explorer

FIGURE 10.4

Configuring hardware inventory

FIGURE 10.5

The configuration .mof file

FIGURE 10.6

Default Software Inventory settings

FIGURE 10.7

Scanning for EXE files

FIGURE 10.8

Collecting files

FIGURE 10.9

Specifying all *.sys files from a folder

FIGURE 10.10

Configure a new display name.

FIGURE 10.11

A custom display name

FIGURE 10.12

Software information in Resource Explorer

FIGURE 10.13

FileSystemFile .log

FIGURE 10.14

Files generated by the inventory and discovery processes

FIGURE 10.15

Reading a collected file in Resource Explorer

FIGURE 10.16

Default Software Metering settings

FIGURE 10.17

Software Metering Properties dialog box

FIGURE 10.18

Software Metering node with software metering rules

FIGURE 10.19

General page of the Create Software Metering Rule Wizard

FIGURE 10.20

Software metering maintenance tasks

FIGURE 10.21

Software Metering Summarization Progress report

FIGURE 10.22

Reading the mtrmgr .log file on the client

FIGURE 10.23

Running the Software Metering Usage Report Cycle action on the client

Chapter 11

FIGURE 11.1

Site Maintenance dialog

FIGURE 11.2

Asset Intelligence home page

FIGURE 11.3

Asset Intelligence Edit Inventory Classes dialog

FIGURE 11.4

Import Software Licenses Wizard

FIGURE 11.5

General License Statement import

FIGURE 11.6

General License Statement

Chapter 12

FIGURE 12.1

Creating the data source

FIGURE 12.2

Viewing the default reports

FIGURE 12.3

The Client Push status report opened from the console

FIGURE 12.4

Contents of the All application deployments (advanced) report

FIGURE 12.5

Report options for built-in security roles

FIGURE 12.6

Creating a Windows file-based report subscription

FIGURE 12.7

Creating a report using Report Builder 3.0

Chapter 13

FIGURE 13.1

Compliance Settings main page

FIGURE 13.2

The default client settings

FIGURE 13.3

The Create Configuration Item Wizard, General page

FIGURE 13.4

The Create Configuration Item Wizard's Manage Administrative Categories dialog box

FIGURE 13.5

Create Configuration Item Wizard, General page completed

FIGURE 13.6

CI application Detection Methods page

FIGURE 13.7

CI application Settings page

FIGURE 13.8

Create Setting dialog

FIGURE 13.9

General page of the Create Setting dialog box completed

FIGURE 13.10

The Compliance Rules page

FIGURE 13.11

The Compliance Rules, Create Rule dialog box

FIGURE 13.12

Application CI Summary page

FIGURE 13.13

Create Configuration Baseline Wizard, Create Configuration Baseline dialog

FIGURE 13.14

Add Configuration Items

FIGURE 13.15

Add Software Updates window

FIGURE 13.16

Deploy Configuration Baselines Wizard

FIGURE 13.17

Configuration Manager client configurations

FIGURE 13.18

Compliance report

FIGURE 13.19

Windows 10 Configuration Item

FIGURE 13.20

Selecting Windows Information Protection

FIGURE 13.21

Windows Information Protection Default allow rule

FIGURE 13.22

Creating a WIP rule based on AppLocker Policy files

FIGURE 13.23

Create a WIP rule by publisher, product name, binary name, and version

FIGURE 13.24

Create an AppLocker policy file (XML)

FIGURE 13.25

Configure Windows Information Protection Settings, part 1

FIGURE 13.26

Configure Windows Information Protection Settings, part 2

FIGURE 13.27

Enterprise Data Protection icon overlay (briefcase)

FIGURE 13.28

Configure Windows Information Protection Settings, part 3

FIGURE 13.29

Deploying a WIP policy with the remediate noncompliant rule

FIGURE 13.30

Overriding the behavior of WIP

FIGURE 13.31

Blocking the behavior of WIP

FIGURE 13.32

Microsoft Security Compliance Manager

FIGURE 13.33

Import Configuration Data Wizard, Select Files page

FIGURE 13.34

Import Configuration Data Wizard, Confirmation page

FIGURE 13.35

Create User Data And Profiles Configuration Item Wizard

FIGURE 13.36

Create User Data And Profiles Configuration Item Wizard, Folder Redirection screen

FIGURE 13.37

Create User Data And Profiles Configuration Item Wizard, Offline Files screen

FIGURE 13.38

Create User Data And Profiles Configuration Item Wizard, Roaming Profiles screen

FIGURE 13.39

Create User Data And Profiles Configuration Item Wizard, Summary screen

FIGURE 13.40

Deploy User Data And Profiles Configuration Policy dialog

FIGURE 13.41

Create Remote Connection Profile Wizard, General page

FIGURE 13.42

Create Remote Connection Profile Wizard, Profile Settings page

FIGURE 13.43

Create Compliance Policy Wizard, General page

FIGURE 13.44

Create Compliance Policy Wizard, Supported Platforms page

FIGURE 13.45

Create Compliance Policy Wizard, Rules page

FIGURE 13.46

Exchange Online action required message for noncompliant Android device

FIGURE 13.47

Exchange Online action required message for noncompliant iOS device

FIGURE 13.48

Configuring conditional access for Exchange Online

FIGURE 13.49

Exchange Online policy

FIGURE 13.50

Web redirect to install the Company Portal app on iOS

FIGURE 13.51

Web redirect to install the Company Portal app on Android

FIGURE 13.52

Company Access Setup on iOS

FIGURE 13.53

Company Access Setup on Android

FIGURE 13.54

Policy Compliance Status: In Compliance (iOS)

FIGURE 13.55

Policy Compliance Status: In Compliance (Android)

FIGURE 13.56

Compliance Settings, Company Resource Access

FIGURE 13.57

Create Certificate Profile Wizard, General page

FIGURE 13.58

Create Certificate Profile Wizard, Trusted CA Certificate page

FIGURE 13.59

Create Certificate Profile Wizard, Supported Platforms page

FIGURE 13.60

Create Certificate Profile Wizard, Completion page

FIGURE 13.61

Create Exchange ActiveSync Email Profile Wizard, Exchange ActiveSync page

FIGURE 13.62

Create Exchange ActiveSync Email Profile Wizard, Synchronization Settings page

FIGURE 13.63

Create VPN Profile Wizard, General page

FIGURE 13.64

Create VPN Profile Wizard, Connection page

FIGURE 13.65

Create VPN Profile Wizard, Authentication Method page

FIGURE 13.66

Create VPN Profile Wizard, Proxy Settings page

FIGURE 13.67

Create VPN Profile Wizard, Automatic VPN page

FIGURE 13.68

Create VPN Profile Wizard, Supported Platforms page

FIGURE 13.69

Create Wi-Fi Profile Wizard, General page

FIGURE 13.70

Create Wi-Fi Profile Wizard, Wi-Fi Profile page

FIGURE 13.71

Create Wi-Fi Profile Wizard, Security Configuration page

FIGURE 13.72

Create Wi-Fi Profile Wizard, Advanced Settings page

FIGURE 13.73

Create Wi-Fi Profile Wizard, Proxy Settings page

FIGURE 13.74

Windows Hello For Business Wizard, Settings page

FIGURE 13.75

Create Terms And Conditions Wizard, Terms page

FIGURE 13.76

Create Edition Upgrade Policy Wizard, General page

Chapter 14

FIGURE 14.1

Selecting the Endpoint Protection Point role

FIGURE 14.2

Endpoint Protection listed in Programs and Features

FIGURE 14.3

Selecting the Endpoint Protection custom setting

FIGURE 14.4

Configuring Endpoint Protection settings

FIGURE 14.5

Configuring the Scheduled Scans settings

FIGURE 14.6

Configuring the Scan Settings

FIGURE 14.7

Configuring the Default Actions settings

FIGURE 14.8

Configuring the Real-Time Protection settings

FIGURE 14.9

Configuring the Exclusion Settings

FIGURE 14.10

Configuring the Advanced settings

FIGURE 14.11

Configuring the Threat Overrides settings

FIGURE 14.12

Configuring the MAPS settings

FIGURE 14.13

Configuring the Definition Updates settings

FIGURE 14.14

Configuring Windows Firewall policy

FIGURE 14.15

Increasing policy priority

FIGURE 14.16

Obtaining the definition update version

FIGURE 14.17

Definition update status

FIGURE 14.18

Verifying the Endpoint Protection client definition version

FIGURE 14.19

Alerts tab in the collection properties

FIGURE 14.20

Antimalware Activity Report

FIGURE 14.21

Notification Agent log and Endpoint Protection log

Chapter 15

FIGURE 15.1

Built-in security roles

FIGURE 15.2

Application Administrator Properties

FIGURE 15.3

Security scopes

FIGURE 15.4

New security scope

FIGURE 15.5

New security scope and application

FIGURE 15.6

New security scope

FIGURE 15.7

Objects Secured By A Single Security Scope report

FIGURE 15.8

Assigned security scopes and collections

FIGURE 15.9

Create Security Scopes

FIGURE 15.10

Set Security Scopes

FIGURE 15.11

Security Scope List, In Use

FIGURE 15.12

Add Scope to User

FIGURE 15.13

User with RBA Rights Console View

FIGURE 15.14

User with RBA Rights Devices View

FIGURE 15.15

User with RBA Rights Applications View

FIGURE 15.16

User with RBA Rights Deployments View

FIGURE 15.17

User with RBA Rights Reports View

FIGURE 15.18

RBA Viewer Roles Similarity

FIGURE 15.19

RBA Viewer Console Review

FIGURE 15.20

Collection limiting

Chapter 16

FIGURE 16.1

A sample AfterBackup.bat file calling a PowerShell script

FIGURE 16.2

The Backup Site Server properties

FIGURE 16.3

Starting the site recovery process

FIGURE 16.4

Site Server And Database Recovery Options

FIGURE 16.5

The Site Recovery Information page

FIGURE 16.6

The Prerequisite Downloads page

FIGURE 16.7

Site And Installation Settings page

FIGURE 16.8

Database Information page

FIGURE 16.9

Database Information page

FIGURE 16.10

Prerequisite Check page

FIGURE 16.11

Install page

FIGURE 16.12

Finished page

FIGURE 16.13

Viewing ConfigMgrSetup .log

FIGURE 16.14

Selecting the Perform Site Maintenance Or Reset This Site option

FIGURE 16.15

Available Site Maintenance options

Chapter 17

FIGURE 17.1

Enabling the Backup Site Server task

FIGURE 17.2

CMTrace Error Lookup window

FIGURE 17.3

Highlighted error in CMTrace

FIGURE 17.4

The Site Status dashboard

FIGURE 17.5

The Show Messages menu

FIGURE 17.6

The Configuration Manager Status Message Viewer window

FIGURE 17.7

The Status Message Details dialog

FIGURE 17.8

Distribution Point Job Queue Manager

FIGURE 17.9

Collection Evaluation Viewer

FIGURE 17.10

Content Library Explorer

FIGURE 17.11

Security Configuration Wizard Template XML file

FIGURE 17.12

Content Library Transfer

FIGURE 17.13

Content Ownership Tool

FIGURE 17.14

RBA Viewer

FIGURE 17.15

Run Metering Summarization Tool

FIGURE 17.16

Client Troubleshooting Tool (CliSpy)

FIGURE 17.17

Deployment Monitoring Tool

FIGURE 17.18

PolicySpy

FIGURE 17.19

Power Viewer

FIGURE 17.20

Send Schedule Tool

FIGURE 17.21

WakeupSpy

FIGURE 17.22

System Center Support Center

FIGURE 17.23

SMS_Executive threads

FIGURE 17.24

SMS_Executive component status

FIGURE 17.25

smsexec.log file

FIGURE 17.26

Distribution Point Configuration, Distribution Status Node

FIGURE 17.27

The Database Replication node

FIGURE 17.28

RCMCtrl.log viewed in CMTrace.exe

FIGURE 17.29

Replication Link Analyzer

FIGURE 17.30

Exec SPDiagDRS in SQL Management Studio

FIGURE 17.31

Confirm Deletion of Resource in Collection

Chapter 18

FIGURE 18.1

Exchange Server Connectors location in the Configuration Manager console

FIGURE 18.2

Add Exchange Server Wizard—General page

FIGURE 18.3

Add Exchange Server Wizard—Account page

FIGURE 18.4

Add Exchange Server Wizard—Discovery page

FIGURE 18.5

Add Exchange Server Wizard—Settings page

FIGURE 18.6

Add Exchange Server Wizard—Settings page—General Settings

FIGURE 18.7

Add Exchange Server Wizard—Settings page—Password Settings

FIGURE 18.8

Add Exchange Server Wizard—Settings page—Email Management Settings

FIGURE 18.9

Add Exchange Server Wizard—Settings page—Security Settings

FIGURE 18.10

Add Exchange Server Wizard—Settings page—Application Settings

FIGURE 18.11

Lite-managed devices

FIGURE 18.12

Device context menu options

FIGURE 18.13

Domains page Admin center

FIGURE 18.14

Add an alternative UPN suffix.

FIGURE 18.15

Create a user for Azure AD Connect.

FIGURE 18.16

Connecting to Azure AD

FIGURE 18.17

Selecting domain and OUs

FIGURE 18.18

Setting the mobile device authority

FIGURE 18.19

Signing in with your Microsoft Intune organizational account

FIGURE 18.20

Create Microsoft Intune Subscription Wizard, General Configuration

FIGURE 18.21

A distribution point in Microsoft Intune is added.

FIGURE 18.22

Enabling Android support

FIGURE 18.23

Enabling iOS and Mac OS X (MDM) support

FIGURE 18.24

Create Configuration Item Wizard—General page

FIGURE 18.25

Create Configuration Item Wizard—Device Settings page

FIGURE 18.26

Create Configuration Item Wizard—Password page

FIGURE 18.27

Create Configuration Item Wizard—Device page

FIGURE 18.28

Create Configuration Item Wizard—Email Management page

FIGURE 18.29

Create Configuration Item Wizard—Store page

FIGURE 18.30

Create Configuration Item Wizard—Browser page

FIGURE 18.31

Create Configuration Item Wizard—Internet Explorer page

FIGURE 18.32

Create Configuration Item Wizard—Cloud page

FIGURE 18.33

Create Configuration Item Wizard—Security page

FIGURE 18.34

Create Configuration Item Wizard—Peak Synchronization page

FIGURE 18.35

Create Configuration Item Wizard—Roaming page

FIGURE 18.36

Create Configuration Item Wizard—Encryption page

FIGURE 18.37

Create Configuration Item Wizard—Wireless Communications page

FIGURE 18.38

Wireless Network Connection page

FIGURE 18.39

Create Configuration Item Wizard—Certificates page

FIGURE 18.40

Import Certificate dialog box

FIGURE 18.41

Create Configuration Item Wizard—System Security page

FIGURE 18.42

Create Configuration Item Wizard—Windows Server Work Folders page

FIGURE 18.43

Create Setting dialog box

FIGURE 18.44

Select your custom setting in the Browse Settings dialog box.

FIGURE 18.45

Create Rule dialog box

FIGURE 18.46

Paste the app’s URL from the App Store in the Apps URL field.

FIGURE 18.47

Create Configuration Item Wizard—Windows 10 Team page

FIGURE 18.48

Create Configuration Item Wizard—Microsoft Edge page

FIGURE 18.49

Create Configuration Item Wizard—Platform Applicability page

FIGURE 18.50

Create Configuration Item Wizard—Content Rating page

FIGURE 18.51

Create Configuration Item Wizard—Data Protection

FIGURE 18.52

Add App To The Noncompliant List dialog box

FIGURE 18.53

Create Configuration Item Wizard—Configure iOS And Mac OS X Custom Profile Settings page

FIGURE 18.54

Create Configuration Item Wizard—Configure Kiosk Mode Settings For iOS Devices

FIGURE 18.55

Create Configuration Item Wizard—Kiosk Mode – Samsung Knox page

FIGURE 18.56

Create Certificate Profile Wizard—Trusted CA Certificate page

FIGURE 18.57

Create Certificate Profile Wizard—SCEP Enrollment page

FIGURE 18.58

Create Certificate Profile Wizard—Certificate Properties page

FIGURE 18.59

Create VPN Profile Wizard—Connection page

FIGURE 18.60

Create VPN Profile Wizard—Automatic VPN page

FIGURE 18.61

Create Exchange ActiveSync Email Profile Wizard—Exchange ActiveSync page

FIGURE 18.62

Create Wi-Fi Profile Wizard—Wi-Fi Profile page

FIGURE 18.63

Create Wi-Fi Profile Wizard—Security Configuration page

FIGURE 18.64

Create Compliance Policy Wizard—Supported Platforms

FIGURE 18.65

Create Compliance Policy Wizard—Rules

FIGURE 18.66

Configuring conditional access policy

FIGURE 18.67

Enabling conditional access policy

FIGURE 18.68

Enabling conditional access policy

FIGURE 18.69

Configure Conditional Access Policy Wizard—Targeted Collections

FIGURE 18.70

Create Application Management Policy Wizard—application management policy for iOS

FIGURE 18.71

Microsoft Intune Subscription Properties dialog box

FIGURE 18.72

Creating the enrollment profile

FIGURE 18.73

System Center Configuration Manager logon page

FIGURE 18.74

Deploy Terms And Conditions

FIGURE 18.75

Setting the management authority

FIGURE 18.76

Open the Microsoft Intune company portal.

FIGURE 18.77

Beginning the company access setup

FIGURE 18.78

Enroll Windows Phone device

FIGURE 18.79

Turning on Workplace Join

FIGURE 18.80

Device enrolled in device management

FIGURE 18.81

Enrolled devices in Configuration Manager

Guide

Cover

Table of Contents

Chapter 1

Pages

iv

v

vi

vii

xxiii

xxiv

xxv

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

392

393

394

395

396

397

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

512

513

514

515

516

517

518

519

520

521

522

523

524

525

526

527

528

529

530

531

533

534

535

536

537

538

539

540

541

542

543

544

545

546

547

548

549

550

551

552

553

554

555

556

557

558

559

560

561

562

563

564

565

566

567

568

569

570

571

572

573

574

575

576

577

578

579

580

581

582

583

584

585

586

587

588

589

590

591

592

593

594

595

596

597

598

599

600

601

602

603

604

605

606

607

608

609

610

611

612

613

614

615

616

617

618

619

620

621

622

623

624

625

626

627

628

629

630

631

632

633

634

635

636

637

638

639

640

641

642

643

644

645

646

647

648

649

650

651

652

653

654

655

656

657

658

659

660

661

662

663

664

665

666

667

668

669

670

671

672

673

674

675

676

677

678

679

680

681

682

683

684

685

686

687

688

689

690

691

692

693

694

695

696

697

698

699

700

701

702

703

704

705

706

707

708

709

711

712

713

714

715

716

717

718

719

720

721

722

723

724

725

726

727

728

729

730

731

732

733

734

735

736

737

738

739

740

741

742

743

744

745

746

747

748

749

750

751

752

753

754

755

756

757

759

760

761

762

763

764

765

766

767

768

769

770

771

772

773

774

775

776

777

778

779

780

781

782

783

784

785

786

787

788

789

790

791

792

793

794

795

796

797

798

799

800

801

802

803

804

805

806

807

808

809

810

811

812

813

814

815

816

817

822

823

824

825

826

818

827

819

820

821

828

829

830

832

833

834

835

836

837

838

839

840

841

842

843

844

845

846

847

848

849

850

851

852

853

854

855

856

857

859

860

861

862

863

864

865

866

867

868

869

870

871

872

873

874

875

876

877

Introduction

The Enterprise Mobility + Security product group has completed one of the most successful management products of all time. These folks work very hard to ensure that the product meets the higher standards and are always looking for feedback about it.

This book is written by a group of individuals who have endured the growing pains of this product, some even from day one, and who have helped Microsoft improve Configuration Manager with countless hours of real-world use and testing.

Welcome to Mastering System Center Configuration Manager. You will gain the knowledge you need to unlock Configuration Manager and Enterprise Mobility + Security to its full potential.

The Mastering Series

The Mastering series from Sybex provides outstanding instruction for readers with intermediate and advanced skills in the form of top-notch training and development for those already working in their field and provides clear, serious education for those aspiring to become pros. Every Mastering book includes the following:

Real-world scenarios, ranging from case studies to interviews that show how the tool, technique, or knowledge presented is applied in actual practice

Skill-based instruction, with chapters organized around real tasks rather than abstract concepts or subjects

Self-review questions, so you can be certain you’re equipped to do the job right

What This Book Covers

Mastering System Center Configuration Manager