Get in Touch

Course Outline

Module 1: Managing computers and mobile devices in the enterprise

This module outlines the Configuration Manager features that facilitate complex management tasks, including:

  • Hardware and software inventory.
  • Application management.
  • Operating system deployment.
  • Settings management.
  • Software update management.
  • Remote client troubleshooting.
  • Protection from malware.

Lessons for module 1

  • Overview of systems management by using enterprise management solutions
  • Overview of the Configuration Manager architecture
  • Overview of the Configuration Manager administrative tools
  • Tools for monitoring and troubleshooting a Configuration Manager site

Lab : Exploring the Configuration Manager tools

  • Searching in the Configuration Manager console
  • Using Windows PowerShell with Configuration Manager
  • Using Configuration Manager Service Manager to manage components
  • Monitoring site and component status
  • Reviewing log files by using the Configuration Manager Trace tool
  • Explain how to use Configuration Manager to address the challenges of managing systems and users in today’s enterprise.
  • Describe the Configuration Manager architecture.
  • Describe the management tools that you use to perform administrative functions for Configuration Manager.
  • Describe the tools that you use to monitor and troubleshoot a Configuration Manager site.

Module 2: Analyzing data using queries and reports

The Microsoft System Center Configuration Manager database holds a vast amount of data regarding the resources in your environment. Since it is not always necessary to perform all management tasks on every resource simultaneously, you can create queries to locate specific devices or user objects that meet certain criteria. These queries can also be used to create collections or to gather additional information about specific resources. This module details queries and the methods for creating and running them. Additionally, you can run reports to view various types of information related to your Configuration Manager environment. Running these reports requires the installation and configuration of a reporting services point, which this module covers in detail.

Lessons for module 2

  • Introduction to queries
  • Configuring Microsoft SQL Server Reporting Services (SSRS)

Lab : Creating and running queriesConfiguring boundaries and resource discovery

  • Creating data queries
  • Creating subselect queries
  • Creating status message queries

Lab : Configuring SSRS

  • Configuring a reporting services point
  • Creating a report by using Report Builder
  • Create and configure data and status message queries.
  • Configure and manage SSRS and the reporting services point.

Module 3: Preparing the management infrastructure to support PCs and mobile devices

This module explains how to prepare the management infrastructure, which includes configuring boundaries, boundary groups, and resource discovery. It also describes how Configuration Manager interacts with the Microsoft Exchange Server environment to discover and manage mobile devices.

Lessons for module 3

  • Configuring site boundaries and boundary groups
  • Configuring resource discovery
  • Configuring the Exchange Server Connector for mobile device management
  • Configuring user and device collections

Lab : Configuring boundaries and resource discovery

  • Configuring boundaries, boundary groups, and fallback relationships
  • Configuring Active Directory discovery methods

Lab : Configuring user and device collections

  • Creating a device collection
  • Creating a user collection
  • Configuring a maintenance window
  • Configure boundaries and boundary groups.
  • Configure resource discovery.
  • Configure the Exchange Server connector mobile device management.
  • Organize resources using device and user collections.

Module 4: Deploying and managing clients

This module details the supported operating systems and devices, software requirements, and various methods for installing the Configuration Manager client. It also describes default and custom client settings that can be configured. Once the client software is installed, you can configure client settings to perform routine management tasks.

Lessons for module 4

  • Overview of the Configuration Manager client
  • Deploying the Configuration Manager client
  • Configuring and monitoring client status
  • Managing client settings in Configuration Manager

Lab : Deploying the Microsoft System Center Configuration Manager client software

  • Preparing the site for client installation
  • Deploying the Configuration Manager client software by using client push installation

Lab : Configuring and monitoring client status

  • Configuring and monitoring client health status

Lab : Managing client settings

  • Configuring client settings
  • Describe the requirements and considerations for installing the Configuration Manager client software.
  • Deploy the Configuration Manager client software.
  • Configure and monitor client status.
  • Manage Configuration Manager client settings.

Module 5: Managing inventory for PCs and applications

This module provides an overview of inventory collection and explains how to manage the collected information. You will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and starting and securing inventory collection. The module also covers the use of software metering to monitor program usage, as well as the configuration and management of Asset Intelligence.

Lessons for module 5

  • Overview of inventory collection
  • Configuring hardware and software inventory
  • Managing inventory collection
  • Configuring software metering
  • Configuring and managing Asset Intelligence

Lab : Configuring and managing inventory collection

  • Configuring and managing hardware inventory

Lab : Configuring software metering

  • Configuring software metering

Lab : Configuring and managing Asset Intelligence

  • Preparing the site for Asset Intelligence
  • Configuring Asset Intelligence
  • Monitoring license agreements by using Asset Intelligence
  • Viewing Asset Intelligence reports
  • Describe inventory collection.
  • Configure and collect hardware and software inventory.
  • Manage inventory collection.
  • Configure software metering.
  • Configure Asset Intelligence.

Module 6: Distributing and managing content used for deployments

Configuration Manager clients retrieve content, such as packages, applications, software updates, and operating system images, from distribution points. Configuration Manager depends on the distribution point infrastructure to provide content management functionality. In this module, you will review content management features, configure distribution points, and learn how to distribute and monitor content. You will also perform content validation and prestaging.

Lessons for module 6

  • Preparing the infrastructure for content management
  • Distributing and managing content on distribution points

Lab : Distributing and managing content for deployments

  • Installing a new distribution point
  • Managing content distribution
  • Prepare the infrastructure for content management.
  • Distribute and manage content on distribution points.

Module 7: Deploying and managing applications

In this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You will also learn to use the Software Center and the Application Catalog to install available applications. The module covers managing deployments for non-traditional applications and installing Windows 10 apps and virtualized applications.

Lessons for module 7

  • Overview of application management
  • Creating applications
  • Deploying applications
  • Managing applications
  • Deploying virtual applications by using System Center Configuration Manager (Optional)
  • Deploying and managing Windows Store apps

Lab : Creating and deploying applications

  • Installing and configuring the Application Catalog roles
  • Creating applications with requirements
  • Deploying applications

Lab : Managing application supersedence and removal

  • Managing application supersedence
  • Uninstalling the Excel Viewer application

Lab : Deploying virtual applications by using Configuration Manager (Optional)

  • Configuring support for App-V
  • Deploying virtual applications

Lab : Using Configuration Manager to deploy Windows Store apps

  • Configuring support for sideloading Windows Store apps
  • Configuring a Windows Store app
  • Deploying Windows 10 apps to users
  • Describe the application management features of Configuration Manager.
  • Create applications.
  • Deploy applications.
  • Manage applications.
  • Configure and deploy virtual applications.
  • Configure and deploy Windows Store apps.

Module 8: Maintaining software updates for managed PCs

This module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring software updates to your Configuration Manager clients.

Lessons for module 8

  • The software updates process
  • Preparing a Configuration Manager site for software updates
  • Managing software updates
  • Configuring automatic deployment rules
  • Monitoring and troubleshooting software updates

Lab : Configuring the site for software updates

  • Configuring and synchronizing the software update point

Lab : Deploying and managing software updates

  • Determining software update compliance
  • Deploying software updates to clients
  • Configuring automatic deployment rules
  • Describe how the software updates feature integrates with Configuration Manager.
  • Prepare the Configuration Manager site for software updates.
  • Manage the evaluation and deployment of software updates.
  • Configure automatic deployment rules.
  • Monitor and troubleshoot software updates.

Module 9: Implementing Endpoint Protection for managed PCs

Configuration Manager offers several security-related features to help protect client computers from malware threats and to configure specific Windows Firewall settings. Based on System Center Endpoint Protection (Endpoint Protection) functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies and Windows Firewall settings on client computers. This module explains how to configure Endpoint Protection Configuration Manager to implement Endpoint Protection and deploy and monitor Endpoint Protection policies.

Lessons for module 9

  • Overview of Endpoint Protection in Configuration Manager
  • Configuring, deploying, and monitoring Endpoint Protection policies

Lab : Implementing Microsoft System Center Endpoint Protection

  • Configuring the System Center Endpoint Protection point and client settings
  • Configuring and deploying Endpoint Protection policies
  • Monitoring Endpoint Protection
  • Configure Endpoint Protection to detect and remediate malware and security vulnerabilities.
  • Configure, deploy, and manage Endpoint Protection policies.

Module 10: Managing compliance and secure data access

Many enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager play a key role in identifying existing configurations, discovering systems with adverse configuration changes, and automatically remediating these settings when necessary. Compliance settings also help control how users manage and access data in the enterprise network environment. For computers running Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You can also control data access using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings manageable via Configuration Manager and teaches you how to use them to maintain configuration requirements and provide secure data access to enterprise resources.

Lessons for module 10

  • Overview of Compliance Settings
  • Configuring compliance settings
  • Viewing compliance results
  • Managing resource and data access

Lab : Managing compliance settings

  • Managing configuration items and baselines
  • Viewing compliance settings and reports
  • Configuring remediation in compliance settings
  • Using compliance information to create collections
  • Describe compliance settings features.
  • Configure compliance settings.
  • View compliance results.
  • Manage resource and data access.

Module 11: Managing operating system deployment

You can use the operating system deployment feature in Configuration Manager to create operating system images for deployment to unmanaged computers and those managed by Configuration Manager. There are several scenarios for deploying operating systems via Configuration Manager, including working with new systems or upgrading existing ones. Operating system deployment utilizes both Configuration Manager and Windows components to manage and deliver images. You can configure settings on a reference computer before capturing its operating system image, or use task sequences created by Configuration Manager after deploying the image to a target system. This module explains how to use Configuration Manager to create an operating-system deployment strategy and how to manage Windows as a service.

Lessons for module 11

  • An overview of operating system deployment
  • Preparing a site for operating system deployment
  • Deploying an operating system
  • Managing Windows as a service

Lab : Preparing thea site for operating -system deployment

  • Managing the site system roles used to support operating system deployment
  • Managing packages to support operating system deployment

Lab : Deploying operating -system images for bare-metal installations

  • Preparing the operating system image
  • Creating a task sequence to deploy an image
  • Deploying an image
  • Describe the terminology, components, and scenarios used to deploy operating systems by using Configuration Manager.
  • Describe how to prepare a site for operating system deployment.
  • Describe the process used to deploy an operating system image.

Module 12: Managing and maintaining a Configuration Manager site

This module explains how to manage and maintain a Configuration Manager site. It describes role-based administration, Remote Tools, and site maintenance tasks manageable via Configuration Manager. Additionally, it explains how to back up and recover a Configuration Manager site system.

Lessons for module 12

  • Configuring role-based administration
  • Configuring Remote Tools
  • Overview of Configuration Manager site maintenance
  • Backing up and recovering a Configuration Manager site

Lab : Configuring role-based administration

  • Configuring a new scope for Toronto administrators
  • Configuring a new administrative user

Lab : Configuring Remote Tools

  • Configuring the Remote Tools client settings and permissions
  • Managing desktops by using Remote Control

Lab : Maintaining a Configuration Manager site

  • Configuring maintenance tasks in Configuration Manager
  • Configuring the Backup Site Server task
  • Recovering a site from a backup
  • Configure role-based administration.
  • Configure Remote Tools to support client activity.
  • Identify Configuration Manager site Maintenance tasks.
  • Back up and recover a Configuration Manager site.

Requirements

  • Networking fundamentals, encompassing common networking protocols, topologies, hardware, media, routing, switching, and addressing.
  • Active Directory Domain Services (AD DS) principles and the fundamentals of AD DS management.
  • Installation, configuration, and troubleshooting procedures for Windows-based personal computers.
  • Basic concepts of public key infrastructure (PKI) security.
  • Fundamental understanding of scripting and Windows PowerShell syntax.
  • Basic understanding of Windows Server roles and services.
  • Basic understanding of the configuration options for iOS, Android, and Windows Mobile device platforms.

Students may fulfill these prerequisites by attending the following courses or by gaining equivalent knowledge and skills through practical experience:

  • Course 20697-1: Installing and Configuring Windows 10
  • Course 20697-2: Deploying and Managing Windows 10 Using Enterprise Services
  • Course 20411: Administering Windows Server 2012
 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories