ConfigMgr 2012 - Discovering and Organizing Resources Mariusz Zarzycki, Phd, MCT, MCTS, MCITP, MCSE, MCSA.....

Slides:



Advertisements
Similar presentations
IP ADDRESS MANAGEMENT [IPAM]
Advertisements

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Module 5: Creating and Configuring Group Policy
Managing User Settings with Group Policy
11 WORKING WITH GROUPS Chapter 7. Chapter 7: WORKING WITH GROUPS2 CHAPTER OVERVIEW  Understand the functions of groups and how to use them.  Understand.
11.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Understanding Active Directory
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
SIM352. Proliferation of devices Virtualization moving to the desktop Growing threats to corporate information Industry Trends “More things to manage”
Chapter 7 WORKING WITH GROUPS.
Module 16: Software Maintenance Using Windows Server Update Services.
11 REVIEWING MICROSOFT ACTIVE DIRECTORY CONCEPTS Chapter 1.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Hands-On Microsoft Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Name Resolution Domain Name System.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
© 2012 Microsoft Corporation. All rights reserved.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Managing User Desktops with Group Policy
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Two Installing and Configuring Exchange Server 2003.
Module 6: Configuring User Environments Using Group Policy.
Implementing Group Policy. Overview What is Group Policy Introduction to Group Policy Group Policy Structure How Group Policy Settings Are Applied in.
Module 5: Configuring Internet Explorer and Supporting Applications.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Module 7 Planning and Deploying Messaging Compliance.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
Module 5: Creating and Configuring Group Policies.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
SMS Software Distribution. Overview  Explaining How SMS Distributes Software  Managing Distribution Points  Configuring Software Distribution and the.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Search Overview Search Features: WSS and Office Search Architecture Content Sources and.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
THIS PRESENTATION: WINDOWS UPDATES VIA AUTOMATIC DEPLOYMENT RULES BEST PRACTICES SYSTEM CENTER CONFIGURATION MANAGER 2012 R2 Jodie Gaver Jodie Gaver Working.
Module 8: Managing Software Distribution. Collections Packages Programs Advertisements Collections Packages Programs Advertisements How Software.
Week 4 Objectives Overview of Group Policy Group Policy Processing Implementing a Central Store for Administrative Templates.
Module 10: Implementing Administrative Templates and Audit Policy.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Three Managing Recipients.
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
Module 6 Creating and Configuring Group Policy. Module Overview Overview of Group Policy Configuring the Scope of Group Policy Objects Evaluating the.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Unit 9 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/17/2016 Instructor: Williams Obinkyereh.
Maintaining and Updating Windows Server 2008 Lesson 8.
Pass Microsoft Installing and Configuring Windows Server 2012 exam in just 24 HOURS! 100% REAL EXAM QUESTIONS ANSWERS Microsoft Installing.
SharePoint 101 – An Overview of SharePoint 2010, 2013 and Office 365
Implementing Active Directory Domain Services
MCSA VCE
Braindumps Questions Answers
VCE Questions Dumps
This Presentation Covers Training Modules for SCCM
Utilize Group Policy Terminal Server Settings
Windows Server 2008 Administration
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
What you will learn today
Module 1: Overview of Systems Management Server 2003
Microsoft Virtual Academy
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Preparing for the Windows 8.1 MCSA
Presentation transcript:

ConfigMgr Discovering and Organizing Resources Mariusz Zarzycki, Phd, MCT, MCTS, MCITP, MCSE, MCSA

Agenda Resource Discovery Boundaries and Boundaries Groups User and Device collections Role-Based Administration

Configuring Resource Discovery

What is Resource Discovery? Resource discovery is the process of detecting and acquiring information about network resources: 1.Discovery gathers information about network resources (computers, users, security groups, and network infrastructure) 2.Discovery generates a DDR file 3.Discovery Data Manager loads the information from the DDR file into the database Reference Planning for Discovery in Configuration Manager Active Directory Site Server Site Database.DDR Network If a DDR record is not updated within a specific amount of time, a site maintenance task called Delete Aged Discovery Data will remove the record from the database. This task is, by default, configured to delete data older than 90 days. You can modify this site maintenance task in the Administration workspace. Expand the Site Configuration node, click the Sites node, right-click the site name, and then click Site Maintenance.

Discovery Methods Active Directory Forest Discovery Active Directory System Discovery Active Directory User Discovery Active Directory Group Discovery Network Discovery Heartbeat Discovery

Active Directory Discovery Methods For Active Directory Forest Discovery, the options include: Enabling Active Directory Forest Discovery and boundary creation Specifying Active Directory forest options For all other Active Directory discovery methods, specify : At least one Active Directory container Any additional search options The polling schedule

Short descriptions of discovery methods?

What Is Heartbeat Discovery? Site Server Site Database.DDR By default, Heartbeat Discovery runs every seven days You can configure the schedule, but understand the implications when reducing the Heartbeat Discovery interval A discovery method that refreshes the Configuration Manager client computer discovery data in the site database

Monitoring Discovery by Using Component Status and Log Files

Configuring Resource Discovery DEMO 1

Jak został wykryty TOR- CL1 SMS_AD_SYSTEM_DISCOVERY_A GENT

Boundaries and Boundaries Groups

Overview of Client Assignment Client assignment is a process that determines the Configuration Manager site that manages a client computer Assign clients to a Configuration Manager site by: Manually specifying the site code to use Configuring the client to automatically assign to a site based upon boundaries and boundary groups Central Administration Site (CAS) Primary Site (S02) Primary Site (S01)

What Is a Boundary? A network location that contains one or more devices that you want to manage IP Range Active Directory Site IP Subnet IPv6 Prefix

What Is a Boundary? Site Assignment You can configure a boundary group to provide site assignment for clients located within member boundaries. A single boundary should not be a member of multiple boundary groups configured for site assignment. Note Be careful not to add a boundary to multiple site-assignment boundary groups if these boundary groups are associated with different sites. If you do, clients cannot determine which site they should be assigned to. Configuration Manager does not support overlapping boundaries for site assignment. Site Assignment You can configure a boundary group to provide site assignment for clients located within member boundaries. A single boundary should not be a member of multiple boundary groups configured for site assignment. Note Be careful not to add a boundary to multiple site-assignment boundary groups if these boundary groups are associated with different sites. If you do, clients cannot determine which site they should be assigned to. Configuration Manager does not support overlapping boundaries for site assignment.

Boundaries and Boundaries Groups DEMO 2

User and Device collections

Overview of User and Device Collections You can use collections to: Organize resources into manageable units Organize collections of target resources for performing operations such as application deployments or installing software updates Target groups of computers for specific configuration settings Integrate role-based administration Collections represent groups of resources that consist of computers, users, and security groups

Types of Rules Used to Create and Manage Collections Collection rule types include: Direct Rule Exclude Collections Include Collections Query Rule Incremental collection member evaluation every 5 minutes Full collection member evaluation every 7 days Specify a Limiting collection as a basis for resources

User and Device collections DEMO 3

Other considerations include: Deployed software will not run if maximum run time extends past the end of the maintenance window If maximum run time is set to “Unknown,” deployed software may run past the end of maintenance window Best Practices: Assign maintenance windows only to collections specifically created for that purpose Include a description of the maintenance window in the name of the collection If PC1 is a member of Collection A, Collection B, and Collection C, and: Then, PC1’s maintenance windows will be 4 A.M. to 7 A.M., and 5 P.M. to 11 P.M. Collection A’s maintenance window is from 5 P.M. to 8 P.M. Collection C’s maintenance window is from 7 P.M. to 11 P.M. Collection B’s maintenance window is from 4 A.M. to 7 A.M. A Maintenance window does not prevent the following tasks: Deployments, software updates, and task sequences specifically configured to ignore maintenance windows or user-initiated deployments Wake On LAN transmission and out of band management Policy downloads Inventory and metering data collection and reporting Applying Maintenance Windows to Collections Use maintenance windows to configure a specific period of time during which required deployments, software update distributions, and task sequences can run

Monitoring Collections

Role-Based Administration

Overview of Role-Based Administration Use the role-based administration feature to define security settings and to delegate administrative tasks to users or groups User Administrative user Assign a Role Application Administrator Assign a Scope Custom scope containing objects to manage Assign a Collection Custom collection containing users or computers to manage Defining role-based administration: Must specify one or more security roles Must specify a security scope or collection for the user Can specify both scopes and collections Can be further customized by mapping security roles to specific security scopes and collections

Default Security Roles Configuration Manager includes 14 built-in security roles Each built-in role contains a set of individual permissions to perform actions on different types of objects

What Are Security Scopes? Considerations: All securable objects are initially assigned to the Default security scope All securable objects must be assigned to at least one security scope All administrative users must be assigned to at least one security scope Use security scopes to define which securable objects an administrative user can view and manage

The Process for Adding an Administrative User to Configuration Manager

Reports on Role-Based Administration Reports provide information related to the configuration and use of role- based administration The reports on role-based administration include:

DEMO 4

Dziekuję za uwagę Konkurs z ConfigMgr’a 2012