28
Index Note to the Reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations. A accounts and Accounts page client push installation, 255, 255 Exchange Server, 607 , 607 Network Access, 420, 420 actions and Actions page application deployment, 310 client installation, 260 scheduled tasks, 734, 734 software updates, 355, 355 Active Directory (AD) discovery methods, 51–52, 236–237 , 236–238 forests, 238, 238–239 groups, 241, 241 heartbeat, 241–243, 244 network, 242 scheduling, 243–244, 243–245 system, 239–240, 240 users, 240 management points, 177–178 schema, 36–37 site boundaries, 44–45 system health validator points, 181 Active Directory Container dialog box, 236, 236 Active Directory Domain Services, 52 Active Directory Membership setting, 367, 372 Active Settings page, 200, 367, 368369, 373 Active Site System Roles Wizard, 368–369, 368369 active software update points setup, 366 Central Administration Site, 366–370, 367–369 checking, 375 primary sites child of CAS, 370–372, 371 stand-alone, 372–374 ActiveSync connections, 604–605, 605, 615 Activity Management Technology (AMT), 19 enrollment point, 195–199, 197–198 out-of-band service points, 187–189, 188–189 Add Application Catalog Website To Internet Explorer Trusted Sites Zone option, 232 Add Configuration Items dialog box, 591, 591 Add Distribution Point Groups dialog box, 441 Add Distribution Points dialog box, 441 Add Driver To Boot Images page, 456, 457 Add Driver To Packages page, 456, 456 Add Exchange Server Wizard Account page, 607 , 607 Discovery page, 608–609, 608 General page, 606–607 , 606 Settings page, 609 Application settings, 614, 614 Email Management settings, 612–613, 612 General settings, 610, 610 Password settings, 610–611, 611 Security settings, 613–614, 613 Add New Collection Alerts window, 720, 720 Add Partner Software Updates Catalogs page, 398, 398 Add Site System Roles Wizard, 158–160, 159 Application Catalog Web Service Point, 192–194, 192, 194 Application Catalog Web Site Point, 192–193, 192–193 distribution points, 163–169, 163–169 Endpoint Protection Manager, 204–205, 205 fallback status points, 186, 186 management points, 175–177, 175–176 mobile device and AMT enrollment points, 196–199, 197–198 out-of-band management, 187–189, 188–189 Reporting Services, 189–190, 190, 535–536, 536 SCEP, 703–704, 704 Software Update Point, 199–204, 199–203 state migration points, 182–184, 182–184 system health validator, 181 Add Software Updates window, 591, 591 Add User Account screen, 471 Add User Or Group dialog box, 550 Additional Settings page, 642–644, 642 ADForestDisc.log file, 238 AdminConsole.msi file, 98 Administration Security report, 538 administrative console Asset Intelligence, 20–21 reports, 542–543, 542 software upgrades, 332 upgrading, 84 WSUS, 365–366 administrative folder migration, 77 administrative users creating, 224–225, 224–226 overview, 220–221, 220 COPYRIGHTED MATERIAL

Index [configmgrblog.com] Note to the Reader: ... WSUS, 365–366 administrative folder migration, 77 ... BranchCache feature, 44 Browse Settings page, 643, 643

Embed Size (px)

Citation preview

IndexNote to the Reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations.

Aaccounts and Accounts page

client push installation, 255, 255Exchange Server, 607, 607Network Access, 420, 420

actions and Actions pageapplication deployment, 310client installation, 260scheduled tasks, 734, 734software updates, 355, 355

Active Directory (AD)discovery methods, 51–52, 236–237, 236–238

forests, 238, 238–239groups, 241, 241heartbeat, 241–243, 244network, 242scheduling, 243–244, 243–245system, 239–240, 240users, 240

management points, 177–178schema, 36–37site boundaries, 44–45system health validator points, 181

Active Directory Container dialog box, 236, 236Active Directory Domain Services, 52Active Directory Membership setting, 367, 372Active Settings page, 200, 367, 368–369, 373Active Site System Roles Wizard, 368–369, 368–369active software update points setup, 366

Central Administration Site, 366–370, 367–369checking, 375primary sites

child of CAS, 370–372, 371stand-alone, 372–374

ActiveSync connections, 604–605, 605, 615Activity Management Technology (AMT), 19

enrollment point, 195–199, 197–198out-of-band service points, 187–189, 188–189

Add Application Catalog Website To Internet Explorer Trusted Sites Zone option, 232

Add Confi guration Items dialog box, 591, 591Add Distribution Point Groups dialog box, 441Add Distribution Points dialog box, 441Add Driver To Boot Images page, 456, 457Add Driver To Packages page, 456, 456

Add Exchange Server WizardAccount page, 607, 607Discovery page, 608–609, 608General page, 606–607, 606Settings page, 609

Application settings, 614, 614Email Management settings, 612–613, 612General settings, 610, 610Password settings, 610–611, 611Security settings, 613–614, 613

Add New Collection Alerts window, 720, 720Add Partner Software Updates Catalogs page, 398, 398Add Site System Roles Wizard, 158–160, 159

Application Catalog Web Service Point, 192–194, 192, 194

Application Catalog Web Site Point, 192–193, 192–193

distribution points, 163–169, 163–169Endpoint Protection Manager, 204–205, 205fallback status points, 186, 186management points, 175–177, 175–176mobile device and AMT enrollment points,

196–199, 197–198out-of-band management, 187–189, 188–189Reporting Services, 189–190, 190, 535–536, 536SCEP, 703–704, 704Software Update Point, 199–204, 199–203state migration points, 182–184, 182–184system health validator, 181

Add Software Updates window, 591, 591Add User Account screen, 471Add User Or Group dialog box, 550Additional Settings page, 642–644, 642ADForestDisc.log fi le, 238AdminConsole.msi fi le, 98Administration Security report, 538administrative console

Asset Intelligence, 20–21reports, 542–543, 542software upgrades, 332upgrading, 84WSUS, 365–366

administrative folder migration, 77administrative users

creating, 224–225, 224–226overview, 220–221, 220

bindex.indd 765bindex.indd 765 27/03/12 8:17 AM27/03/12 8:17 AM

COPYRIG

HTED M

ATERIAL

766 | ADMINISTRATOR COMMENTS SETTING • APPLICATION DEPLOYMENT

Administrator Comments setting, 299administrators

application deployment, 299computer accounts as, 150mobile device enrollment, 622–624, 623–624software updates, 332

ADR (Automatic Deployment Rules), 200, 330, 337, 717ADsgdis.log fi le, 241ADsysdis.log fi le, 240Advanced page

antimalware policy, 713, 713System Center Updates Publisher, 397

advertisement migration, 73AfterBackup.bat fi le, 678–679Agent Extensions Manage The Deployment Of

Applications And Software Updates option, 232agents

clientAsset Intelligence, 473settings, 229–234, 230, 353–355, 354

planning, 59AI. See Asset Intelligence (AI)AILW (Asset Intelligence License Wizard), 491AIUpdateSvc.log fi le, 207AIUSMSI.log fi le, 207AIUSsetup.log fi le, 207alerts and Alerts page

Application Deployment, 274client, 263–265, 264confi guration baselines, 596Deploy Software Updates Wizard, 392–393, 392Deploy Software Wizard, 312–313, 312deployment templates, 338SCEP, 719–722, 720–722

All Instances Of The Objects That Are Related To The Assigned Security Roles option, 221

All security scope, 214All Software Updates node, 384All Systems collection, 326Allow clients to share content with other clients on the

same subset option, 300–301, 393Allow clients to use a fallback source location for

content option, 301Allow Mobile Devices That Cannot Be Provisioned

option, 610Allow Password Recovery option, 611Allow Signed Content from Intranet Microsoft Update

Service Location option, 356Allow Simple Password option, 611Allow System Restart Outside Maintenance Windows

option, 352Allow Task To Be Run On Demand option, 735Allow This Application To Be Installed option, 294

Allow User Policy Request From Internet Clients option, 231

Allow Users To Interact With This Program option, 304

Allowed Message Formats option, 612, 636Allowed Period Of Time Users Can Postpone A

Required Restart To Complete The endpoint Protection Installation (hours) setting, 233

AMT (Activity Management Technology), 19enrollment point, 195–199, 197–198out-of-band service points, 187–189, 188–189

answer fi les, 155–157antimalware policy, 709–715, 709–714Application Administrator Properties window,

213, 213Application Administrator role, 211, 546Application Author role, 211, 546Application Catalog

application deployment, 314–315customizing, 194sample application, 294User Device Affi nity, 322, 323

Application Catalog Customizations page, 194Application Catalog Web Service Point role, 46,

191–195, 192–194, 622, 622Application Catalog Web Site Point role, 46, 191–195,

192–194, 355Application Deployment, 267

Application References, 271–272client experience, 314–316, 314–316Create Application Wizard, 284–288, 285–287dependencies, 273–274

Application References, 272BITS-enabled IIS, 275confi guring, 318, 319default client settings, 275–281, 276–280distribution points, 275management points, 274

Deploy Software Wizard, 307–314, 308–312Detection Method tab, 319distribution point changes, 269–271elements, 281–283, 282–283fl ow options, 272–274new features, 267–269, 268process, 284, 284properties, 283, 283Requirements tab, 319–321, 321–322Ribbon options, 288–293, 289–292sample application, 293–297, 293–298supersedence, 317–318, 317–318troubleshooting, 325–328, 326types, 298–307, 298–303, 305–307User Device Affi nity, 322–325, 323–325

bindex.indd 766bindex.indd 766 27/03/12 8:17 AM27/03/12 8:17 AM

APPLICATION DEPLOYMENT MANAGER ROLE • BASELINE CONFIGURATION | 767

Application Deployment Manager role, 211, 546Application References, 271–272Application Settings window, 614, 614Application Virtualization (App-V), 21applications

confi guration items, 592properties, 282, 282

Applications node, 267, 268, 284, 284Applications That Depend On This Application option,

318Applications That Supersede This Application option,

318Apply This Software Metering Rule To The Following

Clients option, 526archiving backup snapshots, 678–679, 678ASC keyword, 562Asset Intelligence (AI), 473

catalog, 476–478enabling, 485–487, 486–487functionality, 20–21home page, 479–481, 480maintenance tasks, 474–475, 475migrating, 76reports, 481–485, 538requirements, 473–475software licenses, 488–491, 488, 490–491synchronization points, 479, 486–487, 487validation states, 478–479

Asset Intelligence License Wizard (AILW), 491Asset Intelligence Reporting Class Settings dialog box,

485, 486Asset Intelligence Synchronization Point Connection

Settings page, 487, 487Asset Intelligence Synchronization Point role, 46,

206–207, 206Asset Manager role, 211, 547Assets and Compliance workspace, 470–471, 470assigned security scopes and collections, 220–221, 220assigning policies, 716, 716Associate Assigned Security Roles With Specifi c

Security Scopes And Collections option, 221Associated Security Roles dialog box, 550ATM Provisioning Certifi cate page, 188–189, 189ATM Service Point page, 188, 188Automatic Deployment Rules (ADR), 200, 330, 337, 717automatic operations

client remediation, 261–262, 262management point queries, 178operating system image captures, 436–438, 436–438publishing updates, 401

Automatic package conversion state, 103

Automatically Confi gure Used Device Affi nity From Usage Data option, 461

Automatically Detect This Information Using Existing Content option, 286

Automatically Distribute Content For Dependencies option, 309

Automatically Download Content When Packages Are Assigned To Distribution Points option, 387

Automatically Remove Previously Installed Antimalware Software Before Endpoint Protection Client Is Installed option, 232

Availability Management process, 6–7, 11–12Available Software Updates dialog box, 345awebsctrl.log fi le, 195awebsvcMSI fi le, 195

BBackground Intelligent Transfer Service (BITS)

Application Deployment, 275client settings, 231, 275–276, 276Computer Client Agent, 354–355distribution points, 162, 173

Background Intelligent Transfer setting, 231Backup Confi gMgr Site Server task, 673–674, 676

archiving backup snapshots, 678–679confi guring, 680–682, 681considerations, 677copying backups, 677log fi les, 679

Backup Site Server Properties dialog box, 647–648, 648

Backup Site Server task, 680, 681backups, 676

central site, 677considerations, 677copying to other locations, 677excluded items, 674–676log fi les, 679restoring, 682–685, 684site servers, 680–681, 681snapshots, 678–679, 678troubleshooting, 682

bank software, 477bare metal operating system deployment, 412,

448–451, 449, 451baseline confi guration, 581

clients, 593–594, 593initial, 588–589options, 594rules, 590–596, 591, 595

bindex.indd 767bindex.indd 767 27/03/12 8:17 AM27/03/12 8:17 AM

768 | BIDS (BUSINESS INTELLIGENCE DEVELOPMENT STUDIO) • CHANGE MANAGEMENT PROCESS

BIDS (Business Intelligence Development Studio), 534, 566–568

BITS (Background Intelligent Transfer Service)Application Deployment, 275client settings, 231, 275–276, 276Computer Client Agent, 354–355distribution points, 162, 173

/BITSPriority property, 248–249Block The Following Applications In ROM option, 614Bluetooth option, 613, 637Boot Image page, 435, 435boot images

customized, 75Microsoft Deployment Toolkit, 465–466, 466operating system deployment, 413–414, 413packages, 428for PXE, 428–429, 429task sequences, 435, 435

bootable medianon-task sequences, 115–116, 115task sequences, 418

boundariesclient installation, 245–247, 245–246distribution points, 281migrating, 73–74sites, 44–45

Boundary Groups pagedistribution points, 168–169secondary site servers, 143state migration points, 184, 184

branch offi ce migration. See P2V Migration ToolkitBranchCache feature, 44Browse Settings page, 643, 643Browser option, 614Build And Capture task sequence, 416, 419build phase in migration, 80Business Intelligence Development Studio (BIDS), 534,

566–568

Ccaches

BranchCache feature, 44reports, 556

calcplus.msi fi le, 581Calculator Plus utility, 577–578Calendar Synchronization option, 636Camera option, 613, 637Capacity Management process, 6, 11capacity planning, 47capture images

adding, 440–441

automatic building and capturing, 436–438, 436–438

creating, 430–436, 431–435distributing and deploying, 441reference computers, 438–440, 439–440task sequences, 417

Catalog tab, 294, 294catalogs

application. See Application CatalogAsset Intelligence, 476–478

categoriesapplications, 293confi guration items, 579–580

Categorize option, 293CCM registry key, 146–147, 147CCMAdmins property, 250CCMAllowSilentReboot property, 250CCMALWAYSINF property, 249CCMCERTISSUERS property, 249CCMCERTSEL property, 249CCMCERTSTORE property, 249ccmclean.exe utility, 97CCMDebugLogging property, 250CCMEnableogging property, 250ccmeval.log fi le, 262, 739, 739ccmeval process, 261, 736–739, 736, 738–739ccmeval.xml fi le, 262, 737–738, 738CCMEVALHOUR property, 252CCMEVALINTERVAL property, 252CCMFIRSTCERT property, 249CCMHOSTNAME property, 249CCMHTTPPort property, 251CCMHTTPSPort property, 251CCMInstallDir property, 250CCMLogLevel property, 250CCMLogMaxHistory property, 250CCMLogMaxSize property, 250ccmsetup-ccmeval.log fi le, 262ccmsetup.exe utility

manual installation, 252–253properties, 247–252

central administration sitesactive software update points setup, 366–370,

367–369implementing, 125–137, 127–136recovering, 686–691, 687–690roles, 38–39

centralized power management, 21–22Certifi cates page, 641–642, 641Certifi cates To Install On Mobile Devices option, 641Change Initiation Review SMF, 12Change Management process, 5, 9

bindex.indd 768bindex.indd 768 27/03/12 8:17 AM27/03/12 8:17 AM

CHANGING QUADRANT IN MOF • COLLECTIONS | 769

Changing Quadrant in MOF, 8–10Check Application Title with Inventory Information

task, 474child sites

active software update points setup, 370–372, 371recovering, 692

Choose Confi guration Items dialog box, 591Choose Mapping page, 462, 462Choose Target Collection page, 449, 470ciagent.log fi le, 596Classic Software Distribution, 268classifi cations and Classifi cations page

Add Site System Roles Wizard, 202–203, 203software updates

classes, 350confi guring, 376, 376metadata, 334–335

Clean Up Migration Data dialog box, 100, 100cleaning up migration data, 100, 100Client Activity Detail tab, 740, 741Client Activity node, 742, 743client agents

Asset Intelligence, 473settings, 229–234, 230, 353–355, 354

Client Computer Communication Settings page, 136–137, 136

client health, 261, 731alerts, 263–265, 264automatic remediation, 261–262, 262determining, 262–263, 263evaluation results, 740–741, 740–741monitoring, 263, 742–743, 742–743overview, 731–732scheduled tasks, 732–733, 732–733

Actions page, 734, 734CCMEval, 736–739, 736, 738–739Conditions page, 734, 734History page, 735, 736Settings page, 735, 735Triggers page, 733, 733

Client Health Detail tab, 741, 741Client Language Selection page, 129client.msi fi le, 173, 247Client Policy settings, 231, 354Client Policy Polling Interval (Minutes) setting, 231Client Push report, 539Client Replace task sequence, 468Client Status report, 538Client Status History reports, 263Client Status Settings Properties dialog box, 262–263,

263Client Status Summary reports, 263

Client Time To Request Policy reports, 263clients

application deployment, 314–316, 314–316backing up, 674Compliance Settings, 576–577, 577confi guration baselines, 593–594, 593deleted, 520–521health. See client healthinformation migration, 66installation, 229

boundaries, 245–247, 245–246command-line properties, 247–252discovering network objects. See discovering

resourcesgroup policy, 257health, 261–265, 262–264imaging, 258–259login scripts, 258manual process, 252–253packages for operating system deployment,

421–422, 421–422push, 253–257, 255–257settings, 229–234, 230software distribution, 258software updates, 257–258supported operating systems, 234–235troubleshooting, 261updating, 259, 259verifying, 260–261, 260

inventoryprocesses, 519reports, 515

log fi les, 654–655MIF storage location, 504–505migrating, 66, 84, 96–97planning, 59requirements, 26–32settings and deployment, 52

default, 275–281, 276–280hardware inventory, 495–496

Software Metering, 528–530, 529software update settings, 355–356, 355

clusters, 8–9, 49CMtrace.exe program, 261, 596, 656–657, 656–657Cochrane, Mark, 508Collect IDMIF fi les option, 504Collect MIF fi les option, 504Collect NOIDMIF fi les option, 504Collected File Properties dialog box, 512, 513collections, 53, 218

application deployment, 281creating, 223–224

bindex.indd 769bindex.indd 769 27/03/12 8:17 AM27/03/12 8:17 AM

770 | COLLECTIONS • CONFIGURATION MANAGER OVERVIEW

collections (continued)default, 219–220deployment templates, 337enabling, 720migrating, 68, 71–73, 71–73, 87–88, 88software inventory, 500working with, 219

Collections settingapplication deployment, 308software update deployments, 390

Collections That Cannot Be Migrated dialog box, 71, 71columns in packages, 102command line

client installation properties, 247–252WSUS 3.0 Administration Console installation, 366

commentsapplication deployment, 309software metering rules, 526

Comments setting, 309communications, site, 50Completion page

distribution points, 169, 169reporting role, 535secondary site servers, 144

compliance and Compliance Settings, 573clients, 231, 576–577, 577confi guration items. See confi guration items (CIs)confi guration packs, 597–600, 598–600new features, 574, 574overview, 573–574purpose, 575reports, 596–597software updates, 343–344

Compliance and Settings Management reports, 539Compliance Rules page, 585–587, 585Compliance Settings Manager role, 211, 547Compliant status, 406compmon.log fi le, 162component servers, 46, 162Component Status folder, 174Component Status messages, 658, 658computer accounts as administrators, 150Computer Agent settings, 231, 277, 277computer client agents

Asset Intelligence, 473settings, 229–234, 230, 353–355, 354

Computer Maintenance setting, 356Computer Restart settings, 232, 277–278, 278, 355Computer Synchronization option, 610computers

information importing, 449–450, 449names, 242unknown, 452–455, 452–455

Computers for a Specifi c Console User report, 475Conditions page, 734, 734/confi g property, 249Confi gMgr 10 registry key, 148, 148Confi gMgr Report Administrators group, 545Confi gMgr Report Users group, 545Confi gMgr Server option, 397Confi gMgrAdminUISetup.log fi le, 99, 133Confi gMgrAutoSave.ini fi le, 156Confi gMgrInstallation.adm template, 257–258Confi gMgrPostRecoveryActions.html fi le, 695, 695Confi gMgrPrereq.log fi le, 99, 123, 133Confi gMgrSetup.log fi le, 133, 691Confi gMgrSetupWizard.log fi le, 133, 691confi guration baselines, 581

clients, 593–594, 593initial, 588–589options, 594rules, 590–596, 591, 595

confi guration items (CIs)Compliance Rules page, 585–588, 585creating, 577–578Detection Methods page, 581–582, 582General page, 578–580, 578Settings page, 582–584, 583, 585Summary page, 588, 588types, 575–576

confi guration management process, 4–5, 10Confi guration Manager Client Upgrade package,

422Confi guration Manager overview

Active Directory schema, 36–37client settings and deployment, 52console upgrading, 98–99content management, 52–53deployment, 59–63

intelligence gathering, 23–25migration needs, 25troubleshooting, 664–665

disaster recovery, 55–56environment design, 56–60hierarchies and sites, 37–44, 38, 43major features, 14–21, 15migration, 54–55resource discovery, 51–52role-based administration, 53–54site boundaries and boundary groups, 44–45site communications, 50site security mode, 51site system design, 47–49site system roles, 45–47SQL considerations, 49–50system requirements, 26–36

bindex.indd 770bindex.indd 770 27/03/12 8:17 AM27/03/12 8:17 AM

CONFIGURATION MANAGER PROPERTIES DIALOG BOX • CUSTOM SEVERITY PAGE | 771

Confi guration Manager Properties dialog box, 529, 529, 595, 595

Confi guration Manager Status Message Viewer window, 659, 659

confi guration.mof fi le, 495–496, 506–507, 507confi guration packs, importing, 597–600, 598–600confi guration settings, migrating, 76Confi gure Automatic Updates option, 356–357Confi gure Client Setting dialog box, 512, 512, 514, 514Confi gure Confi gMgr Integration dialog box, 464, 465Confi gure Manager Alert option, 392Confi gure The Network page, 442, 450Confi rm Object Delete dialog box, 526Confi rm Settings page, 704Confi rmation page

confi guration packs, 599–600, 600System Center Updates Publisher, 402, 402

Console Users on a Specifi c Computer report, 475content

library, 42–43backing up, 674software updates, 332

managing, 52–53migrating, 66prestaging, 44replicating, 50validating, 43, 43

distribution points, 167–168, 168, 269secondary site servers, 143, 143

Content Location settingsapplication deployment type, 300boot images, 414operating system images, 415operating system installers, 416

Content pageapplication deployment type, 299–300, 300Deploy Software Wizard, 309, 309

Content Types tab, 296, 296Content Validation page

distribution points, 167–168, 168, 269secondary site servers, 143, 143

Converted package conversion state, 103copying backups to other locations, 677COUNT command, 562Create a deployment alert when the threshold is higher

than the following option, 313Create a deployment alert when the threshold is lower

than the following option, 313Create A New Custom Task Sequence task, 416Create A New Deployment Package option, 385Create A New Task Sequence page, 442, 450

Create Application Wizard, 282, 284–288, 285–287, 298, 307–314, 308–312

Create Boot Image Using MDT dialog box, 465, 466Create Confi guration Baseline Wizard, 588–589, 588Create Confi guration Item Wizard

Compliance Rules page, 585–588, 585Detection Methods page, 581–582, 582General page, 578–580, 578mobile devices, 631

Additional Settings page, 642–644, 642Certifi cates page, 641–642, 641Email Management page, 635–636, 635Encryption page, 639–640, 639General page, 631–632, 632Mobile Devices Settings page, 632–633, 633Password page, 633–635, 634Peak Synchronization page, 637–638, 637Platform Applicability page, 644, 645Roaming page, 638, 638Security page, 636–637, 636Supported Platform page, 644, 644Wireless Communications page, 640–641,

640Settings page, 582–584, 583, 585Summary page, 588, 588

Create Deployment Type option, 290Create MDT Task Sequence dialog box, 467–469, 467,

469Create Package From Defi nition Wizard, 421–424,

421–423Create Prestage Content File option, 289–290, 290Create Prestage Content Wizard, 290, 290Create Role Wizard, 348Create Rule dialog box, 586–587, 587Create Secondary Site Wizard, 139–145, 140–144Create Setting dialog box, 582–584, 583Create Site Role Wizard, 487, 487Create Software Metering Rule Wizard, 525, 525Create Subscription Wizard, 559, 559Create Task Sequence Media Wizard, 453–454,

453–454Create Task Sequence Wizard, 431–435, 431–435, 450,

451Create Task Wizard, 442–445, 443–445criteria for update searches, 382–384, 382–384custom labels, 477Custom Schedule dialog box

hardware inventory, 504network discovery, 244, 245

custom security scope, 214–216, 215, 353Custom Severity page, 353

bindex.indd 771bindex.indd 771 27/03/12 8:17 AM27/03/12 8:17 AM

772 | CUSTOMER EXPERIENCE IMPROVEMENT PROGRAM CONFIGURATION PAGE • DEPLOYMENT

Customer Experience Improvement Program Confi guration page, 131

customer focused service delivery, 3Customizations tab, 413–414customized boot images, 75

Ddashboards

migration, 82, 83package conversion, 103, 103, 108status messages, 658, 658

Data Access tabboot images, 414operating system images, 415operating system installers, 416

data gathering in migration, 66–68, 85–86, 85–86, 99Data Gathering Status dialog box, 85, 85data library, 42data manipulation language (DML) messages, 665Data Preview page, 449, 470Data Replication Service (DRS), 665, 668–669, 668–669data source and Data Source tab

authentication accounts, 537boot images, 414, 429, 429operating system images, 415operating system installers, 416report properties, 553

data types, 666–668, 667Database Information page, 130, 130, 689, 689Database Replication troubleshooting, 665–669, 665,

667–669Database Server page, 130, 136–137, 136databases

moving, 696–697validating, 152, 152

dataldr.log fi le, 509, 509, 519–520DataLib folder, 170–172, 172Date Published setting, 293dcmagent.log fi le, 596Deadline Behavior setting, 392Default Actions page, 711, 711Default Application Catalog Website Point setting, 232,

355Default Client Malware Policy, 716–717Default security scope, 214Default Settings dialog box

BITS, 275–276, 276Computer Agent, 277, 277Computer Restart, 277–278, 278Endpoint Protection, 706, 706inventory, 499, 499Software Deployment, 278–279, 279

software inventory, 511, 511User and Device Affi nity, 279, 280

defaultsclient settings, 275–281, 276–280, 577, 577collections, 219–220MIF storage location, 504–505

defi ne and capture phase in migration, 80defi nition fi les in SCEP, 717–719, 717–718Defi nition Updates page, 714, 714Delete option, 291deleted clients, 520–521deleting

applications, 291software metering rules, 526

Deliver phase in SMFs, 13delta discovery, 243delta inventory information, 494Delta Synchronization Interval option, 608dependencies and Dependencies tab

Application Deployment, 273–274Application References, 272BITS-enabled IIS, 275confi guring, 318, 319default client settings, 275–281, 276–280distribution points, 275management points, 274types, 307, 307

Asset Intelligence, 482Deploy Confi guration Baselines Wizard, 593–594, 593Deploy Software Updates Wizard

languages, 351packages, 338–339restart settings, 352settings overview, 339software updates, 388–395, 389–392

Deploy Software WizardAlerts page, 312–313, 312Content page, 309, 309Deployment Settings page, 310, 310General page, 307–309, 308operating system image capturing, 436–437,

436–437Scheduling page, 311, 311task sequences, 444–445, 445User Experience page, 312, 312

deploymentapplication. See Application Deploymentclients, 52Confi guration Manager, 59–63images, 441intelligence gathering, 23–25migration needs, 25

bindex.indd 772bindex.indd 772 27/03/12 8:17 AM27/03/12 8:17 AM

DEPLOYMENT DEADLINE SETTINGS • DISK SPACE | 773

operating system. See operating system deployment (OSD)

packages, 338–339, 384–386SCEP, 700software updates, 339–340, 344–345

downloading, 384–387, 385–386fi nding, 380–384, 381–384groups, 388monitoring, 404–408, 404–407rules, 340–341, 341templates, 337–338

status messages, 661–662task sequences, 444–448, 445–448troubleshooting, 664–665

Deployment Deadline settings, 232Deployment Imaging Servicing and Management

(DISM) tool, 457Deployment Name setting, 389Deployment Options setting, 301Deployment Package page

Deploy Software Updates Wizard, 393software updates, 385, 385

deployment phase in migration, 81Deployment Program Always Forces A Reboot option,

305Deployment Settings page, 310, 310, 445, 445Deployment Status window, 447, 448Deployment Types tab, 282, 296, 296Deployments node, 325–326, 326depth management of mobile devices, 195, 616–617

device enrollment, 622administrator confi guration, 622–624, 623–624user confi guration, 624–631, 625–631

rolesApplication Catalog web service point,

622, 622distribution point, 621, 621enrollment point, 618–619, 618enrollment proxy point, 617–618, 617management point, 619–620, 619Microsoft enterprise certifi cation authority,

620, 621settings

Additional Settings, 642–644, 642Certifi cates, 641–642, 641Email Management, 635–636, 635Encryption, 639–640, 639General, 631–632, 632Mobile Devices Settings, 632–633, 633Password, 633–635, 634Peak Synchronization, 637–638, 637Platform Applicability, 644, 645

Roaming, 638, 638Security, 636–637, 636Supported Platform, 644, 644Wireless Communications, 640–641, 640

DESC keyword, 562descriptions

confi guration items, 579, 584deployment packages, 386

design, site system, 47–49Detection Method page, 272, 302–303, 302, 319,

581–582, 582Detection Rule Wizard, 303Determine Behavior Based On Return Codes

option, 305device drivers, 418, 454–457, 455–457device enrollment, 622

administrator confi guration, 622–624, 623–624user confi guration, 624–631, 625–631

Device Management reports, 539Device Restart Behavior setting, 392DHCP with PXE, 428Direct Push When Roaming option, 612Direct Rule type for collections, 219Directory Services Administration SMF, 10Disable Alternate Sources option, 233DisableCacheOpt property, 250DisableSiteOpt property, 251disabling software metering rules, 523–524disaster recovery, 55–56, 673

backups, 677–682, 678, 681central sites, 686–691, 687–690maintenance options, 692–694monitoring, 691, 691multisite environments, 692planning, 673–674post-recovery tasks, 695–696, 695restores, 682–685, 684starting, 685

discovering resourcesActive Directory, 236–237, 236–238

forests, 238, 238–239groups, 241, 241heartbeat, 241–243, 244network, 242scheduling, 243–244, 243–245system, 239–240, 240users, 240

Add Exchange Server Wizard, 608–609, 608out-of-band management, 19overview 51–52, 235–236

Discovery page, 608–609, 608disk space, 665

bindex.indd 773bindex.indd 773 27/03/12 8:17 AM27/03/12 8:17 AM

774 | DISKS CATEGORY • ENDPOINT PROTECTION MANAGER ROLE

Disks category, 417DISM (Deployment Imaging Servicing and

Management) tool, 457Display in Software Center option, 312Display Name Properties window, 513, 513display names for software inventory, 500, 513, 513distmgr.log fi le, 174, 427Distribute Content option, 292Distribute Content Wizard, 441Distribute The Content For This Package To Preferred

Distribution Point option, 387distribution

boot image packages, 428images, 441software. See software distribution

Distribution Point page, 141–142, 142, 163–165, 166distribution point role, 46, 621, 621distribution points, 41–44, 43, 162–174, 163–174

changes, 269–271dependencies, 275high availability, 49managing, 52migrating, 66, 78, 82–84, 87operating system deployment, 414–415, 446PXE on, 426–427, 427software requirements, 173software updates, 386status messages, 663troubleshooting, 173–174, 174upgrading, 83–84, 91–95, 92–93, 95

Distribution Points page, 386, 446Distribution Priority setting, 387Distribution Settings page

boot images, 414operating system images, 415operating system installers, 416software updates, 386–387, 386

distributionspackage migration, 74status messages, 662–663

DML (data manipulation language) messages, 665DNSSUFFIX property, 252Do Not Expire A Superseded Update Until The

Software Update Is Superseded For A Specifi ed Period option, 369, 374

Do Not Synchronize From Microsoft Update Or The Upstream Update Point option, 374

Do Not Synchronize From Microsoft Update Or The Upstream Update Server option, 368

domain profi les, 716Download Location page, 344, 387, 393–394Download Only Content Changes To The Distribution

Point option, 387

Download Settings For Slow Or Unreliable Network settings, 393

Download Settings For Unprotected Distribution Points settings, 393

Download Settings page, 338Download Software Updates Wizard, 351, 385–386, 385Download Updates Wizard, 335, 384–387downloading software updates, 384–387, 385–386/downloadtimeout property, 248Drive Settings page

distribution points, 165, 165secondary site servers, 142–143, 142

drive space requirementsclients, 27servers, 33

Driver Details page, 455drivers, device, 418, 454–457, 455–457Drivers category for task sequences, 417Drivers tab for boot images, 413DRS (Data Replication Service), 665, 668–669, 668–669

EEdit Primary Devices node, 324, 325Editions tab, 416EICAR test malware, 724–728, 724–728email

alerts, 721–722, 722mobile devices, 612–613, 612, 635–636, 635report subscriptions, 560–561

Email Attachments option, 613Email Download While Roaming option, 638Email Management page, 635–636, 635Email Management Settings page, 612–613, 612Empower Users feature, 331Enable Automatic Site-wide Client Push Installation

option, 254Enable Hardware Inventory On Clients option, 503Enable Software Updates on Clients option, 361Enable System Center Operations Manager

Maintenance Mode option, 313enabling

Asset Intelligence, 485–487, 486–487collections, 720Software Metering Client Agent, 522software metering rules, 524, 524

encryption and Encryption pageclient inventory reports, 515mobile devices, 639–640, 639

endpoint protection. See System Center Endpoint Protection (SCEP)

Endpoint Protection client agent, 705–709, 706–708Endpoint Protection Manager role, 212

bindex.indd 774bindex.indd 774 27/03/12 8:17 AM27/03/12 8:17 AM

ENDPOINT PROTECTION POINT ROLE • GENERAL SETTINGS | 775

Endpoint Protection Point roleadding, 204–205, 205confi guring, 702–705, 704description, 46reports, 547

Enforcement phase in software updates, 407enrollment, device, 622

administrator confi guration, 622–624, 623–624user confi guration, 624–631, 625–631

Enrollment Point Connection Account option, 619enrollment point role, 46–47, 618–619, 618Enrollment Point setting, 618enrollment proxy point role, 47, 195–199, 197–198,

617–618, 617EnrollmentService.log fi le, 646EnrollmentWeb.log fi le, 646Enrollsrvmsi fi le, 199Enrollsvc.log fi le, 199Enrollweb.log fi le, 199Enrollwebmsi fi le, 199environment variables, 584EPCtrlmgr.log fi le, 205, 705EPMgr.log fi le, 205, 704–705EPsetup.log fi le, 205, 705Error Lookup window, 656, 656Error status

in-console monitoring, 405–406package conversion, 103

Estimated Install Time (Minutes) option, 305Evaluation phase in software updates, 407event logs, 475Examination Institute for IT (EXIN), 2Exclude Collections Rule, 219Excluded Settings page, 712, 712excluding

malware scanning items, 712, 712software inventory fi les, 515–516, 516

expired software updates, 331Export Application Wizard, 291–292, 292exporting

applications, 291–292, 292reports, 570–571software updates, 74synchronization with, 379–380

extending hardware inventory, 505–510, 507–510

Ffallback status point role, 46, 185–187, 186fat images, 419FEP (Front Endpoint Protection) vs. SCEP, 699fi le-based report subscriptions, 558–559, 559

fi le collection for software inventory, 500File Encryption On Mobile Device option,

614, 639fi le library, 42fi le system validation, 148, 149FileLib folder, 170, 173fi les for software updates, 335FileSystemFile.log fi le, 515, 516fi lters for software updates, 330Financial Management process, 6, 12Find all mobile devices in the exchange organization

option, 609fi nding

management points, 177–178software updates, 380–384, 381–384

fi rewalls, 715–716, 715fl at hierarchies, 210folder migration, 77Force A Mandatory Device Restart option, 305/forcereboot property, 248forest discovery, 51–52, 238, 238–239free drive space requirements

clients, 27servers, 33

Front Endpoint Protection (FEP) vs. SCEP, 699FSP property, 251fspMSI.log fi le, 187Full Administrator role, 212, 547full antimalware scans, 710Full Content update option, 401Full Synchronization Schedule option, 608

Ggeneral confi guration items, 592General Information page, 287–288, 287General License Statement, 489–490, 490General settings

Add Exchange Server Wizard, 606–607, 606application deployment, 282, 282, 299, 299boot images, 413, 413client push installation, 254, 255confi guration items, 578–580, 578, 583, 583Create Application Wizard, 285–286, 285Deploy Software Updates Wizard, 389–390, 389Deploy Software Wizard, 307–309, 308mobile devices, 631–632, 632New Site Role Wizard, 424operating system images, 415operating system installers, 416reports, 550–551sample application, 293–294, 293

bindex.indd 775bindex.indd 775 27/03/12 8:17 AM27/03/12 8:17 AM

776 | GENERAL SETTINGS • IMAGES

General settings (continued)SCEP, 703secondary site servers, 139–140, 140site system roles, 159, 159software metering, 523, 523, 525, 525software updates, 348state migration points, 424task sequences, 416–417, 444

General Settings window, 610, 610Generate System Center Operations Manager Alert

When A Software Installation Fails option, 313Getting Started page

central administration sites, 127, 127primary sites, 134–135, 134

Global Conditions node, 321, 322global data replication, 50, 666, 667global roaming, 37goals

determining, 24–25software updates, 346

GROUP BY keyword, 562group policies and GPOs

client installation, 257SCEP, 703settings, 356–357

groupsActive Directory, 52, 241, 241boundary, 44–45distribution points, 52, 270–271, 663software updates, 330, 337, 388validating, 149–150, 150

Hhard-linking, 423hardware inventory, 494–495

client settings, 233, 495–496confi guration.mof fi le, 495–496confi guring, 502–505, 503extending, 505–510, 507–510MIF fi les, 497–499Registry, 507–510, 508–510reporting classes, 496–497troubleshooting, 519

Hardware Inventory Client Agent, 473–474Hardware Inventory option, 233hardware reports, 482–483, 539hardware requirements

Asset Intelligence, 478clients, 26–27servers, 32–33

health, client. See client healthheartbeat discovery, 51, 241–243, 244, 516

hidden reports, 551hierarchies, 37–38, 38

central administration sites, 38–39design and implementation, 122distribution points, 41–44, 43fl at, 210planning, 58primary sites, 39–40secondary sites, 40

Hierarchy Maintenance tool, 693–694high availability, 49history and History page

reports, 557SCEP, 725, 725scheduled tasks, 735, 736

HTTP Connected Computer Devices option, 620HTTP security mode, 51HTTPS Connected Computer Devices option, 620HTTPS security mode, 51

IIcon option, 295Identifi cation registry key, 146Identifi cation tab, 588–589, 588Idle Time Before Mobile Device Is Locked

setting, 634Idle Time In Minutes Before Mobile Device Is Locked

setting, 611IDMIF fi les

description, 498–499storage location on clients, 504–505

If The Running Task Does Not End When Requested, Force It To Stop option, 735

Ignore Maintenance Windows and Install Immediately at Deadline option, 352

Ignore mobile devices that are inactive for more than (days) setting, 609

Image Capture Wizard, 439, 439Image Destination page, 439, 439Image Information page, 439images

boot. See boot imagesclient installation, 258–259creating, 430–436, 431–435Microsoft Deployment Toolkit, 465–466, 466operating system, 415

automatic building and capturing, 436–438, 436–438

deploying, 440–441offl ine servicing, 457–459, 458–459reference computers, 438–440, 439–440

task sequences, 417

bindex.indd 776bindex.indd 776 27/03/12 8:17 AM27/03/12 8:17 AM

IMAGES TAB • LANGUAGE SELECTION PAGE | 777

Images tabboot images, 413operating system images, 415

Immediately Expire A Superseded Update option, 369, 374

Import Certifi cate page, 642, 642Import Computer Information Wizard, 449, 449Import Confi guration Data Wizard, 599–600,

599–600Import Information page, 286, 286–287Import New Driver Wizard, 455–457, 455–457Import Software License Wizard, 488–490, 488, 490Import Summary page, 510, 510Import User Device Affi nity option, 323, 324importing

application information, 286, 286–287certifi cates, 642, 642computer information, 449–450, 449confi guration packs, 597–600, 598–600drivers, 455–457, 455–457MOF fi les, 510, 510reports, 551–552, 569–570software licenses, 488–491, 488, 490–491software updates, 75, 398–399, 399update synchronization with, 379–380user device affi nity, 323, 324, 461–462, 462

in-band management, 19in-console software updates deployment monitoring,

404–407, 404–407In Progress status, 406Inactive Client Details reports, 263incident management process, 4, 11Include Collections Rule, 219Include Updates In Image page, 451Information Systems Examination Board (ISEB), 2Infrared option, 614Infrastructure Administrator role, 212, 547–548Infrastructure Engineering SMF, 11Infrastructure role cluster, 9Install All Required Software Updates When Deadline

Occurs option, 361Install An Existing Image Package task sequence, 416Install Applications page, 443, 444, 451Install Client Wizard, 256–257, 257Install Confi guration Manager Client page, 442–443Install Endpoint Protection Client In Client Computers

option, 232Install page, 133, 133, 690, 690Install Permissions settings, 232Install The Confi guration Manager Client page, 450Install The Windows Operating System page, 450Install Windows page, 442, 443installation

client. See clientssite system roles, 157–160, 158–159software update points, 346–348System Center Updates Publisher, 395–396, 395WSUS, 361–365, 363

Installation Behavior setting, 303Installation Deadline setting, 390Installation Program setting, 302Installation program visibility settings, 304Installation Progress window, 439, 446, 446Installation Properties tab, 254, 256, 256Installation Source Files page, 140Installation Start In option, 302installers, operating system, 415–416, 429–430, 430Intel Activity Management Technology, 19interaction of site system roles, 157–158Internet-based software update settings, 348–349Internet option for software updates, 387Internet Sharing From Mobile Devices option, 610Inventoried Software Titles node, 477inventory, 15, 493–494

hardware. See hardware inventorysoftware

collecting, 499–500, 499confi guring, 511–518, 511–518

troubleshooting, 518–521viewing, 500–501, 501, 514, 515

Inventory Reporting Detail setting, 512InventoryAgent.log fi le, 519–521IP address ranges, 44IP subnets, 44IPv6 prefi x, 44IT Infrastructure Library (ITIL), 2–7, 13IT Service Continuity Management process, 6IT service management (ITSM), 2

ITIL, 2–7MOF, 7–13, 13

IT Service Management Forum (itSMF), 2

JJob Scheduling SMF, 10jobs, migration, 66, 82, 87–91, 88–90

KKeywords option, 295

Llabels in Asset Intelligence, 477Language Selection page, 351, 394

bindex.indd 777bindex.indd 777 27/03/12 8:17 AM27/03/12 8:17 AM

778 | LANGUAGES • MESSAGES. SEE STATUS MESSAGES

languagesdeployment, 299, 338software metering rules, 526software updates, 351, 377, 377, 394

Languages page, 204, 351, 377, 377libraries

content, 42–43ITIL, 2–7, 13

licensesAsset Intelligence, 488–491, 488, 490–491central administration sites, 128reports, 484–485

link states, 666Link Text option, 295linked reports, 569lite management of mobile devices, 195, 603–605, 605

Account page, 607, 607confi guration results, 614–616, 615–616Discovery page, 608–609, 608General page, 606–607, 606Settings page, 609

Application settings, 614, 614Email Management settings, 612–613, 612General settings, 610, 610Password settings, 610–611, 611Security settings, 613–614, 613

load balancing, 49load state for USMT packages, 422local installation, 126Localized Application Name option, 295Localized Description option, 295Locate Driver page, 455, 455locations for deployment templates, 338log fi les

application deployment, 327–328backup process, 679client, 654–655management points, 178–179, 654SCEP, 705site servers, 651–653for troubleshooting, 651–657Windows event, 475

login scripts, 258/Logon property, 248Logon Requirement option, 303

Mmaintenance plans, 647–651, 648maintenance windows, 351–352malware, 700

antimalware policy, 709–715, 709–714

assigning policy, 716–717, 716scenario, 723–728, 724–728Windows Firewall policies, 715–716, 715

Malware Detection alerts, 719Malware Outbreak alerts, 719Manage Administrative Categories dialog box, 579, 580Manage Endpoint Protection Client On Client

Computers option, 232Manage phase for SMFs, 13Management information format (MIF) fi les, 497–499,

504–505Management Point page, 175–176, 175management point role, 46, 619–620, 619management points

dependencies, 274fi nding, 177–178high availability, 49inventory, 519log fi les, 178–179, 654overview, 174–176, 175–176proxy, 176–177queries, 178server locator point functionality, 178software requirements, 179troubleshooting, 179

Manual package conversion state, 103manual synchronization, 342Manually Copy The Content In This Package To The

Distribution Point option, 387Manually Defi ne This Information option, 286MAPS (Microsoft Active Protection Service), 700–701,

701Maximum Allowed Run Time (Minutes) setting,

304–305Maximum Custom MIF File Size (KB) setting, 504Maximum Run Time settings, 352–353Maximum Size For HTML Email (Automatically

Downloaded) setting, 636Maximum Size For Plain Text Email (Automatically

Downloaded) setting, 636Maximum Size Of An Attachment (Automatically

Downloaded) setting, 636Maximum Time To Keep Calendar Entries setting, 612Maximum Time To Keep Email setting, 612, 635MDT. See Microsoft Deployment Toolkit (MDT)media task sequences, 418media boot task sequences, 433–436, 434–435Media Type page, 434, 435, 453memory

central administration sites, 132SQL, 126, 132

messages. See status messages

bindex.indd 778bindex.indd 778 27/03/12 8:17 AM27/03/12 8:17 AM

METADATA IN SOFTWARE UPDATES • MULTISITE ENVIRONMENTS, RECOVERY IN | 779

metadata in software updates, 334–335, 376, 379, 401Metadata Only option, 401metering software. See Software Metering featureMicrosoft Active Protection Service (MAPS), 700–701,

701Microsoft Active Protection Service page

antimalware policy, 714, 714Endpoint Protection Manager, 204–205, 205

Microsoft Application Virtualization Management, 21Microsoft Calculator Plus utility, 577–578Microsoft Confi guration Manager folder, 148, 149Microsoft Deployment Toolkit (MDT)

backing up, 676boot images, 465–466, 466installing, 464integrating, 464–465, 465scenarios, 464task sequences, 466–469, 467, 469

Microsoft enterprise certifi cation authority role, 620, 621

Microsoft Malware Protection Center (MMPC), 700Microsoft Operations Framework (MOF), 7

Changing Quadrant, 9–10ITIL, 7–9, 13, 13Operating Quadrant, 10operations management reviews, 12–13Optimizing Quadrant, 11–12process model, 9reliability workbook, 14Supporting Quadrant, 10–11

Microsoft RichCopy 4.0 Properties dialog box, 293–298, 293–298

Microsoft Software License Terms page, 128Microsoft Update catalog, 342Microsoft Volume License Statement, 488–489MIF (Management information format) fi les, 497–499,

504–505migmctrl.log fi le, 82, 92migration, 65

branch offi ces. See P2V Migration Toolkitdata-gathering process, 67–68distribution points, 78introduction, 65–66needs, 25objects, 54–55

not supported, 77supported, 70–77, 71–73

packages, 100–101best practices, 107monitoring, 108, 108Package Conversion Manager, 101–102, 101process, 102–107, 103, 105–106

planning, 80–81preparing, 79report, 539side-by-side. See side-by-side migrationsource hierarchy, 66–67, 67types, 68–70wipe-and-load, 97–100, 100

migration points, 182–185, 182–184, 424–426, 425Minimum Password Length (Characters) setting, 611MMPC (Microsoft Malware Protection Center), 700mobile device and AMT enrollment point role,

195–199, 197–198Mobile Device Management While Roaming option,

638mobile devices, 18, 603

depth management. See depth management of mobile devices

lite management. See lite management of mobile devices

new features, 603–604operating systems, 30–32troubleshooting, 645–646

Mobile Devices option, 233Mobile Devices Settings page, 632–633, 633models, report, 562–563MOF. See Microsoft Operations Framework (MOF)monitoring, 53

application deployment, 326client health, 742–743, 742–743client status, 263distribution point upgrades, 92, 93migration, 66, 82, 83package conversion, 108, 108recovery, 691, 691SCEP, 702software updates, 330, 404–408, 404–407

movingapplications, 292–293reports, 568site databases, 696–697

MP_Hinv.log fi le, 519/MP property, 248mpcontrol.log fi le, 179mpMSI.log fi le, 179mpSetup.log fi le, 179mtrmgr.log fi le, 529, 529multicast support and Multicast page, 42, 167,

167, 415multiple malware detection alerts, 719multiple product updates, 335multisite environments, recovery in, 692

bindex.indd 779bindex.indd 779 27/03/12 8:17 AM27/03/12 8:17 AM

780 | NAMES • OPERATIONS ADMINISTRATOR ROLE

Nnames

computers, 242confi guration items, 579deployment, 299, 389packages, 385servers, 159software inventoried products, 500software metering rules, 525

NAP. See Network Access Protection (NAP)NAP Evaluation tab, 353native uninstall support, 272.NET Framework application, 272Netdisc.log fi le, 242Network Access Account page, 420, 420Network Access Account setting, 281Network Access Protection (NAP), 18

Active Directory schema, 37compliance, 233report, 539software updates, 353system health validator, 181

Network Access Protection Client Agent option, 233Network Administration SMF, 10Network Discovery Schedule tab, 244, 244Network Location option, 387Network report, 539networks

connectivity, 665describing, 25discovery. See discovering resourcessoftware updates, 387speed, 45

New Computer scenario, 467New Distribution Points Wizard, 428New Table Or Matrix Wizard, 564No Action deployment option, 305/NoCRLCheck property, 249NOIDMIF fi les

description, 498–499location, 504–505

non-task sequence bootable media, 115–116, 115/noservice property, 248Not Applicable package conversion state, 103, 106Number Of Failed Logon Attempts Before Device Is

Wiped setting, 611Number Of Passwords Remembered setting, 611

Oobjects

content-related, 53discovering. See discovering resources

migrating, 54–55, 66, 68, 89–91, 89–90security scopes, 217–218, 218software updates, 335–337

Off-Peak Synchronization Frequency option, 638Offi ce of Government Commerce (OGC), 2offl ine image servicing, 457–459, 458–459Offl ineServicingMgr.log fi le, 459OMRs (Operations Management Reviews), 9, 12–13Only The Instances Of The Objects That Are Assigned

To The Specifi ed Security Scopes Or Collections option, 221

Only When A User Is Logged On option, 304Only When No User Is Logged On option, 304Operate phase for SMFs, 13Operating Quadrant MOF, 8, 10operating system deployment (OSD), 17–18, 411

bare metal, 412, 448–451, 449, 451client install package, 421–422, 421–422device drivers, 454–457, 455–457distribution points, 414–415driver catalogs, 418enhancements, 21images, 415

automatic building and capturing, 436–438, 436–438

boot. See boot imagesdeploying, 440–441offl ine servicing, 457–459, 458–459reference computers, 438–440, 439–440

installers, 415–416, 429–430, 430MDT, 464–470, 465–467, 469migration objects, 75–76Network Access account, 420, 420new features, 411–412process, 418–419PXE on distribution points, 426–427, 427scenarios, 412state migration points, 414, 424–426, 425task sequences, 416–418

for capture image, 430–436, 431–435deploying, 444–448, 445–448developing, 441–444, 442–444

user device affi nity, 418, 459–463, 460–463user state maintenance, 470–471, 470USMT packages, 422–424, 423

Operating System Deployment Manager role, 549operating systems

client requirements, 27–32client support, 234–235P2V Migration Toolkit requirements, 109report, 539server requirements, 33–36

Operations Administrator role, 212, 549

bindex.indd 780bindex.indd 780 27/03/12 8:17 AM27/03/12 8:17 AM

OPERATIONS MANAGEMENT OVERVIEW • POWER CONTROL IN OUT-OF-BAND MANAGEMENT | 781

operations management overview, 1defi ning, 1–2ITIL, 2–7MOF, 7–13, 13

Operations Management Reviews (OMRs), 9, 12–13Operations Manager Alert option, 392Operations Review, 12Operations role cluster, 9Optimizing Quadrant MOF, 7–8, 11–12Option tab for group discovery, 241, 241optional application information, 288Options tab for Software Center, 316, 316ORDER BY keyword, 562Organization Name setting, 232, 355organizational units (OUs), 237out-of-band management, 19–20, 187–189, 188–189out-of-service point role, 47overlapping boundaries, 45Owners option, 294

PP2V Migration Toolkit, 109

non-task sequences, 115–116, 115requirements, 109scenarios, 110steps, 110–114, 111–114task sequences, 110

Package Conversion Dashboard, 103, 103, 108Package Conversion Manager, 101–102, 101Package Conversion Wizard, 105–106, 106Package Defi nition page, 421, 421Package Source setting, 386packages

deployment, 338–339, 384–386library, 42migrating, 100–101

best practices, 107monitoring, 108, 108Package Conversion Manager, 101–102, 101process, 102–107, 103, 105–106

package defi nition fi les, 421, 421USMT, 422–424, 423

Packages node, 267, 268PackageScanReport.XML fi le, 108, 108parameters for reports, 552Partner role cluster, 9partner software updates catalogs, 397–398, 398Password Complexity option, 611, 634Password Expiration In Days option, 611Password page, 633–635, 634

Password Settings window, 610–611, 611passwords for mobile devices, 610–611, 611, 633–635, 634Patch property, 249Patch Tuesday, 340–341, 341paths, discovery, 237PCMTrace.log fi le, 108PDP And IMAP Email option, 635Peak Synchronization Frequency option, 638Peak Synchronization page, 637–638, 637Pending state in Asset Intelligence, 479permissions

Application Administrator, 213, 213central administration sites, 132clients, 232Confi guration Manager deployment, 664reports, 545, 545, 550Software Update Manager, 357

Persist Content In The Client Cache option, 300phases in client installation, 261physical locations, 56–57physical-to-virtual Migration Toolkit. See P2V

Migration ToolkitPkgLib folder, 170, 171PkgXferMgr component, 43Plan phase in SMFs, 13Planning for Site Systems in Confi guration

Management document, 131Platform Applicability page, 644, 645POC (proof-of-concept) environments, 60policies

endpoint protection, 709antimalware, 709–715, 709–714assigning, 716, 716Windows Firewall, 715–716, 715

groupclient installation, 257SCEP, 703settings, 356–357

Policy Polling Interval (Minutes) setting, 354Polling Schedule tab, 243, 243POP And IMAP Email option, 612Port Number setting, 618portalwebMSI fi le, 195portlctl.log fi le, 195ports

proxy points, 618WSUS, 373, 373

post-installation phase in client installation, 261post-migration considerations, 99post-recovery tasks, 695–696, 695power control in out-of-band management, 19–20

bindex.indd 781bindex.indd 781 27/03/12 8:17 AM27/03/12 8:17 AM

782 | POWER MANAGEMENT • RELEASE MANAGEMENT PROCESS

power managementcentralized, 21–22client setting, 233report, 539–540

PowerShell Execution Policy option, 232pre-deploying user applications, 463, 463pre-installation phase in client installation, 261pre-migration in package conversions, 107preinst.exe tool, 693–694PREREQCHK.EXE.fi le, 123Prerequisite Check page, 132, 132, 690, 690Prerequisites Downloads page, 128–129, 128Prerequisites Licenses page, 128PrestageContent.log fi le, 95prestaged content, 44, 270, 289–290, 290prestaged media, 418previously migrated objects, migrating, 69–70Primary Computer Users report, 475Primary Site Installation page, 135–136primary sites, 39–40

active software update points setupchild of CAS, 370–372, 371stand-alone, 372–374

recovering, 692servers, 120

checklist, 124implementing, 134–138, 134, 137–138

prioritiesapplication deployment type, 298policies, 716, 716software update distribution, 387

private fi rewall profi les, 716problem management process, 4, 11Process Model, 7Processor Properties node, 477–478processor requirements

clients, 27servers, 33

Product Code option, 302Product Key page, 128, 128products in updates, 350–351Products page

Software Update Point role, 203–204, 203software updates, 377, 377third-party updates, 402, 403

profi les for Windows Firewall policies, 716Programs tab, 301–302, 301proof-of-concept (POC) environments, 60Properties dialog box for applications, 293protection, endpoint. See System Center Endpoint

Protection (SCEP)providers in hardware inventory, 506

provisioned systems, 187provisioning

command lines, 252workstations, 20

proxy management points, 176–177Proxy Server Settings page, 206, 487Proxy Settings option, 397public fi rewall profi les, 716publishing updates. See System Center Updates

Publisher (SCUP)Purpose setting in application deployment, 310push client installation, 253–257, 255–257PXE and PXE page

boot images for, 428–429, 429confi guring, 42distribution points, 166, 166, 415, 426–427, 427unknown computer support, 452, 452

PXE Service Point Confi guration dialog box, 426–427

Qquadrants in MOF, 7–13queries, 16, 178Query Rule for collections, 219quick antimalware scans, 710

RRAM requirements

clients, 27servers, 33

RBAC (Role-Based Access Control) model, 209RCMCtrl.log fi le, 668, 668Read-only Analyst role, 212, 549Real-Time Protection page, 712, 712recovery. See disaster recoveryRecursively Search Active Directory Child Containers

option, 237reference computer images, 438–440, 439–440References tab

sample application, 295, 295supersedence, 318, 318

refresh computer deployment scenario, 412Refresh Interval (Hours) option, 610Registry

64 bit applications, 584hardware inventory, 507–510, 508–510Report Builder, 563–564site installation validation, 146–148, 147–148

RegKeyToMof tool, 508–509, 508Release Management process, 5, 10

bindex.indd 782bindex.indd 782 27/03/12 8:17 AM27/03/12 8:17 AM

RELEASE READINESS REVIEW SMF • ROAMING PAGE | 783

Release Readiness Review SMF, 12Release role cluster, 9Reliability Workbook, 14remediation, client, 261–262, 262reminders for client software updates, 354remote console for out-of-band management, 20remote control, 18Remote Desktop option, 613remote distribution point throttling, 270remote installation, 126Remote Tools Operator role, 212Remote Tools option for clients, 233Removable Storage option, 613, 637Repeated Malware Detection alerts, 719repeating services point role, 47Replace Hardware scenario, 464, 469–470replication, 50

SQL, 281troubleshooting, 665–669, 665, 667–669

Report Builder, 563–565, 564–565Report Manager, 542–543, 543Reporting Services point, 189–191, 190Reporting Services Point page, 536, 536reporting services site system, 535–536, 536reports, 19, 533–534

Asset Intelligence, 481–485BIDS, 566–568client health, 743, 743client inventory, 515Compliance Settings, 596–597creating, 561–568, 564–565exporting, 570–571hardware inventory, 496–497importing, 551–552, 569–570linked, 569managing, 550–558migrating, 77migration results, 83models, 562–563moving, 568Report Builder, 563–565, 564–565Reporting Services, 189–191, 190running, 541–543, 542–543SCEP, 723, 723security, 545–550, 545, 558software metering, 474, 530, 540software updates, 381–382, 381, 407–408SQL commands, 561–562SQL Reporting Services, 21SQL Server Reporting Services, 534–538, 536status messages, 659–660subscriptions, 553–555, 558–561, 559

Require Administrator Approval if Users Request this Application option, 310

Require Email Encryption/Encryption Algorithm option, 639

Require Email Signing/Signing Algorithm option, 639

Require Password Settings On Mobile Devices option, 611, 634

Require The Site Server To Initiate Connections To This Site System option, 367, 370, 372

Required Components to Use Administration UI page, 365

requirements and Requirements tabApplication Catalog Web Service Point, 194Application Catalog Web Site Point, 194application deployment, 273, 319–321, 321–322application information, 305–306, 305Asset Intelligence, 473–475, 478clients, 26–32distribution points, 173Endpoint Protection Manager, 205fallback status points, 186management points, 179mobile devices, 198Reporting Services, 191servers, 33–36site servers, 123–125Software Update Point role, 204state migration points, 185system health validator points, 182

RESETKEYINFORMATION property, 250Resource Explorer, 500–501, 501, 514, 515, 518, 519resources

discovery. See discovering resourcesfor security scopes, 216, 217

Resources folder, 538Restart Countdown setting, 352Restart Settings page, 352restoring backups, 682–685, 684Retire/Reinstate option, 290/retry property, 248return codes, 273–274, 306, 306Return Codes tab, 306, 306review phase in migration, 81Revision History option, 289, 289Ribbon options, 288–293, 289–292RichCopy application, 272roaming

global, 37mobile device settings, 638, 638site system roles, 158

Roaming page, 638, 638

bindex.indd 783bindex.indd 783 27/03/12 8:17 AM27/03/12 8:17 AM

784 | ROLE-BASED ACCESS CONTROL (RBAC) MODEL • SECURITY

Role-Based Access Control (RBAC) model, 209role-based administration, 53–54, 209

administrative users, 220–221, 220, 224–225, 224–226

collections, 218–220, 223–224overview, 209–210security

roles, 210–213, 211, 213, 221scopes, 214–218, 214–215, 217–218, 221–231,

222–223software updates, 357–358

rolesmobile devices, 616–617

Application Catalog web service point, 622, 622distribution point, 621, 621enrollment point, 618–619, 618enrollment proxy point, 617–618, 617management point, 619–620, 619Microsoft enterprise certifi cation authority, 620,

621site system. See site system roles

rulesapplication deployment, 319–320collections, 219confi guration baselines, 581, 590–596, 591, 595confi guration items, 585–588, 585, 587–588software metering

adding, 524–526, 525Automatic Rule Generation, 523–524, 523enabling and disabling, 524migrating, 77

software updates, 330, 337, 340–341, 341supersedence, 349System Center Updates Publisher, 358, 399–400,

400Run Installation and Uninstall Programs in 32-Bit

Process on 64-Bit Clients option, 302Run Task As Soon As Possible After A Scheduled Start

Is Missed option, 735running reports, 541–543, 542–543

SScan Settings page, 711, 711scan state for USMT packages, 422scans

antimalware policy, 709–711, 709–711software updates, 361

SCCMContentLib folder, 170, 171SCCMContentLib library, 42SCEP. See System Center Endpoint Protection (SCEP)SCEPInstall.exe utility, 705Schedule Deployment Re-evaluation setting, 361

Schedule Evaluation setting, 390Scheduled Scans option, 709–710, 709scheduled tasks

Actions page, 734, 734CCMEval, 736–739, 736, 738–739client health, 732–733, 732–733Conditions page, 734, 734History page, 735, 736Settings page, 735, 735Triggers page, 733, 733

schedulesantimalware scans, 709–710, 709application deployment, 311, 311content distribution, 41–42deployment templates, 337discovery, 243–244, 243–245, 608inventory, 501–502report subscriptions, 559software updates

deployments, 390–391, 390scans, 361synchronization, 342, 349, 378, 378

Scheduling pageDeploy Software Updates Wizard, 390–391, 390Deploy Software Wizard, 311, 311

schema for Active Directory, 36–37scheme extensions, 132scopes, security, 53, 214, 214

applications, 292–293creating, 214–216, 215resources, 216–217, 216–217scenario, 221–231, 222–223viewing, 217–218, 218

Scratch Space setting, 465scripts for client installation, 258, 260SCUP (System Center Updates Publisher), 675–676search folders in migration, 77search options for software updates, 382–384, 382–384secondary site servers

implementing, 138–145, 139–145overview, 120–121

secondary sites, 40backing up, 682migrating, 84upgrading, 95–96, 96

securitymobile devices, 613–614, 613, 636–637, 636reports, 545–550, 545, 558roles, 53, 210–213, 211, 213, 221SCEP, 700–702scopes, 53, 214, 214

applications, 292–293creating, 214–216, 215

bindex.indd 784bindex.indd 784 27/03/12 8:17 AM27/03/12 8:17 AM

SECURITY ADMINISTRATION SMF • SITE SERVERS | 785

resources, 216–217, 216–217scenario, 221–231, 222–223viewing, 217–218, 218

sites, 51SQL Server Reporting Services, 535

Security Administration SMF, 10Security Administrator role, 212, 549Security Compliance Manager, 598–599, 599Security Management SMF, 11Security page

application, 297, 298boot images, 414mobile devices, 636–637, 636operating system images, 415operating system installers, 416unknown computer support, 453, 454

Security role cluster, 9Security Settings window, 613–614, 613Security Warning window, 399, 399SELECT command for reports, 562Select Deployment Package option, 385Select Deployment Template option, 389Select Files page, 599, 599Select Media Type page, 434, 434, 453, 453Select New Container dialog box, 236, 237Selected Language option, 295Self-Update option, 357Send Password Recovery PIN To Exchange Server

option, 634Server Deployment scenario, 464Server Language Selection page, 129server locator point functionality, 178servers

requirements, 32–36setting migration, 66site. See site servers

Service Continuity Management SMF, 12Service Delivery process, 3service desk function, 4, 11Service Level Agreement Review, 12Service-Level Agreements (SLAs), 4Service Level Management (SLM) process, 5, 11Service Management Functions (SMFs), 7–13Service Monitoring and Control SMF, 10/Service property, 248Service Support process, 3service validation, 151, 151Services registry key, 148, 148Servicing tab, 415Set period of time to install Software Updates with a

deadline setting, 361Set Security Scope option, 292–293

Set Security Scopes window, 216Setting Summary page, 131, 131settings and Settings page

Add Exchange Server Wizard, 609Application Settings, 614, 614Email Management Settings, 612–613,

612General Settings, 610, 610Password Settings, 610–611, 611Security Settings, 613–614, 613

Application Deployment, 274migrating, 76recovery process, 689, 689scheduled tasks, 735, 735task sequences, 417

Settings Management feature, 18Settings Summary page, 689, 689Setup Wizard

central administration sites, 127–134, 127–133primary site servers, 134–138, 134, 137–138System Center Updates Publisher, 395, 395

Shared (Multi-user) Computers report, 475Show Install Status option, 144, 145Show Message menu, 658, 658Show Notifi cations For New Deployments option, 232Show Settings From All Mobile Device Confi guration

Items option, 643side-by-side migration, 81–82

clients, 96–97confi guring, 85–86, 85–86distribution points, 87, 91–95, 92–93, 95process, 82–84, 83secondary sites, 95–96, 96

Signing And Encryption tab, 515Simple Schedule option, 504Simulate Deployment option, 291, 291Single Computer page, 449, 449, 469single instance storage, 269Site and Installation Settings page, 129, 129, 688, 688site data, 667, 667site database server point role, 47Site Maintenance dialog box, 526–527, 527site migration point role, 47Site Recovery Information page, 687, 687Site Repair Wizard, 685Site Server and Database Recovery Options page,

686–687, 687site servers, 121

backing up, 680–681, 681checklist, 123–124implementing, 123, 123

central administration, 125–137, 127–136

bindex.indd 785bindex.indd 785 27/03/12 8:17 AM27/03/12 8:17 AM

786 | SITE SERVERS • SMSEXEC.LOG FILE

site servers (continued)primary sites, 134–138, 134, 137–138secondary sites, 138–145, 139–145software requirements, 123–125troubleshooting, 152–155, 152–155unattended installation, 155–157

inventory, 519–520log fi les, 651–653primary, 120secondary, 120–121verifying, 145–150, 146

database validation, 152, 152fi le system validation, 148, 149group validation, 149–150, 150registry validation, 146–148, 147–148services validation, 151, 151WMI validation, 150–151, 151

Site Status dashboard, 658, 658Site System Installation Account setting, 367, 372site system roles, 45–47

Application Catalog Web Service Point, 191–195, 192–194

Application Catalog Web Site Point, 191–195, 192–194

Asset Intelligence Synchronization Point, 206–207, 206

component servers, 162confi guring, 137, 137distribution points, 162–174, 163–174Endpoint Protection Manager, 204–205, 205fallback status points, 185–187, 186installing, 157–160, 158–159management points, 174–179, 175–176mobile device and AMT enrollment point, 195–199,

197–198operating system, 33–34out-of-band management, 187–189, 188–189overview, 160–162Reporting Services point, 189–191, 190site database servers, 180site servers, 179–180site systems, 180Software Update Point, 199–204, 199–203state migration points, 182–185, 182–184system health validator points, 180–182

Site System Roles page, 137, 137site systems, 180

backing up, 674design, 47–49planning, 58

Site tab, 260, 260site-to-site communications, 281sitecomp.log fi le, 162, 537

sites, 37–38, 38boundaries, 44–45central administration, 38–39communications, 50databases, 47, 696–697distribution points, 41–44, 43failure effects, 682–683maintenance tasks, 648–650migrating, 66primary, 39–40recovering, 684–685, 684, 692secondary, 40security, 51types, 120–121, 122upgrading, 95–96, 96

64 bit applications, Registry, 584Size Limit (KB) For Email Attachments (Automatically

Downloaded) setting, 613Size Limit (KB) For HTML Email (Automatically

Downloaded) setting, 613Size Limit (KB) For Plain Text Email (Automatically

Downloaded) setting, 612skpswi.dat fi le, 515SLAs (Service-Level Agreements), 4SLM (Service Level Management) process, 5, 11SMFs (Service Management Functions), 7–13smp.msi fi le, 185smpmsi.log fi le, 185SMS And MMS Messaging option, 614, 637SMS_CCM folder, 148, 149SMS Database Monitor, 155sms_def.mof fi le, 78, 495SMS_Executive component, 153–154, 153SMS provider point role, 47SMS Provider Settings page, 130–131SMS providers

high availability, 49purpose, 155settings, 130–131

SMS registry key, 146SMS Site reports, 540smsawebsvcsetup.log fi le, 195smsbkup.log fi le, 676, 676, 682SMSCacheDir property, 251SMSCacheFlags property, 251SMSCacheSize property, 251SMSConfi gSource property, 251smsdbmon.log fi le, 155, 180SMSDIRECTORYLOOKUP property, 251SMSDPPROV.LOG fi le, 92Smsenrollsrvsetup.log fi le, 198Smsenrollwebsetup.log fi le, 198smsexec.log fi le, 154, 154

bindex.indd 786bindex.indd 786 27/03/12 8:17 AM27/03/12 8:17 AM

SMSFSPSETUP.LOG FILE • SOFTWARE UPDATES | 787

SMSFSPSetup.log fi le, 187SMSMP property, 251smsportwebsetup.log fi le, 195smsprov.log fi le, 180SMSPUBLICROOTKEY property, 250smspxe.log fi le, 427SMSROOTKEYPATH property, 250SMSSiteCode property, 252smssmpsetup.log fi le, 185snapshots

archiving, 678–679, 678report properties, 557

Software Available Time setting, 390Software Catalog

application deployment, 314, 315application information, 282distribution points, 271primary devices, 322

software categories for Asset Intelligence, 476Software Center

application deployment, 314–316, 315–316distribution points, 271software updates, 331, 331

Software Deployment option, 233Software Deployment page, 278–279, 279software distribution

client installation, 258collections. See collectionsdistribution points. See distribution pointspackages. See packagesreports, 540

Software Distribution Component Properties dialog box, 280–281, 280

Software Download While Roaming option, 638software families for Asset Intelligence, 476–477software inventory

clients, 233collecting, 499–500, 499confi guring, 511–518, 511–518

software licenses for Asset Intelligence, 488–491, 488, 490–491

Software Metering Client Agent, 473–474, 521Software Metering feature, 17, 521

clients, 528–530, 529confi guring, 522–523, 522maintenance tasks, 526–528, 527overview, 521–522reports, 474, 530, 540rules

adding, 524–526, 525Automatic Rule Generation, 523–524, 523enabling and disabling, 524migrating, 77

Software Metering option, 233Software Metering Properties dialog box, 523, 523Software Metering Summarization Progress report,

527, 527Software Metering Usage Report Cycle

action, 529, 529software reports, 483–484software requirements

Application Catalog Web Service Point, 194Application Catalog Web Site Point, 194Asset Intelligence Synchronization Point, 207distribution points, 173Endpoint Protection Manager, 205fallback status points, 186management points, 179mobile device and AMT enrollment point

role, 198Reporting Services, 191servers, 33–36site servers, 123–125Software Update Point role, 204state migration points, 185system health validator points, 182

Software Update Catalog, 358Software Update Manager role, 212

reports, 549software updates, 357–358

software update point role, 47active. See active software update points setupinfrastructure, 346install planning, 346–348settings, 199–204, 199–203software updates, 333–334testing, 359–360

Software Update Scan Schedule setting, 361software updates, 17, 329

classifi cationsclasses, 350confi guring, 376, 376metadata, 334–335

client installation, 257–258client settings, 355–356, 355compliance, 343–344Computer Client Agent, 353–355, 354deployments, 339–340, 344–345

Deploy Software Updates Wizard, 388–395, 389–392

packages, 338–339rules, 340–341, 341templates, 337–338

downloading, 384–387, 385–386enabling, 233fi les, 335

bindex.indd 787bindex.indd 787 27/03/12 8:17 AM27/03/12 8:17 AM

788 | SOFTWARE UPDATES • STATUS MESSAGES

software updates (continued)fi nding, 380–384, 381–384general settings, 348goals, 346group policy settings, 356–357groups, 330, 337, 388Internet-based settings, 348–349languages, 351, 377, 377, 394maintenance windows, 351–352metadata, 334–335, 376, 379migrating, 74–75monitoring, 404–408, 404–407new features, 329–332objects, 335–337planning, 345prerequisites, 332–333process, 342products, 350–351properties, 353reports, 381–382, 381, 540–541role-based administration, 357–358settings, 375–380, 376–378software update point role. See software update

point roleSoftware Updates Client Agent

confi guring, 360–361, 360description, 334

summary details, 351supersedence rules, 349synchronization, 342–343, 349, 375–380, 376–378System Center Updates Publisher, 358–359templates, 332, 337–338test labs, 359–360update fi les, 351Windows Server Update Services Server

console, 365–366installation, 361–365, 363

Software Updates Client Agent, 360–361, 360Software Updates Deployment Evaluation Cycle

action, 355Software Updates Scan Cycle action, 355sorting reports, 562Source Directory page, 421, 422Source Files page, 421source hierarchy, 66–67, 67, 85/source property, 248source sites, migrating, 66Specify A Fully Qualifi ed Domain Name (FQDN) For

This Site System On The Intranet option, 370Specify An FQDN For This Site System For Use On The

Internet option, 367Specify An FQDN For This Site System On The

Intranet option, 372

Specify an Internet-based FQDN For This Site System option, 370, 372

Specify Endpoint Protection License page, 704Specify Intranet Microsoft Update Service Location

option, 356Specify Microsoft Active Protection Service window,

704Specify Peak Time option, 638Specify The Content Distribution page, 428speed of networks, 45splash.hta fi le, 127SpyNet, 700SQL

considerations, 49–50memory, 126, 132replication, 281reports

commands, 561–562SQL Reporting Services, 21, 675

SQL Server Management Studio, 534SQL Server Reporting Services (SSRS), 189–190,

534–538, 536SQL Server Settings page, 140–141, 141srsrp.log fi le, 191, 538srsrpMSI.log fi le, 191, 538srsrpsetup.log fi le, 191SSRS (SQL Server Reporting Services), 189–190,

534–538, 536stand-alone media for task sequences, 418standalone site recovery, 692startup scripts for client installation, 260state-based distribution point groups, 43–44State Message Detail Level setting, 390State Message Reporting Cycle (Minutes) setting, 355State Messaging setting, 234State Migration page, 443, 443, 450–451, 451State Migration Point page, 424–426, 425state migration points

confi guring, 424–426, 425operating system deployment, 414

State Migration report, 541states

Asset Intelligence validation, 473link, 666

statistics for in-console monitoring, 404–407, 404–407

Status Message Details dialog box, 659, 659status messages, 657–659, 658–659

default reports, 541deployment, 661–662distribution, 662–663distribution point confi guration, 663distribution point groups, 663

bindex.indd 788bindex.indd 788 27/03/12 8:17 AM27/03/12 8:17 AM

STOP DATA GATHERING DIALOG BOX • SYSTEM ROLE SELECTION PAGE | 789

system, 664web reports, 659–660

Stop Data Gathering dialog box, 99Stop The Task If It Takes Longer Than setting, 735Storage Card Encryption option, 614, 639Storage Folder Settings page, 425, 425Storage Management SMF, 10Style folder for reports, 538Subscription Schedule page, 559subscriptions for reports, 553–555, 558–561, 559summarization tasks for software metering, 528Summarize Installed Software Data task, 474Summary Details information for software updates,

351Summary page

Asset Intelligence, 487client health, 740, 740client installation, 422computer information, 450confi guration items, 588, 588Deploy Software Updates Wizard, 394–395, 394device drivers, 457distribution points, 169, 169image capture, 439Microsoft Deployment Toolkit, 470mobile devices, 614–615packages, 424secondary site servers, 143–144, 144task sequences, 436, 443

supersedence, 343application deployment, 317–318, 317–318Application References, 272software updates, 349

Supersedence page for applications, 297, 297Supersedence Rules page

Software Update Point role, 202, 202software updates, 377, 378

Support role cluster, 9Supported Platform page, 644, 644Supporting Quadrant MOF, 9–11Supports Contacts option, 294Suppress Any Required Computer Restart After The

Endpoint Protection Client Is Installed option, 232Supsetup.log fi le, 204Suspend BitLocker PIN Entry Or Restart option, 232suspended software updates, 330–331swmproc.log fi le, 530SWMTRReportGen.log fi le, 530Sync Schedule tab, 378, 378synchronization

Asset Intelligence, 479, 486–487, 487discovery, 608

mobile devices, 637–638, 637monitoring, 407, 407software update points, 368–369, 374software updates, 342–343, 349, 375–380, 376–378

Synchronization Point Schedule page, 487Synchronization Schedule page

Asset Intelligence Synchronization Point, 207Software Update Point role, 201

Synchronization Source page, 200, 201, 371, 371Synchronize From An Upstream Update Server option,

368, 374Synchronize From Microsoft Update option, 368, 374System Administration SMF, 10System Center Endpoint Protection (SCEP), 22, 699

alerts, 719–722, 720–722benefi ts, 700–702defi nition fi les, 717–719, 717–718Endpoint Protection client agent, 705–709,

706–708Endpoint Protection Point role, 702–705, 704endpoint protection policies, 709

antimalware, 709–715, 709–714assigning, 716, 716Windows Firewall, 715–716, 715

vs. FEP, 699malware scenario, 723–728, 724–728reporting, 723, 723settings, 232–233

System Center Online service, 476System Center Updates Publisher (SCUP), 127,

342, 395backups, 675–676confi guring, 396–397, 396–397importing updates, 398–399, 399installing, 395–396, 395overview, 358–359partner software updates catalogs, 397–398, 398publishing updates, 401–402, 401rules, 399–400, 400third-party updates, 402–404, 403

system discovery, 52, 239–240, 240system health validator point role, 47, 180–182system requirements

client, 26–32servers, 32–36System Center Updates Publisher, 358–359

System Restart Turnaround Time setting, 352system role. See site system rolesSystem Role Selection page

Asset Intelligence, 487reporting site role, 535state migration points, 424

bindex.indd 789bindex.indd 789 27/03/12 8:17 AM27/03/12 8:17 AM

790 | SYSTEM STATUS MESSAGES • USE THIS SERVER AS THE ACTIVE SOFTWARE UPDATE SERVER OPTION

system status messages, 664system updates. See System Center Updates Publisher

(SCUP)systems management, 1

TTask Sequence Designer, 111, 112Task Sequence Information page, 442, 450task sequences

capture images, 430–436, 431–435deploying, 444–448, 445–448developing, 441–444, 442–444MDT, 466–469, 467, 469media boot, 433–436, 434–435operating system deployment, 416–418,

450–451, 451P2V Migration Toolkit, 110–114, 111–114reports, 541

Team Model, 8Technology setting, 299templates for software updates, 332, 337–338test labs, 359–360test phase in migration, 80–81testing

site backups, 681, 681software update points, 359–360

thin images, 4193rd party license information, 490–491, 491third-party updates, 402–404, 403Threat Overrides page, 713, 713thresholds for alerts, 721, 721throttling

content distribution, 41–42remote distribution point, 270

time stamps for log fi les, 328Trace utility, 328Trace32 utility, 154Triggers page, 733, 733troubleshooting, 647

Application Catalog Web Service Point, 194–195

Application Catalog Web Site Point, 194–195application deployment, 325–328, 326Asset Intelligence Synchronization Point, 207backups, 682client installation, 261Confi guration Manager deployment, 664–665Database Replication, 665–669, 665, 667–669distribution points, 173–174, 174Endpoint Protection Manager, 205enrollment proxy point and enrollment point,

198–199

fallback status points, 187inventory, 518–521log fi les for, 651–657maintenance plans for, 647–651, 648management points, 179mobile devices, 645–646Reporting Services, 191scenario, 669–671site database servers, 180site servers, 152–155, 152–155Software Update Point role, 204state migration points, 185status messages for, 657–664, 658–659

Trusted Publishers option, 397Type of Deployment setting, 390

Uunattended site server installation, 155–157Uncategorized state in Asset Intelligence, 479Unhealthy Client Details reports, 263Uninstall Program option, 302/Uninstall property, 249Uninstall Start In option, 302unknown computer support, 452–455, 452–455Unknown package conversion state, 103Unknown status in monitoring, 405unmanaged scenarios, SCEP in, 702–703Unsigned Applications option, 614, 637Unsigned File Installation option, 614, 637Update Files setting, 351Update lists feature, 332Update Prerequisite Components page, 688, 688Update Server option, 396Update/Update Group option, 390Updateable state in Asset Intelligence, 479Updated Prerequisite Components page, 135updates

clients, 259, 259security, 717–719, 717–718software. See software updates

Upgrade Assessment - Windows 7 report, 541Upgrade Shared Distribution Point wizard, 91–92, 92upgrading

administrative console, 84Confi guration Manager console, 98–99distribution points, 83–84, 91–95, 92–93, 95secondary sites, 95–96, 96

Use default distribution point groups associated to this collection option, 308–309

Use This Server As The Active Software Update Server option, 375

bindex.indd 790bindex.indd 790 27/03/12 8:17 AM27/03/12 8:17 AM

USE WAKE-ON-LAN TO WAKE UP CLIENTS FOR REQUIRED DEPLOYMENT OPTION • WINDOWS UPDATE AGENT (WUA) | 791

Use Wake-On-LAN to Wake up Clients for Required Deployment option, 390

/UsePKICert property, 249User And Device Affi nity settings, 234, 279, 280User Categories option, 295user-centric focus for distribution points, 271user confi guration for mobile devices, 624–631, 625–631User-defi ned state in Asset Intelligence, 478User Device Affi nity

application deployment, 322–325, 323–325confi guring, 459–463, 460–463operating system deployment, 418report, 541

User Device Affi nity Usage Threshold (Days) setting, 461

User Device Affi nity Usage Threshold (Minutes) setting, 461

User Documentation option, 295User-Driven Installation scenario, 464User Experience settings

application deployment, 303–305, 303Deploy Software Updates Wizard, 391–392, 391Deploy Software Wizard, 312, 312deployment templates, 337task sequence deployment, 446visual experience, 391–392

user facing packages, 101user focused service support, 3User State Migration Tool (USMT)

documentation, 424package creation, 422–424, 423

usersadministrative, 220–221, 220, 224–225, 224–226discovery, 52, 240report, 541state management, 470–471, 470

UserState task category, 417

VValidated state in Asset Intelligence, 478validation

Asset Intelligence states, 478–479confi guration baseline rules, 594–596, 595confi guration items, 585–588, 585, 587–588content, 43, 43databases, 152, 152fi le systems, 148, 149groups, 149–150, 150registry, 146–148, 147–148services, 151, 151WMI, 150–151, 151

validator points, 180–182

vendor updates, 358verifi cation

client installation, 260–261, 260site servers, 145–150, 146

database validation, 152, 152fi le system validation, 148, 149group validation, 149–150, 150Registry validation, 146–148, 147–148services validation, 151, 151WMI validation, 150–151, 151

version setting for software metering rules, 525–526viewing

inventory information, 500–501, 501software inventory, 514, 515, 517–518, 518

Virtual Application Name setting, 619virtual application package migration, 74Virtual Applications report, 541Volume Shadow Copy Service (VSS), 673

WWake on LAN feature

description, 18report, 541

WCM.log fi le, 204web reports for status messages, 659–660Web Site Name setting, 618Web Site Selection page, 363, 363Website Name/Port Number setting, 619Whether Or Not A User Is Logged On option, 304wildcards in Compliance Settings, 584Windows 7 operating system support, 28Windows event log settings, 475Windows Firewall policies, 715–716, 715Windows Management Instrumentation (WMI),

150–151, 151, 344Windows Server 2003 operating system support, 29Windows Server 2008 operating system support,

29–30Windows Server Update Services (WSUS), 17, 329

central administration sites, 132console, 365–366database backups, 675description, 332installing, 361–365, 363ports, 373, 373reporting events, 349software update points, 346Synchronization Manager, 342–343

Windows Update Agent (WUA)compliance, 343event messages, 349software updates, 356

bindex.indd 791bindex.indd 791 27/03/12 8:17 AM27/03/12 8:17 AM

792 | WINDOWS VISTA OPERATING SYSTEM SUPPORT • SOFTWARE UPDATES

Windows Vista operating system support, 28Windows XP operating system support, 27wipe-and-load migration, 97–100, 100Wireless Communications page, 640–641, 640Wireless Network Connection window, 641, 641Wireless Network Connections option, 613Wizard Completed screen

captured image, 441compliance, 343distribution points, 428task sequences, 436USMT packages, 424

WMI (Windows Management Instrumentation), 150–151, 151, 344

Work Information setting, 356Workforce Management SMF, 11workstations as distribution points, 269WSUS. See Windows Server Update Services (WSUS)WSUSCtrl.log fi le, 204wsusutil.exe utility, 74–75, 379–380WSYNCMGR.log fi le, 204WUA (Windows Update Agent)

compliance, 343event messages, 349

software updates, 356

bindex.indd 792bindex.indd 792 27/03/12 8:17 AM27/03/12 8:17 AM