top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland
Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland
Autore Coupland Martyn
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, [England] : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (290 p.)
Disciplina 005.1
Collana Professional expertise distilled
Soggetto topico Microsoft System center configuration manager
Computer networks - Management
Software configuration management - Computer programs
Soggetto genere / forma Electronic books.
ISBN 1-78217-209-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Designing Complex Hierarchies; Selecting the appropriate site system server; When to use a central administration site; Determining the location of primary sites; Working with secondary sites; Client count; Traffic control; Local management point; What should you do when you are unsure?; Designing fault-tolerant hierarchies; Fault tolerance in site systems; Fault tolerance in site-system roles; Backup and recovery in Configuration Manager
Advanced backup optionsAdditional backup tasks; Restoring a Configuration Manager site; Post recovery tasks to complete the recovery; Designing to support trusted forests; Designing to support nontrusted forests; Designing a sample hierarchy; Business requirements; Design assumptions and risks; Planning the new hierarchy; Directly addressing the stated requirements; Planning for the SQL Server configuration; Planning for fault tolerance and high availability; Defining the business benefits; Delivering the design documentation; Design diagrams; Summary
Chapter 2: Implementing Security with CertificatesPlanning for the use of certificates; Setting up a secure communication; Preparing the certificate authority; Setting up certificate services using the user interface; Setting up certificate services using PowerShell; Configuring certificate templates; Creating the web server certificate template; Creating the client certificate for distribution points; Creating the client certificate for Windows computers; Issuing certificate templates; Requesting the web server certificate; Requesting the client certificate for distribution points
Deploying the client certificate for Windows workstationsConfiguring IIS to use the distribution point certificate; Configuring Configuration Manager; Configuring distribution points to use certificates; Configuring management points to use certificates; Deploying certificates to workgroup computers; Summary; Chapter 3: Working with Inventory, Asset Intelligence, and Software Metering; Configuring software and hardware inventory; Planning the configuration of inventory; Configuring hardware inventory; Initiating inventory cycles manually; Using inventory data to your advantage
Controlling inventory with control filesTracking assets with inventory; Tracking build cycles with the registry; Tracking with reports; Making use of software metering; Modifying metering retention; Viewing metering data; Removing unused software with metering data; Real-world use of asset intelligence; Licensing with asset intelligence; Controlling applications with inventory data; Using security groups for application control; Summary; Chapter 4: Security with Endpoint Protection; Configuring the endpoint protection infrastructure; Deploying the endpoint protection point
Deploying the endpoint protection point with the console
Record Nr. UNINA-9910463297403321
Coupland Martyn  
Birmingham, [England] : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland
Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland
Autore Coupland Martyn
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, [England] : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (290 p.)
Disciplina 005.1
Collana Professional expertise distilled
Soggetto topico Microsoft System center configuration manager
Computer networks - Management
Software configuration management - Computer programs
ISBN 1-78217-209-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Designing Complex Hierarchies; Selecting the appropriate site system server; When to use a central administration site; Determining the location of primary sites; Working with secondary sites; Client count; Traffic control; Local management point; What should you do when you are unsure?; Designing fault-tolerant hierarchies; Fault tolerance in site systems; Fault tolerance in site-system roles; Backup and recovery in Configuration Manager
Advanced backup optionsAdditional backup tasks; Restoring a Configuration Manager site; Post recovery tasks to complete the recovery; Designing to support trusted forests; Designing to support nontrusted forests; Designing a sample hierarchy; Business requirements; Design assumptions and risks; Planning the new hierarchy; Directly addressing the stated requirements; Planning for the SQL Server configuration; Planning for fault tolerance and high availability; Defining the business benefits; Delivering the design documentation; Design diagrams; Summary
Chapter 2: Implementing Security with CertificatesPlanning for the use of certificates; Setting up a secure communication; Preparing the certificate authority; Setting up certificate services using the user interface; Setting up certificate services using PowerShell; Configuring certificate templates; Creating the web server certificate template; Creating the client certificate for distribution points; Creating the client certificate for Windows computers; Issuing certificate templates; Requesting the web server certificate; Requesting the client certificate for distribution points
Deploying the client certificate for Windows workstationsConfiguring IIS to use the distribution point certificate; Configuring Configuration Manager; Configuring distribution points to use certificates; Configuring management points to use certificates; Deploying certificates to workgroup computers; Summary; Chapter 3: Working with Inventory, Asset Intelligence, and Software Metering; Configuring software and hardware inventory; Planning the configuration of inventory; Configuring hardware inventory; Initiating inventory cycles manually; Using inventory data to your advantage
Controlling inventory with control filesTracking assets with inventory; Tracking build cycles with the registry; Tracking with reports; Making use of software metering; Modifying metering retention; Viewing metering data; Removing unused software with metering data; Real-world use of asset intelligence; Licensing with asset intelligence; Controlling applications with inventory data; Using security groups for application control; Summary; Chapter 4: Security with Endpoint Protection; Configuring the endpoint protection infrastructure; Deploying the endpoint protection point
Deploying the endpoint protection point with the console
Record Nr. UNINA-9910787810903321
Coupland Martyn  
Birmingham, [England] : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland
Microsoft System Center Configuration Manager Advanced Deployment : design, implement, and configure System Center Configuration Manager 2012 R2 with the help of real-world examples / / Martyn Coupland
Autore Coupland Martyn
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, [England] : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (290 p.)
Disciplina 005.1
Collana Professional expertise distilled
Soggetto topico Microsoft System center configuration manager
Computer networks - Management
Software configuration management - Computer programs
ISBN 1-78217-209-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Designing Complex Hierarchies; Selecting the appropriate site system server; When to use a central administration site; Determining the location of primary sites; Working with secondary sites; Client count; Traffic control; Local management point; What should you do when you are unsure?; Designing fault-tolerant hierarchies; Fault tolerance in site systems; Fault tolerance in site-system roles; Backup and recovery in Configuration Manager
Advanced backup optionsAdditional backup tasks; Restoring a Configuration Manager site; Post recovery tasks to complete the recovery; Designing to support trusted forests; Designing to support nontrusted forests; Designing a sample hierarchy; Business requirements; Design assumptions and risks; Planning the new hierarchy; Directly addressing the stated requirements; Planning for the SQL Server configuration; Planning for fault tolerance and high availability; Defining the business benefits; Delivering the design documentation; Design diagrams; Summary
Chapter 2: Implementing Security with CertificatesPlanning for the use of certificates; Setting up a secure communication; Preparing the certificate authority; Setting up certificate services using the user interface; Setting up certificate services using PowerShell; Configuring certificate templates; Creating the web server certificate template; Creating the client certificate for distribution points; Creating the client certificate for Windows computers; Issuing certificate templates; Requesting the web server certificate; Requesting the client certificate for distribution points
Deploying the client certificate for Windows workstationsConfiguring IIS to use the distribution point certificate; Configuring Configuration Manager; Configuring distribution points to use certificates; Configuring management points to use certificates; Deploying certificates to workgroup computers; Summary; Chapter 3: Working with Inventory, Asset Intelligence, and Software Metering; Configuring software and hardware inventory; Planning the configuration of inventory; Configuring hardware inventory; Initiating inventory cycles manually; Using inventory data to your advantage
Controlling inventory with control filesTracking assets with inventory; Tracking build cycles with the registry; Tracking with reports; Making use of software metering; Modifying metering retention; Viewing metering data; Removing unused software with metering data; Real-world use of asset intelligence; Licensing with asset intelligence; Controlling applications with inventory data; Using security groups for application control; Summary; Chapter 4: Security with Endpoint Protection; Configuring the endpoint protection infrastructure; Deploying the endpoint protection point
Deploying the endpoint protection point with the console
Record Nr. UNINA-9910808996203321
Coupland Martyn  
Birmingham, [England] : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui