Index
A
- actions
- about / Role-based administration
- Active Directory Forest method / The Configuration Manager's discovery methods
- Active Directory group discovery method / Client discovery and installation methods
- Active Directory Schema
- extending, for SCCM 2012 R2 / Extending the Active Directory schema for SCCM 2012 R2
- Active Directory security
- about / The Active Directory security
- ways / The Active Directory security
- best practices, URL / The Active Directory security
- Active Directory Security Group method / The Configuration Manager's discovery methods
- Active Directory system discovery method / Client discovery and installation methods
- Active Directory System Group method / The Configuration Manager's discovery methods
- Active Directory System method / The Configuration Manager's discovery methods
- Active Directory User method / The Configuration Manager's discovery methods
- administrative actions, Configuration Manager
- administrative user
- creating / Administrative users
- advanced custom report example
- about / Advanced custom report example
- alert actions
- postpone / Managing alerts
- edit comments / Managing alerts
- configure / Managing alerts
- enable / Managing alerts
- disable / Managing alerts
- refresh / Managing alerts
- delete / Managing alerts
- alerts
- configuring, for End Protection / Configuring alerts for Endpoint Protection
- managing / Managing alerts
- configuring / Configuring alerts
- subscribing to / Subscribing to alerts
- alerts, states
- active / In-console alerts
- cancelled / In-console alerts
- disabled / In-console alerts
- never triggered / In-console alerts
- postponed / In-console alerts
- Alert subscriptions
- about / Alert subscriptions
- All security scope / Security scopes
- Android operating system
- mobile application delivery, reference / Mobile application delivery
- antimalware policies
- creating / Creating client settings and antimalware policies
- working with / Working with antimalware policies
- default policy / Understanding the default antimalware policy
- scheduled scans setting / Understanding the default antimalware policy
- scan setting / Understanding the default antimalware policy
- default actions setting / Understanding the default antimalware policy
- real-time protection setting / Understanding the default antimalware policy
- exclusion setting / Understanding the default antimalware policy
- advanced setting / Understanding the default antimalware policy
- threat overrides setting / Understanding the default antimalware policy
- definition updates setting / Understanding the default antimalware policy
- custom antimalware policy, creating / Creating a custom antimalware policy
- importing / Importing and merging antimalware policies
- merging / Importing and merging antimalware policies, Merging policies
- Antimalware Software
- automatic removal / Automatic removal of antimalware software
- Application Catalog, computer agent device settings / Computer agent device settings
- application catalog web service point / Hierarchy-wide site system roles
- application catalog website point / Hierarchy-wide site system roles
- application deployments
- troubleshooting / Troubleshooting application deployments
- applications
- creating / Creating and managing applications, Creating applications
- managing / Creating and managing applications, Managing applications
- about / About applications
- deployment types / About deployment types
- User Device Affinity / User Device Affinity
- Windows Installer application, creating / Creating a Windows Installer application
- properties / Application properties
- dependencies / Dependencies
- revision history / Revision history
- importing / Exporting and importing applications
- exporting / Exporting and importing applications
- superseding / Superseding applications
- retirement / Application retirement and deletion
- deleting / Application retirement and deletion
- application virtualization deployment type
- Assessment and Deployment Kit (ADK) 8.1
- installing, for SCCM 2012 R2 / Installing ADK 8.1 for SCCM 2012 R2
- URL / Installing ADK 8.1 for SCCM 2012 R2
- asset intelligence synchronization point / Hierarchy-wide site system roles
- attack surface reduction / Attack surface reduction and server hardening
- Automatic Deploy Rules (ADR)
- creating, for definition updates / Creating autodeployment rules for definition updates
- automatic site assignment / Planning boundaries and boundary groups
- Azure pricing calculator
B
- Background Intelligent Transfer Service (BITS) / Background Intelligent Transfer Service device settings
- backup, SSRS
- performing / Backing up SSRS
- report server database, backing up / Backing up SSRS
- encryption keys backing up / Backing up SSRS
- custom report data files, backing up / Backing up SSRS
- report models, backing up / Backing up SSRS
- configuration files, backing up / Backing up SSRS
- baselines
- deployment / Baseline deployment
- best practices, for report development
- best practices, SSRS
- about / Reporting best practices
- BITS bandwidth limitations
- boundaries
- planning / Planning boundaries and boundary groups
- boundaries, functions
- automatic site assignment / Planning boundaries and boundary groups
- preferred site systems / Planning boundaries and boundary groups
- boundary groups
- built-in reports, Endpoint Protection
- top users by threats / Reporting in Endpoint Protection
- user threat list / Reporting in Endpoint Protection
- antimalware activity report / Reporting in Endpoint Protection
- infected computers / Reporting in Endpoint Protection
- infected computers report / Reporting in Endpoint Protection
- dashboard report / Reporting in Endpoint Protection
C
- central administration site
- about / Central Administration Site
- Central Administration Site (CAS)
- about / Hierarchy planning
- centralized system management
- Certificate Registration Point / Hierarchy-wide site system roles
- certificates, cloud distribution point
- creating / Creating certificates
- importing, in Windows Azure / Importing the certificates in Windows Azure
- Ciagent.log file
- CITaskManager.log file
- Classless Inter-Domain Routing (CIDR) / Planning boundaries and boundary groups
- client-to-server communications security / Client-to-server communications security
- client computer
- administering, remotely / Remotely administering a client computer
- client health alerts
- about / Configuring alerts
- client installation
- troubleshooting / Troubleshooting the client installation
- client policy device settings
- about / Client policy device settings
- mobile device client settings / Mobile device client settings
- compliance settings, for device settings / Compliance settings for device settings
- computer agent device settings / Computer agent device settings
- computer restart device settings / Computer restart device settings
- hardware inventory device settings / Hardware inventory device settings
- network access protection device settings / Network access protection device settings
- power management device settings / Power management device settings
- remote control device settings / Remote control device settings
- client settings
- about / Client settings
- simple schedule / Client settings
- custom schedule / Client settings
- priority, defining / Defining a priority
- Background Intelligent Transfer Service (BITS) device settings / Background Intelligent Transfer Service device settings
- client settings, Endpoint Protection
- cloud distribution point
- about / Cloud distribution points
- features / Cloud distribution points
- limitations / Cloud distribution points
- configuring / Cloud distribution points
- prerequisites / Cloud distribution points – prerequisites
- certificates, creating / Creating certificates
- creating / Creating the cloud distribution point
- DNS, configuring for / Configuring DNS for the cloud distribution point
- code-signing certificates
- collections
- configuring, to appear in collection view / Configuring collections to appear in the collection view
- security state view / Security state view
- about / Role-based administration
- associating, with individual roles / Associating security scopes and collections with individual roles
- compliance
- managing / Managing compliance
- settings, configuring / Configuring compliance settings
- configuration items / Configuration items and baselines, Configuration items
- configuration baselines / Configuration items and baselines, Configuration baselines
- baseline deployment / Baseline deployment
- evaluating / Compliance evaluation
- packs / Configuration packs
- authoring / Compliance authoring
- compliance, scenarios
- regulatory compliance / Managing compliance
- change verification / Managing compliance
- configuration drift / Managing compliance
- time to resolution / Managing compliance
- compliance settings
- configuring / Configuring compliance settings
- troubleshooting / Troubleshooting compliance settings
- Ciagent.log file / Troubleshooting compliance settings
- CITaskManager.log file / Troubleshooting compliance settings
- Dcmagent.log file / Troubleshooting compliance settings
- DCMReporting.log file / Troubleshooting compliance settings
- DcmWmiProvider.log file / Troubleshooting compliance settings
- compliance settings, for device settings / Compliance settings for device settings
- compliance states
- for baseline deployment / Compliance evaluation
- compliance states, for baseline deployment
- compliant / Compliance evaluation
- error / Compliance evaluation
- noncompliant / Compliance evaluation
- unknown / Compliance evaluation
- compliance strategy
- about / The compliance strategy
- parameters / The compliance strategy
- compliance strategy, parameters
- reporting / The compliance strategy
- alerting / The compliance strategy
- on-demand results / The compliance strategy
- computer agent device settings
- about / Computer agent device settings
- deployment deadline / Computer agent device settings
- Application Catalog / Computer agent device settings
- install permissions, configuring / Computer agent device settings
- PowerShell execution policy, specifying / Computer agent device settings
- Show notification for new deployment setting / Computer agent device settings
- computer restart device settings
- about / Computer restart device settings
- configuration baselines
- about / Configuration baselines
- exporting / Exporting configuration items and baselines
- configuration baselines, search filters
- revision / Configuration baselines
- compliance count / Configuration baselines
- noncompliance count / Configuration baselines
- failure count / Configuration baselines
- categories / Configuration baselines
- configuration items
- about / Configuration items and baselines
- search criteria / Configuration items
- general option / Configuration items
- type / Configuration items
- detection methods / Configuration items
- custom scripts method / Configuration items
- settings / Configuration items
- compliance rules / Configuration items
- supported platforms / Configuration items
- mobile device settings / Configuration items
- platform applicability / Configuration items
- summary / Configuration items
- progress / Configuration items
- completion / Configuration items
- purpose / Configuration baselines
- exporting / Exporting configuration items and baselines
- organization / Organization
- configuration items, search criteria
- revision field / Configuration items
- child field / Configuration items
- relationship field / Configuration items
- categories field / Configuration items
- device type field / Configuration items
- configuration items, types
- applications / Configuration items
- software updates / Configuration items
- operating system / Configuration items
- general / Configuration items
- Configuration Manager
- package / Introducing packages
- collection / Collections
- Distribution Point (DP) / Distribution Points
- deployment / Deployments
- Windows Intune subscription, adding to / Adding the Windows Intune subscription to Configuration Manager
- backing up / Backing up Configuration Manager
- restoring / Restoring Configuration Manager
- site server operating system crash, recovering from / Recovering from a site server operating system crash
- functional crash, recovering from / Recovering from a Configuration Manager functional crash
- backup process, used for migrating to new environment / Using backup and restore to migrate to a new environment
- restore process, used for migrating to new environment / Using backup and restore to migrate to a new environment
- moving, to new hardware / Moving Configuration Manager to a new hardware
- environment, building / Building a new Configuration Manager environment
- Configuration Manager's data elements
- about / System Center Data warehouse
- Configuration Manager, discovery methods
- Active Directory Forest / The Configuration Manager's discovery methods
- Active Directory Security Group / The Configuration Manager's discovery methods
- Active Directory System / The Configuration Manager's discovery methods
- Active Directory System Group / The Configuration Manager's discovery methods
- Active Directory User / The Configuration Manager's discovery methods
- Heartbeat / The Configuration Manager's discovery methods
- Network / The Configuration Manager's discovery methods
- Configuration Manager client agent
- installation methods / Client discovery and installation methods
- Configuration Manager compliance settings tool / Attack surface reduction and server hardening
- Configuration Manager console
- Configuration Manager environment
- Configuration Manager functional crash
- recovering from / Recovering from a Configuration Manager functional crash
- Configuration Manager infrastructure
- securing / Securing the Configuration Manager infrastructure
- security considerations / Building security into your hierarchy
- site systems, securing / Securing site systems
- Configuration Manager integration
- prerequisites / Cloud integration – prerequisites
- Configuration Manager sites
- about / Configuration Manager sites
- Configuration Manager toolkit
- configuration packs
- about / Configuration packs
- URL / Configuration packs
- configuration packs, types
- regulatory compliance / Configuration packs
- best practices / Configuration packs
- third-party software and hardware / Configuration packs
- connect-using section, SSRS
- Credentials stored securely in report server / Building a custom report
- Windows integrated security / Building a custom report
- console issues, troubleshooting
- about / Troubleshooting console issues
- console logging / Console logging
- WMI permissions, verifying / Verifying WMI permissions
- DCOM permissions, verifying / Verifying DCOM permissions
- CP Studio
- about / CP Studio
- custom client agent settings
- Endpoint Protection, deploying for / Deploying Endpoint Protection for custom client agent settings
- custom client device settings
- configuring, for EndPoint Protection / Configuring custom client device settings for Endpoint Protection
- custom packages
- about / Custom packages
- custom reports
- creating / Creating custom reports, Building a custom report
- development tool, using / Development tools
- chart, creating / Building a custom report
- interactive features, of Reporting Services / Interactive features of reporting services
- custom script detection method
- about / Custom script detection methods
- using, with PowerShell / Custom detection methods with PowerShell
D
- Data Discovery Record (DDR) / Client discovery and installation methods
- Dcmagent.log file
- DCMReporting.log file
- DcmWmiProvider.log file
- default programs, MSI files
- per-system attended / Programs in Configuration Manager
- per-system unattended / Programs in Configuration Manager
- per-system uninstall / Programs in Configuration Manager
- per-user attended / Programs in Configuration Manager
- per-user unattended / Programs in Configuration Manager
- per-user uninstall / Programs in Configuration Manager
- Default security scope / Security scopes
- definition updates
- synchronizing, SUP configured for / Configuring the SUP to synchronize definition updates
- auto deployment rules, creating / Creating autodeployment rules for definition updates
- delivery / Delivering definition updates
- denial of service / Configuration Manager's network security
- dependencies, application
- about / Dependencies
- deployment, Configuration Manager
- about / Deployments
- packages, combining with programs / Combining the use of packages, programs, collections, and deployments
- packages, combining with collection / Combining the use of packages, programs, collections, and deployments
- deployment deadline, computer agent device settings / Computer agent device settings
- deployment types
- about / About deployment types
- Microsoft application virtualization / About deployment types
- Windows Installer / About deployment types
- Script installer / About deployment types
- Windows mobile cabinet / About deployment types
- Nokia SIS file / About deployment types
- requirements, component / Requirements as a component of a deployment type
- global condition / Global conditions
- detection methods / Detection methods
- creating / Creating deployment types
- Windows Installer deployment type, creating / Creating a Windows Installer deployment type
- application virtualization deployment type, creating / Creating an application virtualization deployment type
- script-based deployment type deployment type, creating / Creating a script-based deployment type
- detection methods
- about / Detection methods
- creating / Creating detection methods
- for Windows Installer application / Detection methods for a Windows Installer application
- filesystem-based detection method, creating / Other detection methods
- registry-based detection method, creating / Other detection methods
- custom script detection method, creating / Custom script detection methods
- development tools, for custom reports
- about / Development tools
- Microsoft Report Builder / Development tools
- Microsoft Visual Studio / Development tools
- devices
- URL / Configuration items
- directory service auditing
- discovery methods, System Center Configuration Manager
- Active Directory system discovery / Client discovery and installation methods
- Active Directory group discovery / Client discovery and installation methods
- Network discovery / Client discovery and installation methods
- Distributed Component Object Model (DCOM) permissions
- verifying / Verifying DCOM permissions
- distribution point / Hierarchy-wide site system roles
- DNS
- configuring, for cloud distribution point / Configuring DNS for the cloud distribution point
- Domain Name System (DNS) / Cloud distribution points – prerequisites
E
- e-mail notifications
- configuring / Configuring e-mail notifications
- eavesdropping / Configuration Manager's network security
- encryption keys backup, SSRS
- services, reporting to Configuration Manager / Backing up SSRS
- RsKeyMgmt.exe / Backing up SSRS
- Endpoint Protection
- features / Endpoint Protection
- prerequisites / Prerequisites for Endpoint Protection
- planning for / Planning for Endpoint Protection
- role, installing / Installing the Endpoint Protection role
- software update point, setting up / Setting up a software update point for Endpoint Protection
- SUP, configuring to synchronize definition updates / Configuring the SUP to synchronize definition updates
- alerts, configuring for / Configuring alerts for Endpoint Protection
- custom client device settings, configuring for / Configuring custom client device settings for Endpoint Protection
- deploying, for custom client agent settings / Deploying Endpoint Protection for custom client agent settings
- status, monitoring / Monitoring the status of Endpoint Protection
- details, monitoring / Monitoring Endpoint Protection details
- reporting in / Reporting in Endpoint Protection
- Endpoint Protection, planning for
- client settings, creating / Creating client settings and antimalware policies
- antimalware policies, creating / Creating client settings and antimalware policies
- test collection, deploying to / Deploying to a test collection
- Endpoint Protection alerts
- about / Configuring alerts
- Endpoint Protection client
- about / The Endpoint Protection client
- installing / Installing the Endpoint Protection client
- settings / Understanding Endpoint Protection client settings
- Antimalware Software, automatic removal / Automatic removal of antimalware software
- removing / Removing the Endpoint Protection client
- definition updates, delivery / Delivering definition updates
- Endpoint Protection point / Hierarchy-wide site system roles
- Endpoint Protection status, monitoring
- collection / Monitoring the status of Endpoint Protection
- security state / Monitoring the status of Endpoint Protection
- operational state / Monitoring the status of Endpoint Protection
- enrolment point / Hierarchy-wide site system roles
- enrolment proxy point / Hierarchy-wide site system roles
F
- fallback status point / Hierarchy-wide site system roles
- features, Endpoint Protection
- licensing / Endpoint Protection
- customizable / Endpoint Protection
- separate client / Endpoint Protection
- filesystem-based detection method
- creating / Other detection methods
G
- global conditions
- about / Global conditions
- using / Global conditions
- Group Policy Management Console (GPMC) / Background Intelligent Transfer Service device settings
H
- hardware inventory
- URL, for guidelines / Hardware inventory device settings
- hardware inventory device settings
- Heartbeat method / The Configuration Manager's discovery methods
- hierarchy
- monitoring / Monitoring and maintaining the hierarchy
- maintaining / Monitoring and maintaining the hierarchy
- hierarchy-specific configurations
- role-based authentication / Planning and deploying sites
- resource discovery / Planning and deploying sites
- boundaries and boundary groups / Planning and deploying sites
- client settings / Planning and deploying sites
- hierarchy-wide roles, deploying on CAS
- system health validator point / Hierarchy-wide site system roles
- reporting services point / Hierarchy-wide site system roles
- hierarchy-wide site system roles
- about / Hierarchy-wide site system roles
- asset intelligence synchronization point / Hierarchy-wide site system roles
- top-level software update point / Hierarchy-wide site system roles
- Endpoint Protection point / Hierarchy-wide site system roles
- Certificate Registration Point / Hierarchy-wide site system roles
- hierarchy planning
- about / Hierarchy planning
- Configuration Manager sites / Configuration Manager sites
- central administration site / Central Administration Site
- primary site / Primary and secondary sites
- secondary site / Primary and secondary sites
- hierarchy structure
- planning / Planning your hierarchy structure
- HTTPS
- advantages / Client-to-server communications security
I
- IDMIF files
- in-console alerts
- about / In-console alerts
- installation, SSRS
- reference link / SQL Server Reporting Services installation
- installation methods, Configuration Manager client agent
- client push installation / Client discovery and installation methods
- software update point based installation / Client discovery and installation methods
- manual installation / Client discovery and installation methods
- logon script installation / Client discovery and installation methods
- group policy installation / Client discovery and installation methods
- upgrade installation / Client discovery and installation methods
- interactive features, of Reporting Services
- report parameters / Interactive features of reporting services
- interactive sorting / Interactive features of reporting services
- actions / Interactive features of reporting services
- document maps / Interactive features of reporting services
- subreport / Interactive features of reporting services
- Internet Information Services (IIS) / Building security into your hierarchy
- IP address ranges, as site boundaries
- IPSec configuration
L
- local administration, site system
- securing / Securing the site system's local administration
- audit account management category / Securing the site system's local administration
- audit policy change category / Securing the site system's local administration
- audit object access category / Securing the site system's local administration
M
- malware
- remediation status / Malware remediation status
- top malware / Top malware
- details, monitoring / Monitoring malware details
- Endpoint Protection details, monitoring / Monitoring Endpoint Protection details
- on-demand actions, performing / Performing on-demand actions for the malware
- management point / Hierarchy-wide site system roles
- man in the middle / Configuration Manager's network security
- Microsoft application virtualization deployment type
- about / About deployment types
- Microsoft Report Builder
- about / Development tools
- Microsoft tools
- using / Using Microsoft tools
- Microsoft Visual Studio
- about / Development tools
- MIF files
- misdirection attacks / Configuration Manager's network security
- mobile application delivery
- for iOS, reference / Mobile application delivery
- for Android operating system, reference / Mobile application delivery
- for Windows Phone 8 operating system, reference / Mobile application delivery
- for RT operating systems, reference / Mobile application delivery
- mobile device
- managing / Mobile device management
- managing, capabilities / Mobile device management
- enrolling / Mobile device enrollment
- enrolling, URL / Mobile device enrollment
- mobile device client settings
- about / Mobile device client settings
- mobile device management
- mobile device settings groups
- applying / Mobile device client settings
- MS SQL Server 2012
- installing / Installing MS SQL Server 2012
- URL / Installing MS SQL Server 2012
- Windows Server Update Services, installing / Installing Windows Server Update Services
- MS SQL Server failover cluster
N
- Network Access Protection (NAP)
- network access protection device settings
- Network Basic Input/Output System (NetBIOS) / Computer agent device settings
- Network discovery method / Client discovery and installation methods
- network issues
- identifying / Identifying network issues
- affecting site configuration / Network issues affecting the site configuration
- affecting client installation / Network issues affecting the client installation
- affecting software distribution / Network issues affecting the software distribution
- affecting site communications / Network issues affecting site communications
- network issues, troubleshooting
- about / Troubleshooting network issues
- network configuration issues / Network configuration issues
- connectivity issues / Troubleshooting connectivity issues
- Request Timed Out message / Troubleshooting connectivity issues
- Destination Host Unreachable message / Troubleshooting connectivity issues
- Destination Network Unreachable message / Troubleshooting connectivity issues
- name resolution issues / Name resolution issues
- blocked or unresponsive ports / Blocked or unresponsive ports
- timeout issues / Timeout issues
- issues, with Service Principal Name (SPN) / Issues with the Service Principal Name
- data replication service / Troubleshooting the data replication service
- Network method / The Configuration Manager's discovery methods
- network security, Configuration Manager
- about / Configuration Manager's network security
- misdirection attacks / Configuration Manager's network security
- spoofing attacks / Configuration Manager's network security
- eavesdropping / Configuration Manager's network security
- man in the middle / Configuration Manager's network security
- denial of service / Configuration Manager's network security
- client-to-server communications security / Client-to-server communications security
- server-to-server communications security / Server-to-server communications security
- site-to-site communications security / Site-to-site communications security
- nodes
- about / Role-based administration
- nodes, Resource Explorer / Using Resource Explorer
- NOIDMIF files
- Nokia SIS file cabinet deployment type
- about / About deployment types
O
- objects
- about / Role-based administration
- on-demand actions, malware
- performing / Performing on-demand actions for the malware
- Online System Center
- OSD
- deploying / Operating System Deployment
- features / Operating System Deployment
- about / Operating System Deployment
- out-of-band service point / Hierarchy-wide site system roles
P
- package
- about / Introducing packages
- programs / Programs in Configuration Manager
- collection / Collections
- Distribution Point (DP) / Distribution Points
- deployment / Deployments
- creating / Creating a package
- properties / Package properties
- creating, with package wizard / Creating a package with the new package wizard
- custom packages / Custom packages
- software, repackaging / Repackaging software
- testing / Testing packages
- conversion / Package conversion
- Package Conversion Manager (PCM)
- about / Package conversion
- URL / Package conversion
- package properties
- about / Package properties
- options / Package properties
- tasks / Package properties
- content, validating / Package properties
- content, redistributing / Package properties
- content, removing / Package properties
- program properties / Program properties
- packagers
- URL / Repackaging software
- package wizard
- used, for creating package / Creating a package with the new package wizard
- Policy-based management for SQL Server 2008 R2
- power management device settings
- about / Power management device settings
- PowerShell
- custom detection method, using with / Custom detection methods with PowerShell
- predefined roles, SSRS
- Content Manager / Role-based access control
- Publisher / Role-based access control
- Browser / Role-based access control
- Report Builder / Role-based access control
- My Reports / Role-based access control
- System Administrator / Role-based access control
- System User / Role-based access control
- preferred site systems / Planning boundaries and boundary groups
- prerequisites, cloud distribution point / Cloud distribution points – prerequisites
- prerequisites, Configuration Manager integration
- external dependencies / Cloud integration – prerequisites
- certificate, obtaining / Cloud integration – prerequisites
- keys, obtaining / Cloud integration – prerequisites
- internal dependencies / Cloud integration – prerequisites
- mobile device enrollment / Cloud integration – prerequisites
- URL / Cloud integration – prerequisites
- prerequisites, SCCM 2012 R2
- System Management container, creating / Creating the System Management container
- Active Directory Schema, extending for / Extending the Active Directory schema for SCCM 2012 R2
- Windows Server roles, installing / Installing Windows Server's roles and features
- Windows Server features, installing / Installing Windows Server's roles and features
- Assessment and Deployment Kit (ADK) 8.1, installing / Installing ADK 8.1 for SCCM 2012 R2
- primary site
- about / Primary and secondary sites
R
- registry-based detection method
- creating / Other detection methods
- remote assistance
- configuring / Configuring remote control and remote assistance
- providing, to client computer / Providing remote assistance
- remote control
- configuring / Configuring remote control and remote assistance
- using / Using a remote control
- remote control device settings
- about / Remote control device settings
- Report Builder
- about / Building a custom report
- reference link / Building a custom report
- report caching
- about / Report caching
- report definition language (RDL) / SQL Server Reporting Services
- reporting services point / Hierarchy-wide site system roles
- Reporting Services Point, SSRS
- accessing / Accessing SSRS Point
- report model
- reference link / Creating a report
- report performance, optimizing
- about / Optimizing SSRS performance
- subscriptions / Subscriptions
- report caching / Report caching
- report snapshots / Report snapshots
- report timeout values / Report timeout values
- best practices / Best practices for performance
- reports, Configuration Manager console
- about / Reports in the Configuration Manager console
- subscription, creating / Creating a subscription
- report security, managing / Managing SSRS report security
- creating / Creating a report
- custom reports, creating / Creating custom reports
- advanced custom report example / Advanced custom report example
- best practices / Authoring best practices for report development
- report server execution log
- report server HTTP log
- report server service trace log
- report snapshots
- about / Report snapshots
- reference link / Report snapshots
- report timeout values
- about / Report timeout values
- reference link / Report timeout values
- reserved names
- Resource Explorer
- using / Using Resource Explorer
- nodes / Using Resource Explorer
- Resultant Client settings
- URL / Client settings
- revision history / Revision history
- role-based administration
- about / Role-based administration
- role assignments, SSRS configuration
- about / Role-based access control
- creating / Role-based access control
- Role Based Administration (RBA) / Preventing unauthorized administrative access
- role definition
- about / Role-based access control
- roles
- about / Role-based administration
- RsKeyMgmt.exe
- about / Backing up SSRS
- RT operating systems
- mobile application delivery, reference / Mobile application delivery
S
- SCCM
- SCCM 2012 R2
- deploying, prerequisites / System Center Configuration Manager 2012 R2 – requirements
- prerequisites, URL / System Center Configuration Manager 2012 R2 – requirements
- prerequisites / Prerequisites for System Center Configuration Manager 2012 R2
- Active Directory Schema, extending / Extending the Active Directory schema for SCCM 2012 R2
- installing / Installing System Center Configuration Manager 2012 R2
- features / Managing compliance
- using / Operating System Deployment
- scopes
- about / Role-based administration
- script-based deployment type
- creating / Creating a script-based deployment type
- Script installer deployment type
- about / About deployment types
- secondary site
- about / Primary and secondary sites
- securable item
- about / Role-based access control
- SecuriAudit / Auditing the Configuration Manager's administrative actions
- Security Compliance Manager
- security considerations, Configuration Manager infrastructure
- Active Directory consideration / Building security into your hierarchy
- site selection / Building security into your hierarchy
- site system role assignment / Building security into your hierarchy
- Server placement / Building security into your hierarchy
- Security Information and Event Management (SIEM) / Auditing the Configuration Manager's administrative actions
- security role
- about / Security roles
- built-in roles / Built-in roles
- custom role / Custom roles
- scopes / Security scopes
- security scopes
- about / Security scopes
- All / Security scopes
- Default / Security scopes
- setting / Security scopes
- associating, with individual roles / Associating security scopes and collections with individual roles
- security software / Security software
- server-to-server communications security / Server-to-server communications security
- server hardening / Attack surface reduction and server hardening
- service-level agreements (SLAs) / Managing compliance
- Show Me concept
- about / Role-based administration
- Silect Software
- URL / CP Studio
- site-specific settings / Planning and deploying sites
- site-to-site communications security / Site-to-site communications security
- site administration
- site hierarchy, scenarios / Site administration
- site and SQL Server backups
- about / Site and SQL Server backups
- Configuration Manager, backing up / Backing up Configuration Manager
- Configuration Manager, restoring / Restoring Configuration Manager
- site database
- securing / Securing the site database
- site roles, deploying on multiple primary sites
- application catalog web service point / Hierarchy-wide site system roles
- application catalog website point / Hierarchy-wide site system roles
- distribution point / Hierarchy-wide site system roles
- fallback status point / Hierarchy-wide site system roles
- management point / Hierarchy-wide site system roles
- enrolment point / Hierarchy-wide site system roles
- enrolment proxy point / Hierarchy-wide site system roles
- out-of-band service point / Hierarchy-wide site system roles
- reporting services point / Hierarchy-wide site system roles
- software update point / Hierarchy-wide site system roles
- state migration point / Hierarchy-wide site system roles
- system health validator point / Hierarchy-wide site system roles
- sites
- deploying / Planning and deploying sites
- planning, URL / Planning and deploying sites
- deploying, URL / Planning and deploying sites
- planning / Planning and deploying sites
- site server alerts
- about / Configuring alerts
- site server operating system crash
- recovering from / Recovering from a site server operating system crash
- site system alerts
- about / Configuring alerts
- site system roles
- about / Site system server and roles
- Site database server / Site system server and roles
- Component server / Site system server and roles
- Management point / Site system server and roles
- Distribution point / Site system server and roles
- Reporting services point / Site system server and roles
- State migration point / Site system server and roles
- Software update point / Site system server and roles
- System health validator point / Site system server and roles
- Endpoint Protection point / Site system server and roles
- Fallback status point / Site system server and roles
- Out-of-band service point / Site system server and roles
- Asset intelligence synchronization point / Site system server and roles
- Application catalog web service point / Site system server and roles
- Application Catalog website point / Site system server and roles
- Enrollment proxy point / Site system server and roles
- Enrollment point / Site system server and roles
- URL / Site system server and roles
- site systems, Configuration Manager infrastructure
- securing / Securing site systems
- physical security / Physical security and hardware selection
- hardware selection / Physical security and hardware selection
- system software security / System software security
- attack surface reduction / Attack surface reduction and server hardening
- server hardening / Attack surface reduction and server hardening
- security software / Security software
- local administration, securing / Securing the site system's local administration
- site database, securing / Securing the site database
- network security / Configuration Manager's network security
- site system server
- about / Site system server and roles
- site administration / Site administration
- sites, planning / Planning and deploying sites
- sites, deploying / Planning and deploying sites
- hierarchy, monitoring / Monitoring and maintaining the hierarchy
- hierarchy, maintaining / Monitoring and maintaining the hierarchy
- software, repackaging
- about / Repackaging software
- references / Repackaging software
- common issues, avoiding / Avoiding common issues
- software deployment device settings
- about / Software deployment device settings
- software inventory device settings / Software inventory device settings
- software inventory device settings / Software inventory device settings
- software update point
- setting up, for Endpoint Protection / Setting up a software update point for Endpoint Protection
- Software Update Point (SUP) / Windows Server Update Services and Software Update Point
- software updates, troubleshooting
- about / Troubleshooting software updates
- Windows Server Update Services (WSUS) / Windows Server Update Services and Software Update Point
- Software Update Point (SUP) / Windows Server Update Services and Software Update Point
- spoofing attacks / Configuration Manager's network security
- SQL Report Builder 2012 R2
- download link / Development tools
- SQL security
- SQL Server best practices analyzer
- SQL Server failover cluster
- SQL Server versions, for Reporting Services Point
- reference link / SSRS requirements
- Srsrp.log
- SrsrpMSI
- Srsrpsetup.log
- SSRS
- about / SQL Server Reporting Services
- advantages / SQL Server Reporting Services
- implementing / Implementing SQL Server Reporting Services
- requisites / SSRS requirements
- reference link, for supported version / SSRS requirements
- installing / SQL Server Reporting Services installation
- configuring / SSRS configuration
- predefined roles / Role-based access control
- backing up / Backing up SSRS
- best practices / Reporting best practices
- troubleshooting / Troubleshooting SSRS, Troubleshooting SQL Server Reporting Services
- performance, optimizing / Optimizing SSRS performance
- reference link, for log files / Troubleshooting SQL Server Reporting Services
- SSRS, on Configuration Manager database server
- advantages / SSRS requirements
- disadvantages / SSRS requirements
- reference link / SSRS requirements
- SSRS, on dedicated server
- disadvantages / SSRS requirements
- advantages / SSRS requirements
- reference link / SSRS requirements
- SSRS configuration
- about / SSRS configuration
- role-based access control / Role-based access control
- Reporting Services Point, accessing / Accessing SSRS Point
- data source / Data sources
- state migration point / Hierarchy-wide site system roles
- status
- in Endpoint Protection, monitoring / Monitoring the status of Endpoint Protection
- subscriptions
- about / Subscriptions
- SUP
- configuring, to synchronize definition updates / Configuring the SUP to synchronize definition updates
- Surface Area Configuration tool / Attack surface reduction and server hardening
- System Center Configuration Manager
- discovery methods / Client discovery and installation methods
- System Center data warehouse
- about / System Center Data warehouse
- system health validator point / Hierarchy-wide site system roles
- System Management container
T
- test collection
- deploying to / Deploying to a test collection
- top-level software update point / Hierarchy-wide site system roles
- troubleshooting
- network issues / Troubleshooting network issues
- console issues / Troubleshooting console issues
- client installation / Troubleshooting the client installation
- compliance settings / Troubleshooting compliance settings
- application deployments / Troubleshooting application deployments
- software updates / Troubleshooting software updates
- SSRS / Troubleshooting SQL Server Reporting Services
- troubleshooting, SSRS
- log files / SSRS logs
U
- unauthorized administrative access
- preventing / Preventing unauthorized administrative access
- Active Directory security / The Active Directory security
- database level access, securing / Securing access at the database level
- Configuration Managers administrative actions, auditing / Auditing the Configuration Manager's administrative actions
- User Device Affinity
- about / User Device Affinity
- creating / User Device Affinity
- user or a group account
- about / Role-based access control
V
- Virtual Desktop Infrastructure (VDI) / Client settings
W
- WCM.log file / Windows Server Update Services and Software Update Point
- Windows application log
- Windows Azure
- cloud distribution point certificates, importing / Importing the certificates in Windows Azure
- URL / Importing the certificates in Windows Azure
- Windows Installer application
- creating / Creating a Windows Installer application
- detection methods / Detection methods for a Windows Installer application
- Windows Installer deployment type
- about / About deployment types
- creating / Creating a Windows Installer deployment type
- Windows Intune
- subscribing to / Subscribing to Windows Intune
- URL / Subscribing to Windows Intune
- subscription, adding to Configuration Manager / Adding the Windows Intune subscription to Configuration Manager
- Windows Intune connector role
- configuring / Configuring the Windows Intune connector role
- Windows Intune subscription
- adding, to Configuration Manager / Adding the Windows Intune subscription to Configuration Manager
- mobile device management / Mobile device management
- mobile device enrollment / Mobile device enrollment
- mobile application delivery / Mobile application delivery
- Windows Management Instrumentation (WMI) permissions
- verifying / Verifying WMI permissions
- Windows mobile cabinet deployment type
- about / About deployment types
- Windows Phone 8 operating system
- mobile application delivery, reference / Mobile application delivery
- Windows Security Configuration Wizard tool / Attack surface reduction and server hardening
- Windows Server features
- installing / Installing Windows Server's roles and features
- Windows Server roles
- installing / Installing Windows Server's roles and features
- Windows Server Update Services
- installing / Installing Windows Server Update Services
- Windows Server Update Services (WSUS) / Windows Server Update Services and Software Update Point
- workspaces
- about / Role-based administration
- WSUSCtrl.log file / Windows Server Update Services and Software Update Point
- Wsyncmgr.log file / Windows Server Update Services and Software Update Point
Z
- 7-Zip
- URL / Creating a package