1 / 20

System Center Configuration Manager 2012 Technical Overview – Part 2

System Center Configuration Manager 2012 Technical Overview – Part 2. Walter Pitrof Technology Solution Professional Microsoft Switzerland Email: walterp@microsoft.com. 2012. Agenda – Part 2. Microsoft Forefront Endpoint Protection 2012 Role-Based Administration

sanam
Download Presentation

System Center Configuration Manager 2012 Technical Overview – Part 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. System Center Configuration Manager 2012Technical Overview – Part 2 Walter Pitrof Technology Solution Professional Microsoft Switzerland Email: walterp@microsoft.com 2012

  2. Agenda – Part 2 • Microsoft Forefront Endpoint Protection 2012 • Role-Based Administration • Settings Management • Mobile Device Management • Software Updates • Demo • Q & A

  3. Microsoft ForefrontEndpoint Protection 2012

  4. Forefront EndpointProtection 2012 Provides the following benefits: • Easy to Deploy • Seamless migration from previous antivirus solutions • Easy to Manage • Integration with your existing system management infrastructure • Reporting functionality • Unified Protection • FEP delivers single-agent, multi-threat protection for desktops, portable computers. Backed by a world-class response center and a dedicated community (Microsoft SpyNet®) serving millions of users, the FEP client includes: • Antimalware and antispyware • Rootkit detection and remediation • Critical vulnerability assessment and automatic updates • Integrated Windows Firewall management • Network vulnerability detection via Network Inspection System

  5. FEP 2012 demo

  6. Role-Based Administration

  7. Role-Based Administration Example • Peter assigns Application Deployment role to Meg Meg is responsible for deploying software Meg has a limited view

  8. Role Based Administration demo

  9. Settings Management(aka DCM)

  10. Browse on gold system when creating CIs Scenario: Simplify configuration item creation. Design principal: Admin can create DCM setting and rule without typing by browsing gold system registry and file system, eliminating human errors. Browse local / remote machine Registry and File System only

  11. Settings Management demo

  12. Mobile Device Management

  13. User Centric – Device Management • Managing users means managing beyond desktops with “Single pane of glass” administration • Reaching beyond Windows platforms • “Light” • Provides basic management for all Exchange ActiveSync (EAS) connected devices • “Depth” • Broad feature set • Common administration model for mobile devices, desktops, and servers

  14. Mobile Device Support Exchange Connector demo

  15. Software Updates

  16. Software Updates Management (SUM)

  17. Software Updates • State-based Update Groups • Deploy updates individually or in groups • Updates added to an update group automatically deploy to collections targeted with the group • Auto Deployment Rules • Use search criteria to identify class of updates to automatically deploy: category, products, language, date revised, article id, bulletin id, etc. • Schedule content download and deployment based on sync schedule or define a separate schedule per rule

  18. Update Auto Approval demo

  19. Q&A

  20. © 2011 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related