Book Image

Deploying Microsoft System Center Configuration Manager

By : Jacek Doktór, Paweł Jarosz
Book Image

Deploying Microsoft System Center Configuration Manager

By: Jacek Doktór, Paweł Jarosz

Overview of this book

It becomes important to plan, design, and deploy configurations when administrators know that Configuration Manager interacts with a number of infrastructure components such as Active Directory Domain Services, network protocols, Windows Server services, and so on. Via real-world-world deployment scenarios, this book will help you implement a single primary site or multiples sites. You will be able to efficiently plan and deploy a multiple-site hierarchy such as central administration site. Next, you will learn various methods to plan and deploy Configuration Manager clients, secure them and make the most of new features offered through ConfigMgr 1706 like compliance, deploying updates operating systems to the endpoints. Then, this book will show you how to install, configure, and run SQL reports to extract information. Lastly, you will also learn how to create and manage users access in an ConfigMgr environment By the end of this book, you will have learned to use the built-in mechanism to back up and restore data and also design maintenance plan.
Table of Contents (19 chapters)
Title Page
Credits
About the Authors
www.PacktPub.com
Customer Feedback
Preface
5
Creating Client Settings for Servers and Workstations
11
Configuration Manager Assets
13
Site Server Maintenance Tasks

Introducing role-based administration and security


A ConfigMgr server as an automatic system in the hands of an inexperienced administrator is a very dangerous tool, and, unfortunately, there have been cases where unskilled administrators have erased all the data on all computers managed by the server.

For this reason, when deploying the server, it is very important to properly secure the server and grant access only to those people who should have access; this needs to be well planned as well.

Securing the environment against unwanted access to data or the console might be done by:

  • Turning on encryption of data that is exchanged between clients and the ConfigMgr server
  • Turning on HTTPS instead of HTTP and securing the communication between clients and ConfigMgr server using public key infrastructure (PKI)
  • Granting proper permissions to the console for users and groups only in a particular scope of objects with strictly defined permissions

Hardening the infrastructure

Hardening the environment...