Book Image

Deploying Microsoft System Center Configuration Manager

By : Jacek Doktór, Paweł Jarosz
Book Image

Deploying Microsoft System Center Configuration Manager

By: Jacek Doktór, Paweł Jarosz

Overview of this book

It becomes important to plan, design, and deploy configurations when administrators know that Configuration Manager interacts with a number of infrastructure components such as Active Directory Domain Services, network protocols, Windows Server services, and so on. Via real-world-world deployment scenarios, this book will help you implement a single primary site or multiples sites. You will be able to efficiently plan and deploy a multiple-site hierarchy such as central administration site. Next, you will learn various methods to plan and deploy Configuration Manager clients, secure them and make the most of new features offered through ConfigMgr 1706 like compliance, deploying updates operating systems to the endpoints. Then, this book will show you how to install, configure, and run SQL reports to extract information. Lastly, you will also learn how to create and manage users access in an ConfigMgr environment By the end of this book, you will have learned to use the built-in mechanism to back up and restore data and also design maintenance plan.
Table of Contents (19 chapters)
Title Page
Credits
About the Authors
www.PacktPub.com
Customer Feedback
Preface
5
Creating Client Settings for Servers and Workstations
11
Configuration Manager Assets
13
Site Server Maintenance Tasks

Summary


This chapter covered how to properly go through the process of ConfigMgr 1706 installation, which is not a hard task if you're well prepared. Main tasks included installing the operating system, MS SQL Server, and the rest of the prerequisites. Some configuration data also needs to be prepared, along with a few fundamental decisions that need to be made, which has been also covered in this chapter.

The next chapter covers configuring sites, boundaries, and boundary groups. Boundaries define networks for managed devices, while boundary groups are logical groups of boundaries. Proper configuration of these components is a cornerstone for successful installation and communication between server and clients.