10747 Administering System Center 2012 Configuration Manager

Overview

Course Description

This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and its associated site systems. The course focuses on day-to-day management tasks for System Center 2012 R2 Configuration Manager.

Audience Profile

The primary audience for this course is intended for IT Professionals who are responsible for configuring and managing endpoints in one or more System Center 2012 R2 Configuration Manager sites and all supporting systems. They have one to three years of experience managing and maintaining client computers, devices, and servers in medium to large enterprise organizations. Administrators may have previous Configuration Manager experience, or be new to the product.

Prerequisite(s) Recommended

Before attending this course, students must have:

System administrator–level working knowledge of:

  • Installation, configuration, and troubleshooting for Windows-based personal computers.
  • Windows client management including endpoint security fundamentals.
  • Networking fundamentals, including TCP/IP and Domain Name System (DNS).
  • Windows Server administration concepts including Active Directory® and group policy principles and management.
  • Basic concepts of Public Key Infrastructure (PKI) security.
  • Familiarity with Windows Intune
  • Desired: Basic understanding of Windows Server roles and services
  • Desired: Basic understanding of Microsoft SQL Server® Reporting Services

Learning Objectives

After completing this course, students will be able to:

  • Describe the System Center 2012 R2 Configuration Manager feature set and manage and troubleshoot sites by using the Configuration Manager Console and associated toolset.
  • Configure boundaries and boundary groups, configure discovery methods, manage user and device collections, and implement role-based administration.
  • Describe the client deployment process, configure client deployment methods, configure the client agent settings, and monitor client status.
  • Describe the inventory collection process, configure and manage hardware and software inventory, monitor inventory data flow, and use Asset Intelligence and Software Metering.
  • Analyze data by creating queries and running reports.
  • Create, deploy, and manage software packages and programs.
  • Create and deploy applications by using the System Center 2012 R2 Configuration Manager application model.
  • Configure multiple deployment types.
  • Deploy and manage software updates.
  • Integrate and implement Endpoint Protection by using System Center 2012 R2 Configuration Manager.
  • Deploy operating systems by using the Configuration Manager infrastructure.
  • Manage configuration items, baselines, and profiles to assess and configure settings for devices.
  • Manage mobile devices by using System Center 2012 R2 Configuration Manager.
  • Configure Wake On LAN, Power Management policies, and Remote Control.

Course Outline

Course Outline

Module 1: Overview of System Center 2012 Configuration Manager

This module describes the System Center 2012 Configuration Manager feature set and explains how to manage sites by using the System Center 2012 Configuration Manager Console.

Lessons

  • Introduction to System Center 2012 Configuration Manager
  • Overview of System Center 2012 Configuration Manager Architecture
  • Overview of the Configuration Manager Console
  • Tools for Monitoring and Troubleshooting a Configuration Manager Site

Lab : Exploring the Configuration Manager ConsoleLab : Monitoring and Troubleshooting a Configuration Manager Site After completing this module, students will be able to:

  • Describe the purpose and functionality of System Center 2012 Configuration Manager.
  • Describe the System Center 2012 Configuration Manager architecture.
  • Identify and locate the management features available in the Configuration Manager console.
  • Identify and use the tools available to monitor and troubleshoot a Configuration Manager site.

Module 2: Discovering and Organizing Resources

This module explains how to configure discovery methods, configure boundaries and boundary groups, manage user and device collections, and implement role-based security.

Lessons

  • Configuring Resource Discovery
  • Configuring Boundaries and Boundary Groups
  • Configuring User and Device Collections
  • Configuring Role-Based Administration

Lab : Configuring Resource Discovery and Boundaries

Lab : Configuring User and Device Collections

Lab : Configuring Role-Based Administration

After completing this module, students will be able to:

  • Configure resource discovery.
  • Configure boundaries and boundary groups.
  • Configure user and device collections.
  • Configure role-based administration.

Module 3: Managing the Configuration Manager Client

This module explains how to configure client deployment methods and client settings, and monitor client status.

Lessons

  • Overview of the Configuration Manager Client
  • Deploying the Configuration Manager Client
  • Managing Client Agents
  • Configuring and Monitoring Client Status

Lab : Deploying the Configuration Manager Client

Lab : Managing Client Settings

Lab : Configuring and Monitoring Client Status

After completing this module, students will be able to:

  • Describe the requirements for installing the Configuration Manager 2012 client.
  • Describe the site roles and methods used to deploy the Configuration Manager client.
  • Describe how to configure the client agent settings.
  • Describe how to monitor client health.

Module 4: Managing Inventory and Software Metering

This module explains how to configure and manage hardware and software inventory, monitor inventory data flow, and use asset intelligence and software metering.

Lessons

  • Overview of Inventory Collection
  • Configuring Hardware Inventory
  • Configuring Software Inventory
  • Managing Inventory Collection
  • Configuring Asset Intelligence
  • Configuring Software Metering

Lab : Configuring and Managing Inventory Collection

Lab : Configuring and Managing Asset Intelligence

Lab : Configuring Software Metering

After completing this module, students will be able to:

  • Describe inventory collection.
  • Configure and collect hardware inventory.
  • Configure and collect software inventory.
  • Manage inventory collection.
  • Configure asset intelligence.
  • Configure software metering.

Module 5: Querying and Reporting Data

This module explains how to create queries and run reports by using SQL Server Reporting Services.

Lessons

  • Introduction to Queries
  • Managing Queries
  • Configuring SQL Server Reporting Services

Lab : Creating and Running Queries

Lab : Configuring Reporting

After completing this module, students will be able to:

  • Describe data and status message queries.
  • Configure and manage data and status message queries.
  • Configure and manage SQL Server Reporting Services in Configuration Manager.

Module 6: Managing Software Deployments by Using Packages and Programs

This module explains how to create and deploy packages and programs.

Lessons

  • Configuring Software Distribution
  • Configuring Packages and Programs
  • Distributing Content to Distribution Points
  • Deploying Programs to Configuration Manager Clients

Lab : Managing Software Deployment by Using Packages and Programs

After completing this module, students will be able to:

  • Describe the software distribution process and configure software distribution settings.
  • Configure packages and programs.
  • Distribute content to distribution points.
  • Deploy programs to Configuration Manager clients.

Module 7: Creating and Deploying Applications

This module explains how to create and deploy applications by using the System Center 2012 Configuration Manager application model.

Lessons

  • Overview of Application Management
  • Creating Applications
  • Deploying Applications
  • Configuring the Application Catalog

Lab : Creating and Deploying an Application

Lab : Deploying Applications from the Application Catalog

After completing this module, students will be able to:

  • Describe application management in Configuration Manager.
  • Create applications.
  • Deploy applications.
  • Configure the Application Catalog.

Module 8: Managing Application Deployment

This module explains how to configure application deployment requirements, application supersedence, application un-installation, and multiple deployment types.

Lessons

  • Configuring Requirements and Dependencies for Deployment Types
  • Configuring Multiple Deployment Types and User Device Affinity
  • Managing Applications

Lab : Advanced Application Deployment

Lab : Managing Application Supersedence and Removal

After completing this module, students will be able to:

  • Describe the requirement rules and dependencies for deployment types.
  • Configure multiple deployment types and user device affinity.
  • Manage applications by uninstalling and replacing applications using application supersedence.

Module 9: Deploying and Managing Software Updates

This module explains how to deploy and manage software updates.

Lessons

  • Overview of Software Updates
  • Preparing the Configuration Manager Site for Software Updates
  • Managing Software Updates
  • Configuring Automatic Deployment Rules
  • Monitoring and Troubleshooting Software Updates

Lab : Configuring the Site for Software Updates

Lab : Deploying and Managing Software Updates

After completing this module, students will be able to:

  • Describe how the software updates feature integrates with Configuration Manager 2012.
  • Prepare a Configuration Manager site for software updates.
  • Manage software update evaluation and deployment.
  • Configure automatic deployment rules.
  • Monitor and troubleshoot software updates.

Module 10: Implementing Endpoint Protection in Configuration Manager 2012

This module explains how to integrate and implement System Center 2012 Endpoint Protection with System Center 2012 Configuration Manager.

Lessons

  • Overview of Endpoint Protection in Configuration Manager
  • Configuring and Monitoring Endpoint Protection Policies

Lab : Implementing Endpoint Protection

After completing this module, students will be able to:

  • Describe how Endpoint Protection is used to detect and remediate malware and security vulnerabilities.
  • Configure and monitor Endpoint Protection policies.

Module 11: Managing Operating System Deployment

This module explains how to deploy operating systems by using the System Center 2012 Configuration Manager infrastructure.

Lessons

  • Overview of Operating System Deployment
  • Preparing the Site for Operating System Deployment
  • Capturing an Operating System Image
  • Deploying an Operating System

Lab : Preparing the Environment for Operating System Deployment

Lab : Building and Capturing a Reference Image

Lab : Performing an In-Place Upgrade

After completing this module, students will be able to:

  • Describe operating system deployment.
  • Prepare a site for operating system deployment.
  • Capture operating system images.
  • Deploy operating systems.

Module 12: Managing Compliance Settings

This module explains how to manage configuration items and baselines to assess and remediate the compliance of settings on devices.

Lessons

  • Overview of Compliance Settings
  • Configuring Compliance Settings
  • Viewing Compliance Results

Lab : Managing Compliance Settings

After completing this module, students will be able to:

  • Describe the Compliance Settings feature.
  • Configure the Compliance Settings feature.
  • View compliance results.

Module 13: Managing Mobile Devices

This module explains how to configure the mobile device management

Settings.

Lessons

  • Configuring Mobile Device Management
  • Depth Management of Mobile Devices
  • Deploying Applications to Mobile Devices

Lab : Managing Mobile Devices

After completing this module, students will be able to:

  • Configure mobile device management.
  • Describe how you can use depth management to manage supported mobile devices.
  • Deploy applications to mobile devices.

Module 14: Configuring Wake On LAN, Power Management, and Remote Control

This module explains how to configure Wake On LAN, power management policies, and Remote Control.

Lessons

  • Configuring Wake On LAN
  • Overview of Out of Band Management
  • Configuring Power Management Settings
  • Configuring Remote Control

Lab : Configuring Power Management Settings

Lab : Configuring Remote Control After completing this module, students will be able to:

  • Configure the Wake On LAN feature.
  • Describe out of band management.
  • Configure power management settings.
  • Configure Remote Control features.

 

Register for Course

Tuition
Available Registrations: Unlimited
The Tuition ticket is sold out. You can try another ticket or another date.

Cost

$2,950.00

Course Code

FRCMIC-43

Course Duration

5

Instructions Method

Instructor Led
REGISTER