Exam Ref 70-696 Managing Enterprise Devices and Apps - Plan and Implement Software Updates
Exam Ref 70-696 Managing Enterprise Devices and Apps - Plan and Implement Software Updates
70-247
Exam Ref Coniguring and Deploying a
Coniguring and
real-world mastery of coniguring and deploying a private cloud
with Microsoft System Center 2012 R2. Designed for experienced
Deploying a Private Cloud
certiication track.
Enterprise
•
•
•
•
Design and deploy System Center
Conigure System Center infrastructure
Conigure the fabric
Conigure System Center integration
Certiication
Microsoft Certiied Solutions
(MCSE) certiication for Private
Devices and Apps
• Conigure and deploy virtual machines and services
System Center.
Microsoft Certiied Solutions
• (MCSA) certiication for
• Windows Server 2012 is a prerequisite.
•
path from other Microsoft certiications.
networking in an enterprise environment—plus basic
microsoft.com/learning/certiication
and application coniguration
Certiication/Microsoft Cloud
Orin Thomas
www.allitebooks.com
From the Library of Ida Schander
PUBLISHED BY
Microsoft Press
A Division of Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052-6399
Copyright © 2014 by Orin Thomas
All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any
means without the written permission of the publisher.
Library of Congress Control Number: 2014951937
ISBN: 978-0-7356-9559-7
First Printing
Microsoft Press books are available through booksellers and distributors worldwide. If you need support related
to this book, email Microsoft Press Book Support at [email protected]. Please tell us what you think of
this book at http://www.microsoft.com/learning/booksurvey.
The example companies, organizations, products, domain names, email addresses, logos, people, places, and
events depicted herein are ictitious. No association with any real company, organization, product, domain name,
email address, logo, person, place, or event is intended or should be inferred.
This book expresses the author’s views and opinions. The information contained in this book is provided without
any express, statutory, or implied warranties. Neither the authors, Microsoft Corporation, nor its resellers, or
distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by
this book.
www.allitebooks.com
From the Library of Ida Schander
Contents at a glance
Introduction xiii
Index 345
www.allitebooks.com
From the Library of Ida Schander
This page intentionally left blank
www.allitebooks.com
From the Library of Ida Schander
Contents
Introduction xiii
Microsoft certiications xiii
Free ebooks from Microsoft Press xiv
Errata, updates, & book support xiv
We want to hear from you xiv
Stay in touch xiv
www.microsoft.com/learning/booksurvey/
v
www.allitebooks.com
From the Library of Ida Schander
Preparing RemoteApp applications 26
Publishing and coniguring RemoteApps 27
Managing connections to RemoteApp applications 28
Group Policy settings 29
Objective summary 32
Objective review 32
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Objective 1.1 34
Objective 1.2 35
Objective 1.3 36
vi Contents
www.allitebooks.com
From the Library of Ida Schander
Objective review 74
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Objective 2.1 115
Contents vii
www.allitebooks.com
From the Library of Ida Schander
Objective 2.2 116
Objective 2.3 117
Objective 2.4 118
Objective 2.5 119
Objective 2.6 120
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Objective 3.1 170
Objective 3.2 171
Objective 3.3 172
viii Contents
www.allitebooks.com
From the Library of Ida Schander
Chapter 4 Manage compliance and endpoint protection
settings 175
Objective 4.1: Build a coniguration item . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Overview of compliance settings 176
Coniguration items 176
Creating coniguration items 178
Create a child coniguration item 180
Coniguration item settings 182
Mobile device settings 183
Remediation 185
Objective summary 187
Objective review 187
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Objective 4.1 215
Objective 4.2 216
Objective 4.3 217
Contents ix
www.allitebooks.com
From the Library of Ida Schander
Chapter 5 Manage Coniguration Manager clients 221
Objective 5.1: Deploy and manage the client agent . . . . . . . . . . . . . . . . . 221
The Coniguration Manager client 222
Client installation 230
Extending the schema 234
Site systems used in client deployment 235
Client assignment 237
Client settings 238
Objective summary 240
Objective review 241
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Objective 5.1 265
Objective 5.2 266
Objective 5.3 267
x Contents
www.allitebooks.com
From the Library of Ida Schander
Hardware inventory collection 272
Extending hardware inventory 274
Software inventory collection 276
File collection 279
Managing inventory collection 280
Objective summary 284
Objective review 285
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Objective 6.1 311
Objective 6.2 312
Objective 6.3 313
Contents xi
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Objective 7.1 340
Objective 7.2 341
Objective 7.3 342
Index 345
www.microsoft.com/learning/booksurvey/
xii Contents
Microsoft certiications
Microsoft certiications distinguish you by proving your command of a broad set of skills and
experience with current Microsoft products and technologies. The exams and corresponding
certiications are developed to validate your mastery of critical competencies as you design
and develop—or implement and support—solutions with Microsoft products and technolo-
gies both on-premises and in the cloud. Certiication brings a variety of beneits to the indi-
vidual and to employers and organizations.
xiii
http://aka.ms/mspressfree
http://aka.ms/tellpress
The survey is short, and we read every one of your comments and ideas. Thanks in
advance for your input!
Stay in touch
Let’s keep the conversation going! We’re on Twitter: http://twitter.com/MicrosoftPress.
Sequencing an application
Sequencing enables you to create a special version of a normal application that can run in the
virtual environment the App-V client provides. In the sequencing process, the Application
Virtualization Sequencer records all the modiications the application makes to iles and set-
tings during installation.
For example, when you install an application, sequencing writes program iles to a particu-
lar directory, writes entries to the registry, and creates or modiies initialization (.ini) iles and
environment variables. The sequencing process records all the information necessary to run
the program within the environment the App-V client provides.
Custom installation
When you perform a custom application installation, you do not provide the Sequencer with
the path to the application installer. Instead, you perform the application installation out-
side the Sequencer and have it record the changes that occur to iles and settings. Custom
installation is similar to a standard installation except that for a custom installation, you must
manually trigger the installation rather than use the Sequencer to do this.
Sequencer options
Generally, the default Sequencer settings are appropriate for most application sequencing
procedures. In some instances, though, you will want to change some or all of the settings.
You can see the settings by clicking Options on the Tools menu of the Sequencer, which
opens the Options dialog box. The advanced settings include the following:
■ Scratch Directory Temporary iles are saved in this location.
■ Allow Microsoft Update To Run During Monitoring Microsoft Update runs during
the monitoring process. This setting is disabled by default.
■ Append Package Version To Filename The version number is added to the ile
name. When an application is resequenced, the version is increased by 1.
■ Always Trust The Source Of Package Accelerators The Sequencer does not gener-
ate a prompt when a package accelerator is not signed by a trusted source.
■ Parse Items The Sequencer monitors these areas of the ile system and settings
when sequencing an application.
■ Exclusion Items The Sequencer does not monitor these areas of the ile system and
settings when sequencing an application.
The App-V Sequencer also supports the following:
■ Package accelerators Package accelerators automate the sequencing process. They
are useful when you need to sequence a particular application frequently.
■ Add-ons or plug-ins You can use the Sequencer to create an add-on or plug-in to
extend the functionality of an application. For example, you could create an add-on for
a sequenced web browser or a graphic design program. When you install an add-on or
plug-in, you install the application irst and then add the component.
You can learn more about deploying the App-V Sequencer at http://technet.microsoft.com
/en-us/library/jj713464.aspx.
4. In the Add Applications dialog box, provide a name for the group and click Add to add
applications.
5. In the Specify Application dialog box, shown in Figure 1-2, select the application you
want to add to the group. Click OK.
7. In the Create Virtual Environment dialog box, review the applications that have been
added to the virtual environment, as shown in Figure 1-4, and then click OK.
EXAM TIP
Remember what steps you need to take to allow virtualized applications to share data.
2. Which services should you disable on the computer running Windows 8.1 x64
prior to sequencing the application?
Objective summary
■ A virtualized application is isolated from the host operating system and interacts indi-
rectly with it through the App-V client.
■ You should sequence an application on the same platform as you intend to run it.
■ Applications sequenced on x64 platforms cannot run on x86 platforms, but applica-
tions sequenced on x86 platforms can run on x64 platforms.
■ App-V Connection Groups allow virtualized applications to share data.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. You use the App-V Sequencer to sequence an x64 application on a computer running
Windows 8.1. Which of the following computers can run this application if the App-V
client software has been installed? (Choose the best answer.)
a. The x64 version of Windows 8.1
B. The x86 version of Windows 8.1
C. The x64 version of Windows 7
D. The x86 version of Windows 7
2. You want to allow two virtualized applications, App-A and App-B, to share data when
running on the same computer. Which of the following should you conigure to allow
this to occur? (Choose two. Each answer forms a complete solution.)
a. App-V Connection Group
B. App-V virtual environment
C. Plug-ins
D. Middleware application
App-V infrastructure
An App-V 5.0 deployment includes several elements, some of which must be present in all
App-V 5.0 models and some of which are used only in speciic App-V deployments.
These elements are as follows:
■ Management Server The Management Server hosts a Microsoft Silverlight–enabled
web application that App-V administrators use to manage the App-V infrastructure.
The Management Server must have a good connection to the Management Server
database. You can deploy the Management Server and Management Server database
on the same server or on different servers.
■ Publishing Server The Publishing Server is a web server that deploys applications to
App-V clients. In previous versions of App-V, the Publishing Server was known as the
streaming server. You deploy App-V applications to the Publishing Server in the App-V
full infrastructure model by using the App-V Management Server console. App-V 5.0
applications are streamed from the Publishing Server by using HTTP.
You can learn more about the full infrastructure model and the standalone model at
http://technet.microsoft.com/en-us/library/dn595131.aspx.
You can learn more about the Coniguration Manager integrated model at
http://technet.microsoft.com/en-us/library/jj822982.aspx.
Streaming applications
When applications are streamed, the application is available to the user as soon as enough of
the application has transferred from the server to the client that the application can start. You
can conigure streaming so that applications are available only when the client is online. You
might want to use this option with sensitive applications to which you want to control access.
You can also conigure streaming so that applications are available when the client is ofline.
In this situation, the application is stored in the client’s cache. Streaming sequenced applica-
tions use the .appv ile format.
Coniguring dependencies
An advantage of using Coniguration Manager as opposed to other deployment methods is
that you can conigure dependencies. When you conigure a dependency, the client checks
whether the speciied prerequisite software environment is present. In the case of sequenced
9. In the Add Dependency dialog box, type App-V Apps in the Dependency Group
Name box and then click OK.
10. In the Application Properties dialog box, click OK.
EXAM TIP
Remember the different App-V models.
Thought experiment
App-V deployment planning at Contoso
You are planning the deployment of App-V at Contoso. Your primary interest is the
ability to meter application usage and limit the number of concurrent instances of
application execution. Contoso does not have a Coniguration Manager deploy-
ment. With this information in mind, answer the following questions:
Objective summary
■ You can deploy App-V by using the full infrastructure, standalone, or Coniguration
Manager integrated model.
■ App-V applications can run only on computers on which a compatible App-V client is
installed.
■ App-V applications can stream from an App-V server or a Coniguration Manager
distribution point. This enables the applications to deploy more quickly.
■ When sequenced, App-V applications are available in .msi format. You can deploy
App-V applications locally in the same manner as you would deploy any other applica-
tion in .msi format.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. You have deployed the Coniguration Manager integrated model. You want to deploy
App-V applications to some of the computers in your organization; however, the
App-V client is not installed on every computer that is a Coniguration Manager client.
The App-V client should be deployed only to computers that need it to run applica-
tions. How can you ensure that computers that are subject to an App-V application
deployment are able to run those applications?
a. Deploy the App-V client to all computers.
B. Conigure the App-V client as a dependency for each App-V application.
C. Conigure each App-V application as a dependency for the App-V client.
D. Conigure each computer to subscribe to the RemoteApp feed.
2. You want to ensure that users with laptop computers have access to App-V applica-
tions only when they are on site. Which of the following strategies could you pursue to
accomplish this goal? (Choose two. Each correct answer provides a complete solution.)
a. Use the App-V full infrastructure model.
B. Use the standalone deployment model.
C. Use the Coniguration Manager integrated model.
D. Use RD Web Access.
3. Which of the following servers must you deploy to support the App-V full
infrastructure model?
a. Management Server
B. Publishing Server
C. Coniguration Manager site server
D. Remote Desktop Session Host server
Remote desktops
Remote Desktop Session Host servers (formerly known as Terminal Servers) provide users
with access to a full remote desktop experience. In this scenario, users securely connect to the
remote session through their local Remote Desktop Connection (RDC) client. From the users’
perspective, their desktop environment appears the same, even though it actually is running
on a remote server. Users have access to applications in the same way as if those applications
were running locally, even though the applications are running on the Remote Desktop
Session Host. Each user establishes his or her own private session that does not affect any
other users that are connected to the same Remote Desktop Session Host.
To access a remote desktop, the user account (or domain global group) of the connecting
user must be added to the Remote Desktop Users group on the computer to which he or she
is connecting. By default, this group has no members.
Installing the Remote Desktop Session Host role on a server automatically enables Remote
Desktop connections to the local computer. If you do not install the Remote Desktop Session
Host role, you can still enable Remote Desktop access to any Windows-based operating sys-
tem by modifying the system properties to allow remote connections. You can allow remote
connections and select the users who can connect remotely by using System Properties in
Control Panel.
Remote Desktop is well suited to single-task workers such as point-of-sale terminals or
data entry workers. In such scenarios, it is important to provide a consistent desktop
Remote applications
Users access Remote Application (RemoteApp) programs remotely through Remote Desktop
Services, but the programs appear as if they are running on the end user’s local computer.
These applications can appear on the Start menu like any locally installed application. Users
can interact with RemoteApp applications in the same manner that they interact with locally
installed applications. Running the application on the server avoids compatibility issues that
might prevent you from installing the application locally. RemoteApp is suited to applications
that you need to manage centrally or that require higher computing requirements than the
users’ desktops might have—for example, an application that requires large amounts of RAM
or one that requires intensive graphics processing. RemoteApp works with Windows clients
that include the Remote Desktop software and Windows RT clients on which the Remote
Desktop Connection app is installed.
You can access the feed by using the following URL: https://<fqdn of rdweb server>
/Rdweb/webfeed.aspx, or users can use their email addresses to subscribe to the feed. If you
intend to allow use of an email address to subscribe to the feed, create a TXT record on the
DNS server. The record name must be named _msadc, and the text ield must contain the URL
for the Remote Desktop web feed.
User settings
User settings are settings for particular groups of users connecting to remote computers. User
settings, shown in Figure 1-9, include the following categories:
EXAM TIP
Remember how to conigure a computer running Windows 8.1 or Windows 8 to subscribe
to the RemoteApp feed.
1. What method could you use to enable an intern to access x86 and x64
RemoteApp applications quickly?
2. What steps would you take to ensure that RemoteApp applications automatically
appeared on the Start screens of the Surface 2 devices the interns use?
Objective summary
■ Remote Desktop enables a user to access a desktop environment remotely that was
hosted on another computer where that desktop is displayed on the local device.
■ RemoteApp uses the same technology as remote desktop but involves displaying an
application that is running on a remote computer on a local device.
■ RD Web Access allows users to launch remote desktop sessions and RemoteApp ses-
sions from a specially conigured web page.
■ Group Policy settings enable you to conigure how a remote desktop and RemoteApp
are conigured.
■ Computers running Windows 8.1 and Windows 8 can subscribe to a RemoteApp feed
through Group Policy or through an item in Control Panel.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. What steps can you take to make RemoteApp applications automatically available to
users who have computers running Windows 8.1 that are joined to the domain while
expending the least amount of administrative effort?
a. Conigure a subscription to the Remote Desktop web feed by using Group Policy.
B. Conigure a subscription to the Remote Desktop web feed by using Control Panel.
C. Conigure the address of the RD Web Access server as the home page in Windows
Internet Explorer on each client.
D. Place shortcuts to each RemoteApp in a shared folder.
Objective 1.1
Thought experiment
1. You should sequence the application twice, once for the computers running
Windows 7 x86 and once for the computers running Windows 8.1 x64.
2. You should disable the Windows Defender and Windows Search services before
sequencing the application on a computer running Windows 8.1 x64.
Objective review
1. Correct answer: A
a. Correct: You should sequence an application on the platform on which you run
it. An x64 application can only be sequenced on an x64 version of an operating
system.
B. Incorrect: You cannot use an x86 version of Windows to sequence an x64
application.
C. Incorrect: You should sequence an application on the platform on which you run
it. Even though this might work, it is not the best answer because it is not the plat-
form on which it will be run.
D. Incorrect: You cannot use an x86 version of Windows to sequence an x64
application.
2. Correct answers: A and B
a. Correct: App-V Connection Groups allow virtualized applications to share data
when running on the same computer.
B. Correct: Virtual environments function in a similar manner to App-V Connection
Groups, but they use Coniguration Manager rather than an App-V server.
C. Incorrect: Plug-ins extend the functionality of the application. They don’t allow
virtualized applications to interact.
D. Incorrect: A middleware application type enables you to sequence middleware or
framework software that another sequenced application package requires.
3. Correct answer: D
a. Incorrect: You use a connection group when you need applications to share data
with each other.
B. Incorrect: The middleware application type enables you to sequence middleware
or framework software that another sequenced application package requires.
Objective 1.2
Thought experiment
1. Because you want to use application metering and instance limitation, the full infra-
structure model is appropriate.
2. The HTTPS protocol delivers streamed applications to clients.
Objective review
1. Correct answer: B
a. Incorrect: You should deploy the client only to computers that need it.
B. Correct: Coniguring the App-V client as a dependency will trigger a check to
verify that the App-V client is installed before attempting to deploy the applica-
tion. If the client is not present, it will be installed.
C. Incorrect: This sequence is reversed. The client should be a dependency for the
application.
D. Incorrect: RemoteApp is not related to the App-V client application.
2. Correct answers: A and C
a. Correct: You can conigure the App-V full infrastructure model so that App-V
applications are streamed and not stored in the cache. This means that the appli-
cation can run only if connectivity can be established.
B. Incorrect: This model involves local installation and allows ofline use.
C. Correct: You can conigure Coniguration Manager so that only streaming versions
of the app are deployed and conigure the cache so that applications are not avail-
able ofline.
D. Incorrect: Although it is possible to deploy App-V on a Remote Desktop Session
Host server to host virtualized applications, this is not an optimal solution to this
situation.
3. Correct answers: A and B
a. Correct: You need to deploy an App-V Management Server for the App-V full
infrastructure model.
B. Correct: You need to deploy an App-V Publishing Server for the App-V full infra-
structure model.
Answers Chapter 1 35
Objective 1.3
Thought experiment
1. You could conigure RD Web Access. Interns could access the RD Web Access website
and use it to launch RemoteApp applications.
2. You would subscribe the Surface 2 devices to the Remote Desktop web feed.
RemoteApp applications would automatically be published to the Surface 2 Start
screens.
Objective review
1. Correct answer: A
a. Correct: Coniguring a subscription to the Remote Desktop web feed by using
Group Policy accomplishes the objective with minimum administrative effort.
B. Incorrect: Coniguring a subscription to the Remote Desktop web feed by using
Control Panel involves substantial administrative effort.
C. Incorrect: Coniguring the address of the RD Web Access server as the home page
in Windows Internet Explorer on each client involves substantial administrative
effort.
D. Incorrect: Placing shortcuts to each RemoteApp in a shared folder involves sub-
stantial administrative effort.
2. Correct answer: C
a. Incorrect: The Remove-RDRemoteApp Windows PowerShell cmdlet enables you
to remove an existing RemoteApp application.
B. Incorrect: The Get-RDRemoteApp Windows PowerShell cmdlet enables you to
view the properties of a RemoteApp application.
C. Correct: The New-RDRemoteApp Windows PowerShell cmdlet enables you to cre-
ate a RemoteApp application.
D. Incorrect: The Set-RDRemoteApp Windows PowerShell cmdlet enables you to
modify an existing RemoteApp application.
Answers Chapter 1 37
39
Basic software information Options include location of iles Options include location of iles
used in the deployment and some used in the deployment and some
additional deployment settings. additional deployment settings.
Extended software and support The application model includes This feature is not part of the
information extended information. package model.
Multiple deployment options A single application can contain A package can contain multiple
multiple deployment types. programs.
Deployment option used The deployment type that Only one program is available
Coniguration Manager uses is per deployment; all clients in the
based on requirements, and it targeted collection run the same
determines which to use at run command.
time.
Revision history Revisions are maintained, and you Revision history is not maintained.
can revert the application to previ-
ous versions.
Uninstall action You can deploy applications to You always deploy packages by
install or uninstall an application. using the Install action.
State-based deployment By using detection methods, the Packages do not include a similar
Coniguration Manager client can feature.
determine the state of an applica-
tion in relationship to its action
and purpose and then perform the
appropriate actions if necessary.
There is some additional information that you can include in an application and not in a
package. This information includes:
■ General information, including administrative categories, date published, owners, and
support contacts.
EXAM TIP
Using a package is the best way to accomplish the goal of running a script by using
Coniguration Manager.
Detection methods
Detection methods enable you to deine how Coniguration Manager determines an applica-
tion’s installation state. Detection methods can query many aspects of the client operating
system, including the ile system and registry. For example, a detection method to determine
whether an application is installed would involve checking for a speciic registry key and
value.
Supersedence
Supersedence enables you to conigure a relationship between a new application and an
existing application that you have deployed. After you conigure supersedence, all future
deployments and Application Catalog requests receive the new application.
State-based deployment
The Coniguration Manager client periodically reevaluates the state of deployed applications
to verify that the current state matches the deployment purpose. For example, if an applica-
tion has been deployed as required and the user has uninstalled it, Coniguration Manager
will reinstall the required application. Similarly, if a required deployment uninstalls an applica-
tion and the user reinstalls it, Coniguration Manager will uninstall the application during the
evaluation cycle.
Monitoring
An important aspect of the application management process is to monitor deployments for
success or failure. Monitoring can involve several activities, including:
■ Examining status in the Monitoring workspace.
■ Reviewing application management reports.
■ Reviewing status messages.
■ Examining log iles.
Application Catalog
Application Catalog enables users to select and install applications automatically by placing
requests in a portal, which administrators can approve for installation, or, if specially conig-
ured, allow installation to occur.
Reporting services
The reporting services point is a site system that you install on a server that is running
Microsoft SQL Server Reporting Services (SSRS), which provides advanced reporting capabili-
ties and authoring tools for building reports. Use this server role to generate reports related
to application management.
You can run reports from the Coniguration Manager console or directly from the report-
ing services point website. You can save reports in a variety of formats. In addition to running
reports manually, the reporting services point supports report subscriptions, which are recur-
ring requests to deliver reports at speciic times or in response to events. In the subscription,
you can specify the application ile format of the report.
When you are planning for the reporting services point, consider the following:
■ You must install the reporting services point on a computer that is running the same
version of SSRS as that of the site database.
■ Each SSRS instance can support one site only.
■ You can install multiple reporting services points in your hierarchy.
■ If you install a reporting services point in a primary site, the reports show the data
collected from that site. However, reports that you run on a reporting services point in
the central administration site return data collected from the entire hierarchy.
Software Center provides users with some control over how and when software installs on
their devices. Users can perform the following actions by using Software Center:
■ Install software that has been deployed as Required to a user collection of which they
are members if the deployment deadline has not passed and they are allowed to do so.
■ Install software that has been deployed as Available to a device-based collection of
which the system is a member.
■ Monitor the status of deployed software. The statuses include Available, Install After,
Installing, Installed, or Failed.
■ Retry an installation that has failed.
■ Uninstall installed software if you conigure an uninstall command on the application
and do not require the software.
■ Manage their personal settings. On the Options tab, users can conigure the following
settings, provided the policies set in the applicable client settings allow them to do so:
■ Business Hours And Days Users can conigure their business hours and days and
conigure settings so their systems do not install software during business hours.
Application Catalog
Application Catalog is an optional component you can install for both intranet-based clients
and Internet-based clients. It functions as a self-service catalog from which users can request
software for installation.
Application Catalog uses two roles: the Application Catalog Web Service Point and the
Application Catalog Website Point roles. The Web Service Point role communicates with
the site server to retrieve application information. The Website Point role is the interface for
Application Catalog, and this role depends on the Web Service role. When users connect to
Application Catalog, the Website Point role passes requests and other communications to the
Web Service Point role, which in turn passes those communications to the site server.
You can customize the look of the Application Catalog website by using the Application
Catalog website point Properties dialog box. A user can navigate to the Application Catalog
website directly. Alternatively, Software Center provides a link to Application Catalog when
you conigure the Default Application Catalog website point in the applicable client settings.
Users can use the Application Catalog website point to:
■ Find available software.
■ Specify primary devices.
■ Manage available applications. On the Application Catalog tab, users can:
■ Search or browse Application Catalog for available software.
■ Install software available to a user-based collection of which they are members.
■ Request software that requires administrator approval.
■ Monitor the status of software requests on the My Application Requests tab.
■ Manage their primary devices. On the My Devices tab, users can:
■ Designate the current system as a primary device.
■ Manage their mobile devices. Users can view the status of their mobile devices and
wipe them remotely if necessary.
You can learn more about Application Catalog and Software Center at http://technet
.microsoft.com/en-us/library/hh489603.aspx.
Thought experiment
Coniguration Manager at Wingtip Toys
You are planning the use of Coniguration Manager for software deployment at
Tailspin Toys. You want to run a command from the C:\Windows\System32 folder
on all of the 15,000 Coniguration Manager clients in your organization but to do
so only once. You also want to ensure that the App-V version of an application is
deployed only on computers that are not a user’s primary device. With this informa-
tion in mind, answer the following questions:
1. What’s the best way to get Coniguration Manager to run the command?
2. What’s the best way to ensure that the App-V version of the application is
deployed correctly?
Objective summary
■ In System Center 2012 R2 Coniguration Manager, you can choose to deploy software
by coniguring what are termed applications, or you can use the traditional method of
coniguring what are termed packages and programs.
■ Applications contain built-in intelligence, such as the ability to deploy different types
of software based on the properties of the client device.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. Which of the following Coniguration Manager features is used to determine whether
an application has already been installed on a computer?
a. Detection method
B. Supersedence
C. User device afinity
D. Application Catalog
2. Which of the following Coniguration Manager features enables end users to request
software they can, after approval, deploy to their computers?
a. User device afinity
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 51
Tab Settings
General Information The settings that you can modify on this tab are:
■ Name You can modify the name of the application.
■ Administrator Comments You can modify any comments for
administrators.
■ Publisher You can modify the name of the software manufacturer.
■ Software Version You can modify the software version.
■ Optional Reference This is an optional ield.
■ Administrative Categories You can modify these categories that help
administrators locate content in the Coniguration Manager console.
■ Date Published You can use this setting to specify a date on which the
application was published.
■ Allow This Application To Be Installed From The Install Application
Task Sequence Action Without Being Deployed You can select this
check box when you want to use the application in a task sequence such as
an operating system deployment task sequence.
■ Owners You can modify the owners of the application.
■ Support Contacts You can modify the support contacts for the
application.
Application Catalog The only setting that you can modify on this tab is Selected Language. The follow-
ing options are conigurable for each language installed and apply to the language
selected. (The users can view all these options in Application Catalog.)
■ Localized Application Name This option displays the name the users
will see.
■ User Categories Use this option to specify categories that the user can
use to ilter applications in Application Catalog.
■ User Documentation Use this option to specify a URL for accessing user
documentation.
■ Link Text Use this option to add a descriptor to the documentation link.
■ Privacy URL Use this option to specify a URL to access company-speciic
privacy information.
■ Localized Description Use this option to specify a description for the
application.
■ Keywords Use this option to add keywords for users to use when search-
ing Application Catalog.
■ Icon Use this option to specify an application icon.
The language in Internet Explorer determines the language displayed when a client
connects to Application Catalog.
References You can use the Relationship Type drop-down list on this tab to view:
■ Applications That Depend On This Application.
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 53
Distribution Settings The settings that you can modify on this tab are:
■ Distribution Priority You can use this drop-down list to set the priority
for sending the package to other sites and distribution points in the same
site.
■ Distribute The Content For This Package To Preferred Distribution
Points If you select this check box, when a client requests this content
and it is not available on any of its preferred distribution points, the content
will be distributed automatically to the client’s preferred distribution points.
■ Prestaged Distribution Point Settings This section provides three
options for copying content to distribution points that are conigured to
support prestaged content:
■ Automatically Download Content When Packages Are Assigned
To Distribution Points You can use this option for smaller applica-
tions, such as Silverlight, that are only a few megabytes in size, where
bandwidth limitations will not affect their distribution.
■ Download Only Content Changes To The Distribution Point You
can use this option for applications that are quite large but receive
small updates. For example, Microsoft Ofice is an application with
an initial size of more than 700 megabytes (MB), and it receives small
software updates.
■ Manually Copy The Content In This Package To The Distribution
Point You can use this option for large packages, such as Ofice 2013,
or for situations in which bandwidth limitations are a concern. With this
option, the Coniguration Manager distribution manager process will
never send the application to the remote distribution point.
Deployment Types This tab displays the currently conigured deployment types and enables you to
manage the existing deployment types or add new deployment types.
Content Locations The Distribution Points or Distribution Point Groups dialog box displays the distri-
bution points and distribution point groups that have the application content.
Supersedence The Supersedence tab displays the applications that this application supersedes.
You can add, edit, or remove supersedence relationships by using this tab.
Security The Administrative Users section displays the user or groups that have administra-
tive rights to the application.
Software deployed as Required The software is installed automati- The software is installed automati-
that is at the deadline or beyond cally and silently. cally and silently.
Software deployed as Required The targeted user can start the Any user of the device can start
prior to the deadline installation from Software Center. the installation from Software
Center.
Software deployed as Available The user can request it from Any user of the device can start
Application Catalog. This might the installation from Software
require administrator approval. Center.
Deploy software without requiring This option installs the software You can use this option to install
a user to log on only on a user’s primary device, if software on any device.
present.
Who can use the software The user or users to whom the Everyone using the device can use
software was deployed can use it. the software.
Software types
The Application Management feature supports different kinds of software, including
Windows-based software and mobile device software. You can perform multiple actions
with software through System Center 2012 R2 Coniguration Manager, including installing
standard installations, performing custom installations, installing virtualized applications, and
uninstalling software. Each installation method that you deine is classiied as a deployment
type.
Applications contain deployment types, which in turn contain information about the iles,
commands, and programs used to install or uninstall software by using a particular method or
command.
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 55
The Create Deployment Type Wizard uses the following standard installation iles to create
the application and initial deployment type:
■ Windows Installer (*.msi File) This deployment type creates an application from a
Windows Installer ile.
■ Windows App Package This deployment type uses Windows Store apps (.appx iles).
■ Windows App Package (In The Windows Store) This deployment type enables
you to deploy applications directly from the Windows Store. This requires the users to
have a valid account for the Windows Store.
■ Script Installer This deployment type creates custom applications. For example, you
use this deployment type for *.exe iles or to deploy installation scripts.
■ Microsoft Application Virtualization 4 This deployment type creates an applica-
tion from a Microsoft Application Virtualization 4 manifest (.xml) ile.
■ Microsoft Application Virtualization 5 This deployment type creates an applica-
tion from a Microsoft Application Virtualization 5 package (.appv) ile.
■ Windows Phone App Package (*.xap File) This deployment type creates an
application by using a Windows Phone app package (.xap) ile.
■ Windows Phone App Package (In The Windows Phone Store) This deployment
type creates an application deployment based on a link to the application in the
Windows Phone Store.
■ Windows Mobile Cabinet This deployment type creates an application from a
Windows Mobile Cabinet (.cab) ile for supported Windows-based mobile devices.
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 57
Detection methods
A detection method is a procedure that enables the deployment process to determine
whether an application is present on a system. Detection occurs before the content is
installed and at regular intervals afterward and provides the following functions:
■ Preventing Coniguration Manager from reinstalling the application needlessly
■ Reinstalling a required application that the user has uninstalled, for example, through
Control Panel
■ Determining whether an application is present before running a deployed uninstall
command
When you create an application by using one of the automatic methods, Coniguration
Manager creates a detection method based on the installer ile used to create the applica-
tion. Generally, this is suficient for most deployments. However, when you create a deploy-
ment type manually or when you need more reinement, you can create enhanced detection
methods.
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 59
Dependencies
Dependencies deine one or more applications that must be installed before you run a
speciic deployment type. You can conigure dependent applications to install automatically
before a deployment type installs.
Dependencies are application deployment types that are added as a prerequisite for
another application’s deployment type. For example, assume that you have a custom applica-
tion that requires installation of a particular run time before the application installs. In this
case, you would create an application with the appropriate deployment type, which installs
the run time as a dependency on the custom application.
When deining a dependency, you create dependency groups. All dependent applications
are in one or more dependency groups. When you choose to allow dependent applications
to install automatically, each application in the group attempts to install in the order that the
group speciies, until one of the dependencies from the group is installed.
When creating a dependency, be careful not to create a circular reference, because then
the installation process will not install the applications.
User Primary device Is this device a primary device for the tar-
geted user?
Device Active Directory site Does this device belong to one of the listed
Active Directory Domain Services (AD DS)
sites?
Total physical memory Does this device meet the deined memory
requirement?
If the predeined global conditions do not meet your needs, you can create custom global
conditions. Administrator-created global conditions allow for a high level of customization.
You can create global conditions for Windows-based devices, Windows Mobile–based
devices, and Nokia devices. The available settings vary depending on the type of global con-
dition you are creating.
Examples of custom global conditions include:
■ Checking for a registry setting on a device.
■ Checking for a speciic coniguration of an application that the registry deines.
■ Verifying that a speciic .NET assembly is available.
■ Verifying an application version for an upgrade.
To create custom global conditions, in the Software Library workspace, in the Global Con-
ditions node, click Create Global Condition.
When you create a Windows-based global condition, you can check several aspects of
Windows-based computers. Table 2-5 describes the setting types you can conigure for evalu-
ation of applications to Windows-based computers.
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 61
Active Directory Query Use this type to construct a query that inds values in AD DS.
Assembly Use this type to specify an assembly from the global assembly cache to
assess as a global condition.
File System Use this type to specify a ile or folder to assess as a global condition.
IIS Metabase Use this type to specify the Internet Information Services (IIS) metabase
setting to assess as a global condition.
Registry Key Use this type to specify a registry key to assess as a global condition.
Registry Value Use this type to specify a registry value to assess as a global condition.
Script Use a discovery script to ind and return a value from the target system.
Structured Query Language Use this type to specify a Structured Query Language (SQL) query to
(SQL) Query assess as a global condition.
WQL Query Use this type to specify a Windows Management Instrumentation (WMI)
Query Language (WQL) script to assess as a global condition.
XPath Query Use this type to specify the XML ile path and XML Path Language (XPath)
query to assess as a global condition.
Requirements
Applications in System Center 2012 R2 Coniguration Manager and newer versions support
using multiple deployment types in each application. This is similar to a package containing
multiple programs. However, there are several differences. When you deploy a package and
program to a collection, the program will attempt to run on every member of the collection.
Deployment types have intelligence in the form of detection methods, dependencies, and
requirements that are not available with programs. This difference means that deployment
types run the installation software only on clients whose installation meets all the speciied
criteria and, therefore, is more likely to be successful.
With applications, you deploy the application and not the deployment types. When clients
receive a policy that includes an application deployment, the clients use the requirements in
the deployment types to determine the deployment type, if any, that they will use. You can
create multiple deployment types of the same type, such as a suite deploying different com-
binations of programs, depending on the department to which the user belongs.
When you deploy an application with multiple deployment types, the application-deploy-
ment evaluation cycle evaluates requirements for each deployment type for the target device
or user. After the target device or user satisies the requirements for a deployment type,
no other deployment types are evaluated, and Coniguration Manager uses the satisfying
deployment type. If the target device or user cannot satisfy the requirements for any of the
deployment types, the application does not attempt to run. When this happens, the status
shows that the device has not met the requirements of the application.
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 63
After creating or adding deployment types, you can adjust the priority with the Increase
and Decrease priority buttons on the Deployment Types tab in the application properties.
There are many reasons for creating requirements and as many ways to deine them:
■ To ensure that the application is installed only on a user’s primary device, use the pri-
mary device requirement from the User category.
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 65
User-deined afinity
You also can enable users to deine their own primary devices through Application Catalog.
First, conigure the Allow User To Deine Their Primary Devices user setting either in Default
Client Settings or in a custom client setting as shown in Figure 2-3:
Users then must start Application Catalog from the device they want to set as a primary
device, click the My Devices link, and then select the I Regularly Use This Computer To Do My
Work check box.
Administrator-deined afinity
There are three ways for administrators to deine user device afinity manually from the
Assets And Compliance workspace:
■ Select a device and then, on the ribbon, click Edit Primary Users.
■ Select a user and then, on the ribbon, click Edit Primary Devices.
■ Import a .csv ile.
You can learn more about task sequence action variables at http://technet.microsoft.com
/en-us/library/hh273365.aspx.
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 67
Content
You use the Content page, shown in Figure 2-5, to specify one or more distribution points or
distribution point groups that contain the content. If you have not previously distributed the
content to at least one distribution point or distribution point group, you must designate the
target distribution points or distribution point group at this time.
Deployment settings
On the Specify Settings To Control How This Software Is Deployed page, shown in Figure 2-6,
you can conigure the following settings:
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 69
Scheduling
On the Specify The Schedule For This Deployment page, shown in Figure 2-7, the options that
are visible in this section depend on how you deploy the application. When deploying an
application, consider the following scheduling options:
■ The default setting is to make the application available as soon as possible to ensure
that applications are available immediately.
■ You can conigure the application to be available at a speciic time.
■ When the application is deployed with the Available purpose, the available time is
based on Coordinated Universal Time (UTC).
User experience
On the Specify The User Experience For The Installation Of This Software On The Selected
Devices page, shown in Figure 2-8, you can conigure settings related to how end users inter-
act with the application deployment.
FIGURE 2-8 Specify The User Experience For The Installation Of This Software On The Selected Devices
If you deploy the application as Available, you can select one of the following options to
determine how users see user notiications:
■ Display In Software Center And Show All Notiications
■ Display In Software Center, And Only Show Notiications For Computer Restarts
If you deploy the application as Required, an additional user notiication option becomes
available: Hide In Software Center And All Notiications. In addition, the following two check
boxes become available for allowing actions outside a maintenance window when the instal-
lation deadline is reached:
■ Software Installation or Software Uninstall
■ System Restart (If Required To Complete The Installation) or Computer Restart (If
Required To Complete The Software Uninstall)
To support the deployment to Windows Embedded devices, System Center 2012 Conigu-
ration Manager SP1 introduced the Commit Changes At Deadline Or During A Maintenance
Window (Requires Restarts) setting under Write Filter Handling For Windows Embedded
Devices.
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 71
Thought experiment
Application deployment at Contoso
You want to deploy a new application to some of the computers in your organiza-
tion. A small number of computers in your organization don’t have enough memory
to run the application, and you want to avoid deploying the application to these
computers. You also want to verify that the deployment you have conigured will
reach all targeted computers. With this information in mind, answer the following
questions:
1. What can you do to ensure that the new application is deployed only to comput-
ers with enough RAM?
2. What should you do to verify that the deployment settings are correct?
Objective summary
■ When creating an application, you can either allow the wizard to detect settings auto-
matically from the installation iles or use the wizard to create the application
manually.
Objective 2.2: Deploy applications using Microsoft System Center 2012 Coniguration Manager CHAPTER 2 73
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. You want to make an application available to a user through Software Center, but the
application should be installed only if the user chooses to install it. Which of the fol-
lowing deployment settings would you conigure when running the Deploy Software
Wizard? (Choose two. Each correct answer forms part of a complete solution.)
Certiicate requirements
Depending on the mobile device operating system, you need certiicates or keys to enroll
mobile devices into your organization’s Intune subscription.
Windows Phone 8 and Code-signing certiicate. All side- Purchase a code-signing certiicate
Windows Phone 8.1 loaded apps must be code-signed. from Symantec.
Windows RT 8.1 and Windows RT ■ Sideloading keys allow ■ Obtain sideloading keys
installation of sideloaded from Microsoft.
apps. ■ Sign apps by using a code-
■ All apps that you sideload signing certiicate that an
must be code-signed. internal or other trusted
certiication authority (CA)
issues.
iOS5, iOS6, and iOS7 Apple Push Notiication service Obtain certiicate from Apple.
certiicate
You can learn more about preparing for Intune software deployment at http://technet
.microsoft.com/en-us/library/dn646955.aspx.
EXAM TIP
Remember the differences between deployment actions.
Thought experiment
Intune at Fabrikam
Fabrikam has just purchased a large number of Surface 2 devices for remote users.
Intune will manage these devices. Users must perform their own enrollment, and
then administrators at Fabrikam will deploy an important custom application that
runs on Windows RT. With this information in mind, answer the following questions:
2. Which keys and certiicates are required to deploy custom software to the
Surface 2 devices by using Intune?
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. Which of the following Intune policy settings would you conigure to set the deployed
application installation time to 4 P.M. each weekday?
a. Update And Application Detection Frequency
B. Automated Or Prompted Installation Of Updates And Applications
C. Allow Immediate Installation Of Updates That Do Not Interrupt Windows
D. Allow Logged On User To Control Windows Restart After Installation Of Scheduled
Updates And Applications
When you view a past revision, you are viewing a read-only copy of it. When you restore a
previous version of an application, Coniguration Manager creates a new revision.
If you no longer need to maintain a revision, you can delete it by clicking the Delete but-
ton. You cannot delete the latest revision. If you do not need the application or any of its revi-
sions, you can delete the application. However, you cannot delete an application if it is:
■ Referenced by any deployments.
■ Speciied as a dependency for another application.
■ Referenced in a task sequence.
■ Part of a virtual environment.
Retiring applications
You can retire an application at any time. Retiring an application prevents new deployments
of the application without uninstalling it. By retiring an application, you save all the work
and time you spent creating and customizing the application. Deployments based on retired
applications will continue to work as expected; however, you cannot create any new deploy-
ments from a retired application.
Although you cannot modify a retired application, you can reinstate the application when
desired. After reinstating an application, you can create new deployments of it. If a retired
Uninstalling applications
If you do not require an application in your environment, you can deploy it with an uninstall
action. However, the uninstall deployment will fail if an existing install deployment for the
software affects the clients targeted with the uninstall action. Therefore, before deploying an
uninstall action, remove the install deployments for the application that you are uninstalling.
You need to remove the install deployments affecting only the clients on which you want
to uninstall the application. If the uninstall deployment is in a separate application from the
install deployment, you can retire it with the install deployment.
Uninstalling an application will not uninstall any dependent applications. The uninstall
action uninstalls all instances of the software regardless of whether the application was
installed by Coniguration Manager, a manual process, or any other method. However, the
software to be uninstalled must be created as an application in Coniguration Manager with
an appropriate uninstall command.
Thought experiment
End of application life cycle at Contoso
An application that is widely deployed on computers will no longer be needed in
several months. With this information in mind, you are considering what strate-
gies to pursue when the application is no longer required. As part of the planning
process, answer the following questions:
Objective summary
■ Application management in Coniguration Manager enables you to upgrade or replace
existing applications by using a supersedence relationship.
■ When you supersede an application, you can specify a new deployment type to
replace that of the superseded application.
■ You can conigure whether to uninstall the superseded application.
■ When you supersede an application, the supersedence applies to all future deploy-
ments and Application Catalog requests.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. An application has been deployed on 30 percent of the desktop computers at your
organization. You want to stop new deployments of this application but don’t want to
remove existing instances of the application. Which of the following steps could you
take to accomplish this goal?
a. Retire the application.
B. Uninstall the application.
C. Supersede the application.
D. Install the application.
2. An application is deployed on 40 percent of the desktop computers at your organiza-
tion. Your superiors have chosen not to continue licensing the application, so now you
have to make sure that it is removed from these computers. No replacement appli-
cation has been chosen at this time. Which of the following steps could you take to
accomplish this goal?
a. Install the application.
B. Supersede the application.
C. Uninstall the application.
D. Retire the application.
3. You have decided to switch from one vendor’s application to another’s. The original
vendor’s application is present on 80 percent of the desktop computers at your orga-
nization. Which of the following steps could you take to replace the original vendor’s
application with a minimum of administrative effort?
a. Supersede the application.
B. Retire the application.
C. Uninstall the application.
D. Install the application.
INVENTORIED SOFTWARE
The list of inventoried software titles includes information about software that the Hardware
Inventory Agent reports. This node displays the following information by default for each
inventoried software title:
■ Product Name The name of the inventoried software
■ Publisher The name of the vendor that developed the software
■ Version The product version of the software title
■ Category The currently assigned software category
■ Family The currently assigned software family
■ Label (1, 2, and 3) The custom labels that have been assigned with the software
title, to a maximum of three
■ Software Count The number of Coniguration Manager clients that have inventoried
the software title
HARDWARE REQUIREMENTS
You can use Asset Intelligence hardware requirements to provide data to help verify that
computers meet hardware requirements for software titles before you target them for
deployment. Asset Intelligence retrieves from its catalog the hardware requirements that
appear in the Coniguration Manager console. The list is not based on inventoried software
title information from Coniguration Manager clients. You can add, modify, or delete
Software metering
Software metering enables you to monitor program usage on Coniguration Manager client
computers. You can summarize software-metering data to produce useful reports that can
help you plan for your organization’s software purchases.
Software metering can collect the following information:
■ Program usage information Includes start time, end time, meter data ID, resource
ID, user name, users of Terminal Services sessions, and whether Terminal Services is
running
■ File information Includes ile ID, ile name, ile version, ile description, and ile size
(in KB)
Summarization tasks
The Summarize Software Metering tasks perform data summarization to reduce the amount
of data the Coniguration Manager site database stores. Data summarization runs daily and
only runs against usage data that is older than 12 hours. Data summarization is required for
all Coniguration Manager software-metering reports to display meaningful data.
You should know when the summarization last occurred if you want to understand what
data the most current set of summary data contains. You can refer to the Software Metering
Summarization Progress report in Coniguration Manager to determine when the summariza-
tion last occurred.
The software-metering summarization tasks are:
■ Summarize Software Metering File Usage Data The Summarize Software
Metering File Usage Data task condenses software-metering ile usage data from
multiple records into one general record. This record provides information about the
program name, version, language, and number of distinct users over intervals of 15
minutes and 1 hour. This process compresses and optimizes the amount of data stored
EXAM TIP
Remember the purpose of software-metering rules.
1. What must you enable to view information about users who have run a speciic
executable?
2. You run an Asset Intelligence report to ind computers that multiple users are
using, but the report displays no records. How can you troubleshoot and correct
the issue?
Objective summary
■ In the Monitoring workspace of the Coniguration Manager console, you can monitor
all deployments, including software updates, compliance settings, applications, task
sequences, packages, and programs.
■ Applications in Coniguration Manager support state-based monitoring, which you can
use to track the last application deployment state for users and devices.
■ Asset Intelligence enhances Coniguration Manager’s inventory capabilities by extend-
ing hardware inventory and adding functionality for license reporting.
■ You can use Asset Intelligence hardware requirements to provide data to help verify
that computers meet hardware requirements for software titles before you target them
for deployment.
■ Software metering enables you to monitor program usage on Coniguration Manager
client computers.
■ The Software Metering Agent reports software-metering data based on the site’s
software-metering rules.
■ The Summarize Software Metering tasks perform data summarization to reduce the
amount of data that the Coniguration Manager site database stores.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. By default, what is the maximum number of automatically created Coniguration
Manager software-metering rules?
a. 10
B. 50
Distribution points
You can deploy distribution points on computers running server operating systems such as
Windows Server 2012 R2, on client operating systems such as Windows 8, and to Microsoft
Azure. Before you deploy a new distribution point, consider the following:
■ Association to boundary groups When you can associate a distribution point with
one or more boundary groups, it becomes a preferred distribution point for clients
within the boundary group’s boundaries. When you associate a distribution point with
a boundary group, you conigure the connection speed to the distribution point as
either Fast (the default) or Slow. Clients that are in an assigned boundary group
attempt to use their preferred distribution points for accessing content. For clients
outside the assigned boundary groups, you have the option of allowing fallback access
to the distribution point. If a preferred distribution point is not available to the client,
the client uses an available fallback distribution point.
■ Use of distribution point groups A distribution point group is a logical grouping
of distribution points that you can use to simplify content distribution to multiple dis-
tribution points. For example, if you distribute content to a distribution point group, all
distribution points that are group members receive the content. Beginning with System
Center 2012 R2 Coniguration Manager, if you add a new distribution point to an exist-
ing distribution point group, the content hosted on other members of the group will
automatically be added to the new distribution point.
You can associate collections with distribution point groups. This enables you to distribute
content to collections directly rather than having to specify distribution point groups during
deployment. Any distribution points that are members of a distribution point group that you
associate with a collection will receive the content that has been distributed to that collection.
■ Support for Internet-based or mobile clients To support Internet-based clients or
mobile clients, you must conigure the distribution point to accept HTTPS communica-
tion. The distribution point must have a valid public key infrastructure (PKI) web server
certiicate to use HTTPS communication. In addition, to support client authentication,
client computers must have a valid PKI client certiicate installed from a trusted certi-
ication authority (CA). Internet client support requires additional coniguration, such
as coniguring a fully qualiied domain name (FQDN), irewall access rules, and the
distribution point to support Internet-based clients. In many scenarios, cloud-based
distribution points replicate this functionality without the complexity of coniguring
communication.
■ Network connection speed to the content source location By default, all dis-
tribution points in a boundary group are conigured with a fast connection. When a
client is connecting to a fallback distribution point, which is one used when the one to
which the client was going to connect is unavailable, Coniguration Manager
Pull-distribution points
When you assign content to a pull-distribution point, the pull-distribution point copies the
content iles from the speciied distribution point. This reduces the processing usage of the
site server when distributing content to a large number of distribution points. Pull-distribu-
tion points support the same conigurations and functionality as typical Coniguration
Manager distribution points with the following exceptions:
■ You cannot conigure a cloud-based distribution point as a pull-distribution point or as
a source server for pull distributions.
■ You cannot conigure a distribution point on a site server as a pull-distribution point.
■ Prestaged content distribution settings override pull distribution. If you conigure the
content for prestaging, a pull-distribution point will not pull it.
■ Rate limit conigurations do not apply to pull-distribution points.
■ Retry settings do not apply to pull-distribution points. The Package Transfer Manager
service on the site server does not notify the pull-distribution point to start download-
ing the content until it has veriied that the pull-distribution point is available on a
source server.
■ If the pull-distribution point is in a remote forest, the Coniguration Manager client
must be installed on the distribution point, and the Network Access Account must be
able to access the source distribution point.
You can conigure a distribution point as a pull-distribution point during the creation of
the distribution point or after the distribution point is in place. When coniguring a distribu-
tion point as a pull-distribution point, you must also specify one or more source distribution
points. You can use only distribution points that support HTTP as source distribution points if
you are using the Coniguration Manager console. When coniguring multiple source distribu-
tion points, you can assign priorities to each.
You can learn more about Coniguration Manager irewall ports at http://technet.microsoft
.com/en-us/library/hh427328.aspx.
Content distribution
Client computers can access only content that has been distributed to distribution points.
Coniguration Manager places content iles in containers called packages. The distribution
process copies these packages to distribution points from the source iles in the source path.
Packages can host application deployment types, packages, deployment packages, operating
system images, driver packages, boot images, and task sequences.
To distribute content to distribution points, perform the following procedure:
1. In the Coniguration Manager console, click the Software Library workspace.
2. Expand the appropriate folder (Application Management, Software Updates, or
Operating Systems).
3. Access the node for the content that you need to distribute.
Updating content
When you change the source iles for speciic content, update the copy of the content on the
distribution points. When you update content on distribution points, Coniguration Manager
increments the package version and updates only the iles with changes.
To update content on distribution points, perform the following procedure:
1. On the Coniguration Manager console, click the Software Library workspace.
2. Expand the appropriate folder: Application Management, Software Updates, or
Operating Systems.
3. Access the node for the content you want to update.
4. Select the content and then, on the ribbon, click Update Distribution Points.
5. In the Coniguration Manager message that asks whether you want to refresh the
content, click Yes.
Prestaging content
Content prestaging enables you to transfer and preload content by using an ofline method
such as shipping media from a site server to a distribution point. You can use this method
instead of ile-based replication to reduce network trafic between the site server and the
distribution point. Content prestaging:
EXAM TIP
Remember the limitations of pull-distribution points.
Thought experiment
Content distribution at Contoso
You are reviewing the distribution of content at Contoso. You are particularly
concerned about when to prestage content and how to respond to application ile
corruption. With this information in mind, answer the following questions:
1. You suspect that the content for a speciic software application is corrupt on a
distribution point. How can you ix the problem?
Objective summary
■ Before you can use Coniguration Manager to deploy software to a client device, you
must have at least one distribution point that the client can access.
■ When you can associate a distribution point with one or more boundary groups, it
becomes a preferred distribution point for clients within the boundary group’s
boundaries.
■ When you associate a distribution point with a boundary group, you conigure the
connection speed to the distribution point as either Fast (the default) or Slow.
■ A distribution point group is a logical grouping of distribution points that you can use
to simplify content distribution to multiple distribution points simultaneously.
■ Associating a collection with a distribution point group enables you to distribute con-
tent to collections directly.
■ When you assign content to a pull-distribution point, the pull-distribution point copies
the content iles from the speciied distribution point.
■ Beginning with System Center 2012 Coniguration Manager SP1, you can use cloud-
based distribution points in Microsoft Azure to host a distribution point.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. Which of the following cannot be used with cloud distribution points? (Choose all that
apply.)
a. App-V streaming packages
B. Software update packages
C. Applications that are installed after being downloaded from the distribution point
D. Prestaged content
2. Which of the following Coniguration Manager log iles would you use to troubleshoot
the distribution of content from the site server to the distribution point?
a. Scheduler.log
B. Sender.log
C. PkgXferMgr.log
D. SMSPXE.log
3. Which of the following Coniguration Manager log iles would you use to view the cur-
rent status of the sender job to verify that content is queued properly for distribution?
a. SMSPXE.log
B. Scheduler.log
C. Sender.log
D. PkgXferMgr.log
4. Which of the following Coniguration Manager log iles would you use to troubleshoot
the copying of compressed content to the destination site during content distribution?
a. PkgXferMgr.log
B. Scheduler.log
C. Sender.log
D. SMSPXE.log
Objective 2.1
Thought experiment
1. Conigure a program to run the command.
2. Use user device afinity as a requirement when coniguring a deployment type.
Objective review
1. Correct answer: A
a. Correct: Detection methods enable you to deine how Coniguration Manager
determines an application’s installation state.
B. Incorrect: Supersedence enables you to conigure a relationship between a new
application and an existing application that you have deployed.
C. Incorrect: User device afinity is the process of associating a user with one or more
speciic devices.
D. Incorrect: Application Catalog functions as a self-service catalog from which users
can request software for installation.
2. Correct answer: B
a. Incorrect: User device afinity is the process of associating a user with one or more
speciic devices.
B. Correct: Application Catalog functions as a self-service catalog from which users
can request software for installation.
C. Incorrect: Supersedence enables you to conigure a relationship between a new
application and an existing application that you have deployed.
D. Incorrect: Detection methods enable you to deine how Coniguration Manager
determines an application’s installation state.
3. Correct answer: D
a. Incorrect: Detection methods enable you to deine how Coniguration Manager
determines an application’s installation state.
B. Incorrect: Supersedence enables you to conigure a relationship between a new
application and an existing application that you have deployed.
C. Incorrect: Application Catalog functions as a self-service catalog from which users
can request software for installation.
D. Correct: User device afinity is the process of associating a user with one or more
speciic devices.
Objective 2.2
Thought experiment
1. Conigure a global condition related to the amount of memory and use it with a
requirement so that deployment will occur only if the minimum amount of memory is
available.
2. You can perform a simulated deployment to verify that the deployment settings are
correct.
Objective review
1. Correct answers: A and C
a. Correct: You must choose the Install action to make the application available
through Software Center.
B. Incorrect: The Uninstall action removes an application.
C. Correct: The Purpose of Available makes the application available in Software
Center.
D. Incorrect: Choosing this option would ensure that the software was deployed,
independent of the user’s choice.
2. Correct answers: A and D
a. Correct: You must choose the Install action to make the application available
through Software Center.
B. Incorrect: The Uninstall action removes an application.
C. Incorrect: The Purpose of Available makes the application available in Software
Center.
D. Correct: Choosing this option would ensure that the software was deployed, inde-
pendent of the user’s choice.
Objective 2.3
Thought experiment
1. Users will download the Company Portal app from the Windows Store and use it to
enroll in Intune.
2. A sideloading key is necessary to sideload software. A code-signing certiicate the
Surface 2 devices trust is required to sign the custom software digitally.
Objective review
1. Correct answer: B
a. Incorrect: This policy setting determines the frequency with which new applica-
tion deployments will be detected.
B. Correct: This policy setting determines when updates and applications are
installed as scheduled and whether a user is prompted for installation.
C. Incorrect: This policy setting determines whether updates that don’t require a
restart are installed automatically.
D. Incorrect: This setting determines whether a logged-on user may control when
Windows restarts after the installation of an update or application that requires a
restart.
2. Correct answer: B
a. Incorrect: This policy setting determines the frequency with which new applica-
tion deployments will be detected.
Objective 2.4
Thought experiment
1. Retiring an application prevents new deployments of the application without uninstall-
ing the application. Uninstalling an application removes the application.
2. Uninstall deployments fail if there is an existing install deployment.
Objective review
1. Correct answer: A
a. Correct: Retiring an application blocks new deployments but doesn’t remove
existing deployed software.
B. Incorrect: Uninstalling an application removes it from computers on which it is
installed.
C. Incorrect: Superseding an application replaces one application with another.
D. Incorrect: Installing an application deploys a new application. It does not remove
or replace other applications.
2. Correct answer: C
a. Incorrect: Installing an application deploys a new application. It does not remove
or replace other applications.
Objective 2.5
Thought experiment
1. You must enable Software Metering to view information about users who have run a
speciic executable.
2. Ensure that all computers are conigured to audit logon events. Typically, you would do
this by using Group Policy.
Objective review
1. Correct answer: C
a. Incorrect: The default maximum number of automatically generated
Coniguration Manager software-metering rules is 100.
B. Incorrect: The default maximum number of automatically generated
Coniguration Manager software-metering rules is 100.
C. Correct: The default maximum number of automatically generated
Coniguration Manager software-metering rules is 100.
D. Incorrect: The default maximum number of automatically generated
Coniguration Manager software-metering rules is 100.
Objective 2.6
Thought experiment
1. You can redistribute the content to the distribution point, either from the properties of
the software application or package or from the distribution point itself.
2. You would prestage content when you need to distribute large iles to remote loca-
tions for which the time or expense required to transfer the content across wide area
network (WAN) links is prohibitive.
Objective review
1. Correct answers: A, B and D
a. Correct: You can’t use App-V streaming packages with cloud-based distribution
points.
B. Correct: You can’t use software update packages with cloud-based distribution
points.
C. Incorrect: You can use applications that are installed after being downloaded
from the distribution point with cloud-based distribution points.
D. Correct: You can’t use prestaged content with cloud distribution points.
123
You can learn more about System Center Updates Publisher at http://technet.microsoft
.com/en-US/library/hh134747.aspx.
EXAM TIP
Remember the process for using self-signed certiicates with SCUP.
SCUP options
Depending on the details of your SCUP deployment, you can choose to publish updates to a
WSUS server or to a WSUS server integrated with Coniguration Manager. Update Server
options, shown in Figure 3-1, enable you to conigure whether Updates Publisher 2011 pub-
lishes software updates to a WSUS update server and whether the update server is local or
remote and to specify the certiicate that Updates Publisher 2011 uses to publish software
updates. All software updates must be digitally signed when they are published. Use this
option when clients update using only WSUS.
ConigMgr Server options, shown in Figure 3-2, enable you to conigure how Updates
Publisher 2011 interacts with System Center 2012 R2 Coniguration Manager to publish soft-
ware updates. You should always publish to the top-level WSUS server in your Coniguration
Manager environment because this ensures that all child sites have access to SCUP published
updates. Use this option if Coniguration Manager manages software updates in your organi-
zation’s environment.
You can learn more about integrating SCUP with Coniguration Manager at http://technet
.microsoft.com/en-us/library/hh134775.aspx.
Trusted Publishers options, shown in Figure 3-3, enable you to conigure which publishers
SCUP trusts. This includes adding and removing trusted publishers. You can also view the cer-
tiicate of trusted publishers. You automatically add a publisher to the list of trusted publish-
ers when you import a catalog into SCUP and when you publish a software update.
Proxy Settings options, shown in Figure 3-4, enable you to conigure proxy settings when
you use SCUP to import software update catalogs from the Internet or when you publish
software update catalogs to the Internet.
Managing updates
After you have integrated SCUP into your organization’s updates infrastructure, you need to
start importing and publishing updates. You can add an update directly from a standalone
update ile, or you can subscribe to a vendor’s catalog ile. You use the four workspaces of the
SCUP console to accomplish these tasks.
Catalogs workspace
The Catalogs workspace enables you to add catalogs to SCUP. Catalogs are collections of
updates, usually from third-party vendors. Use the Catalogs workspace to subscribe to
software updates catalogs (including partner catalogs), to edit catalog subscriptions, and
to import software updates from catalogs into the Updates Publisher 2011 repository. After
the software updates are imported into the repository, you can publish or export them to an
external catalog. Figure 3-7 shows the Catalogs workspace.
EXAM TIP
Remember that you use the Catalogs workspace to subscribe to the updates catalogs that
third-party vendors publish.
Rules workspace
Applicability rules enable you to determine whether the computer that is the target of the
update has the prerequisites for the installation update. For example, Figure 3-8 shows an
applicability rule related to the Notepad.exe ile.
Thought experiment
Third-party software updates at Tailspin Toys
You are the server administrator at Tailspin Toys. Tailspin Toys uses WSUS to deploy
Microsoft software updates to client computers on its internal network. All of the
computers deployed at Tailspin Toys have software installed that was created by
a speciic third-party vendor. This third-party vendor publishes an update catalog
that is compatible with System Center Updates Publisher. You have deployed SCUP
on a computer running Windows Server 2012 R2. You have obtained a signing
certiicate from an internal CA. With this information in mind, answer the following
questions:
1. What steps can you take to minimize the complexity of obtaining and importing
updates from the third-party vendor into SCUP?
2. Which computers in the organization need to trust the CA that issued the sign-
ing certiicate installed on the SCUP server?
Objective summary
■ System Center Updates Publisher enables you to deploy third-party software updates
to WSUS or Coniguration Manager servers so that these updates can be deployed to
clients of these servers.
■ You can subscribe to update catalogs that third-party vendors publish. From these
catalogs, you can import updates.
■ You can publish updates or update bundles to WSUS or Coniguration Manager
servers.
■ Rules enable you to perform checks on clients to determine update applicability.
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 135
Deployment
When you install a software update point, you must conigure it to communicate with the
WSUS through the appropriate ports. By default, when you install WSUS on a computer run-
ning Windows Server 2012 or Windows Server 2012 R2, it creates a dedicated website for
WSUS and conigures ports 8530 for HTTP and 8531 for HTTPS.
A Coniguration Manager software update point has the following prerequisites:
■ WSUS 3.0 SP2 or newer The Software Updates feature requires WSUS 3.0 Service
Pack 2 (SP2) or newer for software-updates catalog synchronization and client scan-
ning for compliance assessments with respect to software updates. For Windows
Server 2008 R2, you must download and install WSUS and related prerequisites on a
system before coniguring that system as a Coniguration Manager site system for a
software update point. From Windows Server 2012 onward, WSUS is a built-in role.
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 137
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 139
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 141
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 143
Compliance states
When a client computer performs a deployment evaluation for software updates,
Coniguration Manager creates a state message that contains the software update’s com-
pliance state for each update that it is evaluating. Coniguration Manager then sends state
messages to the site server through the management point, which then inserts them in the
site database. A database summarization process occurs, which summarizes the results into
speciic compliance states. For each update, the Coniguration Manager console displays the
number of client computers in each compliance state.
Compliance states are as follows:
■ Required The software update is applicable to and required on the client computer.
The site server also might report this state for three scenarios:
■ If the software update is deployed but not installed
■ If the state messages have not been received on the site server
■ If the update requires a computer restart before it completes
■ Installed The software update has installed on the computer.
■ Not Required The software update is not applicable to the client computer.
■ Unknown The site server has not received any information about the speciic update
from the client computer. The site server might report this state for three scenarios:
■ The client computer’s compliance scan has not been reported.
■ The scan was not successful.
■ The scan was successful, but the state message has not been processed at the site
server due to a backlog state or a corrupt state message ile.
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 145
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 147
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 149
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 151
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 153
Page Description
General Enables you to conigure general information for the automatic deployment rule,
including the following:
■ Name Use to provide the name associated with the automatic deployment
rule.
■ Description Use to provide additional information about the rule.
■ Template Select a previously saved deployment template or use the built-in
Deinition Updates or Patch Tuesday templates. Create a deployment template
to save the current coniguration settings for the deployment during the wiz-
ard’s last step.
■ Collection Specify the collection that the software update deployment is
targeting.
■ Software Update Group Add software updates to an existing software
update group or ensure creation of a new software
update group each time the rule runs.
■ Enable The Deployment After This Rule Runs Specify whether the updates
deploy to clients immediately after rule evaluation. If you do not select this
option, you need to enable the deployment of the software update group
manually.
Software Updates Enables you to select the property ilters and specify the respective search criteria you
use to add software updates to the associated software update group.
Evaluation Enables you to specify a schedule for running a rule. By default, the evaluation schedule
Schedule is set to run after any software update-point synchronization. If you choose to run the
rule on a speciic schedule, you should ensure that the evaluation schedule does not
exceed the frequency of the synchronization schedule for the software update point.
User Experience Enables you to specify various options for the user experience. Three sections outline
the user experience:
■ User Visual Experience Use one of three options for user notiications selec-
tion: Display In Software Center And Show All
Notiications; Display In Software Center, And Only Show
Notiication For Computer Restarts; and Hide In Software Center And All
Notiications.
■ Deadline Behavior Specify activities that can take place outside a conigured
maintenance window. The options include Software Installation and System
Restart.
■ Device Restart Behavior Specify whether to suppress a restart for servers,
workstations, or both.
Alerts Enables you to specify criteria for generating a Coniguration Manager alert. You also
can specify alert behavior in relation to Operations Manager. For example, to minimize
false alerts, you might choose to disable Operations Manager alerts whenever software
updates install on a computer.
Deployment Enables you to select an existing deployment package or create a new deployment
Package package so that updates deploy from an automatic deployment rule. The deployment
package speciies the package source for the deployment. You must create and share
the package source folder that the deployment package uses. Each deployment pack-
age uses its own shared folder.
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 155
Distribution Points Enables you to specify the distribution points or distribution-point groups that host the
package iles for deployment. This page is visible only if you are creating a new deploy-
ment package.
Download Location Enables you to specify the location from which you download the software update
iles. If you have an Internet connection from the software update point, you can select
Download Software Updates From The Internet. If you do not have an Internet connec-
tion from the software update point, you can download the software updates manually
from a different computer and then store the iles on an accessible network location.
Language Selection Speciies the languages that you should download for each software update ile.
Summary The summary page enables you to verify the Automatic Deployment Rule Wizard set-
tings. You also can click the Save As Template button to save the settings that you want
to use for subsequent deployments. When you click the Save As Template button, you
can select the speciic settings that you want to include in the saved template.
Thought experiment
Deploying a Coniguration Manager software update point at Fabrikam
You are the server administrator at Fabrikam. You are planning the deployment of
Coniguration Manager, which you will initially use to manage software updates.
You have deployed WSUS 4.0 on a computer running Windows Server 2012 R2. This
computer will host only the WSUS role and no Coniguration Manager site system
roles. With this information in mind, answer the following questions:
1. What software element must you deploy on the site server if it is to host the
software update point role?
Objective summary
■ The Coniguration Manager software update point integrates with WSUS to allow soft-
ware updates to be deployed to Coniguration Manager clients.
■ The Coniguration Manager software update point integrates with WSUS 3.0 SP2 or
newer.
■ The software-updates synchronization process retrieves the metadata from an
upstream software update point or from Microsoft Update.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. You are coniguring the connection between the Coniguration Manager software
update point and a separate WSUS server hosted on a computer running the Windows
Server 2012 R2 operating system. This WSUS server is conigured using default ports
and is conigured to accept only secure (HTTPS) trafic. Which port will the
Coniguration Manager software update point need to use for a connection?
a. 8530
B. 8531
C. 80
D. 443
2. Which of the following log iles would you examine to review information about syn-
chronization between the software update point and a WSUS server?
a. Wsyncmgr.log
B. WSUSCtrl.log
C. SoftwareDistribution.log
D. ScanAgent.log
3. Which of the following compliance states indicates that an update should be deployed
to a client computer?
a. Unknown
B. Installed
C. Not Required
D. Required
Objective 3.2: Deploy software updates by using Coniguration Manager and WSUS. CHAPTER 3 157
3. In the Updates section, shown in Figure 3-13, conigure the following settings:
■ Name Type a name for the policy on the General page.
■ Update And Application Detection Frequency (Hours) Indicate how often you
want the client to check for updates.
■ Automated Or Prompted Installation Of Updates And Applications Conigure
whether updates and applications are installed automatically according to a sched-
ule, or the user is prompted for the installation of updates and applications.
■ Allow Immediate Installation Of Updates That Do Not Interrupt
Windows Specify whether updates that do not require a restart will be installed
immediately.
■ Delay To Restart Windows After Installation Of Scheduled Updates And
Applications (Minutes) Specify how long the computer will wait.
■ Allow Logged On User To Control Windows Restart After Installation Of
Scheduled Updates And Applications This option allows a signed-on user to
control whether a computer restarts after the installation of applications and
updates.
■ Prompt User To Restart Windows During Windows Intune Client Agent
Mandatory Updates Determines whether the user is prompted after the installa-
tion of a mandatory update that requires a restart.
Objective 3.3: Deploy software updates by using Microsoft Intune CHAPTER 3 159
Objective 3.3: Deploy software updates by using Microsoft Intune CHAPTER 3 161
Approving updates
To deploy updates to Intune clients, approve them in the Intune Administration console. To
approve an update, perform the following steps:
1. In the Intune Administration console, click Updates.
2. In the All Updates node, shown in Figure 3-16, select the update that you want to
approve and click Approve.
4. On the Deployment Action page, shown in Figure 3-18, select the approval status for
the update. You can choose from among Required Install, Do Not Install, Available
Install, and Uninstall. Then click Finish.
Objective 3.3: Deploy software updates by using Microsoft Intune CHAPTER 3 163
EXAM TIP
Remember that approval rules will work only if Intune manages the products and clas-
siications that are the subject of the rule. There’s no point creating an approval rule for
Windows 8.1 updates if Intune isn’t conigured to manage updates for Windows 8.1.
4. On the Update Classiications page, select the update classiications for which the rule
will perform an automatic approval. Then click Next. Figure 3-20 shows Critical
Updates and Security Updates selected.
Objective 3.3: Deploy software updates by using Microsoft Intune CHAPTER 3 165
5. On the Deployment page, select the Intune groups for which the automatic approval
rule will approve the update. You can also conigure an installation deadline for
updates approved by this rule. Then click Add. Figure 3-21 shows the All Computers
group selected and an installation deadline of 14 Days After Approval. Click Next to
proceed.
6. On the Summary page, click Finish to complete the installation of the updates.
Third-party updates
You can use Intune to deploy updates from vendors other than Microsoft. You do this by
manually uploading the update iles, which can be in .msi, .msp, or .exe format. To upload and
conigure a third-party update to Intune, perform the following steps:
1. In the Updates workspace of the Intune Administration console, click Upload under
Tasks.
2. On the Update Files page, select the ile you want to upload and click Next.
3. Select a classiication.
You can choose from among Updates, Critical Updates, Security Updates, Update
Rollups, or Service Packs. Then click Next.
4. On the Requirement page, select the operating system and architecture (x86 or x64)
requirements for the update and then click Next.
5. On the Detection Rules page, specify how Intune can check whether the update has
already been deployed on the Intune client.
This check can be performed by looking for an existing ile, an MSI product code, or a
speciic registry key. Click Next.
6. On the Prerequisites page, identify any prerequisite software required for update
installation and then click Next.
Objective 3.3: Deploy software updates by using Microsoft Intune CHAPTER 3 167
EXAM TIP
Remember that you can use SCUP or Intune to publish third-party updates to computers.
Thought experiment
Intune for update deployment for Contoso remote clients
You are responsible for managing software updates for remote clients at Contoso.
All remote clients use the Windows 8.1 operating system and run the same suite of
third-party applications. You want to ensure that any security and critical updates
are deployed as soon as possible. You will review other updates before deciding to
deploy them. With this information in mind, answer the following questions:
1. How can you ensure that Windows 8.1 security and critical updates are installed
as soon as possible?
2. What steps must you take to deploy updates for the suite of third-party
applications?
Objective summary
■ Intune can provide updates to clients on which the Intune agent is installed.
■ You select which updates Intune provides to clients, based on product and update
classiication.
■ When you manually approve updates, you select the group for which the update is
approved and specify a deployment action.
■ Automatic approval rules enable you to deploy updates automatically, based on prod-
uct and update classiication.
■ You can upload third-party updates to Intune and distribute them to Intune clients.
Objective 3.3: Deploy software updates by using Microsoft Intune CHAPTER 3 169
Objective 3.1
Thought experiment
1. Use the Catalogs workspace of the System Center Updates Publisher console to sub-
scribe to the update catalog the third-party vendor published.
2. The WSUS server and WSUS clients must trust the CA that issued the signing certiicate
installed on the SCUP server.
Objective review
1. Correct answer: B
a. Incorrect: The Installable rule type determines whether a target computer
requires a software update.
B. Correct: The Installed rule type determines whether an update is already present
on a computer.
C. Incorrect: Automatic approval rules are used with Intune to deploy updates auto-
matically, based on classiication and product.
D. Incorrect: Automatic deployment rules are used with Coniguration Manager to
deploy updates automatically, based on classiication and product.
2. Correct answer: C
a. Incorrect: You use the Updates workspace to manage updates and update
bundles, but you use the Publications workspace to remove a software update
from publication.
B. Incorrect: You use the Catalogs workspace to subscribe to updates catalogs that
third-party vendors publish.
C. Correct: You use the Publications workspace to remove a software update from
publication.
D. Incorrect: You use the Rules workspace to edit rules that determine whether an
update should be installed.
3. Correct answer: A
a. Correct: You specify whether an update requires a restart in the Restart Behavior
section.
B. Incorrect: You use the Impact section to specify how an update should be han-
dled—for example, whether it must be installed independently of other updates.
Objective 3.2
Thought experiment
1. You must ensure that the WSUS console is deployed on the site server, given that
WSUS is hosted on a separate server. This allows communication between the software
update point and the WSUS server.
2. You must ensure that the management point and distribution point roles are also
deployed.
Objective review
1. Correct answer: B
a. Incorrect: Port 8530 is used for HTTP communication in the default coniguration
of WSUS on Windows Server 2012 R2. You need to use port 8531 when coniguring
communication by using HTTPS.
B. Correct: You need to use port 8531 when coniguring communication by using
HTTPS.
C. Incorrect: Port 80 is usually reserved for HTTP trafic. With WSUS on Windows
Server 2012 R2, the default HTTP port is 8530.
D. Incorrect: Although port 443 is usually reserved for HTTPS trafic and was used
for secure communication with earlier versions of WSUS, more recent versions of
WSUS use port 8531 for HTTPS communication.
2. Correct answer: A
a. Correct: Located on the site server, the Wsyncmgr.log log ile provides information
about the software-updates synchronization process.
B. Incorrect: The WSUSCtrl.log log ile provides information about the coniguration,
database connectivity, and health of the site’s WSUS server.
C. Incorrect: The SoftwareDistribution.log log ile provides information about the
software updates that synchronize from the conigured update source to the WSUS
server database.
D. Incorrect: Located on the client computer, the ScanAgent.log log ile provides
information about the scan requests for software updates, which tool is requested
for the scan, and the WSUS location.
Objective 3.3
Thought experiment
1. Create an automatic approval rule that approves all critical and security updates for
computers running Windows 8.1.
2. Import third-party updates into Intune and then approve them for distribution.
Objective review
1. Correct answer: D
a. Incorrect: Automatic approval rules automatically approve updates based on
product and classiication. If the Windows 8 and Windows 8.1 updates are not
present in the Intune console, you need to change the update categories and clas-
siications settings.
B. Incorrect: You can upload third-party updates to Intune, but you should conigure
update categories and classiications to ensure that speciic Microsoft operating
systems and products are covered.
C. Incorrect: Update policies specify when and how updates will be deployed. You
do not use them to conigure which updates will be deployed.
D. Correct: You need to conigure update categories and classiications to ensure
that updates for Windows 8.1 will be available to your Intune deployment.
2. Correct answer: B
a. Incorrect: You conigure update categories and classiications to ensure that
updates for speciic products and for speciic classiications will be available to your
Intune deployment.
B. Correct: Update policies specify when and how updates will be deployed, includ-
ing whether a signed-on user can override a restart required to complete update
installation.
175
Coniguration items
Coniguration items contain one or more unique settings and values that you want to com-
pare for compliance evaluation. For example, does a particular registry key have a particular
setting, is a speciic software update installed, or is the most recent version of an installed
application deployed on the client?
Within a coniguration item, you specify the compliance settings you are evaluating and
the rules that should take effect based on those settings. You can use a single coniguration
item to evaluate multiple settings. When coniguring a compliance rule as part of a conigura-
tion item, you can deine the noncompliance severity that the client reports if the evaluation
reveals noncompliance. If the coniguration item supports remediation, you can specify the
setting in the coniguration item that you want to remediate—for example, changing a regis-
try key value from 0 to 1.
After completing the General page, the wizard takes different paths, depending on which
type of coniguration item you are creating. Table 4-1 describes the pages that appear for
each of the types.
Windows Detection Methods This page appears only if you selected the This
Coniguration Item Contains Application Settings check
box on the General page of the wizard. On the Detection
Methods page, you can specify the manner in which the
application is detected.
Supported Platforms On this page, you can conigure the Windows operating
systems that will assess this coniguration item for compli-
ance. If you selected the This Coniguration Item Contains
Application Settings check box on the General page, this
page appears after the Compliance Rules page.
Settings On this page, you can add new settings that you need to
monitor.
Compliance Rules On this page, you can add new compliance rules used to
evaluate the settings based on speciied conditions.
Mobile device Mobile Device Settings On this page, you select the Mobile Device Settings
Groups item that you want to evaluate in this conigura-
tion item. For each group that you choose, the wizard
adds a page.
Supported Platforms On this page, you select the mobile device operating sys-
tems that this coniguration item can evaluate. The sup-
ported platforms include:
■ Windows Mobile 6.1 and 6.5.
■ Nokia Symbian.
■ Windows Phone 8.
■ Windows RT.
■ Windows 8.1.
■ iOS 5, iOS 6, and iOS 7.
■ Android 4, Android 4.1, and 4.2.
Platform Applicability This page displays the mobile device settings that do
not support all the platforms that you speciied on the
Supported Platforms page.
Mac OS X Supported Platforms On this page, you select the Mac OS X operating systems
that this coniguration item can evaluate. The supported
platforms include Mac OS X 10.6, Mac OS X 10.7, and Mac
OS X 10.8.
Settings On this page, you can add new settings that you want to
monitor.
Compliance Rules On this page, you can add new compliance rules to evalu-
ate the settings based on speciied conditions.
Windows settings
When you create a Windows coniguration item, you can monitor several aspects of
Windows-based computers. The following list describes the setting types that you can moni-
tor for computers running Windows operating systems:
■ Active Directory Query Use this setting type to construct a query to ind values in
Active Directory Domain Services (AD DS).
■ Assembly Use this setting type to specify an assembly from the global assembly
cache to assess for compliance on computers.
■ File System Use this setting type to specify a ile or folder to assess for compliance
on computers.
■ IIS Metabase Use this setting type to specify the Internet Information Services (IIS)
metabase setting to assess for compliance on computers.
■ Registry Key Use this setting type to specify a registry key to assess for compliance
on computers.
■ Registry Value Use this setting type to specify a registry value to assess for compli-
ance on computers.
■ Script Use this setting type to specify two scripts:
■ A discovery script to identify and return a value
■ A remediation script to remediate the noncompliant setting
■ SQL Query Use this setting type to specify a SQL query to assess for compliance on
computers.
Mac OS X settings
You can monitor the following setting types on Coniguration Manager clients running the
Mac OS X operating system:
■ Mac OS X Preferences This setting type includes preferences within Mac OS X that
use the following data types on application IDs and keys: string, date and time, integer,
loating point, and Boolean.
■ Script This setting type allows a script to run that returns the value to be assessed for
client compliance.
Compliance rules
The simplest compliance rule to conigure is an Existential rule. Existential rules test whether
a setting exists. You can choose whether the compliance state exists or does not exist. In
addition to testing for existence, the File system setting also supports the following com-
pliance rule: File Exists The Following Number Of Times. This rule uses any of the available
operators to compare values from 0 through 9999.
Another type of rule is the Value rule. You use value rules to compare the current value in
the coniguration item to a speciied value by using one of the available operators. Some of
the setting types support more than just a simple comparison. For example:
■ The value rule for the Registry Key setting enables you to evaluate permissions on a
registry key for compliance.
■ The value rule for the File System setting enables you to evaluate the following
properties:
■ Date Modiied
■ Date CreatedSize (Bytes)
■ Product Name
■ File Version
■ Company
■ Secure Hash Algorithm 1 (SHA-1)
■ Attributes
Severity levels
Computers that do not comply with one or more of the objects or settings in the conigura-
tion item send a state message and a status message with one of the following noncompliant
severity levels:
■ None
■ Information
■ Warning
■ Critical
■ Critical With Event
Computers that do not comply with one or more of the objects or settings in the con-
iguration item log a Windows application event message (Event ID: 11857) of the type Error.
State messages and status messages the client sends have the noncompliant severity level of
Critical With Event.
Remediation
Coniguration Manager supports remediation only for the following coniguration items:
■ Registry values
■ Scripts
■ WQL query coniguration items
EXAM TIP
Remember which coniguration item types allow remediation.
2. Which coniguration item type could you use to determine whether a prohibited
application is installed on Coniguration Manager clients running the
Windows 8.1 operating system?
Objective summary
■ The Compliance Settings feature enables you to assess and manage coniguration set-
tings for Coniguration Manager clients.
■ Coniguration items contain one or more unique settings and values that you want to
compare for compliance evaluation.
■ Use the create a child coniguration item method to create a coniguration item that
inherits the properties of an existing coniguration item.
■ Use the copy existing coniguration items method to create a coniguration item with
the properties of an existing coniguration item but for which you want to modify
some settings.
■ Coniguration Manager maintains a revision history of each coniguration item. When
you modify a coniguration item, you do not lose the previous settings, and you can
still use the previous settings in a coniguration baseline.
■ Coniguration Manager supports the following noncompliant severity levels: None,
Information, Warning, Critical, and Critical With Event.
■ Coniguration Manager supports remediation only for the following coniguration
items: registry values, scripts, WQL query coniguration items, all mobile phone set-
tings, and Mac OS X Preferences (where the value type operator is set to Equals).
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
Coniguration baselines
A coniguration baseline is a group of coniguration items, software updates, and other con-
iguration baselines. If a system is noncompliant with one item in a coniguration baseline, it is
noncompliant with the coniguration baseline.
If you include coniguration items for multiple products and system settings in a single
baseline, you increase the baseline’s complexity. This makes managing the baseline more
dificult. A simpler approach is to create several single product or system settings baselines
and then deploy the baselines to the Coniguration Manager collections to which you want
to apply them. When you evaluate the baselines, the compliance results are easier for you to
analyze. You can use the same coniguration item in multiple coniguration baselines.
After you create a coniguration baseline, you can deploy it to a collection. This enables
that collection’s devices or primary devices of the collection’s users to download the conigu-
ration baseline and assess compliance with each of the baseline’s coniguration items.
You can use the evaluation results of the coniguration baseline to create a collection. If
the coniguration baseline contains coniguration items that do not support automatic reme-
diation, you can use this collection as a target so that an additional task can remediate the
issue. For example, you might use the coniguration items in a coniguration baseline to
detect a forbidden application. You then can create a collection based on the coniguration
baseline and deploy an application or package to uninstall the forbidden application.
You can create collections based on the following compliance states: Compliant, Error,
Non-Compliant, and Unknown. You can access the wizard for creating the collection by
selecting the coniguration baseline and then selecting the Deployment tab. When you select
a deployment on the Deployment tab, a Create New Collection menu appears on both the
ribbon and the Actions menu. You can use this option to create a query-based collection
according to the state you have chosen.
The following settings are available in the Deploy Coniguration Baselines dialog box:
■ Available Coniguration Baselines Use this list box to select any additional base-
lines you want to deploy as part of this deployment.
■ Selected Coniguration Baselines This list box displays the baselines that are
selected for this deployment.
Coniguration packs
Coniguration packs are predeined coniguration items or coniguration baselines that
Microsoft and other developers provide to organizations. These coniguration packs often
represent best-practice conigurations for common operating systems, server roles, services,
and programs. For example, some auditing irms use coniguration packs to assess whether an
organization complies with speciic regulations regarding computer coniguration.
You can download Microsoft and some non-Microsoft coniguration packs from the
Microsoft System Center Marketplace. In addition, you can ind coniguration packs created
by users on several Coniguration Manager community support websites. You also can add
existing Coniguration Manager 2007 coniguration packs to System Center 2012 R2
Coniguration Manager by using the import functionality.
After you download and import a coniguration pack, you can use the coniguration items
and coniguration baselines as they are. Alternatively, you can use them as a starting point for
your own coniguration settings and then modify the imported coniguration packs to meet
your requirements.
Compliance monitoring
Like all deployments, you can monitor the compliance baseline deployments in the
Monitoring workspace in the Deployments node. When you select a compliance deployment,
the preview pane displays the following:
■ General information This section includes the name of the deployment and the
target collection.
■ Compliance statistics This section includes a pie chart displaying the relative num-
ber of Compliant, Error, Non-Compliant, and Unknown client systems. The total asset
count and the time of the summarization appear with a link to a detailed status view.
■ Related objects This section includes links to the target collection and the deployed
baseline.
EXAM TIP
Remember that you can use the compliance results as the basis for creating new
collections.
1. Which report would you use to determine the speciic coniguration items in a
baseline that are triggering noncompliance when applied to a collection?
2. Which report would you view to determine the compliance trend for a conigu-
ration baseline?
Objective summary
■ A coniguration baseline is a group of coniguration items, software updates, and other
coniguration baselines.
■ You can group coniguration items into coniguration baselines.
■ You deploy coniguration baselines to client systems to evaluate compliance and
(potentially) perform remediation.
■ You can use the evaluation results of the coniguration baseline to create a collection.
■ Coniguration packs are predeined coniguration items or coniguration baselines that
Microsoft and other developers provide to organizations.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. Which of the following can you include in a coniguration baseline? (Choose two. Each
correct answer provides a complete solution.)
a. Coniguration item
B. Antimalware policy
C. Windows Firewall policy
D. Software updates
Prerequisites
To implement Endpoint Protection within your Coniguration Manager primary site or hierar-
chy, you must meet the following prerequisites:
■ Endpoint Protection point Before you can install the Endpoint Protection client on
workstations, you must install and conigure an Endpoint Protection Point Site System
Client settings
You can use Default Client Settings to apply Endpoint Protection installation settings to all
clients within the hierarchy. You would create and conigure a Custom Client Device Settings
item if you needed to apply unique settings to members of a speciic collection. For example,
you might want to deploy Endpoint Protection to a small group of computers irst to test it
before you deploy it to the entire hierarchy. Over time, you can add clients to the target col-
lection to provide a phased deployment.
The Endpoint Protection section provides several settings that relate to the installation of
the Endpoint Protection client. Table 4-2 describes these settings.
Setting Description
Manage Endpoint Protection When set to Yes, Coniguration Manager manages the existing Endpoint
Client On Client Computers Protection client on client computers.
When set to No, Coniguration Manager does not manage the Endpoint
Protection client. The default setting is No.
Install Endpoint Protection Client When set to Yes, the Endpoint Protection client installs on client com-
On Client Computers puters. This option is available only if Manage Endpoint Protection
Client On Client Computers is set to Yes.
When set to No, the Endpoint Protection client will not install on client
computers, and all subsequent options are disabled.
The default setting is Yes.
Automatically Remove Previously When set to Yes, the client installation checks for and uninstalls most
Installed Antimalware Software third-party antimalware clients.
Before Endpoint Protection Is The default setting is Yes. The Endpoint Protection client installation
Installed fails if you attempt to install the client on a computer that does not sup-
port the uninstallation of an existing antimalware solution. In this case,
uninstall the existing antimalware solution before you enable Endpoint
Protection.
Allow Endpoint Protection If set to Yes, the Endpoint Protection client installs outside the speciied
Client Installation And Restart maintenance window for the device. If set to No, the client installs only
Outside Maintenance Windows. during the speciied maintenance window.
Maintenance Windows Must Be At The default setting is No. A maintenance window must be at least 30
Least 30 Minutes Long For Client minutes long for the Endpoint Protection client to install successfully.
Installation
For Windows Embedded Devices This setting speciies how the Endpoint Protection client installs on a
With Write Filters, Commit Windows Embedded device. If you select Yes, the write ilter is disabled,
Endpoint Protection Client which allows the installation to commit on the device. This also requires
Installation (Requires Restarts) a restart of the device. If you select No, the client installs on a tempo-
rary overlay and is not committed until another installation commits the
changes to the device. The default setting is No.
Suppress Any Required Computer If set to Yes, after the client installs the client will suppress any required
Restarts After The Endpoint restarts. The default setting is Yes.
Protection Client Is Installed Consider deploying KB981889 to your Coniguration Manager clients
before you deploy the Endpoint Protection client. This update requires
a client restart, but it can help you prevent restarts during the Endpoint
Protection client installation task.
Allowed Period Of Time Users Can This setting speciies the number of hours a user can postpone a poten-
Postpone A Required Restart To tial restart after the client installs. The default setting is 24 hours.
Complete The Endpoint Protection This option is available only if Suppress Any Required Computer
Installation (Hours) Restarts After The Endpoint Protection Client Is Installed is set to Yes.
Disable Alternate Sources (Such After you install the Endpoint Protection client, it will connect imme-
As Microsoft Windows Update, diately to a source and update its antimalware signatures. The default
Microsoft Windows Server Update setting is Yes.
Services, Or UNC Shares) For The If you set this to Yes, the initial update of the antimalware signatures
Initial Deinition Update On Client from a remote source is disabled. In this case, only Coniguration
Computers Manager provides the initial update to client computers. This setting
helps avoid unnecessary network connections to remote locations such
as the Internet and can reduce network bandwidth during the initial
installation.
Setting this option to No allows the client to update the antimalware
signatures from a remote source after initial installation of the client.
Antimalware policies
You use an antimalware policy to control coniguration settings for the Endpoint Protection
client on client computers. When you conigure client settings to install Endpoint Protection
on client computers, a default client antimalware policy is applied to provide initial protection
after the installation.
You can import preconigured policy templates, or you can create your own custom
antimalware policy and deploy the policy to collections. This enables you to provide different
Endpoint Protection client settings based on the requirements of the computers contained
within a collection. For example, you might have a group of computers in a collection that
require speciic iles or ile locations excluded from the malware scan processes. A custom
antimalware policy enables you to address this requirement.
If you deploy a custom antimalware policy to a collection, the custom policy settings
merge with the default client antimalware policy. A single computer might be a member of
multiple collections that have an assigned policy. The client uses priority evaluation to deter-
mine which policy to apply. The policy with the highest priority, which is the lowest number
displayed in the Priority column, will take precedence. That policy then applies appropriate
settings to the Endpoint Protection client software.
To modify the default antimalware policy, perform the following procedure:
1. In the Coniguration Manager console, click the Assets And Compliance workspace.
2. Expand the Endpoint Protection node and then click Antimalware Policies.
3. In the results pane, click Default Client Malware Policy.
4. On the ribbon, click Properties.
The Default Antimalware Policy dialog box appears.
Setting Description
Scheduled Scans Provides settings to enable or disable a scheduled scan on client computers.
When you enable scheduled scans, additional scan options are available, such
as the type of scan, the day and time of the scan, and performance options
such as starting the scan only when the computer is idle.
Scan Settings Provides settings that describe what the client should scan—for example,
removable storage devices, network drives, and email.
Default Actions Provides settings to specify how Endpoint Protection should respond to
Severe, High, Medium, and Low classiied threats. Possible options include
Allow, Quarantine, and Remove.
For Severe and High threats, you can select an additional option,
Recommended, which treats the threat as instructed within the deinition iles.
You cannot select Allow for threats classiied as Severe or High.
Real-time Protection Provides settings to enable real-time protection. If you enable real-time pro-
tection, additional options are available to specify whether to scan incoming
iles, outgoing iles, or both. You also can specify whether users can conigure
real-time protection settings on their computers.
Exclusion Settings Enables you to specify iles, locations, ile types, and processes to exclude from
the scanning process.
Advanced Provides settings to specify options such as whether to create a system restore
point before cleaning computers, show notiication messages to users, delete
quarantined iles after a speciied number of days, and allow users to control
exclusions.
Threat Overrides Enables you to conigure a speciic action (Allow, Remove, or Quarantine)
based on a threat name.
Microsoft Active Protection Enables you to specify whether clients join Microsoft Active Protection Service.
Service You also can specify whether you want to allow end users to modify Microsoft
Active Protection Service settings on their client.
Deinition Updates Provides options to specify how often a client will check for deinition updates.
Settings include specifying the location and order in which the client obtains
updated deinitions. Possible source options include:
■ Updates Distributed From Coniguration Manager.
■ Updates Distributed From WSUS.
■ Updates Distributed From Microsoft Update.
■ Updates Distributed From Microsoft Malware Protection Center.
■ Updates From UNC File Shares.
You can deine the order in which to contact update sources.
If you choose to provide updates from UNC ile shares, you must download the
updates manually and store them in speciic folders on the UNC ile share. Files
for x64-based computers must be in a folder named x64, and iles for
x86-based computers must be in a folder named x86. You must share the par-
ent folder that contains the x64 and x86 folders with Read access permissions
for the client computers and domain users that connect to the share.
During an automatic update, the client computer’s computer account is used
to authenticate to the share. When a user manually updates the deinitions,
that user’s user account authenticates to the share.
Task Description
Increase priority If multiple policies are deployed to the same computer, the policies
apply in the order shown in the Order column of the Antimalware Policies
or Windows Firewall Policies results pane. You can use Increase Priority to
increase the priority on a selected policy. This option is available for both
antimalware and Windows Firewall policies.
Decrease priority Similar to Increase Priority, you can use Decrease Priority to decrease the
priority of a selected policy. This option is available for both antimalware
and Windows Firewall policies.
Merge antimalware policies This option enables you to merge multiple antimalware policies into a single
policy. During the merge, if any policy conlicts occur they are resolved by
using the most secure option for the conlicting setting.
Perform an on-demand scan You might need to perform an on-demand scan of a single computer or a
collection of computers outside the scheduled scan. If you select a device
collection, the Endpoint Protection button, when clicked, provides options
to perform a Full Scan or a Quick Scan on all computers within the col-
lection. If you select a speciic computer within a collection, you also can
choose to perform a Full Scan or Quick Scan on the selected computer as
required. This creates a Coniguration Manager client notiication, which
attempts to initiate the scan as soon as possible.
Force computers to download You can force a download of the latest antimalware deinition iles by per-
the latest antimalware deini- forming the following procedure:
tion iles
1. Select a device collection or a speciic computer within a collection.
2. On the Collection tab, click Endpoint Protection.
3. Click Download Deinition to open the Download
Deinition dialog box.
4. In the Download Deinition dialog box, select a deinition update
source: Software Update Deployment or Endpoint Protection Client
Source Order.
5. The Download Deinition dialog box provides an
option to randomize client execution of the download task. Conig-
ure the randomization period. The randomization period is set to
120 minutes by default.
Set security scopes For each antimalware policy, you can deine a speciic security scope. This
enables you to delegate policy management to speciic administrative
users. For example, you might specify a policy for workstations and conig-
ure another policy for servers. You can assign the workstation policy to a
scope named Workstations, and you can assign the server policy to a scope
named Servers. Then you can assign each scope to appropriate administra-
tive users.
Method Description
System Center 2012 R2 Endpoint The Monitoring workspace has a node named Endpoint Protection
Protection Status Status. Under this node is another node, named System Center 2012 R2
Endpoint Protection Status. This node provides information such as:
■ Endpoint Protection client status.
Malware Detected The Monitoring workspace also has a node named Malware Detected.
This node provides a summary of detected malware, including infor-
mation such as Collection, Threat Name, Computers Infected, and
Computers Remediated.
Antimalware Policies and Malware In the Assets And Compliance workspace, you can click the Devices
Detail tabs node (or expand the Device Collections node) and double-click to view
the membership of a device collection. When you select a computer,
the preview pane displays an Antimalware Policies tab and a Malware
Detail tab. The Antimalware Policies tab shows statistics related to the
application state of the policy applied to the client. The Malware Detail
tab provides statistics on detected threats and the computer’s remedia-
tion state.
Reports The Endpoint Protection report category provides six reports that you
can use to classify antimalware activity and infection status. These
reports include the following:
■ Antimalware Activity Report
■ Antimalware Overall Status And History
■ Computer Malware Details
■ Infected Computers
■ Top Users By Threats
■ User Threat List
Coniguring alerts
You can use Coniguration Manager alerts to notify administrative users when speciic events
have occurred within the hierarchy. You can conigure alerts for each collection by opening
the Properties dialog box of that collection and then selecting the Alerts tab and clicking
Add. This displays the Add New Collection Alerts dialog box, shown in Figure 4-8. Table 4-6
describes the Endpoint Protection events that you can enable to generate alerts.
Event Description
Malware Is Detected When you select this event, an alert is generated if malware is detected on
any computer within the collection. You can deine the malware detection
threshold for the alert. Choose from the following options:
■ High – All Detections An alert is generated whenever malware
is detected, regardless of the action the Endpoint Protection client
takes.
■ Medium – Detected, Pending Action An alert is generated only
if one or more computers require a manual action to complete the
malware removal.
■ Low – Detected, Still Active An alert is generated when there are
one or more computers in the collection on which detected malware
is still active.
The Same Type Malware Is When you select this event, an alert is generated if the same malware has
Detected On A Number Of been detected on a speciied percentage of computers.
Computers
The Same Type Malware Is When you select this event, an alert is generated if speciic malware is
Repeatedly Detected Within detected more than a speciied number of times over a speciied number
The Speciied Interval On A of hours.
Computer
Multiple Types Of Malware When you select this event, an alert is generated if more than a speciied
Are Detected On The Same number of malware types are detected over a speciied number of hours on
Computer With The Speciied computers in the monitored collection.
Interval
For each event, you also can specify the severity of the alert itself. Choose Critical,
Warning, or Information.
You can learn more about coniguring alerts for Endpoint Protection in Coniguration
Manager at http://technet.microsoft.com/en-us/library/hh508782.aspx.
EXAM TIP
Remember how antimalware policy priority works.
1. Which alert option should you conigure to detect repeat infections on the same
computer?
2. Which alert option should you conigure to detect the same malware on multiple
computers?
Objective summary
■ System Center Endpoint Protection is an antimalware client that can detect and reme-
diate malware, rootkit, network, and spyware vulnerabilities; automatically download
antimalware deinitions and engine updates; and manage Windows Firewall settings.
■ Endpoint Protection requires a Coniguration Manager Endpoint Protection point,
which you conigure with client settings and, depending on how you want deinition
updates delivered, a software update point.
■ You use an antimalware policy to control coniguration settings for the Endpoint Pro-
tection client on client computers.
■ You can conigure a irewall policy to establish settings for each type of network pro-
ile, including domain, private, and public.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. Which of the following locations can host antimalware deinition update iles for an
Endpoint Protection client? (Choose three. Each correct answer provides a complete
solution.)
a. FTP site
B. Microsoft Update/Microsoft Malware Protection Center
C. UNC ile share
D. WSUS server
Objective 4.1
Thought experiment
1. You must conigure the Intune connector to manage mobile device coniguration item
settings.
2. You could look for application-speciic registry settings by using Registry Key settings
or look for iles related to the application by using File System coniguration item
settings.
Objective review
1. Correct answers: A and C
a. Correct: Registry values support remediation.
B. Incorrect: Registry keys do not support remediation. Registry values do.
C. Correct: WQL queries support remediation.
D. Incorrect: XPath queries do not support remediation.
2. Correct answer: C
a. Incorrect: You use an Active Directory query setting type to perform an Active
Directory query to locate values in Active Directory.
B. Incorrect: You use the Assembly setting type to determine whether an assembly
from the global assembly cache is present.
C. Correct: You can use a File System setting type in a coniguration item to deter-
mine whether a particular ile is present on a Coniguration Manager client.
D. Incorrect: You use a Registry Value setting type to check for a registry value.
3. Correct answer: D
a. Incorrect: You use a Registry Value setting type to check for a registry value. You
use Registry Key to check for a registry key.
B. Incorrect: You use the WQL query setting to determine whether a WQL query run
on a Coniguration Manager client matches a speciic value.
C. Incorrect: You can use the Script setting type to run a script that checks for a spe-
ciic result or runs as a remediation script to remedy a noncompliant setting.
D. Correct: You use a Registry Key setting type to check for a registry key.
Objective 4.2
Thought experiment
1. You can use the Summary Compliance By Coniguration items for a coniguration base-
line when looking at a collection. You use the detailed report for a speciic asset.
2. You would use the compliance history of a coniguration baseline report to view con-
iguration baseline compliance trend data.
Objective review
1. Correct answers: A and D
a. Correct: A coniguration baseline is a group of coniguration items, software
updates, and other coniguration baselines.
B. Incorrect: A coniguration baseline is a group of coniguration items, software
updates, and other coniguration baselines.
C. Incorrect: A coniguration baseline is a group of coniguration items, software
updates, and other coniguration baselines.
D. Correct: A coniguration baseline is a group of coniguration items, software
updates, and other coniguration baselines.
Objective 4.3
Thought experiment
1. You should conigure The Same Type Malware Is Repeatedly Detected Within The
Speciied Interval On A Computer.
2. You should conigure The Same Type Malware Is Detected On A Number Of
Computers.
Manage Coniguration
Manager clients
The Coniguration Manager client is software that you deploy to devices that you intend
to manage using System Center 2012 R2 Coniguration Manager. The client performs tasks
locally, based on the instructions received from Coniguration Manager. Collections enable
you to group devices or users for performing tasks by using Coniguration Manager.
221
The tabs of the Coniguration Manager Properties dialog box are as follows:
■ General This tab, shown in Figure 5-2, enables you to view identifying information
about the client. This includes the build number, the assigned site, the type of certii-
cate, and the management point the client is using.
■ Components This tab enables you to view information about the installed components
and agents. When you install the client, this installs all client components and agents,
even if you disable them at the site. On this tab, you can view versions of the individual
components and whether they are enabled or disabled. This tab is shown in Figure 5-3.
Objective 5.1: Deploy and manage the client agent CHAPTER 5 223
■ Site This tab enables you to assign a client to a site either automatically or manually.
Changes to this tab require local administrator rights.
■ Cache Use this tab to conigure the client cache settings. On this tab, you can change
the cache location from the default location of %systemroot%\Ccmcache to a different
location, or you can delete iles from the cache. You also can change the cache’s size.
Changes to this tab require local administrator rights.
■ Conigurations This tab enables you to view the coniguration baselines assigned
to this client. You also can run an evaluation and view a local report of the client’s
compliance. Access to local compliance reports from this tab requires local administra-
tor rights.
■ Network This tab enables you to conigure settings for Internet-based management.
Changes to this tab require local administrator rights.
Workgroup-based clients
You can use Coniguration Manager to manage computers that are not part of a domain.
These computers, referred to as workgroup-based computers, must meet the following
prerequisites:
■ You must install the Coniguration Manager client software manually on each work-
group-based computer by using an account with local administrator privileges.
■ You must conigure a network access account to allow access to resources in the site
server domain for clients that are not domain members.
There also are features that Coniguration Manager does not support for workgroup-
based computers, including:
■ Using client push installation.
■ Targeting users for application deployment.
■ Performing global roaming.
■ Using Active Directory Domain Services (AD DS) to locate site system servers.
■ Using Active Directory discovery.
An alternative to managing nondomain client computers by using Coniguration Manager
is to manage them by using Microsoft Intune. In this scenario, ensure that you deploy the
nondomain-joined client on a network with connectivity to the Internet.
Objective 5.1: Deploy and manage the client agent CHAPTER 5 225
Mac OS X computers
System Center 2012 Coniguration Manager Service Pack 1 (SP1) introduced support for Mac
OS X computers. Coniguration Manager supports the following versions of the Mac operat-
ing systems:
■ Mac OS X 10.6 (Snow Leopard)
■ Mac OS X 10.7 (Lion)
■ Mac OS X 10.8 (Mountain Lion)
■ Mac OS X 10.9 (System Center R2 Coniguration Manager only)
Mac OS X computers are limited to the following Coniguration Manager features:
■ Hardware inventory You can use the hardware inventory data collected from Mac
OS X computers in the same way as data collected from Windows-based computers;
that is, you can use it to create collections, reports, and queries. You also can use the
Coniguration Manager console feature Resource Explorer to view hardware inventory
data for Mac OS X computers.
■ Software deployment You can use Coniguration Manager to deploy software that
is packaged in the following formats to Mac OS X computers:
■ Mac OS Installer Package (.pkg)
■ Mac OS X Application (.app)
■ Apple Disk Image (.dmg)
■ Meta Package File (.mpkg)
■ Compliance settings Coniguration Manager supports the use of Mac OS X
Preference settings (.plist iles) to enforce the coniguration of different elements on
Mac OS X computers, or shell scripts to monitor and remediate settings.
Coniguration Manager client software installation and management for Mac OS X com-
puters requires the use of public key infrastructure (PKI) certiicates. The Coniguration
Manager client software for Mac OS X computers always performs certiicate revocation
checking, and you cannot disable this functionality. If a Mac OS X computer is unable to per-
form the check, it will not connect to the Coniguration Manager site systems.
Mac OS X computers communicate with Coniguration Manager site systems as if they
were Internet-based clients. This means that all communication happens by using HTTPS. You
must conigure management points and distribution points to support Mac OS X computers.
To conigure a management point and a distribution point to support Mac OS X comput-
ers, perform the following procedure:
Objective 5.1: Deploy and manage the client agent CHAPTER 5 227
Objective 5.1: Deploy and manage the client agent CHAPTER 5 229
CCMSetup.exe
CCMSetup.exe generally begins the client installation process and runs in all client installation
methods. CCMSetup performs the following actions:
■ Determines the location from which to download client prerequisites and installation
iles. If you start CCMSetup without command-line options, and if you have extended
the AD DS schema for Coniguration Manager, the setup process reads the client instal-
lation properties from AD DS to ind an appropriate management point. If you have
not extended the Active Directory schema, CCMSetup searches Domain Name System
(DNS) or Windows Internet Naming Service (WINS) for a management point to con-
tact. Alternatively, you can specify a management point by providing the
/mp:<ComputerName> switch or a speciic Universal Naming Convention (UNC) loca-
tion by using the /source:<path> switch.
■ Downloads and installs client prerequisite iles. Files include the client.msi ile and all
prerequisite software necessary for install.
CCMSetup copies all the iles it needs to the %systemroot%\CCMSetup\Logs folder and
creates the Ccmsetup.log ile in the same location. Numerous switches are available for modi-
fying the behavior of CCMSetup.exe.
Client.msi
After CCMSetup.exe installs the required prerequisites on the intended client, CCMSetup
invokes Client.msi by using MSIExec, a Windows Installer ile. MSIExec then installs the client
on the system. Client.msi creates the client.msi.log ile in the %systemroot%\CCMSetup folder.
You can modify the Client.msi installation behavior by providing speciic properties on the
CCMSetup.exe command line. Alternatively, you can specify the properties on the Installation
Properties tab of the Client Push Installation Properties dialog box. These settings publish to
AD DS, and several installation methods use them.
CCMSetup.msi
You also can use GPOs to deploy the Coniguration Manager client software. GPOs use the
CCMSetup.msi ile to initiate the installation process. This ile is located in the <installation
directory>\bin\i386 folder on the Coniguration Manager site server.
Objective 5.1: Deploy and manage the client agent CHAPTER 5 231
Objective 5.1: Deploy and manage the client agent CHAPTER 5 233
3. Review the contents of Scxcm.log in the /V/Opt/Microsoft folder to conirm that the
installation occurred.
Management point
A management point is usually required to complete the client installation process because
the client might need to contact a distribution point to download necessary prerequisite soft-
ware. The installation process is complete when the client has registered with a primary site,
receives its initial policy assignment, and then retrieves the policy. This initial policy sets the
components to their desired state. In most installation methods, the client downloads
CCMSetup.exe and Client.msi iles from a management point and any other prerequisites
Objective 5.1: Deploy and manage the client agent CHAPTER 5 235
Distribution point
Most client installation methods copy the necessary installation iles from a management
point. In certain circumstances, the installation process uses a distribution point instead.
When you deploy an operating system by using the Coniguration Manager Operating
System Deployment feature, the task sequence action that installs the client software down-
loads the operating system from a distribution point. If you use Pre-Boot Execution
Environment (PXE) boot in conjunction with operating system deployment, Coniguration
Manager installs the Windows Deployment Services PXE server on the distribution point.
Client assignment
You cannot manage a client until it is assigned to a site. After client installation is complete,
the client is assigned automatically to a site so that the client can be managed. You can
assign client devices to any primary site; however, you cannot assign client devices either to a
secondary site or to a central administration site.
Most clients will reside within site-assignment boundary groups and will be assigned
automatically to a site based on the boundary deinition. You can conigure a fallback site for
clients that might be outside the conigured boundaries of any site. You also can assign a cli-
ent to a site through a client.msi property either directly or through the Installation Properties
tab of the Client Push Installation Properties dialog box.
Objective 5.1: Deploy and manage the client agent CHAPTER 5 237
Client settings
You can conigure client software in the Administration workspace in the Client Settings node
of the Coniguration Manager console. You conigure the Default Client Settings object with
settings that will apply to all clients. The Default Client Settings object always has a priority
of 10,000, and you cannot change this setting. Therefore, the Default Client Settings object is
applied irst, and custom settings will override the default settings when you assign them to
collections. You can conigure custom settings for any of the categories or a combination of
categories found in the Default Client Settings object.
Client settings are hierarchy-wide settings that, by default, affect all clients in the hierar-
chy. Because Coniguration Manager considers these settings as global data, modiications
that you make to Default Client Settings at one site replicate to all other primary sites in the
hierarchy and to the central administration site.
Custom settings
In the Administration workspace, in the Client Settings node of the Coniguration Manager
console, you can create custom client settings. The Default Client Settings object applies to
all clients, and if you want to conigure a setting for all devices or users, you can modify the
Default Client Settings option. However, if you need to change some settings for a speciic
collection of users or devices, you will need to create a custom setting.
Reasons for creating custom client settings include:
■ Creating a custom client setting for a group of systems on which software metering
should be disabled.
Policy Setting
Objective 5.1: Deploy and manage the client agent CHAPTER 5 239
EXAM TIP
Remember how settings are resolved when multiple client settings apply through collec-
tion membership.
Thought experiment
Coniguration Manager client deployment
You are planning the deployment of the Coniguration Manager client at Contoso.
As part of the planning process, you need to determine how to handle computers
that are not joined to the domain and computers that are running the Mac OS X
operating system. With this information in mind, answer the following questions:
1. What steps do you need to take to install the Coniguration Manager client on
nondomain-joined Windows-based computers?
2. Which site system roles require web server certiicates when you use
Coniguration Manager to manage computers running Mac OS X?
3. Which site system roles require client authentication certiicates when you use
Coniguration Manager to manage computers running Mac OS X?
Objective summary
■ On computers running Windows operating systems, the UI for the Coniguration
Manager client consists of two parts: the Coniguration Manager control panel and
Software Center.
■ Users can set the preferences for software delivery or remote control by using
Software Center.
■ You must manually install the Coniguration Manager client software on workgroup-
based computers and conigure a network access account to allow access to resources
in the site server domain for clients that are not domain members.
■ To conigure a client for Internet-based client management, obtain a computer certii-
cate from a trusted certiication authority (CA). You must conigure the client with the
Internet fully qualiied domain name (FQDN) of the management point.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. Of which domain security group must a user account be a member if it will be used to
extend the schema with information about Coniguration Manager?
a. Domain Admins
B. Schema Admins
C. Enterprise Admins
D. Protected Users
2. You are working with a Coniguration Manager deployment in which the Active
Directory schema has not been extended. Which of the following methods can you use
to assign a site code to clients? (Choose two. Each correct answer provides a complete
solution.)
a. Use the Client.msi property SMSSITECODE=site code.
B. Conigure an answers.txt ile.
C. Conigure Group Policy.
D. Conigure an unattend.xml ile.
3. What is the priority of the Default Client Settings object?
a. 1
B. 100
C. 1,000
D. 10,000
4. Which of the following settings cannot be conigured through a custom client device
policy? (Choose three. Each correct answer provides a complete solution.)
a. Software Inventory: Conigure The Display Names For Manufacturer Or Product
B. Compliance Settings: Schedule Compliance Evaluation
C. Mobile Devices: Polling Interval
D. Cloud Services: Allow Access To Cloud Distribution Point
Objective 5.1: Deploy and manage the client agent CHAPTER 5 241
Collections
Collections represent resource groups that consist of devices such as computers and mobile
devices or users and user groups from all of the hierarchy’s sites. You can use collections to
accomplish several management and coniguration tasks, including:
■ Organizing resources into manageable units to create an organized and logical struc-
ture of resources.
■ Organizing collections of target resources to perform Coniguration Manager opera-
tions on multiple resources simultaneously. Coniguration Manager operations can
include operations such as application deployments and installation of software
updates.
■ Targeting groups of computers with speciic conigurations, such as:
■ Client settings.
■ Power-management settings.
■ Maintenance-window settings.
■ Organizing computers based on their compliance status, with a speciic baseline.
■ Integrating with role-based administration to specify collections that a speciic admin-
istrative user can access.
You can view or modify collections by using the User Collections and Device Collections
nodes found in the Assets And Compliance workspace. User collections can contain Users and
User Groups. Device collections can contain devices managed by Coniguration Manager.
All User Groups User Collections This collection displays all security groups that
the Active Directory Group Discovery method
discovers.
All Users User Collections This collection displays all users that the Active
Directory User Discovery method discovers.
All Users And User Groups User Collections This collection contains all users and user
groups that the Active Directory User Discovery
method discovers.
All Desktop And Server Clients Device Collections This collection displays all desktop computers
and servers that are Coniguration Manager
clients and that have communicated with the
site by using Heartbeat Discovery.
All Mobile Devices Device Collections This collection displays mobile devices that
Coniguration Manager manages and that sat-
isfy one of the following conditions:
■ The mobile device is assigned to a site.
All Systems Device Collections This collection contains all systems and all
unknown computers. This collection also dis-
plays devices that have been discovered by
using Active Directory System Discovery,
Network Discovery, and Heartbeat Discovery.
All Unknown Computers Device Collections This collection contains x64 and x86 placeholder
entries for the unknown computer support fea-
tures that Operating System Deployment uses.
Rule Description
Direct rule You can use a direct rule to add a speciic resource to a collection. If you add a
resource to a collection by using a direct rule, the resource will remain in the col-
lection until manually removed. You can create or manage direct membership
rules for a collection by using either of the following methods:
■ Use the Create Direct Membership Rule Wizard. This wizard opens when
you select Direct Rule in the Create Device Collection Wizard or in the
Create User Collection Wizard.
■ Add the selected items to an existing collection. You can select existing
resources and add these resources to existing user collections by using
the Users node and the Devices node located in the Assets And
Compliance workspace. This creates a direct membership rule for the
target collection that contains the selected resources.
Query rule You can use a query rule to add members to a collection based on their attributes.
For example, you can create a collection that contains devices that are within a
speciic Active Directory organizational unit (OU), or you can create a collection
that contains devices on which a speciic software version is installed. In both
cases, collection membership is updated dynamically based on the query rule’s
results. You can conigure collection membership to be reevaluated according to
a schedule.
Include collections You can use the include collections rule type to include the members of another
collection in the membership evaluation for the current collection.
Exclude collections You can use the exclude collections rule type to exclude the members of another
collection in the membership evaluation for the current collection.
When you create a new collection, you specify a base collection called a limiting collection.
The limiting collection becomes a foundation for resources that can be added to the new
collection. You can use limiting collections along with role-based access control to ensure that
delegated administrators can see only objects that are relevant for their administrative tasks.
Coniguration Manager reevaluates all of a collection’s rules on a speciied schedule. You
can also trigger on-demand reevaluation of collection membership. The default schedule to
evaluate the membership of custom collections is once every seven days.
Coniguration Manager supports incremental evaluation of members of a collection. This
feature runs separately from the full update cycle, and it scans periodically for new resources
or resources that have changed since the previous collection evaluation. If you enable incre-
mental evaluation, incremental collection member evaluation runs every ive minutes.
Figure 5-5 shows enabling incremental updates during collection creation.
Maintenance windows
Maintenance windows enable you to conigure a speciic period during which required
deployments, software-update installations, coniguration-item remediation, and task
sequences can run on a client. Assigning a speciic start time for a program deployment does
not ensure that the program runs at that time. However, you can conigure maintenance
windows to ensure that the assigned program installations and the restarts that Coniguration
Manager triggers do not occur at inconvenient or undesirable times.
For example, you might conigure a required application deployment that installs a large
application and then restarts the computer. To avoid running this during normal business
hours, you might conigure the deployment to run at 2:00 A.M. on a speciic day. However, an
executive might have taken a portable computer on a business trip before you deployed the
program. When the executive returns to the ofice after the scheduled start time, the portable
computer would start to install the application a few minutes after the computer connects
to the ofice network. This could affect the system performance of the computer and, after
installation, force a restart at the very time the executive wants to check an important email
message or make a presentation. To avoid this scenario, conigure an overnight maintenance
window for a collection of which the executive’s computer is a member. This ensures that the
installation and restarts do not occur during normal business hours.
Power management
Use Coniguration Manager to conigure and monitor standard Windows power options
throughout the managed environment. Coniguration Manager power management enables
you to apply a power plan to managed computers and monitor power consumption to mini-
mize costs and provide environmental beneits for your organization.
Dependency Description
Client computer support for the Client computers need to be able to support the following states:
intended power state
■ Sleep
■ Hibernate
■ Wake from sleep
■ Wake from hibernate
Clients with Windows 7 and later provide the best platform for power
management. However, you can also use power management with
Windows Vista.
You can use the Power Management: Power Capabilities report to
verify the hardware capabilities of computers in a speciic collection.
Correct display adapter driver Make sure that client computers are using the correct display adapter
driver. If they are using the wrong display adapter driver, the sleep
states might be disabled, and power-monitoring data might not be
available.
Table 5-5 lists the prerequisites for implementing power management by using
Coniguration Manager.
Dependency Description
Coniguration Manager client soft- All client computers that you intend to manage with a power manage-
ware ment policy must be Coniguration Manager clients.
Hardware Inventory To use power management, you must enable Hardware Inventory.
Power management uses information that the hardware inventory
process collects.
Power Management Client Settings To use power management, you must enable Power Management
Client Settings. You can conigure this option in Default Client Settings
to apply to the entire hierarchy, or you can create a custom client
device setting to deploy to a speciic collection. By default, Power
Management Client Settings is enabled.
You can also allow users to exclude their devices from power manage-
ment. If you enable this option, users can then use Software Center
to exclude their own computers from power management plans. This
option is disabled by default.
Reporting services point The power management reports require you to conigure a reporting
services point within the site.
Setting Description
Turn Off Display After (Minutes) This setting speciies the amount of time that a computer must be inac-
tive before turning off the monitor. Setting a value of zero prevents
power management from turning off the display.
Sleep After (Minutes) This setting speciies the amount of time that a computer must be inac-
tive before going into a sleep state.
Hibernate After (Minutes) This setting speciies the amount of time that a computer must be inac-
tive before going into a hibernation state.
Require A Password On Wakeup This setting speciies whether unlocking the computer requires a pass-
word after it comes out of a sleep state.
Power Button Action This setting speciies the action that occurs when you press the power-
on button on the computer. Values include the following:
■ Do nothing
■ Sleep
■ Hibernate
■ Shut down
Start Menu Power Button This setting speciies the action that occurs when you click the Start
menu power button. Values include the following:
■ Sleep
■ Hibernate
■ Shut down
Sleep Button Action This setting speciies the action that occurs when you press the Sleep
button. Values include the following:
■ Do nothing
■ Sleep
■ Hibernate
■ Shut down
Lid Close Action This setting speciies the action that occurs when you close the lid on a
portable computer. Values include the following:
■ Do nothing
■ Sleep
■ Hibernate
■ Shut down
Turn Off Hard Disk After This setting speciies the amount of time that a computer’s hard disk
(Minutes) must be idle before it turns off.
Hibernate After (Minutes) This setting speciies the amount of time that a computer must be inac-
tive before it goes into a hibernation state.
Low Battery Action This setting speciies the action that occurs when the battery reaches a
low-threshold setting on a portable computer. Values include the
following:
■ Do nothing
■ Sleep
■ Hibernate
■ Shut down
Critical Battery Action This setting speciies the action that occurs when the battery reaches
a critical-threshold setting on a portable computer. Values include the
following:
■ Do nothing
■ Sleep
■ Hibernate
■ Shut down
Allow Hybrid Sleep This setting speciies whether Windows should save a hibernation ile
when the computer enters a sleep state. You can use the hibernation ile
to restore the computer’s state in the event of a power loss while in the
sleep state.
Allow Standby State When This setting enables the computer to be in standby mode, which enables
Sleeping Action it to wake up faster. Note that this mode still consumes some power.
Required Idleness To Sleep (%) This setting speciies a percentage of idle time for the computer proces-
sor to go into a sleep state.
Enable Windows Wake-Up Timer This setting enables the built-in Windows wake-up timer that power
For Desktop Computers management can use to wake a desktop computer. This setting is not
available for portable computers.
You can conigure each of the power management settings twice: once for on-battery
systems and once for plugged-in systems. To apply a power plan to a collection of computers,
perform the following procedure:
1. Right-click the collection that is to have the power management policy and then click
Properties.
2. Click the Power Management tab and then select Specify Power Management Settings
For This Collection.
Figure 5-8 shows this for the Toronto Windows 8.1 Workstations collection.
EXAM TIP
Remember the default evaluation schedule period for rule-based collections.
Thought experiment
Power management at Tailspin Toys
You are the Coniguration Manager administrator at Tailspin Toys. You are setting
up Coniguration Manager to manage the power settings for the leet of laptop
computers used at Tailspin Toys. With this information in mind, answer the follow-
ing questions:
1. Which power management setting would you conigure to ensure that the com-
puter shuts down when the battery reaches the critical-threshold setting?
2. Which power management setting would you conigure to ensure that a por-
table computer is shut down when the lid is closed?
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. Which of the following can you add to a collection by using a direct membership rule?
(Choose two. Each correct answer provides a complete solution.)
a. Router
B. Switch
C. Active Directory security group
D. User account
2. You have created a collection by using a query rule. You have not enabled incremental
updates. How often will the membership of the collection be updated by default?
a. Once an hour
B. Once a day
C. Once every 7 days
D. Once every 10 days
3. Which of the following activities are not affected by maintenance windows? (Choose
three. Each correct answer provides a complete solution.)
a. Coniguration item remediation
B. User-initiated software deployment
C. Policy download and evaluation
D. Centralized software deployments
Client status column with- Collection status displays information about the client’s status, including:
in the collection
■ Client Type (Computer).
■ Client (Yes/No).
■ Site Code.
■ Client Activity (Active/Inactive).
Coniguration Manager Coniguration Manager reports provide client deployment and assignment sta-
reports tus. All of the client deployment and assignment reports require you to deploy a
fallback status point system role in the environment and conigure the client to
report state messages to the fallback status point during client installation.
Useful Coniguration Manager reports include the following:
■ Client Assignment Detailed Status Report
■ Client Assignment Failure Details
■ Client Assignment Status Details
■ Client Assignment Success Details
■ Client Deployment Status Details
■ Client Deployment Success Report
■ Client Deployment Failure Report
■ Computers Assigned But Not Installed For A Particular Site
■ Count Of Clients For Each Site
■ Count Of Coniguration Manager Clients By Client Versions
Coniguration Manager On each client, you can conirm the client’s status from the General tab of the
properties Coniguration Manager Properties dialog box.
Client logs You can use several log iles to verify client installation. Examples include:
■ CCMSetup.log This log records setup tasks that CCMSetup.exe per-
forms. You use this log to help troubleshoot client installation problems.
CCMSetup.log is stored at %Windir%\CCMSetup\Logs.
■ Client.msi.log This log records setup tasks that Client.msi performs.
You use this log to help troubleshoot client installation problems. Client
.msi.log is stored at %Windir%\CCMSetup\Logs.
■ ClientLocation.log This log records site assignment tasks. You use
this log to help troubleshoot when the client is not assigned to a
Coniguration Manager site. ClientLocation.log is stored at %Windir%
\CCM\Logs.
■ ClientIDManagerStartup.log This log records when the client has
registered in the site successfully. No other client processes will com-
plete until after registration of the client. This log is stored at %Windir%
\CCM\Logs.
■ DataTransferService.log This log records all BITS communication for
policy or package access. You should check this log when troubleshoot-
ing components that cannot download. This log is stored at %Windir%
\CCM\Logs.
■ PolicyAgent.log This log records policies by using the Data Transfer
service. You should check this log when troubleshooting the policy that
cannot update. This log is stored at %Windir%\CCM\Logs.
Client status
The System Center 2012 R2 Coniguration Manager client agent runs a scheduled task to
evaluate its client health status. The health status of a client enables you to determine the
answers to the following questions:
■ How many clients are healthy in the hierarchy?
■ How many clients are inactive in the hierarchy because they have been powered off for
a long time or because the Coniguration Manager client agent is not installed?
■ What is the main cause of unhealthy clients in the hierarchy?
The task runs daily between midnight and 1:00 A.M. by default. Then, the client sends the
evaluation results to a management point as a status message. Similar to the initial installa-
tion process, if the client fails to send its status message to a management point, it will then
send the status message to a fallback status point if one exists in your hierarchy. If you have
not installed a fallback status point in your hierarchy, the site server might not receive some
evaluation results. The site server summarizes the evaluation results and activities of the cli-
ent’s health and then displays them in the Coniguration Manager console in the Client Status
folder located in the Monitoring workspace.
Report Description
Client Remediation Details This report provides client remediation details for a given collection.
Client Remediation Summary This report provides remediation summary information for a given
collection.
Client Status History This report provides a historical view of the overall client status in the
environment.
Client Status Summary This report provides administrators with the current percentages of
healthy and active clients for a given collection.
Client Time To Request Policy This report shows the percentage of clients that have requested pol-
icy at least once in the past 30 days. Each day represents a percent-
age of total clients that have requested policy since day one in the
cycle. This is useful for determining the time it would take to distrib-
ute a policy update to your client population. Client deployments or
changes in client count can affect the accuracy of the report.
Clients With Failed Client Check This report displays details about clients in a speciic collection that
Details have failed a client check.
Inactive Clients Details This report provides a detailed list of inactive clients for a given
collection.
EXAM TIP
Remember that not all health issues can be remediated.
1. How can you determine which clients have failed client health checks?
2. How can you determine which clients in a collection are inactive?
Objective summary
■ The System Center 2012 R2 Coniguration Manager client agent runs a scheduled task
to evaluate its client health status.
■ If the client fails to send its status message to a management point, it will then send
the status message to a fallback status point if one exists in your hierarchy.
■ The Client Health evaluation engine is an executable ile named CCMEval.exe. This
engine can perform health checks by using rules and can automatically rectify some
coniguration problems through a process termed remediation.
■ You can run the Coniguration Manager Health Evaluation process on demand by run-
ning CCMEval.exe as required. Client health evaluation and remediation is only avail-
able to Windows-based computers.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. You want to run Coniguration Manager Health Evaluation immediately rather than
waiting for it to occur at the scheduled time. Which of the following iles would you
run to accomplish this task?
a. CCMEval.exe
B. CCMSetup.exe
C. CMTrace.exe
D. CCMSetup.msi
Objective 5.1
Thought experiment
1. You must install the client manually, using an account with local administrator privi-
leges. You also must conigure a network access account to allow access to resources in
the site server domain for clients that are not domain members.
2. The computers running the Management Point, Distribution Point, Enrollment Point,
and Enrollment Proxy Point roles require web server certiicates when you want to use
Coniguration Manager to manage computers running Mac OS X.
3. The computers running the Management Point and Distribution Point roles require
client authentication certiicates when you want to use Coniguration Manager to man-
age computers running Mac OS X.
Objective review
1. Correct answer: B
a. Incorrect: The user account used to extend the schema must be a member of the
Schema Admins domain security group.
B. Correct: The user account used to extend the schema must be a member of the
Schema Admins domain security group.
C. Incorrect: The user account used to extend the schema must be a member of the
Schema Admins domain security group.
D. Incorrect: The user account used to extend the schema must be a member of the
Schema Admins domain security group.
2. Correct answers: A and C
a. Correct: You can assign a site code to a Coniguration Manager client by using the
Client.msi property SMSSITECODE=site code.
B. Incorrect: You cannot assign a site code to a Coniguration Manager client by
using an answers.txt ile.
C. Correct: You can assign a site code to a Coniguration Manager client by using
Group Policy.
D. Incorrect: You cannot assign a site code to a Coniguration Manager client by
using an unattend.xml ile.
3. Correct answer: D
a. Incorrect: The Default Client Settings object has a default priority of 10,000.
B. Incorrect: The Default Client Settings object has a default priority of 10,000.
Objective 5.2
Thought experiment
1. Conigure the Critical Battery Action power management setting.
2. Conigure the Lid Close Action power management setting.
Objective review
1. Correct answers: C and D
a. Incorrect: You cannot add a router to a collection because a router cannot be
managed by Coniguration Manager.
B. Incorrect: You cannot add a switch to a collection because a switch cannot be
managed by Coniguration Manager.
C. Correct: You can add an Active Directory security group to a collection by using a
direct membership rule.
D. Correct: You can add a user account to a collection by using a direct membership
rule.
2. Correct answer: C
a. Incorrect: By default, collection membership is reevaluated once every 7 days.
B. Incorrect: By default, collection membership is reevaluated once every 7 days.
C. Correct: By default, collection membership is reevaluated once every 7 days.
D. Incorrect: By default, collection membership is reevaluated once every 7 days.
3. Correct answers: A, B, and C
a. Correct: Coniguration item remediation is not affected by maintenance windows.
B. Correct: User-initiated software deployment is not affected by maintenance
windows.
Objective 5.3
Thought experiment
1. Run the Clients With Failed Client Check Details report.
2. Run the Inactive Clients Details report to determine which clients are no longer active
in a collection.
Objective review
1. Correct answer: A
a. Correct: You run CCMEval.exe to trigger the health evaluation process.
B. Incorrect: CCMSetup.exe is used in the client deployment process.
C. Incorrect: CMTrace.exe is used to view log iles.
D. Incorrect: CCMSetup.msi is used in the Coniguration Manager setup process.
2. Correct answer: B
a. Incorrect: The Verify BITS Exists health check does not support automatic
remediation.
B. Correct: The Verify/Remediate Windows Update Service Status health check sup-
ports automatic remediation.
269
EXAM TIP
Custom client settings override any settings that you conigure within Default Client
Settings.
Windows Phone 8/Windows Phone 8.1 Only managed apps Only managed apps
You can use the results of inventory collection with other Coniguration Manager features.
For example, you can:
■ Build queries that include or exclude computers based on their hardware coniguration
or installed software. For example, you can create a query that displays all computers
with less than 5 gigabytes of space left on their operating system volume.
■ Build collections by using queries that include or exclude computers based on their
hardware coniguration or the type of installed software—for example, that have a
speciic model of graphics adapter or that are running a speciic application.
■ Generate reports based on hardware coniguration or installed software.
■ Use queries and reports to ind computers that do not meet corporate standards. For
example, you can maintain information about current hardware and software installa-
tions to ensure that all computers meet the current compliance requirements.
■ Use Resource Explorer, which is the Coniguration Manager console that displays the
complete inventory data that Coniguration Manager collects for individual computers.
■ Collect copies of iles from client computers by using software inventory. Coniguration
Manager then stores these iles on the site server. One example is if you need to collect
a speciic coniguration ile from computers within a speciic site.
By default, the hardware inventory and software inventory collection runs every seven
days, though by coniguring default or custom client settings, you can modify this schedule
to meet your organization’s requirements. Computer hardware and software coniguration
changes slowly, so it is rarely necessary to schedule aggressive inventory collection. Figure 6-1
shows a schedule conigured to run once every 14 days.
If you want the hardware inventory settings to apply to speciic computers only, create a
custom client setting that deploys to a collection that contains the computers you want to
inventory. If a computer receives settings from both the default and custom client settings,
the hardware inventory agent merges the hardware inventory classes from each of the set-
tings when the client reports its hardware inventory.
Option Use
Enable Hardware Inventory On Clients Enable or disable a hardware inventory collection. This option is
enabled by default. Disabling hardware inventory in custom set-
tings disables hardware inventory on clients.
Hardware Inventory Schedule Specify the start time and interval for which the client’s hardware
inventory agent collects hardware inventory. By default, hardware
inventory collection runs every seven days.
Maximum Custom MIF File Size (KB) Specify the maximum size for custom Managed Information Format
(MIF) iles that you want to collect from a client. You can conigure
this option by using the Collect MIF Files setting. The hardware
inventory agent does not collect or process any MIF iles that
exceed the maximum custom MIF ile size. The default value is
250 kilobytes (KB).
Hardware Inventory Classes Customize which WMI classes and attributes you use to collect
hardware information from Coniguration Manager clients. You can
modify the default classes and attributes, or you can import custom
Managed Object Format (MOF) iles to allow for vendor-speciic
classes and attributes.
Collect MIF Files Specify the custom MIF ile types that you want to collect. You can
choose to collect custom IDMIF and NOIDMIF iles, or you can col-
lect both types. The default option is no collection of any custom
MIF iles.
■ Add a new hardware inventory class. You can connect to another computer to retrieve
speciic inventory classes and then add the new inventory class to the set of default
classes. For example, you might use a client computer to test a hardware vendor–spe-
ciic MOF ile. After you verify that the speciic MOF ile collects the custom informa-
tion properly, you can connect to the computer from the Coniguration Manager
console to import the vendor-speciic classes.
If you have a custom MOF ile that contains hardware inventory class settings that you
used in a prior version of Coniguration Manager or an MOF ile that a vendor provides, you
can use the Import and Export features to import or export custom MOF iles and their
associated settings.
The Coniguration.mof ile is a text ile you can edit with a text editor such as Notepad
.exe, which deines the data classes for the hardware inventory agent. Coniguration.mof also
deines and registers the providers that the hardware inventory agent uses during data col-
lection. To extend the hardware inventory that Coniguration Manager collects, you edit the
Coniguration.mof ile to use a registered inventory data provider. For example, if you want to
collect additional information from speciic registry keys on the client computer, you modify
the registry property provider to collect the speciic registry key information that you require.
When clients request computer policies as part of their normal policy-polling interval,
Coniguration Manager attaches the Coniguration.mof content to the policy body that clients
download and compile. When you add, modify, or delete data classes from the Coniguration
.mof ile, the next time that clients receive an updated computer policy, they automatically
compile changes that have occurred to inventory-related data classes.
Similar to hardware inventory, software inventory initially reports a full inventory soon
after you enable the software inventory agent. Subsequent inventory reports only contain
changes to inventory information. The site server processes delta inventory information but
rejects it if information is missing or corrupt. If the site server rejects the delta inventory, it
instructs the client to run and report a full inventory cycle.
You can use Resource Explorer to view inventory information for client software, or you
can view software-inventory information in reports. Coniguration Manager clients that are
running OS X, Linux, or UNIX do not support the software inventory feature.
The information that Coniguration Manager gathers can include data related to the
operating system, installed programs, and any iles that you want to inventory. Coniguration
Manager stores this data in the site database, where you can use the information in queries to
generate and view reports or to build software-speciic collections. For example, you can cre-
ate a collection of all computers that have speciic versions of iles, or you can ind all clients
with an old version of a ile and replace it with a newer version.
Although software inventory can provide a list of installed application iles, such as .exe
iles, you should not use it for identifying installed software. Instead, you should use Asset
Intelligence, which provides details about installed applications beyond a simple list of ile
names. For example, software inventory might ind a ile named Game.exe but not be able
to ind information beyond that name. Asset Intelligence, however, will allow you to identify
which application it actually is.
By default, software inventory is enabled on clients, but no ile types are deined for inven-
tory. To inventory speciic ile types, you need to conigure software inventory rules by using
the following settings:
■ Name You can list a speciic ile, or you can specify a ile type by using wildcard
characters. For example, you could specify *.ps1 to inventory Windows PowerShell
command-line interface scripts.
■ Path You can conigure the agent to search for the speciied ile on all of the clients’
hard disks or in a speciic path. The path can be explicit or based on a variable such as
%ProgramFiles%.
EXAM TIP
File collection is not enabled by default. Up to ive versions of each ile are stored.
To conigure ile collection by software inventory, you must perform the following
procedure:
1. To create a new ile entry, under Client Settings, in the Software Inventory section, click
Set Files and then click New (which appears as a star).
2. In the Collected File Properties dialog box, shown in Figure 6-6, specify the name of
the iles that you want to collect or use wildcard characters to specify the ile types that
you want to collect. An example is *.ini.
3. Specify the location in which you want the agent to search for iles. You can conigure
the agent to search for a speciic ile on all of the client’s hard disks or in a speciic path
only. The path can be explicit or based on a variable such as %windir%.
Several methods are available to troubleshoot the causes of problems with inventory col-
lection. These methods include:
■ Reviewing the client log iles A client’s log iles can help you identify inventory
problems that are affecting that client. The client log iles that pertain directly to
inventory are as follows:
■ InventoryAgent.log Records activities of the inventory agent, including creation
of discovery data records (DDRs) and inventory reports.
■ CcmExec.log Records activities of the client of the Short Message Service (SMS)
Agent Host service. For inventory, this includes high-level events such as initializa-
tion of the inventory agent queue.
■ Policyagent.log Records policy updates on the client, including updates that
enable the inventory agent and conigure the hardware inventory collection.
■ FileSystemFile.log Records scanning events by the inventory agent ile system
for software inventory when you enable and conigure it.
■ Mifprovider.log Records events related to MIF ile reporting.
■ Reviewing the management point log iles You can use log iles on the manage-
ment point to help identify inventory problems that relate to inventory processing. The
management point log iles that pertain to inventory are as follows:
■ MP_Hinv.log Provides details on hardware inventory that client computers report.
Thought experiment
Inventory collection at Contoso
You are the Coniguration Manager administrator at Contoso. Contoso has a het-
erogeneous environment, with computers that run Windows, Mac OS X, Linux, and
UNIX operating systems. You are interested in collecting hardware and software
inventory information. With this in mind, answer the following questions:
Objective summary
■ Inventory collection involves gathering information about a client computer’s hard-
ware and software.
■ Hardware inventory collects information about the hardware coniguration of client
computers.
■ Coniguration Manager supports hardware inventory collection for computers that are
running supported Windows operating systems, Mac OS X, Linux, and UNIX operating
systems.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. Which of the following Coniguration Manager features can you use to determine
whether a speciic graphics card is being used on a Coniguration Manager client?
a. Hardware inventory
B. Software inventory
C. File collection
D. Software metering
2. You want to collect all .ini iles stored in a speciic folder on each Coniguration
Manager client. Which of the following Coniguration Manager features would you
use to accomplish this goal?
a. Software metering
B. Asset Intelligence
C. Hardware inventory
D. File collection
3. You have conigured software inventory to inventory all iles that use the .docx exten-
sion. If you don’t change any other settings, which of the following ile types will not
be collected by software inventory by default? (Choose all that apply.)
a. Files with the encryption attribute set
B. Files with the compression attribute set
C. Files with the hidden attribute set
D. Files with the archive attribute set
Software metering
You use software metering to monitor application usage on Coniguration Manager client
computers. You can summarize software-metering data to produce useful reports that can
help you plan for your organization’s software purchases.
Software metering can be useful when you need to know:
■ How many instances of a particular software program users are using.
■ How many licenses of a particular software program you need to purchase when you
renew your license agreement with the software vendor.
■ Whether any users are still running a particular software program. If users are no lon-
ger using the program, you could consider retiring it.
■ What times of the day users most frequently use a software program.
Software metering can collect detailed information, such as the information listed in
Table 6-3.
Software metering uses two main components to perform data collection tasks: the
Software Metering Agent and software-metering rules. When enabled, the Software
Metering Agent reports software-metering data based on the site’s software-metering rules.
You must conigure software-metering rules prior to beginning data collection about a pro-
gram’s usage.
Default Client Settings enables the Software Metering Agent by default and is conigured
to send software-metering data to the management point every seven days. Rules are cre-
ated automatically, based on usage. However, no rules are enabled by default. If you want to
enable software metering for a speciic group of computers, you can create a custom client
setting coniguration that targets a speciic collection of devices, and then you can disable
the Software Metering Agent in default client agent settings. Figure 6-9 shows the Software
Metering settings section of the Default Client Settings object.
Software-metering rules
When you create a new rule, you can specify the site to which the rule applies and whether
the rule should affect only the speciied site or all clients in the hierarchy. By default, rules
apply either to the site in which you deine them or to all sites if you deine them in the cen-
tral administration site.
To create a software-metering rule, perform the following steps:
1. In the Coniguration Manager console, click the Software Metering node of the Assets
And Compliance workspace.
2. On the ribbon, click Create Software Metering Rule.
3. On the General page of the Create Software Metering Rule Wizard, specify the details
of the application you wish to meter. Figure 6-10 shows a metering rule conigured
for Notepad.exe. You can browse to the application location to have these properties
populated automatically.
EXAM TIP
Remember how to conigure automatic rule creation.
Thought experiment
Software metering at Fabrikam
You are the Coniguration Manager administrator at Fabrikam. You’ve been trialing
Coniguration Manager’s software-metering functionality, but you’ve found that
the default coniguration does not suit your needs. Speciically, you want to use it to
ind out how many people are running a speciic graphics application that you want
to retire. You also want to reduce the number of automatically created rules so that
they are only generated if a substantial number of people are using an application.
With this in mind, answer the following questions:
1. How can you determine the number of people who are running the graphics
application, given that it’s likely to be used by less than 10 percent of people in
the organization?
2. What steps can you take to reduce the number of automatically created rules
and limit rule creation to when more than 30 percent of client computers in your
organization use an application?
Objective summary
■ Software metering records how many instances of a particular software program users
are using.
■ Software metering records when the application was run, who ran it, and how long
they were running it.
■ Maintenance tasks remove software-metering data and summary data after speciied
periods.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. You want to ensure that aged software-metering summary data is stored for 365 days.
Which of the following tasks would you modify to accomplish this goal?
a. Summarize Software Metering File Usage Data
B. Summarize Software Metering Monthly Usage Data
■ User Resource
In addition, there is an Unknown Computer object for the All Unknown Computers col-
lection that is used in operating system deployment. You can create queries by using the
Unknown Computer object type; however, you must write out the query in WQL.
A valid query includes the following elements:
■ A unique query name that identiies the query
■ Object type
■ Attribute class
■ Attribute
When you create a query, the only requirement is that you specify a unique name for your
query. The object type is set to the System Resource object type by default, and all attribute
When running the Reporting Services Coniguration Manager, you irst must specify the
server name and instance that you are managing. After you connect to the server, you must
conigure the nodes as described in Table 6-5.
Node Description
<Server Name> This node displays a summary of the current coniguration and the status of
\<Instance Name> the service.
Service Account This node enables you to change the service account that was set during
SSRS installation.
Web Service URL During the initial coniguration, you click the Apply button to accept the
default settings, or you can change the default settings before clicking
Apply.
Database In this node, you click the Change Database button to specify the database
that SSRS should use.
Report Manager URL During the initial coniguration, you click the Apply button to accept the
default settings, or you can change the default settings prior to clicking
Apply.
Email Settings This is an optional setting. If you will use report subscriptions through
email, you must conigure a sender address and a Simple Mail Transfer
Protocol (SMTP) server.
Execution Account This account enables you to use report-data sources that require creden-
tials or to connect to remote servers that store external images such as
custom icons.
Encryption Keys This node enables you to back up or restore the encryption keys that SSRS
uses.
Scale-out Deployment This node displays the status of a scale-out deployment of SSRS in which
multiple SSRS servers share a common reporting database.
Managing reports
Coniguration Manager includes more than 400 reports. They are displayed in the
Coniguration Manager console as shown in Figure 6-13 and are organized into more than
50 subfolders based on the category of the report.
If you select Model-Based Report, you will be asked to select the reporting services model on
which to base the report, and the Microsoft SQL Server Report Builder will run as shown in
Figure 6-15. If you choose SQL-Based Report, the report builder is launched without selecting a
model.
SQL Server Report Builder also runs if you choose to edit an existing report. You can edit
a report by selecting it within the Coniguration Manager console and clicking Edit on the
console ribbon. You can create a clone of a report by editing the report and then saving it
with a new name by using SQL Server Report Builder. You also can use Save As functionality
to export an existing report.
To import a report, navigate to the Reporting Services webpage, which is located at
http://server/reports, using an account that has permission to edit reports. Navigate to the
folder into which you want to upload the report and then click Upload File. On the Upload
File page, shown in Figure 6-16, browse to the report ile in .rdl format and click OK. You
also can use the Reporting Services webpage to add folders in which to store Coniguration
Manager reports.
EXAM TIP
Remember what steps you need to take to clone and import a report.
Asset Intelligence
Asset Intelligence enhances the inventory capabilities of Coniguration Manager by extend-
ing hardware inventory and adding functionality for license reporting. By enabling additional
hardware-inventory WMI reporting classes, Asset Intelligence helps improve the range of
information that it gathers about software titles in use.
Asset Intelligence offers the following beneits over software inventory:
■ Enables more accurate representation of software titles that are present on managed
computers
■ Provides information about the license usage for speciic products rather than just
information about the software itself
■ Can be used in conjunction with software metering to rationalize licensing by deter-
mining instances when software has deployed but is not being used
■ Retrieves information about installed software through the hardware inventory client
agent after the software inventory agent detects software titles by scanning client
storage
Hardware 04A – Shared (multi- ■ Collection This report lists computers that
user) Computers do not seem to have a primary
user because no one user has a
percentage of console logon time
greater than 66 percent.
License 03A – Count Of Licenses ■ Collection This report lists the products
By License Status whose licenses are managed by
■ Product Name
the Software Licensing Service.
Software 03A – Uncategorized ■ Collection This report lists the software that
Software either is categorized as unknown
or has no categorization.
Software 09A – Infrequently Used ■ Collection This report displays software titles
Software that have not been used during a
■ Days not used
speciied period of time.
1. Which tool can you use to create a brand new report based on Asset Intelligence
data?
Objective summary
■ Software metering enables you to track how often a particular application is used.
■ Automatic software metering rule creation enables you to specify the percentage of
client computers in the hierarchy that must have the application installed before a rule
is automatically created.
■ Software-metering data is summarized on a speciied schedule and then replicates to
the central administration site, which contains usage data from all client computers
within the hierarchy.
■ Data summarization runs daily and only against usage data that is older than 12 hours.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. Which of the following tools could you use to import a report in RDL format so that it
can be used in Coniguration Manager?
a. Coniguration Manager console
B. Internet Explorer
C. SQL Server Report Builder
D. Reporting Server Coniguration Manager
2. Which of the following tools could you use to clone an existing Coniguration Manager
report?
a. Reporting Server Coniguration Manager
B. SQL Server Report Builder
Objective 6.1
Thought experiment
1. Windows, Mac OS X, Linux, and supported UNIX operating systems support the collec-
tion of hardware inventory.
2. Only Coniguration Manager clients running Windows operating systems support the
collection of software inventory.
Objective review
1. Correct answer: A
a. Correct: You can use hardware inventory to determine whether a speciic graphics
card is being used on a Coniguration Manager client.
B. Incorrect: Software inventory enables you to inventory software, not hardware.
C. Incorrect: You can’t use ile collection to determine which hardware is installed on
a computer.
D. Incorrect: Software metering tracks how often an application is run.
2. Correct answer: D
a. Incorrect: Software metering tracks how often an application is run.
B. Incorrect: Asset Intelligence enables you to identify software on a computer.
C. Incorrect: Hardware inventory enables you to collect hardware information, not
iles.
D. Correct: You would use ile collection to collect all .ini iles stored in a speciic
folder on a Coniguration Manager client.
3. Correct answers: A and B
a. Correct: Software inventory does not collect iles with the encryption attribute set
by default.
B. Correct: Software inventory does not collect iles with the compression attribute
set by default.
C. Incorrect: Software inventory will inventory iles with the hidden attribute set by
default.
D. Incorrect: Software inventory will inventory iles with the archive attribute set by
default.
Objective review
1. Correct answer: D
a. Incorrect: The Summarize Software Metering File Usage Data task condenses
software-metering ile usage data from multiple records into one general record.
B. Incorrect: The Summarize Software Metering Monthly Usage Data task condenses
detailed software-metering usage data from multiple records into one general
record.
C. Incorrect: The Delete Aged Software Metering Data task deletes all unsummarized
software-metering data that is older than the number of days speciied.
D. Correct: The Delete Aged Software Metering Summary Data task deletes sum-
marized software-metering summary data that is older than the number of days
speciied. By default, the task runs every Sunday to delete software-metering sum-
mary data that is older than 270 days.
2. Correct answer: B
a. Incorrect: The Delete Aged Software Metering Summary Data task deletes sum-
marized software-metering summary data that is older than the number of days
speciied. By default, the task runs every Sunday to delete software-metering sum-
mary data that is older than 270 days.
B. Correct: The Delete Aged Software Metering Data task deletes all unsummarized
software-metering data that is older than the number of days speciied. By default,
the task runs every day and deletes software-metering data that is older than ive
days.
C. Incorrect: The Summarize Software Metering Monthly Usage Data task condenses
detailed software-metering usage data from multiple records into one general
record.
D. Incorrect: The Summarize Software Metering File Usage Data task condenses
software-metering ile usage data from multiple records into one general record.
Objective 6.3
Thought experiment
1. You can use SQL Server Report Builder to create a report based on information in the
Coniguration Manager database.
2. You can use the Asset Intelligence Software Details Conlict Resolution dialog box to
resolve conlicts between categorization and information in System Center Online.
Objective review
1. Correct answer: B
a. Incorrect: You cannot use the Coniguration Manager console to import reports in
RDL format.
B. Correct: You use Internet Explorer, or another browser, to connect to http://server
/reports to upload reports in RDL format.
C. Incorrect: You can use SQL Server Report Builder to clone and edit reports, but
you need to use Internet Explorer, or another browser, to upload a report to a
Report Server instance.
D. Incorrect: You use Reporting Server Coniguration Manager to conigure the
Reporting Server instance.
315
General settings
The General Settings group of policies, shown in Figure 7-1, enables you to conigure the fol-
lowing settings:
■ Internet Sharing From Mobile Devices Whether the device allows tethering
■ Computer Synchronization Whether the device can be synchronized with a
computer
■ Allow mobile devices that cannot be provisioned Whether mobile devices that
cannot be managed completely by Exchange can make connection
■ Refresh Interval (Hours) How often the mobile device policy is refreshed
Password settings
The Password Settings group, shown in Figure 7-2, enables you to conigure the following
settings:
■ Require Password Settings On Mobile Devices Whether to require a password to
unlock the mobile device
■ Minimum Password Length (Characters) Minimum required password length
■ Password Expiration In Days Maximum password age
Objective 7.1: Integrate Coniguration Manager with the Microsoft Exchange ActiveSync Connector CHAPTER 7 317
Email management
The Email Management Settings group, shown in Figure 7-3, enables you to conigure the
following settings:
■ POP And IMAP Email Whether to allow POP and IMAP protocol email
■ Maximum Time To Keep Email How long email will be stored
■ Maximum Time To Keep Calendar Entries How long calendar entries can be stored
■ Direct Push When Roaming Whether to allow Direct Push when the mobile device
is on a roaming network
■ Allowed Message Formats Whether to allow HTML and/or plaintext messaging
formats
Security
The Security Settings group, shown in Figure 7-4, enables you to conigure the following
settings:
■ Remote Desktop Whether the device supports Remote Desktop
■ Removable Storage Whether the device supports removable storage
■ Camera Whether the device’s camera can be used
■ Bluetooth Whether Bluetooth functionality can be used
■ Wireless Network Connections Whether to allow connections to a wireless
network
■ Infrared Whether to allow infrared connections
■ Browser Whether to allow use of the mobile device’s browser
■ Storage Card Encryption Whether to enforce encryption on any storage card
Objective 7.1: Integrate Coniguration Manager with the Microsoft Exchange ActiveSync Connector CHAPTER 7 319
Applications
The Applications Settings group, shown in Figure 7-5, enables you to conigure the following
settings:
■ Unsigned File Installation Whether to allow the installation of unsigned iles
■ Unsigned Applications Whether to allow the installation of unsigned applications
■ Block The Following Applications In ROM A list of speciically blocked applications
Connector coniguration
You should conigure the account that you want to use when you set up an Exchange Server
connector to be a member of the following Exchange management roles:
■ Recipient Management
■ View Only Organization Management
■ Server Management
The Exchange Server connector enables you to manage any device that supports Exchange
ActiveSync, although not all devices that use Exchange ActiveSync support all Exchange
ActiveSync management functionality. The Exchange Server connector does not install a cli-
ent on the mobile device that you are managing. This means that using the Exchange Server
connector provides only a subset of the functionality available for mobile device manage-
ment when compared to managing the same devices through the Coniguration Manager
Intune connector.
When you conigure the Exchange Server connector, you specify the address of a Client
Access server as shown in Figure 7-6. When coniguring the address of the client access server,
specify one that is in the same Active Directory Domain Services (AD DS) site as the
Coniguration Manager site system server.
Objective 7.1: Integrate Coniguration Manager with the Microsoft Exchange ActiveSync Connector CHAPTER 7 321
The Exchange Server connector connects through the client access server to conigure the
default Exchange ActiveSync mailbox policy on the mailbox server. Even though the mailbox
server is used to interact with the policy, the policy itself is stored within Active Directory
Domain Services.
The irst time a mobile device connects to the client access server, it retrieves the policy.
Every subsequent time that the device connects to the client access server, it checks to see
whether there are updates to the policy. If the policy has been updated, the mobile device
downloads and applies the new policy.
Thought experiment
ActiveSync MDM at Fabrikam
You are responsible for MDM at Fabrikam, a manufacturer of surveillance drones.
You have conigured the Coniguration Manager ActiveSync connector for
Exchange and will be managing MDM policies from Coniguration Manager. You will
be implementing policies as required. Because of the secure nature of Fabrikam’s
facilities, you need to ensure that the cameras on any mobile phones brought into
the facilities are disabled. In addition, because several Fabrikam executives travel
extensively overseas, you want to ensure that Direct Push functionality is disabled
when their mobile phones are connected to roaming networks. With this in mind,
answer the following questions:
1. Which settings group would you conigure to ensure that mobile device cameras
cannot be used on mobile devices managed at Fabrikam?
2. Which settings group would you conigure to block Direct Push notiications
when a mobile device is connected to a roaming network?
Objective summary
■ The Exchange Server connector enables you to conigure mobile device policies
applied through ActiveSync to devices that connect to an Exchange deployment.
■ After you conigure one setting in a settings group, all settings in that group will be
managed through Coniguration Manager rather than through Exchange.
■ When coniguring the Exchange Server connector on the Coniguration Manager
server, specify the address of the client access server.
■ The Exchange Server connector enables you to perform Discovery, Hardware
Inventory, Settings Management, Remote Wipe, Reporting, and Quarantine And Block
from Exchange Server.
Objective 7.1: Integrate Coniguration Manager with the Microsoft Exchange ActiveSync Connector CHAPTER 7 323
Microsoft Intune
Microsoft Intune is a cloud-based management service that enables you to manage client
computers and mobile devices. You can use Intune to perform the following tasks:
■ Deploy and manage software updates
■ Deploy and manage applications
■ Inventory hardware and software
■ Manage endpoint protection
■ Perform remote assistance
■ Manage mobile devices
■ Manage software licensing
■ Conigure Windows Firewall policy
You can use Intune to perform management tasks on computers that rarely connect to an
organizational network. You can also use Intune to perform management tasks on a device
that is not joined to an Active Directory domain. Intune also enables you to manage software
deployment for computers that are running Windows, Android, and Apple iOS operating
systems.
You do not need a Coniguration Manager deployment to use Intune, but you can inte-
grate Intune into a Coniguration Manager deployment. Using Coniguration Manager with
Intune enables you to manage all of your organization’s devices, both mobile devices and
traditional computers, using a single console.
Intune supports management of clients on the following operating systems:
■ Windows 8.1 (x86, x64), Windows 8 (x86, x64), Windows 7, and Windows Vista
■ Windows RT 8.1 and Windows RT
■ Windows Phone 8 and Windows Phone 8.1
Windows Phone 8 and Windows Code-signing certiicate. All side- Purchase a code-signing certiicate
Phone 8.1 loaded apps must be code-signed. from Symantec.
Windows RT 8.1 and Windows RT Sideloading keys to allow installa- Obtain sideloading keys from
tion of sideloaded apps. Microsoft.
All apps that you sideload must be Sign apps by using a code-signing
code-signed. certiicate that an internal or third-
party trusted certiication author-
ity (CA) issues.
iOS 6, iOS 7, iOS 8 Apple Push Notiication service Obtain from Apple.
certiicate.
To create the Intune connector, you must perform the following procedure:
1. In the Administration workspace, expand the Hierarchy Coniguration folder and then
click Microsoft Intune Subscriptions.
2. On the ribbon, click Add Microsoft Intune Subscription.
3. On the Introduction page, click Next.
Device enrollment
Each mobile device operating system uses a different method to enable users to self-enroll
their mobile devices, with the method sometimes different depending on whether you are
■ iOS To enroll an iOS device, use the device’s browser to navigate to manage
.microsoft.com and then provide credentials. If your organization has integrated
System Center 2012 R2 Coniguration Manager, you can obtain the Company Portal
app through the Apple App Store.
■ Android Users can enroll mobile devices that are running the Android operating
system by acquiring the Company Portal App, without charge, from the Google
Play store. They then can provide their credentials in the app to enroll in the
EXAM TIP
Remember that an Apple Push Notiication Service certiicate is required to manage
devices running iOS. No such certiicate is required to manage devices running Android.
1. With which hostname on the Internet must the site server on which you will
deploy the Intune connector be able to communicate?
2. Which account should you specify when coniguring the Intune connector on the
Coniguration Manager site server?
Objective summary
■ You can use Intune to manage hardware inventory, software inventory, endpoint pro-
tection, remote assistance settings, software licensing, and irewall policy.
■ You can use Intune to deploy and manage software updates and applications.
■ You can use Intune separately from Coniguration Manager, or you can integrate it
with Coniguration Manager.
■ You can deploy apps to mobile devices by deep linking to the app in the appropriate
vendor’s store.
■ You need to have an Apple Push Notiication Service certiicate from Apple if you want
to manage and deploy applications to devices running the iOS operating system.
■ Devices running the Android operating system do not require special certiicates to be
managed through Intune.
■ You need to conigure directory synchronization between Microsoft Azure Active
Directory and on-premises Active Directory if you intend to integrate Intune with
Coniguration Manager.
■ The site server that hosts the Intune connector must be able to communicate with
manage.microsoft.com on the Internet.
Objective review
Answer the following questions to test your knowledge of the information in this objective.
You can ind the answers to these questions and explanations of why each answer choice is
correct or incorrect in the “Answers” section at the end of the chapter.
1. Which of the following device management tasks can you perform using Intune on a
computer running Windows 8.1? (Choose all that apply.)
a. Operating system upgrade
B. BitLocker unlock
C. Application deployment
D. Hardware inventory
Objective 7.3: Manage connection proiles by using Coniguration Manager CHAPTER 7 333
VPN proiles
You can use VPN proiles to deploy VPN connection coniguration information to
Coniguration Manager clients that are running Windows 8.1 and Windows RT 8.1 or to
iPhone and iPad devices that are running iOS 5, iOS 6, and iOS 7. You can use VPN proiles
to deploy VPN connections that use the following connection types:
■ Cisco AnyConnect
■ Juniper Pulse
■ F5 Edge Client
■ Dell SonicWALL Mobile Connect
■ Check Point Mobile VPN
■ Microsoft SSL (SSTP)
■ Microsoft Automatic
■ IKEv2
■ PPTP
■ L2TP
The advantage of doing this is that by deploying the proiles to devices, end users will be
able to make VPN connections without having to conigure them themselves. Figure 7-10
shows the coniguration of an IKEv2-based VPN proile.
Certiicate proiles
You can use certiicate proiles to deploy certiicates to Coniguration Manager clients.
Certiicate proiles enable you to conigure automatic certiicate deployment to clients that
cannot participate in the Active Directory Certiicate Services (AD CS) autoenrollment process
because they are not members of the organization’s AD DS. The Windows RT 8.1,
Windows 8.1, iOS, and Android operating systems support certiicate proiles, which in turn
support the following functionality:
■ Certiicate enrollment and renewal from enterprise or standalone certiication
authorities (CAs)
■ Deployment of trusted CA certiicates to compatible Coniguration Manager clients
■ Monitoring of and reporting on installed certiicates
To use certiicate proiles, you must deploy the certiicate registration point on a site sys-
tem server either in the central administration site or in a primary site. You cannot deploy this
role in a secondary site.
Objective 7.3: Manage connection proiles by using Coniguration Manager CHAPTER 7 335
Email proiles
Email proiles are an optional feature in Coniguration Manager 2012 R2. They enable you to
provision managed devices running Windows Phone 8 and Windows Phone 8.1 or devices
running iOS 5, iOS 6, iOS 7, and iOS 8 with proile information for organizational email
accounts through Exchange ActiveSync. This minimizes the amount of effort required for a
user to provision a connection to his organizational email account. In addition to email set-
tings, an email proile conigures synchronization settings for contacts, calendars, and tasks.
Before it is possible to conigure an email proile, it is necessary to install the Email Proiles
Extension for Intune in the Coniguration Manager site.
Wi-Fi proiles
You can use Wi-Fi proiles to deploy wireless network settings so that devices will connect
automatically to preconigured wireless networks without requiring the user to perform the
operation manually. When you deploy Wi-Fi proiles, computers and mobile devices will con-
nect to networks automatically without requiring direct user intervention.
You can use Wi-Fi proiles with devices running the following operating systems:
■ Windows 8.1 (x86 and x64)
■ Windows RT 8.1
■ iOS 5
■ iOS 6
■ iOS 7
■ iOS 8
■ Android
Figure 7-12 shows a Wi-Fi proile for a wireless network with the SSID Contoso.
Objective 7.3: Manage connection proiles by using Coniguration Manager CHAPTER 7 337
EXAM TIP
Remember which items can be provisioned using proiles.
Thought experiment
Managed iOS devices at Contoso
You are using the MDM functionality of Coniguration Manager and Intune to man-
age a large collection of iOS devices at Contoso. You want to ensure that the man-
aged devices trust certiicates issued by a standalone CA deployed on the Contoso
perimeter network. You also want to ensure that users of managed iOS devices do
not have to conigure connections manually to the internal Contoso Wi-Fi network.
With this information in mind, answer the following questions:
1. What steps can you take to ensure that managed iOS devices trust certiicates
issued by the standalone CA on the perimeter network?
2. What steps can you take to ensure that managed iOS devices can automatically
connect to wireless networks?
Objective summary
■ Remote connection proiles enable you to deploy Remote Desktop connection conig-
uration information to managed computers, allowing remote access to those comput-
ers using a Remote Desktop Protocol (RDP) client.
■ VPN proiles enable you to deploy VPN connection coniguration information to man-
aged devices.
■ Certiicate proiles enable you to deploy certiicates to managed devices.
■ Email proiles enable you to deploy email, calendar, contacts, and tasks coniguration
information to managed devices.
■ Wi-Fi proiles enable you to deploy wireless network coniguration information to
managed devices.
Objective 7.3: Manage connection proiles by using Coniguration Manager CHAPTER 7 339
Objective 7.1
Thought experiment
1. You would conigure the Security Settings group to ensure that mobile device cameras
cannot be used at Fabrikam.
2. You would conigure the Email Management Settings group to block Direct Push noti-
ications when a mobile device is connected to a roaming network.
Objective review
1. Correct Answer: C
a. Incorrect: When coniguring the connector, you have to provide the address of
the client access server.
B. Incorrect: When coniguring the connector, you have to provide the address of
the client access server.
C. Correct: When coniguring the connector, you have to provide the address of the
client access server.
D. Incorrect: When coniguring the connector, you have to provide the address of
the client access server.
2. Correct Answer: B
a. Incorrect: The Minimum Password Length setting conigures minimum password
length.
B. Correct: You would conigure the Password Expiration In Days setting and set the
value to 35 days if you wanted people to change their mobile device’s password
every ive weeks.
C. Incorrect: Use the Number Of Passwords Remembered setting to ensure that
passwords cannot be reused.
D. Incorrect: Use the Number Of Failed Logon Attempts Before The Device Is Wiped
setting to ensure that a device is wiped if a password is incorrectly entered a num-
ber of times in succession.
3. Correct Answer: B
a. Incorrect: Use the Number Of Failed Logon Attempts Before The Device Is Wiped
setting to ensure that a device is wiped if a password is incorrectly entered a num-
ber of times in succession.
B. Correct: Use the Number Of Passwords Remembered setting to ensure that pass-
words cannot be reused.
Objective 7.2
Thought experiment
1. The site server on which you deploy the Intune connector must be able to communi-
cate with the manage.microsoft.com hostname.
2. You must conigure an Intune administrator account. You should not use the account
that you used to sign up for Intune (the Outlook.com, Hotmail.com, or live.com
Microsoft account) to conigure the connector.
Objective review
1. Correct Answers: C and D
a. Incorrect: You cannot perform an operating system upgrade by using Intune.
B. Incorrect: You cannot perform BitLocker unlock by using Intune.
C. Correct: You can perform application deployment by using Intune.
D. Correct: You can perform hardware inventory by using Intune.
2. Correct Answer: A
a. Correct: Prior to coniguring a connection between an on-premises Coniguration
Manager deployment and Intune, you must create a canonical name (CNAME)
record in DNS that maps enterpriseenrollment.organizationame.com (where orga-
nizationname.com is your organization’s DNS sufix) to manage.microsoft.com.
B. Incorrect: You must create a CNAME record. MX records are used to locate mail
servers.
Objective 7.3
Thought experiment
1. You can conigure a certiicate proile to deploy the CA certiicate of the standalone CA
on the perimeter network to managed devices. This will ensure that the managed iOS
devices trust certiicates issued by the standalone CA.
2. You can conigure a Wi-Fi proile with the authentication details of Wi-Fi networks at
Contoso. This will ensure that managed iOS devices can automatically connect to wire-
less networks.
Objective review
1. Correct Answer: D
a. Incorrect: You use an email proile to provision a device with email, calendar, task,
and contacts settings.
B. Incorrect: You can use a certiicate proile to deploy a certiicate, including a root
certiicate or a self-signed certiicate, to a managed device. This certiicate will be
trusted.
C. Incorrect: You can use a VPN proile to deploy VPN connection information auto-
matically to managed devices.
D. Correct: You can use a remote connection proile to conigure computers so that
they will accept inbound Remote Desktop connection requests if speciic condi-
tions are met.
345
346
347
348
349
350
F
Failed VE Data object type, 295
I
fallback status points, 236 IDMIF ile format, 282
ile collection IIS (Internet Information Services), 105
about, 279–280 Import Coniguration Data Wizard, 181, 191
disabling, 282 Import Software Licenses Wizard, 93, 307
status messages regarding, 284 In Progress compliance state, 88
File System detection rule, 60 include collections rule, 244
FileSystemFile.log ile, 283 Install deployment action, 44
irewalls Installable Rules dialog box, 131
bandwidth management settings, 104 Installable rules rule type, 134
Coniguration Manager clients, 230 installation
distribution points, 100 Coniguration Manager clients, 230–234, 257–259
Endpoint Protection, 198–200, 207–208 Intune, 78–79
mobile device settings, 184 sequenced applications, 16–18
FQDN (fully qualiied domain name), 100, 226 streaming applications, 17–18
Full Administrator role, 140 Installed compliance state, 144
full infrastructure (Enterprise) model, 13–14 Installed rules rule type, 134
fully qualiied domain name (FQDN), 100, 226 instance limitation, deployment models, 13–14
Integration node (Group Policy), 20
Internet-based clients, 226–227
351
352
353
354
355
356
357
358
359
361
www.microsoftvirtualacademy.com/ebooks
Microsoft Press