Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Microsoft System Center Configuration Manager
  • Table Of Contents Toc
Microsoft System Center Configuration Manager

Microsoft System Center Configuration Manager

By : Marius Sandbu
4.3 (4)
close
close
Microsoft System Center Configuration Manager

Microsoft System Center Configuration Manager

4.3 (4)
By: Marius Sandbu

Overview of this book

Microsoft Configuration Manager is both extensive and complex, and for many, it is the primary tool for Enterprise management. With each new release, Configuration Manager continually proves itself to be the ultimate solution for managing both clients and mobile devices.This book covers in detailed and easy-to-understand steps how to set up highly available Configuration Manager roles and backend services such as SQL, DNS, and AD. You will learn how to plan for high availability, what kind of roles there are, and how they scale.The book starts by examining what needs to be taken into account when planning for high availability before moving on to focus on the different roles and how they can be set up. The book will also go through different scenarios as well as various backup and recovery procedures. You will learn how to identify bottlenecks within the different components and create sample design scenarios for high availability on Configuration Manager. The book will also look at the different high availability options and how to deploy them.
Table of Contents (12 chapters)
close
close

Endpoint Protection


Endpoint Protection is an important feature, but if not properly configured will slow down much of your services. A common company might have different servers which host different services, such as e-mail servers, terminal servers, and file servers. These different services require different policies with regard to endpoint protection. With Configuration Manager, Microsoft has created a set of different standard policies, such as:

  • IIS

  • Exchange

  • Terminal server (RDS)

  • File servers

  • SQL servers

These should be applied accordingly in order to make sure that endpoint protection does not slow down the performance of, for instance, SQL. You can import these templates by navigating to Assets and Compliance | Endpoint protection | antimalware policies. Right-click and choose import, then you will get a list of different template policies. If you have another application that you are unsure of what policy you need, you should check if the producer has an antivirus exclusion list for that...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Microsoft System Center Configuration Manager
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon