index [configmgrblog.com] note to the reader: ... wsus, 365–366 administrative folder migration,...
TRANSCRIPT
IndexNote to the Reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations.
Aaccounts and Accounts page
client push installation, 255, 255Exchange Server, 607, 607Network Access, 420, 420
actions and Actions pageapplication deployment, 310client installation, 260scheduled tasks, 734, 734software updates, 355, 355
Active Directory (AD)discovery methods, 51–52, 236–237, 236–238
forests, 238, 238–239groups, 241, 241heartbeat, 241–243, 244network, 242scheduling, 243–244, 243–245system, 239–240, 240users, 240
management points, 177–178schema, 36–37site boundaries, 44–45system health validator points, 181
Active Directory Container dialog box, 236, 236Active Directory Domain Services, 52Active Directory Membership setting, 367, 372Active Settings page, 200, 367, 368–369, 373Active Site System Roles Wizard, 368–369, 368–369active software update points setup, 366
Central Administration Site, 366–370, 367–369checking, 375primary sites
child of CAS, 370–372, 371stand-alone, 372–374
ActiveSync connections, 604–605, 605, 615Activity Management Technology (AMT), 19
enrollment point, 195–199, 197–198out-of-band service points, 187–189, 188–189
Add Application Catalog Website To Internet Explorer Trusted Sites Zone option, 232
Add Confi guration Items dialog box, 591, 591Add Distribution Point Groups dialog box, 441Add Distribution Points dialog box, 441Add Driver To Boot Images page, 456, 457Add Driver To Packages page, 456, 456
Add Exchange Server WizardAccount page, 607, 607Discovery page, 608–609, 608General page, 606–607, 606Settings page, 609
Application settings, 614, 614Email Management settings, 612–613, 612General settings, 610, 610Password settings, 610–611, 611Security settings, 613–614, 613
Add New Collection Alerts window, 720, 720Add Partner Software Updates Catalogs page, 398, 398Add Site System Roles Wizard, 158–160, 159
Application Catalog Web Service Point, 192–194, 192, 194
Application Catalog Web Site Point, 192–193, 192–193
distribution points, 163–169, 163–169Endpoint Protection Manager, 204–205, 205fallback status points, 186, 186management points, 175–177, 175–176mobile device and AMT enrollment points,
196–199, 197–198out-of-band management, 187–189, 188–189Reporting Services, 189–190, 190, 535–536, 536SCEP, 703–704, 704Software Update Point, 199–204, 199–203state migration points, 182–184, 182–184system health validator, 181
Add Software Updates window, 591, 591Add User Account screen, 471Add User Or Group dialog box, 550Additional Settings page, 642–644, 642ADForestDisc.log fi le, 238AdminConsole.msi fi le, 98Administration Security report, 538administrative console
Asset Intelligence, 20–21reports, 542–543, 542software upgrades, 332upgrading, 84WSUS, 365–366
administrative folder migration, 77administrative users
creating, 224–225, 224–226overview, 220–221, 220
bindex.indd 765bindex.indd 765 27/03/12 8:17 AM27/03/12 8:17 AM
COPYRIG
HTED M
ATERIAL
766 | ADMINISTRATOR COMMENTS SETTING • APPLICATION DEPLOYMENT
Administrator Comments setting, 299administrators
application deployment, 299computer accounts as, 150mobile device enrollment, 622–624, 623–624software updates, 332
ADR (Automatic Deployment Rules), 200, 330, 337, 717ADsgdis.log fi le, 241ADsysdis.log fi le, 240Advanced page
antimalware policy, 713, 713System Center Updates Publisher, 397
advertisement migration, 73AfterBackup.bat fi le, 678–679Agent Extensions Manage The Deployment Of
Applications And Software Updates option, 232agents
clientAsset Intelligence, 473settings, 229–234, 230, 353–355, 354
planning, 59AI. See Asset Intelligence (AI)AILW (Asset Intelligence License Wizard), 491AIUpdateSvc.log fi le, 207AIUSMSI.log fi le, 207AIUSsetup.log fi le, 207alerts and Alerts page
Application Deployment, 274client, 263–265, 264confi guration baselines, 596Deploy Software Updates Wizard, 392–393, 392Deploy Software Wizard, 312–313, 312deployment templates, 338SCEP, 719–722, 720–722
All Instances Of The Objects That Are Related To The Assigned Security Roles option, 221
All security scope, 214All Software Updates node, 384All Systems collection, 326Allow clients to share content with other clients on the
same subset option, 300–301, 393Allow clients to use a fallback source location for
content option, 301Allow Mobile Devices That Cannot Be Provisioned
option, 610Allow Password Recovery option, 611Allow Signed Content from Intranet Microsoft Update
Service Location option, 356Allow Simple Password option, 611Allow System Restart Outside Maintenance Windows
option, 352Allow Task To Be Run On Demand option, 735Allow This Application To Be Installed option, 294
Allow User Policy Request From Internet Clients option, 231
Allow Users To Interact With This Program option, 304
Allowed Message Formats option, 612, 636Allowed Period Of Time Users Can Postpone A
Required Restart To Complete The endpoint Protection Installation (hours) setting, 233
AMT (Activity Management Technology), 19enrollment point, 195–199, 197–198out-of-band service points, 187–189, 188–189
answer fi les, 155–157antimalware policy, 709–715, 709–714Application Administrator Properties window,
213, 213Application Administrator role, 211, 546Application Author role, 211, 546Application Catalog
application deployment, 314–315customizing, 194sample application, 294User Device Affi nity, 322, 323
Application Catalog Customizations page, 194Application Catalog Web Service Point role, 46,
191–195, 192–194, 622, 622Application Catalog Web Site Point role, 46, 191–195,
192–194, 355Application Deployment, 267
Application References, 271–272client experience, 314–316, 314–316Create Application Wizard, 284–288, 285–287dependencies, 273–274
Application References, 272BITS-enabled IIS, 275confi guring, 318, 319default client settings, 275–281, 276–280distribution points, 275management points, 274
Deploy Software Wizard, 307–314, 308–312Detection Method tab, 319distribution point changes, 269–271elements, 281–283, 282–283fl ow options, 272–274new features, 267–269, 268process, 284, 284properties, 283, 283Requirements tab, 319–321, 321–322Ribbon options, 288–293, 289–292sample application, 293–297, 293–298supersedence, 317–318, 317–318troubleshooting, 325–328, 326types, 298–307, 298–303, 305–307User Device Affi nity, 322–325, 323–325
bindex.indd 766bindex.indd 766 27/03/12 8:17 AM27/03/12 8:17 AM
APPLICATION DEPLOYMENT MANAGER ROLE • BASELINE CONFIGURATION | 767
Application Deployment Manager role, 211, 546Application References, 271–272Application Settings window, 614, 614Application Virtualization (App-V), 21applications
confi guration items, 592properties, 282, 282
Applications node, 267, 268, 284, 284Applications That Depend On This Application option,
318Applications That Supersede This Application option,
318Apply This Software Metering Rule To The Following
Clients option, 526archiving backup snapshots, 678–679, 678ASC keyword, 562Asset Intelligence (AI), 473
catalog, 476–478enabling, 485–487, 486–487functionality, 20–21home page, 479–481, 480maintenance tasks, 474–475, 475migrating, 76reports, 481–485, 538requirements, 473–475software licenses, 488–491, 488, 490–491synchronization points, 479, 486–487, 487validation states, 478–479
Asset Intelligence License Wizard (AILW), 491Asset Intelligence Reporting Class Settings dialog box,
485, 486Asset Intelligence Synchronization Point Connection
Settings page, 487, 487Asset Intelligence Synchronization Point role, 46,
206–207, 206Asset Manager role, 211, 547Assets and Compliance workspace, 470–471, 470assigned security scopes and collections, 220–221, 220assigning policies, 716, 716Associate Assigned Security Roles With Specifi c
Security Scopes And Collections option, 221Associated Security Roles dialog box, 550ATM Provisioning Certifi cate page, 188–189, 189ATM Service Point page, 188, 188Automatic Deployment Rules (ADR), 200, 330, 337, 717automatic operations
client remediation, 261–262, 262management point queries, 178operating system image captures, 436–438, 436–438publishing updates, 401
Automatic package conversion state, 103
Automatically Confi gure Used Device Affi nity From Usage Data option, 461
Automatically Detect This Information Using Existing Content option, 286
Automatically Distribute Content For Dependencies option, 309
Automatically Download Content When Packages Are Assigned To Distribution Points option, 387
Automatically Remove Previously Installed Antimalware Software Before Endpoint Protection Client Is Installed option, 232
Availability Management process, 6–7, 11–12Available Software Updates dialog box, 345awebsctrl.log fi le, 195awebsvcMSI fi le, 195
BBackground Intelligent Transfer Service (BITS)
Application Deployment, 275client settings, 231, 275–276, 276Computer Client Agent, 354–355distribution points, 162, 173
Background Intelligent Transfer setting, 231Backup Confi gMgr Site Server task, 673–674, 676
archiving backup snapshots, 678–679confi guring, 680–682, 681considerations, 677copying backups, 677log fi les, 679
Backup Site Server Properties dialog box, 647–648, 648
Backup Site Server task, 680, 681backups, 676
central site, 677considerations, 677copying to other locations, 677excluded items, 674–676log fi les, 679restoring, 682–685, 684site servers, 680–681, 681snapshots, 678–679, 678troubleshooting, 682
bank software, 477bare metal operating system deployment, 412,
448–451, 449, 451baseline confi guration, 581
clients, 593–594, 593initial, 588–589options, 594rules, 590–596, 591, 595
bindex.indd 767bindex.indd 767 27/03/12 8:17 AM27/03/12 8:17 AM
768 | BIDS (BUSINESS INTELLIGENCE DEVELOPMENT STUDIO) • CHANGE MANAGEMENT PROCESS
BIDS (Business Intelligence Development Studio), 534, 566–568
BITS (Background Intelligent Transfer Service)Application Deployment, 275client settings, 231, 275–276, 276Computer Client Agent, 354–355distribution points, 162, 173
/BITSPriority property, 248–249Block The Following Applications In ROM option, 614Bluetooth option, 613, 637Boot Image page, 435, 435boot images
customized, 75Microsoft Deployment Toolkit, 465–466, 466operating system deployment, 413–414, 413packages, 428for PXE, 428–429, 429task sequences, 435, 435
bootable medianon-task sequences, 115–116, 115task sequences, 418
boundariesclient installation, 245–247, 245–246distribution points, 281migrating, 73–74sites, 44–45
Boundary Groups pagedistribution points, 168–169secondary site servers, 143state migration points, 184, 184
branch offi ce migration. See P2V Migration ToolkitBranchCache feature, 44Browse Settings page, 643, 643Browser option, 614Build And Capture task sequence, 416, 419build phase in migration, 80Business Intelligence Development Studio (BIDS), 534,
566–568
Ccaches
BranchCache feature, 44reports, 556
calcplus.msi fi le, 581Calculator Plus utility, 577–578Calendar Synchronization option, 636Camera option, 613, 637Capacity Management process, 6, 11capacity planning, 47capture images
adding, 440–441
automatic building and capturing, 436–438, 436–438
creating, 430–436, 431–435distributing and deploying, 441reference computers, 438–440, 439–440task sequences, 417
Catalog tab, 294, 294catalogs
application. See Application CatalogAsset Intelligence, 476–478
categoriesapplications, 293confi guration items, 579–580
Categorize option, 293CCM registry key, 146–147, 147CCMAdmins property, 250CCMAllowSilentReboot property, 250CCMALWAYSINF property, 249CCMCERTISSUERS property, 249CCMCERTSEL property, 249CCMCERTSTORE property, 249ccmclean.exe utility, 97CCMDebugLogging property, 250CCMEnableogging property, 250ccmeval.log fi le, 262, 739, 739ccmeval process, 261, 736–739, 736, 738–739ccmeval.xml fi le, 262, 737–738, 738CCMEVALHOUR property, 252CCMEVALINTERVAL property, 252CCMFIRSTCERT property, 249CCMHOSTNAME property, 249CCMHTTPPort property, 251CCMHTTPSPort property, 251CCMInstallDir property, 250CCMLogLevel property, 250CCMLogMaxHistory property, 250CCMLogMaxSize property, 250ccmsetup-ccmeval.log fi le, 262ccmsetup.exe utility
manual installation, 252–253properties, 247–252
central administration sitesactive software update points setup, 366–370,
367–369implementing, 125–137, 127–136recovering, 686–691, 687–690roles, 38–39
centralized power management, 21–22Certifi cates page, 641–642, 641Certifi cates To Install On Mobile Devices option, 641Change Initiation Review SMF, 12Change Management process, 5, 9
bindex.indd 768bindex.indd 768 27/03/12 8:17 AM27/03/12 8:17 AM
CHANGING QUADRANT IN MOF • COLLECTIONS | 769
Changing Quadrant in MOF, 8–10Check Application Title with Inventory Information
task, 474child sites
active software update points setup, 370–372, 371recovering, 692
Choose Confi guration Items dialog box, 591Choose Mapping page, 462, 462Choose Target Collection page, 449, 470ciagent.log fi le, 596Classic Software Distribution, 268classifi cations and Classifi cations page
Add Site System Roles Wizard, 202–203, 203software updates
classes, 350confi guring, 376, 376metadata, 334–335
Clean Up Migration Data dialog box, 100, 100cleaning up migration data, 100, 100Client Activity Detail tab, 740, 741Client Activity node, 742, 743client agents
Asset Intelligence, 473settings, 229–234, 230, 353–355, 354
Client Computer Communication Settings page, 136–137, 136
client health, 261, 731alerts, 263–265, 264automatic remediation, 261–262, 262determining, 262–263, 263evaluation results, 740–741, 740–741monitoring, 263, 742–743, 742–743overview, 731–732scheduled tasks, 732–733, 732–733
Actions page, 734, 734CCMEval, 736–739, 736, 738–739Conditions page, 734, 734History page, 735, 736Settings page, 735, 735Triggers page, 733, 733
Client Health Detail tab, 741, 741Client Language Selection page, 129client.msi fi le, 173, 247Client Policy settings, 231, 354Client Policy Polling Interval (Minutes) setting, 231Client Push report, 539Client Replace task sequence, 468Client Status report, 538Client Status History reports, 263Client Status Settings Properties dialog box, 262–263,
263Client Status Summary reports, 263
Client Time To Request Policy reports, 263clients
application deployment, 314–316, 314–316backing up, 674Compliance Settings, 576–577, 577confi guration baselines, 593–594, 593deleted, 520–521health. See client healthinformation migration, 66installation, 229
boundaries, 245–247, 245–246command-line properties, 247–252discovering network objects. See discovering
resourcesgroup policy, 257health, 261–265, 262–264imaging, 258–259login scripts, 258manual process, 252–253packages for operating system deployment,
421–422, 421–422push, 253–257, 255–257settings, 229–234, 230software distribution, 258software updates, 257–258supported operating systems, 234–235troubleshooting, 261updating, 259, 259verifying, 260–261, 260
inventoryprocesses, 519reports, 515
log fi les, 654–655MIF storage location, 504–505migrating, 66, 84, 96–97planning, 59requirements, 26–32settings and deployment, 52
default, 275–281, 276–280hardware inventory, 495–496
Software Metering, 528–530, 529software update settings, 355–356, 355
clusters, 8–9, 49CMtrace.exe program, 261, 596, 656–657, 656–657Cochrane, Mark, 508Collect IDMIF fi les option, 504Collect MIF fi les option, 504Collect NOIDMIF fi les option, 504Collected File Properties dialog box, 512, 513collections, 53, 218
application deployment, 281creating, 223–224
bindex.indd 769bindex.indd 769 27/03/12 8:17 AM27/03/12 8:17 AM
770 | COLLECTIONS • CONFIGURATION MANAGER OVERVIEW
collections (continued)default, 219–220deployment templates, 337enabling, 720migrating, 68, 71–73, 71–73, 87–88, 88software inventory, 500working with, 219
Collections settingapplication deployment, 308software update deployments, 390
Collections That Cannot Be Migrated dialog box, 71, 71columns in packages, 102command line
client installation properties, 247–252WSUS 3.0 Administration Console installation, 366
commentsapplication deployment, 309software metering rules, 526
Comments setting, 309communications, site, 50Completion page
distribution points, 169, 169reporting role, 535secondary site servers, 144
compliance and Compliance Settings, 573clients, 231, 576–577, 577confi guration items. See confi guration items (CIs)confi guration packs, 597–600, 598–600new features, 574, 574overview, 573–574purpose, 575reports, 596–597software updates, 343–344
Compliance and Settings Management reports, 539Compliance Rules page, 585–587, 585Compliance Settings Manager role, 211, 547Compliant status, 406compmon.log fi le, 162component servers, 46, 162Component Status folder, 174Component Status messages, 658, 658computer accounts as administrators, 150Computer Agent settings, 231, 277, 277computer client agents
Asset Intelligence, 473settings, 229–234, 230, 353–355, 354
Computer Maintenance setting, 356Computer Restart settings, 232, 277–278, 278, 355Computer Synchronization option, 610computers
information importing, 449–450, 449names, 242unknown, 452–455, 452–455
Computers for a Specifi c Console User report, 475Conditions page, 734, 734/confi g property, 249Confi gMgr 10 registry key, 148, 148Confi gMgr Report Administrators group, 545Confi gMgr Report Users group, 545Confi gMgr Server option, 397Confi gMgrAdminUISetup.log fi le, 99, 133Confi gMgrAutoSave.ini fi le, 156Confi gMgrInstallation.adm template, 257–258Confi gMgrPostRecoveryActions.html fi le, 695, 695Confi gMgrPrereq.log fi le, 99, 123, 133Confi gMgrSetup.log fi le, 133, 691Confi gMgrSetupWizard.log fi le, 133, 691confi guration baselines, 581
clients, 593–594, 593initial, 588–589options, 594rules, 590–596, 591, 595
confi guration items (CIs)Compliance Rules page, 585–588, 585creating, 577–578Detection Methods page, 581–582, 582General page, 578–580, 578Settings page, 582–584, 583, 585Summary page, 588, 588types, 575–576
confi guration management process, 4–5, 10Confi guration Manager Client Upgrade package,
422Confi guration Manager overview
Active Directory schema, 36–37client settings and deployment, 52console upgrading, 98–99content management, 52–53deployment, 59–63
intelligence gathering, 23–25migration needs, 25troubleshooting, 664–665
disaster recovery, 55–56environment design, 56–60hierarchies and sites, 37–44, 38, 43major features, 14–21, 15migration, 54–55resource discovery, 51–52role-based administration, 53–54site boundaries and boundary groups, 44–45site communications, 50site security mode, 51site system design, 47–49site system roles, 45–47SQL considerations, 49–50system requirements, 26–36
bindex.indd 770bindex.indd 770 27/03/12 8:17 AM27/03/12 8:17 AM
CONFIGURATION MANAGER PROPERTIES DIALOG BOX • CUSTOM SEVERITY PAGE | 771
Confi guration Manager Properties dialog box, 529, 529, 595, 595
Confi guration Manager Status Message Viewer window, 659, 659
confi guration.mof fi le, 495–496, 506–507, 507confi guration packs, importing, 597–600, 598–600confi guration settings, migrating, 76Confi gure Automatic Updates option, 356–357Confi gure Client Setting dialog box, 512, 512, 514, 514Confi gure Confi gMgr Integration dialog box, 464, 465Confi gure Manager Alert option, 392Confi gure The Network page, 442, 450Confi rm Object Delete dialog box, 526Confi rm Settings page, 704Confi rmation page
confi guration packs, 599–600, 600System Center Updates Publisher, 402, 402
Console Users on a Specifi c Computer report, 475content
library, 42–43backing up, 674software updates, 332
managing, 52–53migrating, 66prestaging, 44replicating, 50validating, 43, 43
distribution points, 167–168, 168, 269secondary site servers, 143, 143
Content Location settingsapplication deployment type, 300boot images, 414operating system images, 415operating system installers, 416
Content pageapplication deployment type, 299–300, 300Deploy Software Wizard, 309, 309
Content Types tab, 296, 296Content Validation page
distribution points, 167–168, 168, 269secondary site servers, 143, 143
Converted package conversion state, 103copying backups to other locations, 677COUNT command, 562Create a deployment alert when the threshold is higher
than the following option, 313Create a deployment alert when the threshold is lower
than the following option, 313Create A New Custom Task Sequence task, 416Create A New Deployment Package option, 385Create A New Task Sequence page, 442, 450
Create Application Wizard, 282, 284–288, 285–287, 298, 307–314, 308–312
Create Boot Image Using MDT dialog box, 465, 466Create Confi guration Baseline Wizard, 588–589, 588Create Confi guration Item Wizard
Compliance Rules page, 585–588, 585Detection Methods page, 581–582, 582General page, 578–580, 578mobile devices, 631
Additional Settings page, 642–644, 642Certifi cates page, 641–642, 641Email Management page, 635–636, 635Encryption page, 639–640, 639General page, 631–632, 632Mobile Devices Settings page, 632–633, 633Password page, 633–635, 634Peak Synchronization page, 637–638, 637Platform Applicability page, 644, 645Roaming page, 638, 638Security page, 636–637, 636Supported Platform page, 644, 644Wireless Communications page, 640–641,
640Settings page, 582–584, 583, 585Summary page, 588, 588
Create Deployment Type option, 290Create MDT Task Sequence dialog box, 467–469, 467,
469Create Package From Defi nition Wizard, 421–424,
421–423Create Prestage Content File option, 289–290, 290Create Prestage Content Wizard, 290, 290Create Role Wizard, 348Create Rule dialog box, 586–587, 587Create Secondary Site Wizard, 139–145, 140–144Create Setting dialog box, 582–584, 583Create Site Role Wizard, 487, 487Create Software Metering Rule Wizard, 525, 525Create Subscription Wizard, 559, 559Create Task Sequence Media Wizard, 453–454,
453–454Create Task Sequence Wizard, 431–435, 431–435, 450,
451Create Task Wizard, 442–445, 443–445criteria for update searches, 382–384, 382–384custom labels, 477Custom Schedule dialog box
hardware inventory, 504network discovery, 244, 245
custom security scope, 214–216, 215, 353Custom Severity page, 353
bindex.indd 771bindex.indd 771 27/03/12 8:17 AM27/03/12 8:17 AM
772 | CUSTOMER EXPERIENCE IMPROVEMENT PROGRAM CONFIGURATION PAGE • DEPLOYMENT
Customer Experience Improvement Program Confi guration page, 131
customer focused service delivery, 3Customizations tab, 413–414customized boot images, 75
Ddashboards
migration, 82, 83package conversion, 103, 103, 108status messages, 658, 658
Data Access tabboot images, 414operating system images, 415operating system installers, 416
data gathering in migration, 66–68, 85–86, 85–86, 99Data Gathering Status dialog box, 85, 85data library, 42data manipulation language (DML) messages, 665Data Preview page, 449, 470Data Replication Service (DRS), 665, 668–669, 668–669data source and Data Source tab
authentication accounts, 537boot images, 414, 429, 429operating system images, 415operating system installers, 416report properties, 553
data types, 666–668, 667Database Information page, 130, 130, 689, 689Database Replication troubleshooting, 665–669, 665,
667–669Database Server page, 130, 136–137, 136databases
moving, 696–697validating, 152, 152
dataldr.log fi le, 509, 509, 519–520DataLib folder, 170–172, 172Date Published setting, 293dcmagent.log fi le, 596Deadline Behavior setting, 392Default Actions page, 711, 711Default Application Catalog Website Point setting, 232,
355Default Client Malware Policy, 716–717Default security scope, 214Default Settings dialog box
BITS, 275–276, 276Computer Agent, 277, 277Computer Restart, 277–278, 278Endpoint Protection, 706, 706inventory, 499, 499Software Deployment, 278–279, 279
software inventory, 511, 511User and Device Affi nity, 279, 280
defaultsclient settings, 275–281, 276–280, 577, 577collections, 219–220MIF storage location, 504–505
defi ne and capture phase in migration, 80defi nition fi les in SCEP, 717–719, 717–718Defi nition Updates page, 714, 714Delete option, 291deleted clients, 520–521deleting
applications, 291software metering rules, 526
Deliver phase in SMFs, 13delta discovery, 243delta inventory information, 494Delta Synchronization Interval option, 608dependencies and Dependencies tab
Application Deployment, 273–274Application References, 272BITS-enabled IIS, 275confi guring, 318, 319default client settings, 275–281, 276–280distribution points, 275management points, 274types, 307, 307
Asset Intelligence, 482Deploy Confi guration Baselines Wizard, 593–594, 593Deploy Software Updates Wizard
languages, 351packages, 338–339restart settings, 352settings overview, 339software updates, 388–395, 389–392
Deploy Software WizardAlerts page, 312–313, 312Content page, 309, 309Deployment Settings page, 310, 310General page, 307–309, 308operating system image capturing, 436–437,
436–437Scheduling page, 311, 311task sequences, 444–445, 445User Experience page, 312, 312
deploymentapplication. See Application Deploymentclients, 52Confi guration Manager, 59–63images, 441intelligence gathering, 23–25migration needs, 25
bindex.indd 772bindex.indd 772 27/03/12 8:17 AM27/03/12 8:17 AM
DEPLOYMENT DEADLINE SETTINGS • DISK SPACE | 773
operating system. See operating system deployment (OSD)
packages, 338–339, 384–386SCEP, 700software updates, 339–340, 344–345
downloading, 384–387, 385–386fi nding, 380–384, 381–384groups, 388monitoring, 404–408, 404–407rules, 340–341, 341templates, 337–338
status messages, 661–662task sequences, 444–448, 445–448troubleshooting, 664–665
Deployment Deadline settings, 232Deployment Imaging Servicing and Management
(DISM) tool, 457Deployment Name setting, 389Deployment Options setting, 301Deployment Package page
Deploy Software Updates Wizard, 393software updates, 385, 385
deployment phase in migration, 81Deployment Program Always Forces A Reboot option,
305Deployment Settings page, 310, 310, 445, 445Deployment Status window, 447, 448Deployment Types tab, 282, 296, 296Deployments node, 325–326, 326depth management of mobile devices, 195, 616–617
device enrollment, 622administrator confi guration, 622–624, 623–624user confi guration, 624–631, 625–631
rolesApplication Catalog web service point,
622, 622distribution point, 621, 621enrollment point, 618–619, 618enrollment proxy point, 617–618, 617management point, 619–620, 619Microsoft enterprise certifi cation authority,
620, 621settings
Additional Settings, 642–644, 642Certifi cates, 641–642, 641Email Management, 635–636, 635Encryption, 639–640, 639General, 631–632, 632Mobile Devices Settings, 632–633, 633Password, 633–635, 634Peak Synchronization, 637–638, 637Platform Applicability, 644, 645
Roaming, 638, 638Security, 636–637, 636Supported Platform, 644, 644Wireless Communications, 640–641, 640
DESC keyword, 562descriptions
confi guration items, 579, 584deployment packages, 386
design, site system, 47–49Detection Method page, 272, 302–303, 302, 319,
581–582, 582Detection Rule Wizard, 303Determine Behavior Based On Return Codes
option, 305device drivers, 418, 454–457, 455–457device enrollment, 622
administrator confi guration, 622–624, 623–624user confi guration, 624–631, 625–631
Device Management reports, 539Device Restart Behavior setting, 392DHCP with PXE, 428Direct Push When Roaming option, 612Direct Rule type for collections, 219Directory Services Administration SMF, 10Disable Alternate Sources option, 233DisableCacheOpt property, 250DisableSiteOpt property, 251disabling software metering rules, 523–524disaster recovery, 55–56, 673
backups, 677–682, 678, 681central sites, 686–691, 687–690maintenance options, 692–694monitoring, 691, 691multisite environments, 692planning, 673–674post-recovery tasks, 695–696, 695restores, 682–685, 684starting, 685
discovering resourcesActive Directory, 236–237, 236–238
forests, 238, 238–239groups, 241, 241heartbeat, 241–243, 244network, 242scheduling, 243–244, 243–245system, 239–240, 240users, 240
Add Exchange Server Wizard, 608–609, 608out-of-band management, 19overview 51–52, 235–236
Discovery page, 608–609, 608disk space, 665
bindex.indd 773bindex.indd 773 27/03/12 8:17 AM27/03/12 8:17 AM
774 | DISKS CATEGORY • ENDPOINT PROTECTION MANAGER ROLE
Disks category, 417DISM (Deployment Imaging Servicing and
Management) tool, 457Display in Software Center option, 312Display Name Properties window, 513, 513display names for software inventory, 500, 513, 513distmgr.log fi le, 174, 427Distribute Content option, 292Distribute Content Wizard, 441Distribute The Content For This Package To Preferred
Distribution Point option, 387distribution
boot image packages, 428images, 441software. See software distribution
Distribution Point page, 141–142, 142, 163–165, 166distribution point role, 46, 621, 621distribution points, 41–44, 43, 162–174, 163–174
changes, 269–271dependencies, 275high availability, 49managing, 52migrating, 66, 78, 82–84, 87operating system deployment, 414–415, 446PXE on, 426–427, 427software requirements, 173software updates, 386status messages, 663troubleshooting, 173–174, 174upgrading, 83–84, 91–95, 92–93, 95
Distribution Points page, 386, 446Distribution Priority setting, 387Distribution Settings page
boot images, 414operating system images, 415operating system installers, 416software updates, 386–387, 386
distributionspackage migration, 74status messages, 662–663
DML (data manipulation language) messages, 665DNSSUFFIX property, 252Do Not Expire A Superseded Update Until The
Software Update Is Superseded For A Specifi ed Period option, 369, 374
Do Not Synchronize From Microsoft Update Or The Upstream Update Point option, 374
Do Not Synchronize From Microsoft Update Or The Upstream Update Server option, 368
domain profi les, 716Download Location page, 344, 387, 393–394Download Only Content Changes To The Distribution
Point option, 387
Download Settings For Slow Or Unreliable Network settings, 393
Download Settings For Unprotected Distribution Points settings, 393
Download Settings page, 338Download Software Updates Wizard, 351, 385–386, 385Download Updates Wizard, 335, 384–387downloading software updates, 384–387, 385–386/downloadtimeout property, 248Drive Settings page
distribution points, 165, 165secondary site servers, 142–143, 142
drive space requirementsclients, 27servers, 33
Driver Details page, 455drivers, device, 418, 454–457, 455–457Drivers category for task sequences, 417Drivers tab for boot images, 413DRS (Data Replication Service), 665, 668–669, 668–669
EEdit Primary Devices node, 324, 325Editions tab, 416EICAR test malware, 724–728, 724–728email
alerts, 721–722, 722mobile devices, 612–613, 612, 635–636, 635report subscriptions, 560–561
Email Attachments option, 613Email Download While Roaming option, 638Email Management page, 635–636, 635Email Management Settings page, 612–613, 612Empower Users feature, 331Enable Automatic Site-wide Client Push Installation
option, 254Enable Hardware Inventory On Clients option, 503Enable Software Updates on Clients option, 361Enable System Center Operations Manager
Maintenance Mode option, 313enabling
Asset Intelligence, 485–487, 486–487collections, 720Software Metering Client Agent, 522software metering rules, 524, 524
encryption and Encryption pageclient inventory reports, 515mobile devices, 639–640, 639
endpoint protection. See System Center Endpoint Protection (SCEP)
Endpoint Protection client agent, 705–709, 706–708Endpoint Protection Manager role, 212
bindex.indd 774bindex.indd 774 27/03/12 8:17 AM27/03/12 8:17 AM
ENDPOINT PROTECTION POINT ROLE • GENERAL SETTINGS | 775
Endpoint Protection Point roleadding, 204–205, 205confi guring, 702–705, 704description, 46reports, 547
Enforcement phase in software updates, 407enrollment, device, 622
administrator confi guration, 622–624, 623–624user confi guration, 624–631, 625–631
Enrollment Point Connection Account option, 619enrollment point role, 46–47, 618–619, 618Enrollment Point setting, 618enrollment proxy point role, 47, 195–199, 197–198,
617–618, 617EnrollmentService.log fi le, 646EnrollmentWeb.log fi le, 646Enrollsrvmsi fi le, 199Enrollsvc.log fi le, 199Enrollweb.log fi le, 199Enrollwebmsi fi le, 199environment variables, 584EPCtrlmgr.log fi le, 205, 705EPMgr.log fi le, 205, 704–705EPsetup.log fi le, 205, 705Error Lookup window, 656, 656Error status
in-console monitoring, 405–406package conversion, 103
Estimated Install Time (Minutes) option, 305Evaluation phase in software updates, 407event logs, 475Examination Institute for IT (EXIN), 2Exclude Collections Rule, 219Excluded Settings page, 712, 712excluding
malware scanning items, 712, 712software inventory fi les, 515–516, 516
expired software updates, 331Export Application Wizard, 291–292, 292exporting
applications, 291–292, 292reports, 570–571software updates, 74synchronization with, 379–380
extending hardware inventory, 505–510, 507–510
Ffallback status point role, 46, 185–187, 186fat images, 419FEP (Front Endpoint Protection) vs. SCEP, 699fi le-based report subscriptions, 558–559, 559
fi le collection for software inventory, 500File Encryption On Mobile Device option,
614, 639fi le library, 42fi le system validation, 148, 149FileLib folder, 170, 173fi les for software updates, 335FileSystemFile.log fi le, 515, 516fi lters for software updates, 330Financial Management process, 6, 12Find all mobile devices in the exchange organization
option, 609fi nding
management points, 177–178software updates, 380–384, 381–384
fi rewalls, 715–716, 715fl at hierarchies, 210folder migration, 77Force A Mandatory Device Restart option, 305/forcereboot property, 248forest discovery, 51–52, 238, 238–239free drive space requirements
clients, 27servers, 33
Front Endpoint Protection (FEP) vs. SCEP, 699FSP property, 251fspMSI.log fi le, 187Full Administrator role, 212, 547full antimalware scans, 710Full Content update option, 401Full Synchronization Schedule option, 608
Ggeneral confi guration items, 592General Information page, 287–288, 287General License Statement, 489–490, 490General settings
Add Exchange Server Wizard, 606–607, 606application deployment, 282, 282, 299, 299boot images, 413, 413client push installation, 254, 255confi guration items, 578–580, 578, 583, 583Create Application Wizard, 285–286, 285Deploy Software Updates Wizard, 389–390, 389Deploy Software Wizard, 307–309, 308mobile devices, 631–632, 632New Site Role Wizard, 424operating system images, 415operating system installers, 416reports, 550–551sample application, 293–294, 293
bindex.indd 775bindex.indd 775 27/03/12 8:17 AM27/03/12 8:17 AM
776 | GENERAL SETTINGS • IMAGES
General settings (continued)SCEP, 703secondary site servers, 139–140, 140site system roles, 159, 159software metering, 523, 523, 525, 525software updates, 348state migration points, 424task sequences, 416–417, 444
General Settings window, 610, 610Generate System Center Operations Manager Alert
When A Software Installation Fails option, 313Getting Started page
central administration sites, 127, 127primary sites, 134–135, 134
Global Conditions node, 321, 322global data replication, 50, 666, 667global roaming, 37goals
determining, 24–25software updates, 346
GROUP BY keyword, 562group policies and GPOs
client installation, 257SCEP, 703settings, 356–357
groupsActive Directory, 52, 241, 241boundary, 44–45distribution points, 52, 270–271, 663software updates, 330, 337, 388validating, 149–150, 150
Hhard-linking, 423hardware inventory, 494–495
client settings, 233, 495–496confi guration.mof fi le, 495–496confi guring, 502–505, 503extending, 505–510, 507–510MIF fi les, 497–499Registry, 507–510, 508–510reporting classes, 496–497troubleshooting, 519
Hardware Inventory Client Agent, 473–474Hardware Inventory option, 233hardware reports, 482–483, 539hardware requirements
Asset Intelligence, 478clients, 26–27servers, 32–33
health, client. See client healthheartbeat discovery, 51, 241–243, 244, 516
hidden reports, 551hierarchies, 37–38, 38
central administration sites, 38–39design and implementation, 122distribution points, 41–44, 43fl at, 210planning, 58primary sites, 39–40secondary sites, 40
Hierarchy Maintenance tool, 693–694high availability, 49history and History page
reports, 557SCEP, 725, 725scheduled tasks, 735, 736
HTTP Connected Computer Devices option, 620HTTP security mode, 51HTTPS Connected Computer Devices option, 620HTTPS security mode, 51
IIcon option, 295Identifi cation registry key, 146Identifi cation tab, 588–589, 588Idle Time Before Mobile Device Is Locked
setting, 634Idle Time In Minutes Before Mobile Device Is Locked
setting, 611IDMIF fi les
description, 498–499storage location on clients, 504–505
If The Running Task Does Not End When Requested, Force It To Stop option, 735
Ignore Maintenance Windows and Install Immediately at Deadline option, 352
Ignore mobile devices that are inactive for more than (days) setting, 609
Image Capture Wizard, 439, 439Image Destination page, 439, 439Image Information page, 439images
boot. See boot imagesclient installation, 258–259creating, 430–436, 431–435Microsoft Deployment Toolkit, 465–466, 466operating system, 415
automatic building and capturing, 436–438, 436–438
deploying, 440–441offl ine servicing, 457–459, 458–459reference computers, 438–440, 439–440
task sequences, 417
bindex.indd 776bindex.indd 776 27/03/12 8:17 AM27/03/12 8:17 AM
IMAGES TAB • LANGUAGE SELECTION PAGE | 777
Images tabboot images, 413operating system images, 415
Immediately Expire A Superseded Update option, 369, 374
Import Certifi cate page, 642, 642Import Computer Information Wizard, 449, 449Import Confi guration Data Wizard, 599–600,
599–600Import Information page, 286, 286–287Import New Driver Wizard, 455–457, 455–457Import Software License Wizard, 488–490, 488, 490Import Summary page, 510, 510Import User Device Affi nity option, 323, 324importing
application information, 286, 286–287certifi cates, 642, 642computer information, 449–450, 449confi guration packs, 597–600, 598–600drivers, 455–457, 455–457MOF fi les, 510, 510reports, 551–552, 569–570software licenses, 488–491, 488, 490–491software updates, 75, 398–399, 399update synchronization with, 379–380user device affi nity, 323, 324, 461–462, 462
in-band management, 19in-console software updates deployment monitoring,
404–407, 404–407In Progress status, 406Inactive Client Details reports, 263incident management process, 4, 11Include Collections Rule, 219Include Updates In Image page, 451Information Systems Examination Board (ISEB), 2Infrared option, 614Infrastructure Administrator role, 212, 547–548Infrastructure Engineering SMF, 11Infrastructure role cluster, 9Install All Required Software Updates When Deadline
Occurs option, 361Install An Existing Image Package task sequence, 416Install Applications page, 443, 444, 451Install Client Wizard, 256–257, 257Install Confi guration Manager Client page, 442–443Install Endpoint Protection Client In Client Computers
option, 232Install page, 133, 133, 690, 690Install Permissions settings, 232Install The Confi guration Manager Client page, 450Install The Windows Operating System page, 450Install Windows page, 442, 443installation
client. See clientssite system roles, 157–160, 158–159software update points, 346–348System Center Updates Publisher, 395–396, 395WSUS, 361–365, 363
Installation Behavior setting, 303Installation Deadline setting, 390Installation Program setting, 302Installation program visibility settings, 304Installation Progress window, 439, 446, 446Installation Properties tab, 254, 256, 256Installation Source Files page, 140Installation Start In option, 302installers, operating system, 415–416, 429–430, 430Intel Activity Management Technology, 19interaction of site system roles, 157–158Internet-based software update settings, 348–349Internet option for software updates, 387Internet Sharing From Mobile Devices option, 610Inventoried Software Titles node, 477inventory, 15, 493–494
hardware. See hardware inventorysoftware
collecting, 499–500, 499confi guring, 511–518, 511–518
troubleshooting, 518–521viewing, 500–501, 501, 514, 515
Inventory Reporting Detail setting, 512InventoryAgent.log fi le, 519–521IP address ranges, 44IP subnets, 44IPv6 prefi x, 44IT Infrastructure Library (ITIL), 2–7, 13IT Service Continuity Management process, 6IT service management (ITSM), 2
ITIL, 2–7MOF, 7–13, 13
IT Service Management Forum (itSMF), 2
JJob Scheduling SMF, 10jobs, migration, 66, 82, 87–91, 88–90
KKeywords option, 295
Llabels in Asset Intelligence, 477Language Selection page, 351, 394
bindex.indd 777bindex.indd 777 27/03/12 8:17 AM27/03/12 8:17 AM
778 | LANGUAGES • MESSAGES. SEE STATUS MESSAGES
languagesdeployment, 299, 338software metering rules, 526software updates, 351, 377, 377, 394
Languages page, 204, 351, 377, 377libraries
content, 42–43ITIL, 2–7, 13
licensesAsset Intelligence, 488–491, 488, 490–491central administration sites, 128reports, 484–485
link states, 666Link Text option, 295linked reports, 569lite management of mobile devices, 195, 603–605, 605
Account page, 607, 607confi guration results, 614–616, 615–616Discovery page, 608–609, 608General page, 606–607, 606Settings page, 609
Application settings, 614, 614Email Management settings, 612–613, 612General settings, 610, 610Password settings, 610–611, 611Security settings, 613–614, 613
load balancing, 49load state for USMT packages, 422local installation, 126Localized Application Name option, 295Localized Description option, 295Locate Driver page, 455, 455locations for deployment templates, 338log fi les
application deployment, 327–328backup process, 679client, 654–655management points, 178–179, 654SCEP, 705site servers, 651–653for troubleshooting, 651–657Windows event, 475
login scripts, 258/Logon property, 248Logon Requirement option, 303
Mmaintenance plans, 647–651, 648maintenance windows, 351–352malware, 700
antimalware policy, 709–715, 709–714
assigning policy, 716–717, 716scenario, 723–728, 724–728Windows Firewall policies, 715–716, 715
Malware Detection alerts, 719Malware Outbreak alerts, 719Manage Administrative Categories dialog box, 579, 580Manage Endpoint Protection Client On Client
Computers option, 232Manage phase for SMFs, 13Management information format (MIF) fi les, 497–499,
504–505Management Point page, 175–176, 175management point role, 46, 619–620, 619management points
dependencies, 274fi nding, 177–178high availability, 49inventory, 519log fi les, 178–179, 654overview, 174–176, 175–176proxy, 176–177queries, 178server locator point functionality, 178software requirements, 179troubleshooting, 179
Manual package conversion state, 103manual synchronization, 342Manually Copy The Content In This Package To The
Distribution Point option, 387Manually Defi ne This Information option, 286MAPS (Microsoft Active Protection Service), 700–701,
701Maximum Allowed Run Time (Minutes) setting,
304–305Maximum Custom MIF File Size (KB) setting, 504Maximum Run Time settings, 352–353Maximum Size For HTML Email (Automatically
Downloaded) setting, 636Maximum Size For Plain Text Email (Automatically
Downloaded) setting, 636Maximum Size Of An Attachment (Automatically
Downloaded) setting, 636Maximum Time To Keep Calendar Entries setting, 612Maximum Time To Keep Email setting, 612, 635MDT. See Microsoft Deployment Toolkit (MDT)media task sequences, 418media boot task sequences, 433–436, 434–435Media Type page, 434, 435, 453memory
central administration sites, 132SQL, 126, 132
messages. See status messages
bindex.indd 778bindex.indd 778 27/03/12 8:17 AM27/03/12 8:17 AM
METADATA IN SOFTWARE UPDATES • MULTISITE ENVIRONMENTS, RECOVERY IN | 779
metadata in software updates, 334–335, 376, 379, 401Metadata Only option, 401metering software. See Software Metering featureMicrosoft Active Protection Service (MAPS), 700–701,
701Microsoft Active Protection Service page
antimalware policy, 714, 714Endpoint Protection Manager, 204–205, 205
Microsoft Application Virtualization Management, 21Microsoft Calculator Plus utility, 577–578Microsoft Confi guration Manager folder, 148, 149Microsoft Deployment Toolkit (MDT)
backing up, 676boot images, 465–466, 466installing, 464integrating, 464–465, 465scenarios, 464task sequences, 466–469, 467, 469
Microsoft enterprise certifi cation authority role, 620, 621
Microsoft Malware Protection Center (MMPC), 700Microsoft Operations Framework (MOF), 7
Changing Quadrant, 9–10ITIL, 7–9, 13, 13Operating Quadrant, 10operations management reviews, 12–13Optimizing Quadrant, 11–12process model, 9reliability workbook, 14Supporting Quadrant, 10–11
Microsoft RichCopy 4.0 Properties dialog box, 293–298, 293–298
Microsoft Software License Terms page, 128Microsoft Update catalog, 342Microsoft Volume License Statement, 488–489MIF (Management information format) fi les, 497–499,
504–505migmctrl.log fi le, 82, 92migration, 65
branch offi ces. See P2V Migration Toolkitdata-gathering process, 67–68distribution points, 78introduction, 65–66needs, 25objects, 54–55
not supported, 77supported, 70–77, 71–73
packages, 100–101best practices, 107monitoring, 108, 108Package Conversion Manager, 101–102, 101process, 102–107, 103, 105–106
planning, 80–81preparing, 79report, 539side-by-side. See side-by-side migrationsource hierarchy, 66–67, 67types, 68–70wipe-and-load, 97–100, 100
migration points, 182–185, 182–184, 424–426, 425Minimum Password Length (Characters) setting, 611MMPC (Microsoft Malware Protection Center), 700mobile device and AMT enrollment point role,
195–199, 197–198Mobile Device Management While Roaming option,
638mobile devices, 18, 603
depth management. See depth management of mobile devices
lite management. See lite management of mobile devices
new features, 603–604operating systems, 30–32troubleshooting, 645–646
Mobile Devices option, 233Mobile Devices Settings page, 632–633, 633models, report, 562–563MOF. See Microsoft Operations Framework (MOF)monitoring, 53
application deployment, 326client health, 742–743, 742–743client status, 263distribution point upgrades, 92, 93migration, 66, 82, 83package conversion, 108, 108recovery, 691, 691SCEP, 702software updates, 330, 404–408, 404–407
movingapplications, 292–293reports, 568site databases, 696–697
MP_Hinv.log fi le, 519/MP property, 248mpcontrol.log fi le, 179mpMSI.log fi le, 179mpSetup.log fi le, 179mtrmgr.log fi le, 529, 529multicast support and Multicast page, 42, 167,
167, 415multiple malware detection alerts, 719multiple product updates, 335multisite environments, recovery in, 692
bindex.indd 779bindex.indd 779 27/03/12 8:17 AM27/03/12 8:17 AM
780 | NAMES • OPERATIONS ADMINISTRATOR ROLE
Nnames
computers, 242confi guration items, 579deployment, 299, 389packages, 385servers, 159software inventoried products, 500software metering rules, 525
NAP. See Network Access Protection (NAP)NAP Evaluation tab, 353native uninstall support, 272.NET Framework application, 272Netdisc.log fi le, 242Network Access Account page, 420, 420Network Access Account setting, 281Network Access Protection (NAP), 18
Active Directory schema, 37compliance, 233report, 539software updates, 353system health validator, 181
Network Access Protection Client Agent option, 233Network Administration SMF, 10Network Discovery Schedule tab, 244, 244Network Location option, 387Network report, 539networks
connectivity, 665describing, 25discovery. See discovering resourcessoftware updates, 387speed, 45
New Computer scenario, 467New Distribution Points Wizard, 428New Table Or Matrix Wizard, 564No Action deployment option, 305/NoCRLCheck property, 249NOIDMIF fi les
description, 498–499location, 504–505
non-task sequence bootable media, 115–116, 115/noservice property, 248Not Applicable package conversion state, 103, 106Number Of Failed Logon Attempts Before Device Is
Wiped setting, 611Number Of Passwords Remembered setting, 611
Oobjects
content-related, 53discovering. See discovering resources
migrating, 54–55, 66, 68, 89–91, 89–90security scopes, 217–218, 218software updates, 335–337
Off-Peak Synchronization Frequency option, 638Offi ce of Government Commerce (OGC), 2offl ine image servicing, 457–459, 458–459Offl ineServicingMgr.log fi le, 459OMRs (Operations Management Reviews), 9, 12–13Only The Instances Of The Objects That Are Assigned
To The Specifi ed Security Scopes Or Collections option, 221
Only When A User Is Logged On option, 304Only When No User Is Logged On option, 304Operate phase for SMFs, 13Operating Quadrant MOF, 8, 10operating system deployment (OSD), 17–18, 411
bare metal, 412, 448–451, 449, 451client install package, 421–422, 421–422device drivers, 454–457, 455–457distribution points, 414–415driver catalogs, 418enhancements, 21images, 415
automatic building and capturing, 436–438, 436–438
boot. See boot imagesdeploying, 440–441offl ine servicing, 457–459, 458–459reference computers, 438–440, 439–440
installers, 415–416, 429–430, 430MDT, 464–470, 465–467, 469migration objects, 75–76Network Access account, 420, 420new features, 411–412process, 418–419PXE on distribution points, 426–427, 427scenarios, 412state migration points, 414, 424–426, 425task sequences, 416–418
for capture image, 430–436, 431–435deploying, 444–448, 445–448developing, 441–444, 442–444
user device affi nity, 418, 459–463, 460–463user state maintenance, 470–471, 470USMT packages, 422–424, 423
Operating System Deployment Manager role, 549operating systems
client requirements, 27–32client support, 234–235P2V Migration Toolkit requirements, 109report, 539server requirements, 33–36
Operations Administrator role, 212, 549
bindex.indd 780bindex.indd 780 27/03/12 8:17 AM27/03/12 8:17 AM
OPERATIONS MANAGEMENT OVERVIEW • POWER CONTROL IN OUT-OF-BAND MANAGEMENT | 781
operations management overview, 1defi ning, 1–2ITIL, 2–7MOF, 7–13, 13
Operations Management Reviews (OMRs), 9, 12–13Operations Manager Alert option, 392Operations Review, 12Operations role cluster, 9Optimizing Quadrant MOF, 7–8, 11–12Option tab for group discovery, 241, 241optional application information, 288Options tab for Software Center, 316, 316ORDER BY keyword, 562Organization Name setting, 232, 355organizational units (OUs), 237out-of-band management, 19–20, 187–189, 188–189out-of-service point role, 47overlapping boundaries, 45Owners option, 294
PP2V Migration Toolkit, 109
non-task sequences, 115–116, 115requirements, 109scenarios, 110steps, 110–114, 111–114task sequences, 110
Package Conversion Dashboard, 103, 103, 108Package Conversion Manager, 101–102, 101Package Conversion Wizard, 105–106, 106Package Defi nition page, 421, 421Package Source setting, 386packages
deployment, 338–339, 384–386library, 42migrating, 100–101
best practices, 107monitoring, 108, 108Package Conversion Manager, 101–102, 101process, 102–107, 103, 105–106
package defi nition fi les, 421, 421USMT, 422–424, 423
Packages node, 267, 268PackageScanReport.XML fi le, 108, 108parameters for reports, 552Partner role cluster, 9partner software updates catalogs, 397–398, 398Password Complexity option, 611, 634Password Expiration In Days option, 611Password page, 633–635, 634
Password Settings window, 610–611, 611passwords for mobile devices, 610–611, 611, 633–635, 634Patch property, 249Patch Tuesday, 340–341, 341paths, discovery, 237PCMTrace.log fi le, 108PDP And IMAP Email option, 635Peak Synchronization Frequency option, 638Peak Synchronization page, 637–638, 637Pending state in Asset Intelligence, 479permissions
Application Administrator, 213, 213central administration sites, 132clients, 232Confi guration Manager deployment, 664reports, 545, 545, 550Software Update Manager, 357
Persist Content In The Client Cache option, 300phases in client installation, 261physical locations, 56–57physical-to-virtual Migration Toolkit. See P2V
Migration ToolkitPkgLib folder, 170, 171PkgXferMgr component, 43Plan phase in SMFs, 13Planning for Site Systems in Confi guration
Management document, 131Platform Applicability page, 644, 645POC (proof-of-concept) environments, 60policies
endpoint protection, 709antimalware, 709–715, 709–714assigning, 716, 716Windows Firewall, 715–716, 715
groupclient installation, 257SCEP, 703settings, 356–357
Policy Polling Interval (Minutes) setting, 354Polling Schedule tab, 243, 243POP And IMAP Email option, 612Port Number setting, 618portalwebMSI fi le, 195portlctl.log fi le, 195ports
proxy points, 618WSUS, 373, 373
post-installation phase in client installation, 261post-migration considerations, 99post-recovery tasks, 695–696, 695power control in out-of-band management, 19–20
bindex.indd 781bindex.indd 781 27/03/12 8:17 AM27/03/12 8:17 AM
782 | POWER MANAGEMENT • RELEASE MANAGEMENT PROCESS
power managementcentralized, 21–22client setting, 233report, 539–540
PowerShell Execution Policy option, 232pre-deploying user applications, 463, 463pre-installation phase in client installation, 261pre-migration in package conversions, 107preinst.exe tool, 693–694PREREQCHK.EXE.fi le, 123Prerequisite Check page, 132, 132, 690, 690Prerequisites Downloads page, 128–129, 128Prerequisites Licenses page, 128PrestageContent.log fi le, 95prestaged content, 44, 270, 289–290, 290prestaged media, 418previously migrated objects, migrating, 69–70Primary Computer Users report, 475Primary Site Installation page, 135–136primary sites, 39–40
active software update points setupchild of CAS, 370–372, 371stand-alone, 372–374
recovering, 692servers, 120
checklist, 124implementing, 134–138, 134, 137–138
prioritiesapplication deployment type, 298policies, 716, 716software update distribution, 387
private fi rewall profi les, 716problem management process, 4, 11Process Model, 7Processor Properties node, 477–478processor requirements
clients, 27servers, 33
Product Code option, 302Product Key page, 128, 128products in updates, 350–351Products page
Software Update Point role, 203–204, 203software updates, 377, 377third-party updates, 402, 403
profi les for Windows Firewall policies, 716Programs tab, 301–302, 301proof-of-concept (POC) environments, 60Properties dialog box for applications, 293protection, endpoint. See System Center Endpoint
Protection (SCEP)providers in hardware inventory, 506
provisioned systems, 187provisioning
command lines, 252workstations, 20
proxy management points, 176–177Proxy Server Settings page, 206, 487Proxy Settings option, 397public fi rewall profi les, 716publishing updates. See System Center Updates
Publisher (SCUP)Purpose setting in application deployment, 310push client installation, 253–257, 255–257PXE and PXE page
boot images for, 428–429, 429confi guring, 42distribution points, 166, 166, 415, 426–427, 427unknown computer support, 452, 452
PXE Service Point Confi guration dialog box, 426–427
Qquadrants in MOF, 7–13queries, 16, 178Query Rule for collections, 219quick antimalware scans, 710
RRAM requirements
clients, 27servers, 33
RBAC (Role-Based Access Control) model, 209RCMCtrl.log fi le, 668, 668Read-only Analyst role, 212, 549Real-Time Protection page, 712, 712recovery. See disaster recoveryRecursively Search Active Directory Child Containers
option, 237reference computer images, 438–440, 439–440References tab
sample application, 295, 295supersedence, 318, 318
refresh computer deployment scenario, 412Refresh Interval (Hours) option, 610Registry
64 bit applications, 584hardware inventory, 507–510, 508–510Report Builder, 563–564site installation validation, 146–148, 147–148
RegKeyToMof tool, 508–509, 508Release Management process, 5, 10
bindex.indd 782bindex.indd 782 27/03/12 8:17 AM27/03/12 8:17 AM
RELEASE READINESS REVIEW SMF • ROAMING PAGE | 783
Release Readiness Review SMF, 12Release role cluster, 9Reliability Workbook, 14remediation, client, 261–262, 262reminders for client software updates, 354remote console for out-of-band management, 20remote control, 18Remote Desktop option, 613remote distribution point throttling, 270remote installation, 126Remote Tools Operator role, 212Remote Tools option for clients, 233Removable Storage option, 613, 637Repeated Malware Detection alerts, 719repeating services point role, 47Replace Hardware scenario, 464, 469–470replication, 50
SQL, 281troubleshooting, 665–669, 665, 667–669
Report Builder, 563–565, 564–565Report Manager, 542–543, 543Reporting Services point, 189–191, 190Reporting Services Point page, 536, 536reporting services site system, 535–536, 536reports, 19, 533–534
Asset Intelligence, 481–485BIDS, 566–568client health, 743, 743client inventory, 515Compliance Settings, 596–597creating, 561–568, 564–565exporting, 570–571hardware inventory, 496–497importing, 551–552, 569–570linked, 569managing, 550–558migrating, 77migration results, 83models, 562–563moving, 568Report Builder, 563–565, 564–565Reporting Services, 189–191, 190running, 541–543, 542–543SCEP, 723, 723security, 545–550, 545, 558software metering, 474, 530, 540software updates, 381–382, 381, 407–408SQL commands, 561–562SQL Reporting Services, 21SQL Server Reporting Services, 534–538, 536status messages, 659–660subscriptions, 553–555, 558–561, 559
Require Administrator Approval if Users Request this Application option, 310
Require Email Encryption/Encryption Algorithm option, 639
Require Email Signing/Signing Algorithm option, 639
Require Password Settings On Mobile Devices option, 611, 634
Require The Site Server To Initiate Connections To This Site System option, 367, 370, 372
Required Components to Use Administration UI page, 365
requirements and Requirements tabApplication Catalog Web Service Point, 194Application Catalog Web Site Point, 194application deployment, 273, 319–321, 321–322application information, 305–306, 305Asset Intelligence, 473–475, 478clients, 26–32distribution points, 173Endpoint Protection Manager, 205fallback status points, 186management points, 179mobile devices, 198Reporting Services, 191servers, 33–36site servers, 123–125Software Update Point role, 204state migration points, 185system health validator points, 182
RESETKEYINFORMATION property, 250Resource Explorer, 500–501, 501, 514, 515, 518, 519resources
discovery. See discovering resourcesfor security scopes, 216, 217
Resources folder, 538Restart Countdown setting, 352Restart Settings page, 352restoring backups, 682–685, 684Retire/Reinstate option, 290/retry property, 248return codes, 273–274, 306, 306Return Codes tab, 306, 306review phase in migration, 81Revision History option, 289, 289Ribbon options, 288–293, 289–292RichCopy application, 272roaming
global, 37mobile device settings, 638, 638site system roles, 158
Roaming page, 638, 638
bindex.indd 783bindex.indd 783 27/03/12 8:17 AM27/03/12 8:17 AM
784 | ROLE-BASED ACCESS CONTROL (RBAC) MODEL • SECURITY
Role-Based Access Control (RBAC) model, 209role-based administration, 53–54, 209
administrative users, 220–221, 220, 224–225, 224–226
collections, 218–220, 223–224overview, 209–210security
roles, 210–213, 211, 213, 221scopes, 214–218, 214–215, 217–218, 221–231,
222–223software updates, 357–358
rolesmobile devices, 616–617
Application Catalog web service point, 622, 622distribution point, 621, 621enrollment point, 618–619, 618enrollment proxy point, 617–618, 617management point, 619–620, 619Microsoft enterprise certifi cation authority, 620,
621site system. See site system roles
rulesapplication deployment, 319–320collections, 219confi guration baselines, 581, 590–596, 591, 595confi guration items, 585–588, 585, 587–588software metering
adding, 524–526, 525Automatic Rule Generation, 523–524, 523enabling and disabling, 524migrating, 77
software updates, 330, 337, 340–341, 341supersedence, 349System Center Updates Publisher, 358, 399–400,
400Run Installation and Uninstall Programs in 32-Bit
Process on 64-Bit Clients option, 302Run Task As Soon As Possible After A Scheduled Start
Is Missed option, 735running reports, 541–543, 542–543
SScan Settings page, 711, 711scan state for USMT packages, 422scans
antimalware policy, 709–711, 709–711software updates, 361
SCCMContentLib folder, 170, 171SCCMContentLib library, 42SCEP. See System Center Endpoint Protection (SCEP)SCEPInstall.exe utility, 705Schedule Deployment Re-evaluation setting, 361
Schedule Evaluation setting, 390Scheduled Scans option, 709–710, 709scheduled tasks
Actions page, 734, 734CCMEval, 736–739, 736, 738–739client health, 732–733, 732–733Conditions page, 734, 734History page, 735, 736Settings page, 735, 735Triggers page, 733, 733
schedulesantimalware scans, 709–710, 709application deployment, 311, 311content distribution, 41–42deployment templates, 337discovery, 243–244, 243–245, 608inventory, 501–502report subscriptions, 559software updates
deployments, 390–391, 390scans, 361synchronization, 342, 349, 378, 378
Scheduling pageDeploy Software Updates Wizard, 390–391, 390Deploy Software Wizard, 311, 311
schema for Active Directory, 36–37scheme extensions, 132scopes, security, 53, 214, 214
applications, 292–293creating, 214–216, 215resources, 216–217, 216–217scenario, 221–231, 222–223viewing, 217–218, 218
Scratch Space setting, 465scripts for client installation, 258, 260SCUP (System Center Updates Publisher), 675–676search folders in migration, 77search options for software updates, 382–384, 382–384secondary site servers
implementing, 138–145, 139–145overview, 120–121
secondary sites, 40backing up, 682migrating, 84upgrading, 95–96, 96
securitymobile devices, 613–614, 613, 636–637, 636reports, 545–550, 545, 558roles, 53, 210–213, 211, 213, 221SCEP, 700–702scopes, 53, 214, 214
applications, 292–293creating, 214–216, 215
bindex.indd 784bindex.indd 784 27/03/12 8:17 AM27/03/12 8:17 AM
SECURITY ADMINISTRATION SMF • SITE SERVERS | 785
resources, 216–217, 216–217scenario, 221–231, 222–223viewing, 217–218, 218
sites, 51SQL Server Reporting Services, 535
Security Administration SMF, 10Security Administrator role, 212, 549Security Compliance Manager, 598–599, 599Security Management SMF, 11Security page
application, 297, 298boot images, 414mobile devices, 636–637, 636operating system images, 415operating system installers, 416unknown computer support, 453, 454
Security role cluster, 9Security Settings window, 613–614, 613Security Warning window, 399, 399SELECT command for reports, 562Select Deployment Package option, 385Select Deployment Template option, 389Select Files page, 599, 599Select Media Type page, 434, 434, 453, 453Select New Container dialog box, 236, 237Selected Language option, 295Self-Update option, 357Send Password Recovery PIN To Exchange Server
option, 634Server Deployment scenario, 464Server Language Selection page, 129server locator point functionality, 178servers
requirements, 32–36setting migration, 66site. See site servers
Service Continuity Management SMF, 12Service Delivery process, 3service desk function, 4, 11Service Level Agreement Review, 12Service-Level Agreements (SLAs), 4Service Level Management (SLM) process, 5, 11Service Management Functions (SMFs), 7–13Service Monitoring and Control SMF, 10/Service property, 248Service Support process, 3service validation, 151, 151Services registry key, 148, 148Servicing tab, 415Set period of time to install Software Updates with a
deadline setting, 361Set Security Scope option, 292–293
Set Security Scopes window, 216Setting Summary page, 131, 131settings and Settings page
Add Exchange Server Wizard, 609Application Settings, 614, 614Email Management Settings, 612–613,
612General Settings, 610, 610Password Settings, 610–611, 611Security Settings, 613–614, 613
Application Deployment, 274migrating, 76recovery process, 689, 689scheduled tasks, 735, 735task sequences, 417
Settings Management feature, 18Settings Summary page, 689, 689Setup Wizard
central administration sites, 127–134, 127–133primary site servers, 134–138, 134, 137–138System Center Updates Publisher, 395, 395
Shared (Multi-user) Computers report, 475Show Install Status option, 144, 145Show Message menu, 658, 658Show Notifi cations For New Deployments option, 232Show Settings From All Mobile Device Confi guration
Items option, 643side-by-side migration, 81–82
clients, 96–97confi guring, 85–86, 85–86distribution points, 87, 91–95, 92–93, 95process, 82–84, 83secondary sites, 95–96, 96
Signing And Encryption tab, 515Simple Schedule option, 504Simulate Deployment option, 291, 291Single Computer page, 449, 449, 469single instance storage, 269Site and Installation Settings page, 129, 129, 688, 688site data, 667, 667site database server point role, 47Site Maintenance dialog box, 526–527, 527site migration point role, 47Site Recovery Information page, 687, 687Site Repair Wizard, 685Site Server and Database Recovery Options page,
686–687, 687site servers, 121
backing up, 680–681, 681checklist, 123–124implementing, 123, 123
central administration, 125–137, 127–136
bindex.indd 785bindex.indd 785 27/03/12 8:17 AM27/03/12 8:17 AM
786 | SITE SERVERS • SMSEXEC.LOG FILE
site servers (continued)primary sites, 134–138, 134, 137–138secondary sites, 138–145, 139–145software requirements, 123–125troubleshooting, 152–155, 152–155unattended installation, 155–157
inventory, 519–520log fi les, 651–653primary, 120secondary, 120–121verifying, 145–150, 146
database validation, 152, 152fi le system validation, 148, 149group validation, 149–150, 150registry validation, 146–148, 147–148services validation, 151, 151WMI validation, 150–151, 151
Site Status dashboard, 658, 658Site System Installation Account setting, 367, 372site system roles, 45–47
Application Catalog Web Service Point, 191–195, 192–194
Application Catalog Web Site Point, 191–195, 192–194
Asset Intelligence Synchronization Point, 206–207, 206
component servers, 162confi guring, 137, 137distribution points, 162–174, 163–174Endpoint Protection Manager, 204–205, 205fallback status points, 185–187, 186installing, 157–160, 158–159management points, 174–179, 175–176mobile device and AMT enrollment point, 195–199,
197–198operating system, 33–34out-of-band management, 187–189, 188–189overview, 160–162Reporting Services point, 189–191, 190site database servers, 180site servers, 179–180site systems, 180Software Update Point, 199–204, 199–203state migration points, 182–185, 182–184system health validator points, 180–182
Site System Roles page, 137, 137site systems, 180
backing up, 674design, 47–49planning, 58
Site tab, 260, 260site-to-site communications, 281sitecomp.log fi le, 162, 537
sites, 37–38, 38boundaries, 44–45central administration, 38–39communications, 50databases, 47, 696–697distribution points, 41–44, 43failure effects, 682–683maintenance tasks, 648–650migrating, 66primary, 39–40recovering, 684–685, 684, 692secondary, 40security, 51types, 120–121, 122upgrading, 95–96, 96
64 bit applications, Registry, 584Size Limit (KB) For Email Attachments (Automatically
Downloaded) setting, 613Size Limit (KB) For HTML Email (Automatically
Downloaded) setting, 613Size Limit (KB) For Plain Text Email (Automatically
Downloaded) setting, 612skpswi.dat fi le, 515SLAs (Service-Level Agreements), 4SLM (Service Level Management) process, 5, 11SMFs (Service Management Functions), 7–13smp.msi fi le, 185smpmsi.log fi le, 185SMS And MMS Messaging option, 614, 637SMS_CCM folder, 148, 149SMS Database Monitor, 155sms_def.mof fi le, 78, 495SMS_Executive component, 153–154, 153SMS provider point role, 47SMS Provider Settings page, 130–131SMS providers
high availability, 49purpose, 155settings, 130–131
SMS registry key, 146SMS Site reports, 540smsawebsvcsetup.log fi le, 195smsbkup.log fi le, 676, 676, 682SMSCacheDir property, 251SMSCacheFlags property, 251SMSCacheSize property, 251SMSConfi gSource property, 251smsdbmon.log fi le, 155, 180SMSDIRECTORYLOOKUP property, 251SMSDPPROV.LOG fi le, 92Smsenrollsrvsetup.log fi le, 198Smsenrollwebsetup.log fi le, 198smsexec.log fi le, 154, 154
bindex.indd 786bindex.indd 786 27/03/12 8:17 AM27/03/12 8:17 AM
SMSFSPSETUP.LOG FILE • SOFTWARE UPDATES | 787
SMSFSPSetup.log fi le, 187SMSMP property, 251smsportwebsetup.log fi le, 195smsprov.log fi le, 180SMSPUBLICROOTKEY property, 250smspxe.log fi le, 427SMSROOTKEYPATH property, 250SMSSiteCode property, 252smssmpsetup.log fi le, 185snapshots
archiving, 678–679, 678report properties, 557
Software Available Time setting, 390Software Catalog
application deployment, 314, 315application information, 282distribution points, 271primary devices, 322
software categories for Asset Intelligence, 476Software Center
application deployment, 314–316, 315–316distribution points, 271software updates, 331, 331
Software Deployment option, 233Software Deployment page, 278–279, 279software distribution
client installation, 258collections. See collectionsdistribution points. See distribution pointspackages. See packagesreports, 540
Software Distribution Component Properties dialog box, 280–281, 280
Software Download While Roaming option, 638software families for Asset Intelligence, 476–477software inventory
clients, 233collecting, 499–500, 499confi guring, 511–518, 511–518
software licenses for Asset Intelligence, 488–491, 488, 490–491
Software Metering Client Agent, 473–474, 521Software Metering feature, 17, 521
clients, 528–530, 529confi guring, 522–523, 522maintenance tasks, 526–528, 527overview, 521–522reports, 474, 530, 540rules
adding, 524–526, 525Automatic Rule Generation, 523–524, 523enabling and disabling, 524migrating, 77
Software Metering option, 233Software Metering Properties dialog box, 523, 523Software Metering Summarization Progress report,
527, 527Software Metering Usage Report Cycle
action, 529, 529software reports, 483–484software requirements
Application Catalog Web Service Point, 194Application Catalog Web Site Point, 194Asset Intelligence Synchronization Point, 207distribution points, 173Endpoint Protection Manager, 205fallback status points, 186management points, 179mobile device and AMT enrollment point
role, 198Reporting Services, 191servers, 33–36site servers, 123–125Software Update Point role, 204state migration points, 185system health validator points, 182
Software Update Catalog, 358Software Update Manager role, 212
reports, 549software updates, 357–358
software update point role, 47active. See active software update points setupinfrastructure, 346install planning, 346–348settings, 199–204, 199–203software updates, 333–334testing, 359–360
Software Update Scan Schedule setting, 361software updates, 17, 329
classifi cationsclasses, 350confi guring, 376, 376metadata, 334–335
client installation, 257–258client settings, 355–356, 355compliance, 343–344Computer Client Agent, 353–355, 354deployments, 339–340, 344–345
Deploy Software Updates Wizard, 388–395, 389–392
packages, 338–339rules, 340–341, 341templates, 337–338
downloading, 384–387, 385–386enabling, 233fi les, 335
bindex.indd 787bindex.indd 787 27/03/12 8:17 AM27/03/12 8:17 AM
788 | SOFTWARE UPDATES • STATUS MESSAGES
software updates (continued)fi nding, 380–384, 381–384general settings, 348goals, 346group policy settings, 356–357groups, 330, 337, 388Internet-based settings, 348–349languages, 351, 377, 377, 394maintenance windows, 351–352metadata, 334–335, 376, 379migrating, 74–75monitoring, 404–408, 404–407new features, 329–332objects, 335–337planning, 345prerequisites, 332–333process, 342products, 350–351properties, 353reports, 381–382, 381, 540–541role-based administration, 357–358settings, 375–380, 376–378software update point role. See software update
point roleSoftware Updates Client Agent
confi guring, 360–361, 360description, 334
summary details, 351supersedence rules, 349synchronization, 342–343, 349, 375–380, 376–378System Center Updates Publisher, 358–359templates, 332, 337–338test labs, 359–360update fi les, 351Windows Server Update Services Server
console, 365–366installation, 361–365, 363
Software Updates Client Agent, 360–361, 360Software Updates Deployment Evaluation Cycle
action, 355Software Updates Scan Cycle action, 355sorting reports, 562Source Directory page, 421, 422Source Files page, 421source hierarchy, 66–67, 67, 85/source property, 248source sites, migrating, 66Specify A Fully Qualifi ed Domain Name (FQDN) For
This Site System On The Intranet option, 370Specify An FQDN For This Site System For Use On The
Internet option, 367Specify An FQDN For This Site System On The
Intranet option, 372
Specify an Internet-based FQDN For This Site System option, 370, 372
Specify Endpoint Protection License page, 704Specify Intranet Microsoft Update Service Location
option, 356Specify Microsoft Active Protection Service window,
704Specify Peak Time option, 638Specify The Content Distribution page, 428speed of networks, 45splash.hta fi le, 127SpyNet, 700SQL
considerations, 49–50memory, 126, 132replication, 281reports
commands, 561–562SQL Reporting Services, 21, 675
SQL Server Management Studio, 534SQL Server Reporting Services (SSRS), 189–190,
534–538, 536SQL Server Settings page, 140–141, 141srsrp.log fi le, 191, 538srsrpMSI.log fi le, 191, 538srsrpsetup.log fi le, 191SSRS (SQL Server Reporting Services), 189–190,
534–538, 536stand-alone media for task sequences, 418standalone site recovery, 692startup scripts for client installation, 260state-based distribution point groups, 43–44State Message Detail Level setting, 390State Message Reporting Cycle (Minutes) setting, 355State Messaging setting, 234State Migration page, 443, 443, 450–451, 451State Migration Point page, 424–426, 425state migration points
confi guring, 424–426, 425operating system deployment, 414
State Migration report, 541states
Asset Intelligence validation, 473link, 666
statistics for in-console monitoring, 404–407, 404–407
Status Message Details dialog box, 659, 659status messages, 657–659, 658–659
default reports, 541deployment, 661–662distribution, 662–663distribution point confi guration, 663distribution point groups, 663
bindex.indd 788bindex.indd 788 27/03/12 8:17 AM27/03/12 8:17 AM
STOP DATA GATHERING DIALOG BOX • SYSTEM ROLE SELECTION PAGE | 789
system, 664web reports, 659–660
Stop Data Gathering dialog box, 99Stop The Task If It Takes Longer Than setting, 735Storage Card Encryption option, 614, 639Storage Folder Settings page, 425, 425Storage Management SMF, 10Style folder for reports, 538Subscription Schedule page, 559subscriptions for reports, 553–555, 558–561, 559summarization tasks for software metering, 528Summarize Installed Software Data task, 474Summary Details information for software updates,
351Summary page
Asset Intelligence, 487client health, 740, 740client installation, 422computer information, 450confi guration items, 588, 588Deploy Software Updates Wizard, 394–395, 394device drivers, 457distribution points, 169, 169image capture, 439Microsoft Deployment Toolkit, 470mobile devices, 614–615packages, 424secondary site servers, 143–144, 144task sequences, 436, 443
supersedence, 343application deployment, 317–318, 317–318Application References, 272software updates, 349
Supersedence page for applications, 297, 297Supersedence Rules page
Software Update Point role, 202, 202software updates, 377, 378
Support role cluster, 9Supported Platform page, 644, 644Supporting Quadrant MOF, 9–11Supports Contacts option, 294Suppress Any Required Computer Restart After The
Endpoint Protection Client Is Installed option, 232Supsetup.log fi le, 204Suspend BitLocker PIN Entry Or Restart option, 232suspended software updates, 330–331swmproc.log fi le, 530SWMTRReportGen.log fi le, 530Sync Schedule tab, 378, 378synchronization
Asset Intelligence, 479, 486–487, 487discovery, 608
mobile devices, 637–638, 637monitoring, 407, 407software update points, 368–369, 374software updates, 342–343, 349, 375–380, 376–378
Synchronization Point Schedule page, 487Synchronization Schedule page
Asset Intelligence Synchronization Point, 207Software Update Point role, 201
Synchronization Source page, 200, 201, 371, 371Synchronize From An Upstream Update Server option,
368, 374Synchronize From Microsoft Update option, 368, 374System Administration SMF, 10System Center Endpoint Protection (SCEP), 22, 699
alerts, 719–722, 720–722benefi ts, 700–702defi nition fi les, 717–719, 717–718Endpoint Protection client agent, 705–709,
706–708Endpoint Protection Point role, 702–705, 704endpoint protection policies, 709
antimalware, 709–715, 709–714assigning, 716, 716Windows Firewall, 715–716, 715
vs. FEP, 699malware scenario, 723–728, 724–728reporting, 723, 723settings, 232–233
System Center Online service, 476System Center Updates Publisher (SCUP), 127,
342, 395backups, 675–676confi guring, 396–397, 396–397importing updates, 398–399, 399installing, 395–396, 395overview, 358–359partner software updates catalogs, 397–398, 398publishing updates, 401–402, 401rules, 399–400, 400third-party updates, 402–404, 403
system discovery, 52, 239–240, 240system health validator point role, 47, 180–182system requirements
client, 26–32servers, 32–36System Center Updates Publisher, 358–359
System Restart Turnaround Time setting, 352system role. See site system rolesSystem Role Selection page
Asset Intelligence, 487reporting site role, 535state migration points, 424
bindex.indd 789bindex.indd 789 27/03/12 8:17 AM27/03/12 8:17 AM
790 | SYSTEM STATUS MESSAGES • USE THIS SERVER AS THE ACTIVE SOFTWARE UPDATE SERVER OPTION
system status messages, 664system updates. See System Center Updates Publisher
(SCUP)systems management, 1
TTask Sequence Designer, 111, 112Task Sequence Information page, 442, 450task sequences
capture images, 430–436, 431–435deploying, 444–448, 445–448developing, 441–444, 442–444MDT, 466–469, 467, 469media boot, 433–436, 434–435operating system deployment, 416–418,
450–451, 451P2V Migration Toolkit, 110–114, 111–114reports, 541
Team Model, 8Technology setting, 299templates for software updates, 332, 337–338test labs, 359–360test phase in migration, 80–81testing
site backups, 681, 681software update points, 359–360
thin images, 4193rd party license information, 490–491, 491third-party updates, 402–404, 403Threat Overrides page, 713, 713thresholds for alerts, 721, 721throttling
content distribution, 41–42remote distribution point, 270
time stamps for log fi les, 328Trace utility, 328Trace32 utility, 154Triggers page, 733, 733troubleshooting, 647
Application Catalog Web Service Point, 194–195
Application Catalog Web Site Point, 194–195application deployment, 325–328, 326Asset Intelligence Synchronization Point, 207backups, 682client installation, 261Confi guration Manager deployment, 664–665Database Replication, 665–669, 665, 667–669distribution points, 173–174, 174Endpoint Protection Manager, 205enrollment proxy point and enrollment point,
198–199
fallback status points, 187inventory, 518–521log fi les for, 651–657maintenance plans for, 647–651, 648management points, 179mobile devices, 645–646Reporting Services, 191scenario, 669–671site database servers, 180site servers, 152–155, 152–155Software Update Point role, 204state migration points, 185status messages for, 657–664, 658–659
Trusted Publishers option, 397Type of Deployment setting, 390
Uunattended site server installation, 155–157Uncategorized state in Asset Intelligence, 479Unhealthy Client Details reports, 263Uninstall Program option, 302/Uninstall property, 249Uninstall Start In option, 302unknown computer support, 452–455, 452–455Unknown package conversion state, 103Unknown status in monitoring, 405unmanaged scenarios, SCEP in, 702–703Unsigned Applications option, 614, 637Unsigned File Installation option, 614, 637Update Files setting, 351Update lists feature, 332Update Prerequisite Components page, 688, 688Update Server option, 396Update/Update Group option, 390Updateable state in Asset Intelligence, 479Updated Prerequisite Components page, 135updates
clients, 259, 259security, 717–719, 717–718software. See software updates
Upgrade Assessment - Windows 7 report, 541Upgrade Shared Distribution Point wizard, 91–92, 92upgrading
administrative console, 84Confi guration Manager console, 98–99distribution points, 83–84, 91–95, 92–93, 95secondary sites, 95–96, 96
Use default distribution point groups associated to this collection option, 308–309
Use This Server As The Active Software Update Server option, 375
bindex.indd 790bindex.indd 790 27/03/12 8:17 AM27/03/12 8:17 AM
USE WAKE-ON-LAN TO WAKE UP CLIENTS FOR REQUIRED DEPLOYMENT OPTION • WINDOWS UPDATE AGENT (WUA) | 791
Use Wake-On-LAN to Wake up Clients for Required Deployment option, 390
/UsePKICert property, 249User And Device Affi nity settings, 234, 279, 280User Categories option, 295user-centric focus for distribution points, 271user confi guration for mobile devices, 624–631, 625–631User-defi ned state in Asset Intelligence, 478User Device Affi nity
application deployment, 322–325, 323–325confi guring, 459–463, 460–463operating system deployment, 418report, 541
User Device Affi nity Usage Threshold (Days) setting, 461
User Device Affi nity Usage Threshold (Minutes) setting, 461
User Documentation option, 295User-Driven Installation scenario, 464User Experience settings
application deployment, 303–305, 303Deploy Software Updates Wizard, 391–392, 391Deploy Software Wizard, 312, 312deployment templates, 337task sequence deployment, 446visual experience, 391–392
user facing packages, 101user focused service support, 3User State Migration Tool (USMT)
documentation, 424package creation, 422–424, 423
usersadministrative, 220–221, 220, 224–225, 224–226discovery, 52, 240report, 541state management, 470–471, 470
UserState task category, 417
VValidated state in Asset Intelligence, 478validation
Asset Intelligence states, 478–479confi guration baseline rules, 594–596, 595confi guration items, 585–588, 585, 587–588content, 43, 43databases, 152, 152fi le systems, 148, 149groups, 149–150, 150registry, 146–148, 147–148services, 151, 151WMI, 150–151, 151
validator points, 180–182
vendor updates, 358verifi cation
client installation, 260–261, 260site servers, 145–150, 146
database validation, 152, 152fi le system validation, 148, 149group validation, 149–150, 150Registry validation, 146–148, 147–148services validation, 151, 151WMI validation, 150–151, 151
version setting for software metering rules, 525–526viewing
inventory information, 500–501, 501software inventory, 514, 515, 517–518, 518
Virtual Application Name setting, 619virtual application package migration, 74Virtual Applications report, 541Volume Shadow Copy Service (VSS), 673
WWake on LAN feature
description, 18report, 541
WCM.log fi le, 204web reports for status messages, 659–660Web Site Name setting, 618Web Site Selection page, 363, 363Website Name/Port Number setting, 619Whether Or Not A User Is Logged On option, 304wildcards in Compliance Settings, 584Windows 7 operating system support, 28Windows event log settings, 475Windows Firewall policies, 715–716, 715Windows Management Instrumentation (WMI),
150–151, 151, 344Windows Server 2003 operating system support, 29Windows Server 2008 operating system support,
29–30Windows Server Update Services (WSUS), 17, 329
central administration sites, 132console, 365–366database backups, 675description, 332installing, 361–365, 363ports, 373, 373reporting events, 349software update points, 346Synchronization Manager, 342–343
Windows Update Agent (WUA)compliance, 343event messages, 349software updates, 356
bindex.indd 791bindex.indd 791 27/03/12 8:17 AM27/03/12 8:17 AM
792 | WINDOWS VISTA OPERATING SYSTEM SUPPORT • SOFTWARE UPDATES
Windows Vista operating system support, 28Windows XP operating system support, 27wipe-and-load migration, 97–100, 100Wireless Communications page, 640–641, 640Wireless Network Connection window, 641, 641Wireless Network Connections option, 613Wizard Completed screen
captured image, 441compliance, 343distribution points, 428task sequences, 436USMT packages, 424
WMI (Windows Management Instrumentation), 150–151, 151, 344
Work Information setting, 356Workforce Management SMF, 11workstations as distribution points, 269WSUS. See Windows Server Update Services (WSUS)WSUSCtrl.log fi le, 204wsusutil.exe utility, 74–75, 379–380WSYNCMGR.log fi le, 204WUA (Windows Update Agent)
compliance, 343event messages, 349
software updates, 356
bindex.indd 792bindex.indd 792 27/03/12 8:17 AM27/03/12 8:17 AM