Cargando…

Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples /

If you are an experienced Configuration Manager administrator looking to advance your career or get more from your current environment, then this book is ideal for you. Prior experience of deploying and managing a Configuration Manager site would be helpful in following the examples throughout this...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Coupland, Martyn (autohr.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2014.
Colección:Professional expertise distilled.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Designing Complex Hierarchies; Selecting the appropriate site system server; When to use a central administration site; Determining the location of primary sites; Working with secondary sites; Client count; Traffic control; Local management point; What should you do when you are unsure?; Designing fault-tolerant hierarchies; Fault tolerance in site systems; Fault tolerance in site-system roles; Backup and recovery in Configuration Manager.
  • Advanced backup optionsAdditional backup tasks; Restoring a Configuration Manager site; Post recovery tasks to complete the recovery; Designing to support trusted forests; Designing to support nontrusted forests; Designing a sample hierarchy; Business requirements; Design assumptions and risks; Planning the new hierarchy; Directly addressing the stated requirements; Planning for the SQL Server configuration; Planning for fault tolerance and high availability; Defining the business benefits; Delivering the design documentation; Design diagrams; Summary.
  • Chapter 2: Implementing Security with CertificatesPlanning for the use of certificates; Setting up a secure communication; Preparing the certificate authority; Setting up certificate services using the user interface; Setting up certificate services using PowerShell; Configuring certificate templates; Creating the web server certificate template; Creating the client certificate for distribution points; Creating the client certificate for Windows computers; Issuing certificate templates; Requesting the web server certificate; Requesting the client certificate for distribution points.
  • Deploying the client certificate for Windows workstationsConfiguring IIS to use the distribution point certificate; Configuring Configuration Manager; Configuring distribution points to use certificates; Configuring management points to use certificates; Deploying certificates to workgroup computers; Summary; Chapter 3: Working with Inventory, Asset Intelligence, and Software Metering; Configuring software and hardware inventory; Planning the configuration of inventory; Configuring hardware inventory; Initiating inventory cycles manually; Using inventory data to your advantage.
  • Controlling inventory with control filesTracking assets with inventory; Tracking build cycles with the registry; Tracking with reports; Making use of software metering; Modifying metering retention; Viewing metering data; Removing unused software with metering data; Real-world use of asset intelligence; Licensing with asset intelligence; Controlling applications with inventory data; Using security groups for application control; Summary; Chapter 4: Security with Endpoint Protection; Configuring the endpoint protection infrastructure; Deploying the endpoint protection point.