About me About this session Agenda Computer User.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

3/29/2017 1:10 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
Experiences with Service Manager and Orchestrator.
Contains: Monitoring configuration: MPs, rules, monitors, discoveries, etc. Configuration & inventory data Performance data State data Alerts.
Fluffy’s Safe Right? If you want to limit a user’s functionality, don’t make them an administrator.
UD-B302 Lighting, HVAC, … 75% IT 25% PCs, Laptops, Monitors $28b Network $18b Servers $14b Printers $13b $90b Telecom $10b Other $7b Commercial Energy.
Agenda Orchestrator - Components Orchestrator – For the ConfigMgr Admin.
DV-B306 One with Windows More Apps in More Places Modern Managemen t.
4/13/2017 7:44 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
-ConfigMgr Scripting history -Introduction to the ConfigMgr SP1 & PowerShell -Scenarios & Demos.
Appetizers Each MVP will present one tantalizing appetizer to whet your appetite for more. Please save all questions for the end. P.S. We’re here all.
4/15/ :16 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
DV-B307 Personal & flexible  App and OS personalization roam across Windows  Syncs are smart and logins are fast  Application or OS reconfiguration.
Agenda Overcome flat budgets Coping with relentless growth Meeting increasing business demands Managing escalating complexity Maintaining service levels.
Service Manager Operations Manager Configuration Manager Data Protection Manager Virtual Machine Manager App Controller Orchestrator Active Directory.
AI-B301 Topics A quick note: There is a lot of information in this session, too much in fact! Slides are heavy and designed for you to review. We’ll.
Something special about Benjamin Session Objectives and Takeaways.
Patch Deployment Patch Creation Vulnerability Scanning Vulnerability Intelligence.
Agenda Advanced Query Techniques Agenda Taming SQL Performance issues.
Not what you are looking for? Head to another session now!
Devices & Experiences Users Want Applications and data across devices, anywhere Controlled access to data with seamless authentication.
Windows Store apps Provisioning Installation.
Leader in Cloud Services Enablement and Desktop Virtualization 900+ employees worldwide 100+ patents granted or pending 200+ partnerships include Microsoft,
Session Objectives and Takeaways Scenario End UserAdministrator Art needs to quickly install an application to edit a diagram that he needs to update.
IM-B201 Traditional Virtualized Private Cloud Public Cloud  Windows  Linux  UNIX  Windows  Linux  UNIX  Windows  Linux  Windows  Linux.
Boot processCapable of USB boot Firmware USB boot enabled. (PCs certified for use with Windows 7 or Windows 8 can be configured to boot directly.
Customizing the Browser Browser Management Deployment MethodsApp Compat.

Increase the level of Service Pack to the supported level IMPACT.
LinuxUNIX Red HatSUSECentOSUbuntuDebianOracleAIXHP-UXSolaris Configuration Manager * * * * * * Endpoint Protection No Plans.
Not what you are looking for? Head to another session now!
Hats off to MS Research! Wake-on-LAN in ConfigMgr.
Global Foundation Services (GFS) Malware Protection Center Microsoft Security Response Center (MSRC)
What are add-ins Types of add-ins Creating add-ins Demos.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
“With System Center 2012, we have much more granular insight into and control over the services we’re delivering to the business. This is critical.
IM-B401 Dashboard Samples shown today can be found at
Your Application:.NET Application Performance Monitoring First mile: internal synthetic transactions Mid-mile: Global Service Monitor Last mile: client-side.
IM-B391 Agenda Getting Metrics Out From Database Servers.
Pre-Talk Q&A piecing it together fabric design and configuration.
REQUIREMENTS WORKING SOFTWARE Misunderstood requirements Conflicting priorities Unmet user expectations Can’t get actionable feedback Disparate management.
Co-facilitator Denver user group Blog at  Code examples from this presentation.
Supporting and Maintaining Desktop Applications Lesson 13.
Microsoft NDA Confidential Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and.
Maps Serverquarium 2013 Four Steps to Conquering the Summit.
Online Snapshots Disk-Based Backup Active Directory Tape-Based Backup SC DPM Up to Every 15 minutes Disaster Recovery with offsite replication and.
SD-B309 Session Objectives And Takeaways Check us out on Visit our blog: Watch us:
DC-B312 BitLocker Improvements in Windows 8 MBAM 2.0 Investment Areas and Key New Features Deploying MBAM 2.0MBAM 2.0 End User Experience.
Five issues, commonly addressed on the forums and mailing lists Boundaries Client identity Business hours and maintenance windows Deployment type.
Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and data across devices, anywhere.
Amit Virmani Software Design Engineer Madhu Jujare Software Design Engineer.
Integrated Platform Virtual applications work like installed applications Virtual applications use Windows standards No dedicated drive letter.
Not what you are looking for? Head to another session now!
Software Update Groups Update Deployments Assign updates to clients Define when, where, how, who Update Packages.
ADK ComponentConfiguration Manager Site System Windows Deployment ToolsCentral Administration Site Server Primary Site Server All SMS Provider.
Agenda Data center challenges Main central themes facing every IT decision maker today Overcome flat budgets Cope with relentless growth Meet increased.
Lost Data and Files Recovery Planning Distributed Workforce System Failures Traditional approaches to machine recovery don’t meet the needs of a.
Session Objectives And Takeaways Our Service Why Use the Portal?
Complete your session evaluations today and enter to win prizes daily. Provide your feedback at a CommNet kiosk or log on at.

On Premises Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service) Storage Servers.
A way to develop software that emphasizes communication, collaboration, and integration between development and IT operations teams.
DC-B301 Agenda Can you afford not to Migrate? What is USMT 5.0?
ConfigMgr Environment 2007 Hierarchy 2007 Hierarchy (Simplified View)
Stop following incidents Register and analyze Describe your tasks step by step Make it part of your DNA If you know what you did the last month you.
High Density Virtualization Low Density or No Virtualization All features Unlimited virtual instances Processor-based license All features Two virtual.
Session Objectives And Takeaways Agenda Monitor and manage servers 30+ Azure Hosted Services 10 global data center facilities & 6 domains 110+
Agenda Is your company using Windows Azure? Dev vs Ops and the Modern Application.
1/16/ :40 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
10/30/ :28 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Presentation transcript:

About me

About this session

Agenda

Computer User

Group policy vs. Configuration Manager Group policy software installationsConfiguration Manager Group policy software installations client side extension ConfigMgr Client → ConfigMgr Software Distribution Agent (ccmexec.exe) Msi package (or.zap file)Any command line Install and uninstall out of the boxPackage model: install and uninstall separate Application model: installation program required, uninstall program recommended Writes Event ID's, but no centralized reporting Extensive and exhaustive reports and logging

Group policy vs. Configuration Manager Group policy software installationsConfiguration Manager Based on active directory and organizational units Collections and database Information can be read from AD Targeting using organizational unitsTargeting using collections Additional targeting using group policy security filtering Queries, direct membership Application Model: requirements Msi package → assign/publishPackage model: Package → Program → Advertisement Application model: deployment types

Group policy vs. Configuration Manager Group policy software installationsConfiguration Manager If msi package and targeted computer are ok, everything just works (or that's what we think) Whether software distribution action was successful or not we get the information. Return codes are important! Sequencing possible using "GPO Link Order" Package installation order within the same GPO is assumed to be random Package model: "Run another program first" Task Sequences Application Model: requirements, dependencies Makes sure the client computer is in the state that msi package defines Makes sure the command line will be run on client - eventually

Group policy vs. Configuration Manager Group policy software installationsConfiguration Manager No scheduling optionsDeployments can be scheduled DFS root → DFS share → directory → msi package (Install source) Package Source Files → Distribution Point → ConfigMgr cache Install source is immutableConfigMgr Windows Installer Source List Management

Domain Group policy software installations Client GPO Software Installations Client Side Extension Windows Installer Msi package GPO Computer User

Msi package Windows installer self-healing (self-repair) Component A (GUID A) File 1 Keypath for Component A File 2 Component B (GUID B) Registry Key 1 Keypath for Component B File 3 Windows installer Check Repair Check Repair

Group policy vs. Configuration Manager Group policy software installationsConfiguration Manager Publish to userAdvertisement, non-mandatory to computer Only domain accountsFor all accounts (Domain, Local) Installing account: user with elevated privileges Installing account: Local System or the user logged on No notifications about new softwareOption for notifications about new software

Start Blocking Per-Machine installations? Blocking Per-User installations? Notify user Blocking process running? Notify user, try again? No Yes No Yes No Yes No Yes Quit: -1 (per-machine) Quit: -2 (per-user) Quit: -3 (blocking process) A

Program already installed? Install program? Notify user: installation finished Run uninstall command Quit: Return Code from uninstall command Reboot needed? No Yes No Yes No Yes Program already installed? No Quit: 0 (no changes) No Quit: -4 (user gave up) Yes Run install command Quit: Return Code from install command Schedule reboot in 60 seconds Notify user: reboot is needed A Uninstall program? Wait of 'OK'

Group policy vs. Configuration Manager Group policy software InstallationsConfiguration Manager Install during startup (boot) "Installing Managed Application..." Install at any time (except during startup) Whether user is logged on or not Uninstall during startup (boot)Uninstall at any time (except during startup) Installing account: Local SystemInstalling account: Local System (Run with administrative rights) or any other account

Domain Keksi Computer HKLM\SOFTWARE\[Wow6432Node\] Microsoft\Windows\CurrentVersion\Uninstall\ GPOInstall Adobe Reader\ DisplayName="GPOInstall Adobe Reader" GPO: "Install Adobe Reader"Startup script: "\\server\share\keksi-adobereader.vbs" Configuration Manager Configuration Manager client Hardware inventory cycle Add/Remove Programs "GPOInstall Adobe Reader" Computer Collection "GPO: Install Adobe Reader" Query Add/Remove Programs Display Name = GPOInstall Adobe Reader Install or upgrade Adobe Reader

Complete your session evaluations today and enter to win prizes daily. Provide your feedback at a CommNet kiosk or log on at Upon submission you will receive instant notification if you have won a prize. Prize pickup is at the Information Desk located in Attendee Services in the Mandalay Bay Foyer. Entry details can be found on the MMS website.

Resources