Book Image

Microsoft System Center Configuration Manager Cookbook - Second Edition

By : Samir Hammoudi, Matthew Hudson, Greg Ramsey, Brian Mason, Chuluunsuren Damdinsuren
Book Image

Microsoft System Center Configuration Manager Cookbook - Second Edition

By: Samir Hammoudi, Matthew Hudson, Greg Ramsey, Brian Mason, Chuluunsuren Damdinsuren

Overview of this book

This practical cookbook is based on the 1602 current branch of System Center Configuration Manager (SCCM). It shows you how to administer SCCM, giving you an essential toolbox of techniques to solve real-world scenarios. Packed with over 60 task-based and instantly usable recipes, you’ll discover how design a SCCM Infrastructure, and dive into topics such as the recommended SQL configuration for SCCM and how to deploy Windows 10 with Operating System Deployment (OSD). You will learn to easily manage Windows 10 devices by deploying applications, software updates, and feature upgrades, andl be able to leverage Mobile Device Management (MDM) using SCCM and Microsoft Intune. Finally, you see how to gather the inventory of all your PC park and create reports based on it. By the end of the book, you will have learned the best practices when working with SCCM and have a handy reference guide for troubleshooting.
Table of Contents (15 chapters)
Microsoft System Center Configuration Manager Cookbook - Second Edition
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface

Introduction


Compliance settings in CM (also known as Desired Configuration Management (DCM) in the past- CM07) have improved greatly since CM12. While CM12 introduced the Remediation feature which could enforce a list of settings, CM Current Branch brings Compliance Settings to a whole new level by leveraging that existing feature to manage Mobile Devices without CM agent installed (enrolled via Microsoft Intune).

In CM Current Branch, Compliance Settings is used for two purposes:

  1. Enforce compliance settings to CM agent installed machines (such as Windows 10, Mac OS X, and Windows clients and servers).

  2. Enforce security policies to agentless mobile devices (such as iOS, Android, or Windows 10 Mobile devices).

This chapter will cover the first scenario and the following chapter will cover the mobile device scenario case.

There are a variety of ways to use compliance settings. The one you are already aware of is Software Updates, which are nothing more than a bunch of Configuration Items (CIs)...