Index
A
- Active Directory Certificate Services / Creating the certificate template
- Active Directory Forest Discovery Agent / Designing to support trusted forests
- ActiveSync devices
- managing / Managing ActiveSync devices
- anatomy, content library
- about / Anatomy of the content library
- package library / Package library
- data library / Data library
- file library / File library
- anatomy, software update deployment
- about / The anatomy of software update deployment
- software update groups / Introducing software update groups
- deployment packages / Introducing deployment packages
- automatic deployment rules / Introducing automatic deployment rules
- application-specific settings, monitoring
- about / Monitoring application-specific settings
- configuration item, creating / Creating the configuration item
- configuration baseline, creating / Creating the configuration baseline
- configuration baseline, deploying / Deploying the configuration baseline
- baseline deployment, monitoring / Monitoring the deployment
- file presence, remediating / Remediating the file presence
- application dependencies
- using / Using application dependencies
- sample application deployment / Sample application deployment
- application detection methods
- application management workflow
- about / Application management workflow
- application model
- about / Introducing the application model
- multiple platforms, targeting / Targeting multiple platforms
- working / How the application model works
- application requisites
- using / Using application requirements
- applications
- controlling, with inventory data / Controlling applications with the inventory data
- controlling, security groups used / Using security groups for application control
- elements, exploring / Exploring the elements of an application
- superseding / Superseding applications
- persistent, making / Making applications persistent
- application supersedence
- relationship, specifying / How to specify a relationship
- asset intelligence
- about / Real-world use of asset intelligence
- licensing with / Licensing with asset intelligence
- assets
- tracking, with inventory / Tracking assets with the inventory
- Auto Apply Drivers / Maintaining a driver library
- automatic deployment rules
B
- boot images
- drivers, adding to / Adding drivers to boot images
- components, adding to / Adding components to boot images
- build cycles, tracking with registry
- MOF files, preparing / Preparing the MOF files
- custom modifications, importing / Import custom modifications
- business benefits, design scenario example
- defining / Defining the business benefits
- business requisites, design scenario example
- about / Business requirements
- assumptions, designing / Design assumptions and risks
- risks, designing / Design assumptions and risks
C
- capacity planning, software updates infrastructure / Capacity planning of the software updates infrastructure
- captured images, deploying
- about / Deploying your captured images
- task sequence information, configuring / Configuring the task sequence information
- task sequence, editing / Editing the task sequence
- task sequence, making available / Making your task sequence available
- central administration site
- certificate authority
- preparing / Preparing the certificate authority
- certificate profiles
- creating / Creating certificate profiles
- certificate revocation list (CRL) / Planning for the use of certificates
- certificates
- usage, planning for / Planning for the use of certificates
- distribution points configuration, for using / Configuring distribution points to use certificates
- management points configuration, for using / Configuring management points to use certificates
- deploying, to workgroup computers / Deploying certificates to workgroup computers
- managing, with Configuration Manager / Managing certificates with Configuration Manager
- certificates, enrolling with PowerShell
- reference / Requesting the web server certificate
- certificates, TechNet
- certificates deployment guide
- reference / Configuring certificate templates
- certificate service
- setting up, user interface used / Setting up certificate services using the user interface
- certificate services
- setting up, PowerShell used / Setting up certificate services using PowerShell
- certificate services installation
- role services / Preparing the certificate authority
- certificate template
- creating / Creating the certificate template
- certificate templates
- configuring / Configuring certificate templates
- issuing / Issuing certificate templates
- certification authority (CA) / Creating certificate profiles
- chart components
- working with / Working with chart components
- client-based diagnostic tools
- using / Using client-based diagnostic tools
- Client Spy / Using the Client Spy tool
- Policy Spy / Using the Policy Spy tool
- deployment monitoring / Using the deployment monitoring tool
- client certificate
- creating, for distribution points / Creating the client certificate for distribution points
- creating, for Windows computers / Creating the client certificate for Windows computers
- requesting, for distribution points / Requesting the client certificate for distribution points
- deploying, for Windows workstations / Deploying the client certificate for Windows workstations
- client count, secondary sites / Client count
- client network traffic, TechNet article
- reference / Client count
- clients
- cloud distribution points, enabling for / Allowing clients to use cloud distribution points
- client settings policies
- used, for deploying endpoint protection agents / Deploying agents using client settings policies
- Client Spy tool
- using / Using the Client Spy tool
- cloud distribution points
- deploying / How to deploy cloud distribution points
- working / How the service works
- management certificate, creating / Creating the management certificate
- creating / Creating the cloud distribution point
- enabling, for clients / Allowing clients to use cloud distribution points
- CM IIS Servers
- CMTrace tool / Error tracing in Configuration Manager
- collection evaluation viewer tool
- using / Using the collection evaluation viewer tool
- Manual Queue / Using the collection evaluation viewer tool
- New Queue / Using the collection evaluation viewer tool
- Full Queue / Using the collection evaluation viewer tool
- Incremental Queue / Using the collection evaluation viewer tool
- collections
- maintenance windows, applying to / Applying maintenance windows to collections
- community add-in, Desktop Team
- company resource profiles
- deploying / Deploying company resource profiles
- compliance
- viewing, reporting used / Viewing compliance using reporting
- monitoring, with baselines / Monitoring compliance with baselines
- compliance baseline
- compliance, obtaining with / Obtaining compliance with a compliance baseline
- compliance settings
- about / An introduction to compliance settings
- use cases / Use cases for compliance settings
- remediation, of noncompliant clients / Remedying of noncompliant clients
- components
- adding, to boot images / Adding components to boot images
- components, operating system deployment tasks / Introduction to operating system deployment
- Computers
- configuration, certificate templates
- about / Configuring certificate templates
- web server certificate template, creating / Creating the web server certificate template
- client certificate, creating for distribution points / Creating the client certificate for distribution points
- client certificate, creating for Windows computers / Creating the client certificate for Windows computers
- certificate templates, issuing / Issuing certificate templates
- web server certificate, requesting / Requesting the web server certificate
- client certificate, requesting for distribution points / Requesting the client certificate for distribution points
- client certificate, deploying for Windows workstations / Deploying the client certificate for Windows workstations
- IIS, configuring for distribution point certificate usage / Configuring IIS to use the distribution point certificate
- configuration, endpoint protection infrastructure / Configuring the endpoint protection infrastructure
- configuration, hardware inventory
- Configuration Items (CIs) / How the application model works
- Configuration Manager
- issues, addressed by central site / When to use a central administration site
- configuring / Configuring Configuration Manager
- drivers, importing into / Importing drivers into Configuration Manager
- Report Builder, configuring for / Configuring Report Builder for Configuration Manager
- Wi-Fi profiles, managing with / Managing Wi-Fi profiles with Configuration Manager
- certificates, managing with / Managing certificates with Configuration Manager
- VPN profiles, managing with / Managing VPN profiles with Configuration Manager
- error tracing / Error tracing in Configuration Manager
- Configuration Manager 2012
- Configuration Manager services
- restarting / Restarting Configuration Manager services
- Configuration Manager site
- backup options / Backup and recovery in Configuration Manager
- recovery in / Backup and recovery in Configuration Manager
- advanced backup options / Advanced backup options
- additional backup tasks / Additional backup tasks
- restoring / Restoring a Configuration Manager site
- post recovery tasks, for completing recovery / Post recovery tasks to complete the recovery
- Configuration Manager toolkit
- about / Using the Configuration Manager toolkit
- URL, for downloading / Using the Configuration Manager toolkit
- server-based diagnostic tools / Using server-based diagnostic tools
- client-based diagnostic tools / Using client-based diagnostic tools
- connector
- used, for connecting to Exchange / Connecting to Exchange using the connector
- console
- endpoint protection point, deploying with / Deploying the endpoint protection point with the console
- used, for creating distribution points / Creating distribution points using the console
- console extensions, MDT
- installing / Installing the console extensions
- content actions
- about / Content actions
- content distribution errors
- troubleshooting / Troubleshooting content distribution errors
- content library
- about / Understanding the content library
- anatomy / Anatomy of the content library
- content library explorer tool
- content ownership tool
- using / Using the content ownership tool
- content source
- deduplication on / Deduplication on the content source
- control files
- inventory, controlling with / Controlling the inventory with control files
- custom boot images
- creating / Creating custom boot images
- custom charts
- creating / Creating custom charts
- data visualizations, configuring / Configuring data visualizations
- custom reports
- creating / Creating custom reports
- requisites / Defining the report requirements
- initial report layout, creating / Creating the initial report layout
- data source, adding to / Adding the data source to the report
D
- data deduplication
- working with / Working with data deduplication
- evaluating / Evaluating data deduplication
- data library
- about / Data library
- Data Replication Service (DRS) / Working with secondary sites
- dataset
- creating, for report / Creating the dataset for the report
- data source
- adding, to custom reports / Adding the data source to the report
- Dell Client Integration Pack (DCIP) / Searching and downloading drivers
- Dell TechCenter
- deployment database, MDT
- configuring / Configuring the deployment database
- deployment errors
- troubleshooting / Troubleshooting deployment errors
- deployment monitoring tool
- deployment packages
- about / Introducing deployment packages
- deployment share, MDT
- configuring / Configuring the deployment share
- design diagrams, design scenario example / Design diagrams
- design documentation, design scenario example
- delivering / Delivering the design documentation
- design scenario example
- business requisites / Business requirements
- new hierarchy, planning / Planning the new hierarchy
- business benefits, defining / Defining the business benefits
- design documentation, delivering / Delivering the design documentation
- design diagrams / Design diagrams
- desktop inventory
- requisites / Configuring the hardware inventory
- distribution point
- deduplication on / Deduplication on the distribution point
- distribution point certificate usage
- IIS, configuring for / Configuring IIS to use the distribution point certificate
- distribution point client certificate
- distribution points
- client certificate, creating for / Creating the client certificate for distribution points
- client certificate, requesting for / Requesting the client certificate for distribution points
- configuring, for certificates usage / Configuring distribution points to use certificates
- deploying / Deploying distribution points
- placement, planning of / Planning for the placement of distribution points
- placement, with fast connectivity / Placement of distribution points with fast connectivity
- placement, with slow connectivity / Placement of distribution points with slow connectivity
- creating, console used / Creating distribution points using the console
- creating, PowerShell used / Creating distribution points using PowerShell
- DNS entry
- creating / Creating the DNS entry
- DP job manager tool
- using / Using the DP job manager tool
- driver library
- maintaining / Maintaining a driver library
- driver packages
- used, for managing drivers / Managing drivers using driver packages
- assigning, to task sequences / Assigning driver packages to task sequences
- drivers
- adding, to boot images / Adding drivers to boot images
- managing, driver packages used / Managing drivers using driver packages
- searching / Searching and downloading drivers
- downloading / Searching and downloading drivers
- extracting / Extracting drivers and creating a repository
- importing, into Configuration Manager / Importing drivers into Configuration Manager
E
- e-mail delivery configuration, SQL Server TechNet Library
- EICAR
- endpoint protection, testing with / Testing endpoint protection with EICAR
- about / Testing endpoint protection with EICAR
- URL / Testing endpoint protection with EICAR
- elements, application
- exploring / Exploring the elements of an application
- requisites / Using application requirements
- dependencies / Using application dependencies
- detection methods / Using application detection methods
- simulated deployments / Using simulated deployments
- supersedence / Superseding applications
- endpoint protection
- deploying, in image / Deploying endpoint protection in your image
- monitoring / Monitoring endpoint protection
- testing, with EICAR / Testing endpoint protection with EICAR
- endpoint protection agents
- deploying / Deploying endpoint protection agents
- deploying, client settings policies used / Deploying agents using client settings policies
- endpoint protection definition updates
- deploying / Deploying endpoint protection definition updates
- software update point, setting up / Setting up the software update point
- automatic deployment rules, using / Using automatic deployment rules
- endpoint protection infrastructure
- configuring / Configuring the endpoint protection infrastructure
- endpoint protection point
- deploying / Deploying the endpoint protection point
- deploying, with console / Deploying the endpoint protection point with the console
- deploying, with PowerShell / Deploying the endpoint protection point with PowerShell
- endpoint protection policies
- creating / Creating endpoint protection policies
- deploying / Deploying endpoint protection policies
- errors
- tracing, with logfiles / Error tracing in Configuration Manager
- error tracing, Configuration Manager
- about / Error tracing in Configuration Manager
- logging options, modifying for components / Modifying the logging options for components
- location, finding for specific logfiles / Where to find specific logfiles
- example scenarios, compliance monitoring
- about / Example scenarios for compliance monitoring
- application-specific settings, monitoring / Monitoring application-specific settings
- unauthorized software applications, monitoring / Monitoring unauthorized software applications
- Exchange Active Sync (EAS) / Managing ActiveSync devices
- Exchange Server connector
- Extensible Authentication Protocol (EAP) / Managing Wi-Fi profiles with Configuration Manager
F
- fault-tolerant hierarchies
- designing / Designing fault-tolerant hierarchies
- fault tolerance
- in site systems / Fault tolerance in site systems
- in site-system roles / Fault tolerance in site-system roles
- Federal Information Processing Standards (FIPS) / Managing Wi-Fi profiles with Configuration Manager
- file library
- about / File library
- fully qualified domain name (FQDN) / How to enroll the certificate
- functionality, Internet-based client management
H
- hardware inventory
- configuring / Configuring the software and hardware inventory, Configuring the hardware inventory
- required settings, configuring / Configuring the required settings
- versus software inventory / Controlling the inventory with control files
- hardware requisites, WSUS
- hierarchy plan, design scenario example
- about / Planning the new hierarchy
- stated requisites, addressing / Directly addressing the stated requirements
- planning, for SQL Server configuration / Planning for the SQL Server configuration
- planning, for fault tolerance / Planning for fault tolerance and high availability
- planning, for high availability / Planning for fault tolerance and high availability
- hybrid images
- capturing / Capturing and deploying hybrid images
- deploying / Capturing and deploying hybrid images
I
- IIS
- configuring, for distribution point certificate usage / Configuring IIS to use the distribution point certificate
- image
- endpoint protection, deploying in / Deploying endpoint protection in your image
- image format
- deciding / Deciding on your image format
- images
- versions, maintaining / Maintaining versions on your images
- using, in virtual environments / Using images in virtual environments
- infrastructure
- designing, for software updates / How to design the infrastructure for software updates
- infrastructure, implementing for patching
- about / Implementing the infrastructure for patching
- single software update point, deploying / Deploying a single software update point
- multiple software update points, deploying / Deploying multiple software update points
- software update point design decisions / Software update point design decisions
- infrastructure, software updates
- placement, planning of software update points / Planning the placement of software update points
- existing WSUS server, using as source / Using an existing WSUS server as the source
- switching, planning of software update points / Planning for the switching of software update points
- initial report layout
- creating / Creating the initial report layout
- Internet-based client management
- working / How Internet-based client management works
- functionality / Functionality in Internet-based client management
- requisites / Requirements for Internet-based client management
- using / Using Internet-based client management
- Internet-based client management (IBCM) / Managing Internet-based devices
- Internet-based devices
- managing / Managing Internet-based devices
- inventory
- configuration, planning of / Planning the configuration of inventory
- controlling, with control files / Controlling the inventory with control files
- assets, tracking with / Tracking assets with the inventory
- build cycles, tracking with registry / Tracking build cycles with the registry
- reports, tracking with / Tracking with reports
- inventory cycles
- initiating, manually / Initiating inventory cycles manually
- inventory data
- using / Using the inventory data to your advantage
- applications, controlling with / Controlling applications with the inventory data
L
- Lenovo
- live devices
- patches, deploying to / Deploying patches to live devices
- local management point, secondary sites / The local management point
- logfiles
- errors, tracing with / Error tracing in Configuration Manager
- finding / Where to find specific logfiles
- reference / Where to find specific logfiles
- logging options
- modifying, for component / Modifying the logging options for components
M
- maintenance windows
- configuring / Configuring maintenance windows
- applying, to collections / Applying maintenance windows to collections
- management certificate
- creating / Creating the management certificate
- certificate template, creating / Creating the certificate template
- enrolling / How to enroll the certificate
- exporting / Exporting the management certificate
- uploading, to Windows Azure / Uploading the management certificate to Windows Azure
- management points
- configuring, for certificates usage / Configuring management points to use certificates
- MAPS
- MDT
- about / Integrating the Microsoft Deployment Toolkit
- integrating / Integrating the Microsoft Deployment Toolkit
- URL / Integrating the Microsoft Deployment Toolkit
- console extensions, installing / Installing the console extensions
- deployment share, configuring / Configuring the deployment share
- deployment database, configuring / Configuring the deployment database
- Microsoft Application Virtualization (App-V) / Deploying virtual applications
- Microsoft certificate authority
- reference / Preparing the certificate authority
- Microsoft Exchange connector
- Microsoft Management Console (MMC) / How to enroll the certificate
- mobile device legacy client management
- mobile devices
- enrolling, with Windows Intune / Enrolling mobile devices with Windows Intune
- MOF files
- about / Configuring the required settings
- reference / Preparing the MOF files
- multicast
- multiple trusted forests
- support, designing for / Designing to support trusted forests
N
- network caching
- about / Introducing network caching
- recommendations, for caching devices existence / Recommendations for where caching devices exist
- Network Device Enrollment Service (NDES) / Managing certificates with Configuration Manager
- nontrusted forests
- support, designing for / Designing to support nontrusted forests
O
- operating system deployment
- operating system deployment tasks
- components / Introduction to operating system deployment
- organizational unit (OU)
P
- package library
- about / Package library
- packages
- using, as primary deployment method / When to use packages
- usage scenarios / Usage scenarios for packages
- parameter
- creating, for report / Creating the parameter for the report
- patch compliance
- reporting / Reporting patch compliance
- obtaining, with compliance baseline / Obtaining compliance with a compliance baseline
- patches
- deploying, to pilot devices / Deploying patches to pilot devices
- deploying, to live devices / Deploying patches to live devices
- patches, deploying to pilot devices
- automatic deployment rules, creating / Creating automatic deployment rules
- Patch Tuesday / Introducing automatic deployment rules
- pilot devices
- patches, deploying to / Deploying patches to pilot devices
- PKI certificate requisites
- planning, certificates
- planning, Internet-based client management
- Policy Platform Client (PPC) / How the application model works
- Policy Spy tool
- using / Using the Policy Spy tool
- Request Machine Assignments option / Using the Policy Spy tool
- Evaluate Machine Policy option / Using the Policy Spy tool
- Request User Assignments option / Using the Policy Spy tool
- Evaluate User Policy option / Using the Policy Spy tool
- Reset Policy option / Using the Policy Spy tool
- Export Policy option / Using the Policy Spy tool
- PowerShell
- used, for setting up certificate services / Setting up certificate services using PowerShell
- endpoint protection point, deploying with / Deploying the endpoint protection point with PowerShell
- used, for creating distribution points / Creating distribution points using PowerShell
- predefined policy templates
- importing / Importing predefined policy templates
- primary sites
- location, determining / Determining the location of primary sites
- privacy statement, endpoint protection
- reference / About the Microsoft Active Protection Service
- Process Monitor, Sysinternals
- ProtectionService parameter / Deploying the endpoint protection point with PowerShell
- public key infrastructure (PKI) / Requirements for Internet-based client management
Q
- query performance
- optimizing / Optimizing query performance
R
- real-world scenarios
- about / Real-world scenarios
- content distribution errors, troubleshooting / Troubleshooting content distribution errors
- deployment errors, troubleshooting / Troubleshooting deployment errors
- site system errors, troubleshooting / Troubleshooting site system errors
- reference images
- creating / Creating reference images
- report
- creating / Creating the first report, Creating the second report
- parameter, creating for / Creating the parameter for the report
- results dataset, creating / Creating the results dataset
- data, formatting / Formatting and displaying the data
- data, displaying / Formatting and displaying the data
- dataset, creating for / Creating the dataset for the report
- Report Builder
- about / Report Builder
- used, for developing reports / Developing reports using Report Builder
- configuring, for Configuration Manager / Configuring Report Builder for Configuration Manager
- reports
- about / Tracking with reports
- inventory, tracking with / Tracking with reports
- developing, Report Builder used / Developing reports using Report Builder
- requisites / Requirements for reports
- report subscriptions
- configuring / Configuring report subscriptions
- creating / Creating report subscriptions
- editing / Creating report subscriptions
- deleting / Creating report subscriptions
- repository
- creating / Extracting drivers and creating a repository
S
- sample application deployment / Sample application deployment
- sample hierarchy
- designing / Designing a sample hierarchy
- secondary sites
- working with / Working with secondary sites
- client count / Client count
- traffic control / Traffic control
- local management point / The local management point
- secure communication setup
- about / Setting up a secure communication
- certificate authority, preparing / Preparing the certificate authority
- certificate templates, configuring / Configuring certificate templates
- security groups
- used, for controlling applications / Using security groups for application control
- server-based diagnostic tools
- using / Using server-based diagnostic tools
- DP job manager / Using the DP job manager tool
- collection evaluation viewer / Using the collection evaluation viewer tool
- content library explorer / Using the content library explorer tool
- content ownership / Using the content ownership tool
- servers patching scenario
- about / A sample scenario to patch servers
- customer requisites / Customer requirements
- maintenance windows, configuring / Configuring maintenance windows
- automatic deployment rules, configuring / Configuring automatic deployment rules and deployments
- deployments, configuring / Configuring automatic deployment rules and deployments
- service manager utility
- using / Using the service manager utility
- determining, for usage / Determining when to use the utility
- simulated deployments
- using / Using simulated deployments
- site-system roles, fault tolerance / Fault tolerance in site-system roles
- site system
- references / Troubleshooting site system errors
- site system errors
- troubleshooting / Troubleshooting site system errors
- site systems, fault tolerance / Fault tolerance in site systems
- site system server
- selecting / Selecting the appropriate site system server
- central administration site / When to use a central administration site
- location, determining of primary sites / Determining the location of primary sites
- secondary sites / Working with secondary sites
- SoftPaq Download Manage utility
- software inventory
- configuring / Configuring the software and hardware inventory
- versus hardware inventory / Controlling the inventory with control files
- software metering
- about / Making use of software metering
- metering retention, modifying / Modifying metering retention
- metering data, viewing / Viewing metering data
- unused software, removing with metering data / Removing unused software with metering data
- software update deployment
- software update groups
- software update infrastructure
- designing / Designing a software update infrastructure
- software update point component
- configuring / Configuring the software update point component
- software update points
- placement, planning / Planning the placement of software update points
- switching, planning of / Planning for the switching of software update points
- software updates
- about / Software updates
- infrastructure, designing for / How to design the infrastructure for software updates
- monitoring / Monitoring software updates
- compliance, viewing with reporting / Viewing compliance using reporting
- compliance, monitoring with baselines / Monitoring compliance with baselines
- software updates infrastructure
- capacity planning / Capacity planning of the software updates infrastructure
- software update synchronization
- working / How software update synchronization works
- on child sites / Synchronization on child sites
- standard images
- benefits, of deploying / Benefits of deploying standard images
- standard operating environment (SOE)
- System Center 2012 Data Protection Manager (DPM) / Backup and recovery in Configuration Manager
- System Center Endpoint Protection
- System Center Update Publisher 2011 (SCUP) / Additional backup tasks
T
- task sequences
- driver packages, assigning to / Assigning driver packages to task sequences
- used, for creating VHD files / Creating VHD files using task sequences
- creating, for VHD / Creating the task sequence for the VHD
- editing / Editing the task sequence
- thick images
- capturing / Capturing and deploying thick images
- deploying / Capturing and deploying thick images
- thin images
- deploying / Capturing and deploying thin images
- capturing / Capturing and deploying thin images
- threat alerts
- managing / Managing threat alerts
- threats
- responding to / Responding to threats
- traffic control, secondary sites / Traffic control
U
- unauthorized software applications, monitoring
- about / Monitoring unauthorized software applications
- configuration item, creating / Creating the configuration item
- configuration baseline, creating / Creating the configuration baseline
- software, removing / Removing the software where it is detected
- Unified Device Management (UDM) / Using Windows Intune
- Uniform Naming Convention (UNC) / Using automatic deployment rules
- Update Retriever
- about / Searching and downloading drivers
- URL, for downloading / Searching and downloading drivers
- use cases, compliance settings
- user interface
- used, for setting up certificate services / Setting up certificate services using the user interface
- user state migration (USMT)
- UTC
- about / Using automatic deployment rules
V
- VHD
- task sequences, creating for / Creating the task sequence for the VHD
- creating / Creating the VHD
- VHD files
- creating, task sequences used / Creating VHD files using task sequences
- virtual applications
- deploying / Deploying virtual applications
- virtual environments
- using / Using virtual environments
- images, using in / Using images in virtual environments
- Virtual Machine Manager (VMM) / Using images in virtual environments
- VPN profiles
- managing, with Configuration Manager / Managing VPN profiles with Configuration Manager
W
- web server certificate
- requesting / Requesting the web server certificate
- web server certificate template
- creating / Creating the web server certificate template
- Wi-Fi profiles
- managing, with Configuration Manager / Managing Wi-Fi profiles with Configuration Manager
- wide area network (WAN) / Deploying distribution points
- Windows Azure
- management certificate, uploading to / Uploading the management certificate to Windows Azure
- Windows Azure Management Portal
- Windows computers
- client certificate, creating for / Creating the client certificate for Windows computers
- Windows Deployment Services (WDS) / Creating distribution points using the console
- Windows Imaging Format (WIM) / Deduplication on the distribution point
- Windows Installer package (MSI) / Using application detection methods
- Windows Intune
- about / Using Windows Intune
- requisites / Requirements for Windows Intune
- URL, for TechNet documentation / Requirements for Windows Intune
- mobile devices, enrolling with / Enrolling mobile devices with Windows Intune
- Windows Intune connector
- deploying / Deploying the Windows Intune connector
- Windows Management Instrumentation (WMI)
- Windows Preinstallation Environment (WinPE) / Configuring the deployment database
- Windows Server Updates Services (WSUS) / Deploying endpoint protection definition updates
- Windows workstations
- client certificate, deploying for / Deploying the client certificate for Windows workstations
- workgroup computers
- certificates, deploying to / Deploying certificates to workgroup computers
- workstations patching scenario
- about / A sample scenario to patch workstations
- customer requisites / Customer requirements
- infrastructure, implementing for patching / Implementing the infrastructure for patching
- software update point component, configuring / Configuring the software update point component
- patches, deploying to pilot devices / Deploying patches to pilot devices
- patches, deploying to live devices / Deploying patches to live devices
- patch compliance, reporting / Reporting patch compliance
- WSUS
- about / Software updates