Mastering System Center Configuration Manager
- Length: 262 pages
- Edition: 1
- Language: English
- Publisher: Packt Publishing
- Publication Date: 2014-12-31
- ISBN-10: 1782175458
- ISBN-13: 9781782175452
- Sales Rank: #5687781 (See Top 100 Books)
Master how to configure, back up, and secure access to System Center Configuration Manager with this practical guide
About This Book
- Employ fast and scalable on-demand application deployment
- Discover the best practices to utilize faster and more efficient anti-malware scanning of clients
- Packed with easy and practical examples to improve your asset management quickly and effectively
Who This Book Is For
This book is perfect for IT administrators who are looking to enhance their skills on system and asset management. A fair understanding of the core elements and applications related to SCCM would be helpful.
In Detail
Microsoft System Center Configuration Manager is a powerful system management product that helps IT administrators perform better asset and organization management by grouping them into logical containers. These logical containers allow you to perform application deployments and software and security updates in no time.
Mastering System Center Configuration Manager explains the Configuration Manager architecture, hierarchy, and components, as well as how to use them. It also provides advanced-level content on how to set up System Center Configuration Manager and integrate it with an existing system. You will also find information on deploying applications, creating client settings, and integrating Configuration Manager with Windows Azure to utilize its full power. At the end of the book, you will learn how to troubleshoot issues with SCCM 2012 R2 on the server side and also on the client side.
Table of Contents
Chapter 1: Introduction to System Center Configuration Manager 2012 R2
Chapter 2: Assets and Compliance
Chapter 3: Software Library
Chapter 4: Reporting in Configuration Manager
Chapter 5: Administration and Monitoring
Chapter 6: Cloud Integration
Chapter 7: Security and Backup
Chapter 8: Troubleshooting