Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland
| Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland |
| Autore | Coupland Martyn |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham, [England] : , : Packt Publishing, , 2014 |
| Descrizione fisica | 1 online resource (290 p.) |
| Disciplina | 005.1 |
| Collana | Professional expertise distilled |
| Soggetto topico |
Microsoft System center configuration manager
Computer networks - Management Software configuration management - Computer programs |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-78217-209-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Designing Complex Hierarchies; Selecting the appropriate site system server; When to use a central administration site; Determining the location of primary sites; Working with secondary sites; Client count; Traffic control; Local management point; What should you do when you are unsure?; Designing fault-tolerant hierarchies; Fault tolerance in site systems; Fault tolerance in site-system roles; Backup and recovery in Configuration Manager
Advanced backup optionsAdditional backup tasks; Restoring a Configuration Manager site; Post recovery tasks to complete the recovery; Designing to support trusted forests; Designing to support nontrusted forests; Designing a sample hierarchy; Business requirements; Design assumptions and risks; Planning the new hierarchy; Directly addressing the stated requirements; Planning for the SQL Server configuration; Planning for fault tolerance and high availability; Defining the business benefits; Delivering the design documentation; Design diagrams; Summary Chapter 2: Implementing Security with CertificatesPlanning for the use of certificates; Setting up a secure communication; Preparing the certificate authority; Setting up certificate services using the user interface; Setting up certificate services using PowerShell; Configuring certificate templates; Creating the web server certificate template; Creating the client certificate for distribution points; Creating the client certificate for Windows computers; Issuing certificate templates; Requesting the web server certificate; Requesting the client certificate for distribution points Deploying the client certificate for Windows workstationsConfiguring IIS to use the distribution point certificate; Configuring Configuration Manager; Configuring distribution points to use certificates; Configuring management points to use certificates; Deploying certificates to workgroup computers; Summary; Chapter 3: Working with Inventory, Asset Intelligence, and Software Metering; Configuring software and hardware inventory; Planning the configuration of inventory; Configuring hardware inventory; Initiating inventory cycles manually; Using inventory data to your advantage Controlling inventory with control filesTracking assets with inventory; Tracking build cycles with the registry; Tracking with reports; Making use of software metering; Modifying metering retention; Viewing metering data; Removing unused software with metering data; Real-world use of asset intelligence; Licensing with asset intelligence; Controlling applications with inventory data; Using security groups for application control; Summary; Chapter 4: Security with Endpoint Protection; Configuring the endpoint protection infrastructure; Deploying the endpoint protection point Deploying the endpoint protection point with the console |
| Record Nr. | UNINA-9910463297403321 |
Coupland Martyn
|
||
| Birmingham, [England] : , : Packt Publishing, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland
| Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland |
| Autore | Coupland Martyn |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham, [England] : , : Packt Publishing, , 2014 |
| Descrizione fisica | 1 online resource (290 p.) |
| Disciplina | 005.1 |
| Collana | Professional expertise distilled |
| Soggetto topico |
Microsoft System center configuration manager
Computer networks - Management Software configuration management - Computer programs |
| ISBN | 1-78217-209-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Designing Complex Hierarchies; Selecting the appropriate site system server; When to use a central administration site; Determining the location of primary sites; Working with secondary sites; Client count; Traffic control; Local management point; What should you do when you are unsure?; Designing fault-tolerant hierarchies; Fault tolerance in site systems; Fault tolerance in site-system roles; Backup and recovery in Configuration Manager
Advanced backup optionsAdditional backup tasks; Restoring a Configuration Manager site; Post recovery tasks to complete the recovery; Designing to support trusted forests; Designing to support nontrusted forests; Designing a sample hierarchy; Business requirements; Design assumptions and risks; Planning the new hierarchy; Directly addressing the stated requirements; Planning for the SQL Server configuration; Planning for fault tolerance and high availability; Defining the business benefits; Delivering the design documentation; Design diagrams; Summary Chapter 2: Implementing Security with CertificatesPlanning for the use of certificates; Setting up a secure communication; Preparing the certificate authority; Setting up certificate services using the user interface; Setting up certificate services using PowerShell; Configuring certificate templates; Creating the web server certificate template; Creating the client certificate for distribution points; Creating the client certificate for Windows computers; Issuing certificate templates; Requesting the web server certificate; Requesting the client certificate for distribution points Deploying the client certificate for Windows workstationsConfiguring IIS to use the distribution point certificate; Configuring Configuration Manager; Configuring distribution points to use certificates; Configuring management points to use certificates; Deploying certificates to workgroup computers; Summary; Chapter 3: Working with Inventory, Asset Intelligence, and Software Metering; Configuring software and hardware inventory; Planning the configuration of inventory; Configuring hardware inventory; Initiating inventory cycles manually; Using inventory data to your advantage Controlling inventory with control filesTracking assets with inventory; Tracking build cycles with the registry; Tracking with reports; Making use of software metering; Modifying metering retention; Viewing metering data; Removing unused software with metering data; Real-world use of asset intelligence; Licensing with asset intelligence; Controlling applications with inventory data; Using security groups for application control; Summary; Chapter 4: Security with Endpoint Protection; Configuring the endpoint protection infrastructure; Deploying the endpoint protection point Deploying the endpoint protection point with the console |
| Record Nr. | UNINA-9910787810903321 |
Coupland Martyn
|
||
| Birmingham, [England] : , : Packt Publishing, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland
| Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland |
| Autore | Coupland Martyn |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham, [England] : , : Packt Publishing, , 2014 |
| Descrizione fisica | 1 online resource (290 p.) |
| Disciplina | 005.1 |
| Collana | Professional expertise distilled |
| Soggetto topico |
Microsoft System center configuration manager
Computer networks - Management Software configuration management - Computer programs |
| ISBN | 1-78217-209-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Designing Complex Hierarchies; Selecting the appropriate site system server; When to use a central administration site; Determining the location of primary sites; Working with secondary sites; Client count; Traffic control; Local management point; What should you do when you are unsure?; Designing fault-tolerant hierarchies; Fault tolerance in site systems; Fault tolerance in site-system roles; Backup and recovery in Configuration Manager
Advanced backup optionsAdditional backup tasks; Restoring a Configuration Manager site; Post recovery tasks to complete the recovery; Designing to support trusted forests; Designing to support nontrusted forests; Designing a sample hierarchy; Business requirements; Design assumptions and risks; Planning the new hierarchy; Directly addressing the stated requirements; Planning for the SQL Server configuration; Planning for fault tolerance and high availability; Defining the business benefits; Delivering the design documentation; Design diagrams; Summary Chapter 2: Implementing Security with CertificatesPlanning for the use of certificates; Setting up a secure communication; Preparing the certificate authority; Setting up certificate services using the user interface; Setting up certificate services using PowerShell; Configuring certificate templates; Creating the web server certificate template; Creating the client certificate for distribution points; Creating the client certificate for Windows computers; Issuing certificate templates; Requesting the web server certificate; Requesting the client certificate for distribution points Deploying the client certificate for Windows workstationsConfiguring IIS to use the distribution point certificate; Configuring Configuration Manager; Configuring distribution points to use certificates; Configuring management points to use certificates; Deploying certificates to workgroup computers; Summary; Chapter 3: Working with Inventory, Asset Intelligence, and Software Metering; Configuring software and hardware inventory; Planning the configuration of inventory; Configuring hardware inventory; Initiating inventory cycles manually; Using inventory data to your advantage Controlling inventory with control filesTracking assets with inventory; Tracking build cycles with the registry; Tracking with reports; Making use of software metering; Modifying metering retention; Viewing metering data; Removing unused software with metering data; Real-world use of asset intelligence; Licensing with asset intelligence; Controlling applications with inventory data; Using security groups for application control; Summary; Chapter 4: Security with Endpoint Protection; Configuring the endpoint protection infrastructure; Deploying the endpoint protection point Deploying the endpoint protection point with the console |
| Record Nr. | UNINA-9910808996203321 |
Coupland Martyn
|
||
| Birmingham, [England] : , : Packt Publishing, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||