SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
chrisest@microsoft.com
What is in SCCM 2012?
What is in SCCM 2012?


             IT Asset
           Intelligence   Software Update
                           Management
            Software
            Metering      Remote Control


  classic and App-V              Support for
     Applications                the Mobile
   Selfservice Portal             Workforce
                                   Power
   OS Deployment
                                Management
                   Network Access Antivirus*
                     Protection
               Settings Management
                     (aka DCM)
Configuration Manager 2007:                          Configuration Manager 2012:
• Optimized for Systems Management scenarios         • Still committed and focused on System
                                                       Management scenarios
• Challenging to manage users:
                                                     • Embrace User Centric scenarios:
  • Forced to translate a user to a device
                                                       • Moving to a state based design, for apps,
  • Explicit: run a specific program on a specific
                                                         deployments, content on DPs.
    device
                                                       • Full application lifecycle model. Install,
• Software Distribution is a glorified script
                                                         Revision Mgt, Supersedence and Uninstall
  execution.
                                                       • Understand and intelligently target the
                                                         relationships between user systems
                                                       • Management solution tailored for
                                                         applications
Application Installation




Application Uninstall                                                            Application Revision




                        Application Retirement)              Application Supersedence
Office 2000
                                                    and 2007
    Eliminate Application-to-                       running
    Application Compatibility                       together…
    issues




                                App-V applies to your custom
                                applications as well…
Run different
versions of Java
together…
Peter as „ConfigMgr Admin‟
has rights to entire console


Peter assigns Application
Deployment role to Meg

Meg is responsible for
deploying software

Meg has a limited view
CENTRAL                                CENTRAL
    SITE                                   SITE


               Desktop                                  Security
              management                              management
                solution                                solution




   BRANCH       BRANCH         BRANCH    BRANCH         BRANCH         BRANCH
     SITE         SITE           SITE      SITE           SITE           SITE
                                        Security solutions such as Anti-Virus,
Applications, OS and application
                                        Desktop Firewall, NAP, Host Intrusion
patches, Asset Inventory, etc
                                        Prevention, etc
Security   + Management
IMPROVED PROTECTION                                   LOWER COSTS
   Security personnel have access                         One server infrastructure to
   to desktop configuration data                          maintain
   Healthstatus and protection                            A single mechanism to deploy
   status in a single interface, with                     software updates to clients
   consolidated reporting
                                                          Central policy implementation
   Incident response (identify /                          for security and management
   patch / remediate) is more
   targeted                                               One set of training for
                                                          administrators
      Riga Stradins                                       A single license to purchase
     University                                           (Core CAL)
“The integration of management and security makes our IT organization more agile. We‟re more
 efficient in the way that we use our personnel. We‟ve increased the number of people available to
 respond to security incidents by 20% with no increase in headcount.”
One infrastructure for desktop management and protection




 FEP is now part of Core CAL




      Slovenia Telecom
 “The integration of Forefront Endpoint Protection with System Center
  Configuration Manager lets us break down the silos within our
  organization and increase efficiency.”
Windows 7 Built-in Features

   Anti-Spyware                               Windows Defender
   Desktop Firewall                           Windows Firewall
   Host Intrusion Prevention (HIPS)           User Access Protection (UAC)
   Network Access Control (NAC)               Network Access Protection
   Hard Disk Encryption (new)                 BitLocker* and BitLocker to Go*
   Virtual Private Network (VPN)              DirectAccess*

Typically, your end point security solution   Most of these features are already part
alone will consume 500~600MB of disk          of Windows 7. Windows 7 is secure by
space                                         default. You basically need only one
                                              security agent – Anti-Virus . FEP is now
                                              part of Core CAL.

                                              *Windows Enterprise feature
Network Security                         Internet Explore 8                  DirectAccess
            •   Policy based networking              Help protect users against:         • Security enhanced, seamless, always on
            •   Multi-Home Firewall Profiles         • Social engineering, privacy,        connection to corporate network
            •   DNSSec Support                         Browser based, and Web server     • Improved management of remote users
            •   Multiple Active Firewalls              exploits                          • Consistent security for all access
            •   Internet Protocol security (IPSec)                                         scenarios
                improvements

User Account Control
• Streamlined UAC
• Standard user can do even more


                                                                                                    Network Access Protection
                                                                                                    • Ensure compliance upon access
AppLocker                                                                                           • Access remediation enforcement
• Application “with listing” control
• Enables application standardization




            BitLocker                                Right Management                    Encrypting File System
            • BitLocker encryption for local         Services                            • User-based file and folder encryption
              HDD
                                                     • Policy based, collaboration and
            • BitLocker To Go for USB
                                                       document level rights
            • Group Policy enforcement
                                                       management



                                                                                                  *Comparison to Enterprise Version
Unified compliance-settings management across
servers, desktops laptops, and mobile devices
Simplify administrator experience
  Browse gold system when creating configuration items
  Simplified Baseline creation experience
Deployment of Baselines
  User and Device targeting of Baselines
  Define compliance SLAs for Baseline deployments and
  generate Alerts
Monitoring Baseline deployment compliance status
Automatic remediation (aka DCM “set”)
CI revisioning and change control
Offline Servicing of Images
  Support for Component Based Servicing compatible
  updates
  Uses updates already approved
Boot Media Updates
  Hierarchy wide boot media – no longer need one per
  site
  Unattended boot media mode – no longer need to
  press “next”
  Use pre-execution hooks to automatically select a task
  sequence – no longer see many optional task sequences
USMT 4.0 - UI integration and support for hard-
link, offline and shadow copy features
IS BACK!
https://connect.microsoft.com/Configuratio
nManagervnext

http://www.microsoft.com/sccm
Sccm 2012 overview - chris_estonina

Más contenido relacionado

La actualidad más candente

System Center 2012 Overview
System Center 2012 OverviewSystem Center 2012 Overview
System Center 2012 OverviewAmit Gatenyo
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pMicrosoft Singapore
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Abdelslam Elsobky
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationShahab Al Yamin Chawdhury
 
SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012capriguy84
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...Herman Arnedo
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012JasonCondo
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Herman Arnedo
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewAmit Gatenyo
 
Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1Unitek Eduation
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-labDPA
 
System Center 2012 Technical Overview
System Center 2012 Technical OverviewSystem Center 2012 Technical Overview
System Center 2012 Technical OverviewAmit Gatenyo
 

La actualidad más candente (20)

System Center 2012 Overview
System Center 2012 OverviewSystem Center 2012 Overview
System Center 2012 Overview
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by Atidan
 
SCCM 2012 Presentation
SCCM 2012 PresentationSCCM 2012 Presentation
SCCM 2012 Presentation
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_p
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012
 
SCCM 2007 Presentation
SCCM 2007 PresentationSCCM 2007 Presentation
SCCM 2007 Presentation
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
 
System center seminar presentation
System center seminar presentationSystem center seminar presentation
System center seminar presentation
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 Installation
 
SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012
 
Installation
InstallationInstallation
Installation
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
 
Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-lab
 
System Center 2012 Technical Overview
System Center 2012 Technical OverviewSystem Center 2012 Technical Overview
System Center 2012 Technical Overview
 
scom
scomscom
scom
 

Destacado

Desktop central-it-mgr
Desktop central-it-mgrDesktop central-it-mgr
Desktop central-it-mgrdaneshjou
 
Retrospective AAET 2016
Retrospective AAET 2016Retrospective AAET 2016
Retrospective AAET 2016aetsenegal
 
Préparer et distribuer une application moderne d'entreprise
Préparer et distribuer une application moderne d'entreprisePréparer et distribuer une application moderne d'entreprise
Préparer et distribuer une application moderne d'entrepriseMicrosoft
 
Périphériques non-Windows et SCCM – Intégrations et management
Périphériques non-Windows et SCCM – Intégrations et managementPériphériques non-Windows et SCCM – Intégrations et management
Périphériques non-Windows et SCCM – Intégrations et managementMicrosoft Technet France
 
SolarWinds Patch Manager Compared to Shavlik / VMware
SolarWinds Patch Manager Compared to Shavlik / VMwareSolarWinds Patch Manager Compared to Shavlik / VMware
SolarWinds Patch Manager Compared to Shavlik / VMwareSolarWinds
 
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 

Destacado (10)

Desktop central-it-mgr
Desktop central-it-mgrDesktop central-it-mgr
Desktop central-it-mgr
 
Retrospective AAET 2016
Retrospective AAET 2016Retrospective AAET 2016
Retrospective AAET 2016
 
Préparer et distribuer une application moderne d'entreprise
Préparer et distribuer une application moderne d'entreprisePréparer et distribuer une application moderne d'entreprise
Préparer et distribuer une application moderne d'entreprise
 
Périphériques non-Windows et SCCM – Intégrations et management
Périphériques non-Windows et SCCM – Intégrations et managementPériphériques non-Windows et SCCM – Intégrations et management
Périphériques non-Windows et SCCM – Intégrations et management
 
Déploiement de Windows 8
Déploiement de Windows 8Déploiement de Windows 8
Déploiement de Windows 8
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
SolarWinds Patch Manager Compared to Shavlik / VMware
SolarWinds Patch Manager Compared to Shavlik / VMwareSolarWinds Patch Manager Compared to Shavlik / VMware
SolarWinds Patch Manager Compared to Shavlik / VMware
 
Green - sizing for estimating, measurement and benchmarking
Green - sizing for estimating, measurement and benchmarkingGreen - sizing for estimating, measurement and benchmarking
Green - sizing for estimating, measurement and benchmarking
 
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 

Similar a Sccm 2012 overview - chris_estonina

Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionLumension
 
Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5ukdpe
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsNovell
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Omega Peripherals
 
MS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical OverviewMS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical OverviewSpiffy
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightIBM WebSphereIndia
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 

Similar a Sccm 2012 overview - chris_estonina (20)

Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
System Center 2012
System Center 2012System Center 2012
System Center 2012
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1
 
Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1
 
MS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical OverviewMS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical Overview
 
Best of Microsoft Management Summit 2012
Best of Microsoft Management Summit 2012Best of Microsoft Management Summit 2012
Best of Microsoft Management Summit 2012
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, AmytimeEmpower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
W8 client management
W8 client managementW8 client management
W8 client management
 

Más de Microsoft Singapore

Flex workstyle aug 31 alan stone
Flex workstyle aug 31   alan stoneFlex workstyle aug 31   alan stone
Flex workstyle aug 31 alan stoneMicrosoft Singapore
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft Singapore
 
Flexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardmanFlexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardmanMicrosoft Singapore
 
A complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panoramaA complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panoramaMicrosoft Singapore
 
The power of cloud productivity chai wei pin chassasia
The power of cloud productivity chai wei pin chassasiaThe power of cloud productivity chai wei pin chassasia
The power of cloud productivity chai wei pin chassasiaMicrosoft Singapore
 
The journey to share point steve sofian_arvato
The journey to share point steve sofian_arvatoThe journey to share point steve sofian_arvato
The journey to share point steve sofian_arvatoMicrosoft Singapore
 
Business productivity value, pricing and licensing hau lu ms
Business productivity value, pricing and licensing hau lu msBusiness productivity value, pricing and licensing hau lu ms
Business productivity value, pricing and licensing hau lu msMicrosoft Singapore
 
Building a service excellence with ms dynamics crm phua chieh sze ccc
Building a service excellence with ms dynamics crm phua chieh sze cccBuilding a service excellence with ms dynamics crm phua chieh sze ccc
Building a service excellence with ms dynamics crm phua chieh sze cccMicrosoft Singapore
 
Microsoft hyper v cloud licensing myths & truths david tang
Microsoft hyper v cloud licensing myths & truths david tangMicrosoft hyper v cloud licensing myths & truths david tang
Microsoft hyper v cloud licensing myths & truths david tangMicrosoft Singapore
 
Private cloud virtual reality to reality a partner story daniel mar_technicom
Private cloud virtual reality to reality a partner story daniel mar_technicomPrivate cloud virtual reality to reality a partner story daniel mar_technicom
Private cloud virtual reality to reality a partner story daniel mar_technicomMicrosoft Singapore
 
Building your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison leeBuilding your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison leeMicrosoft Singapore
 
Work smarter with the future of productivity hau lu
Work smarter with the future of productivity hau luWork smarter with the future of productivity hau lu
Work smarter with the future of productivity hau luMicrosoft Singapore
 
Ms cloud vision_strategy_chris_sharp
Ms cloud vision_strategy_chris_sharpMs cloud vision_strategy_chris_sharp
Ms cloud vision_strategy_chris_sharpMicrosoft Singapore
 
Next gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forteNext gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forteMicrosoft Singapore
 
Converged application solutions yujin lee(hp)
Converged application solutions yujin lee(hp)Converged application solutions yujin lee(hp)
Converged application solutions yujin lee(hp)Microsoft Singapore
 
Information platform of the future mark jewett
Information platform of the future mark jewettInformation platform of the future mark jewett
Information platform of the future mark jewettMicrosoft Singapore
 
microsoft-tag-overview-presentation-for-agency-day-singapore
microsoft-tag-overview-presentation-for-agency-day-singaporemicrosoft-tag-overview-presentation-for-agency-day-singapore
microsoft-tag-overview-presentation-for-agency-day-singaporeMicrosoft Singapore
 

Más de Microsoft Singapore (20)

Flex workstyle aug 31 alan stone
Flex workstyle aug 31   alan stoneFlex workstyle aug 31   alan stone
Flex workstyle aug 31 alan stone
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estonina
 
Flexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardmanFlexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardman
 
A complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panoramaA complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panorama
 
The power of cloud productivity chai wei pin chassasia
The power of cloud productivity chai wei pin chassasiaThe power of cloud productivity chai wei pin chassasia
The power of cloud productivity chai wei pin chassasia
 
The journey to share point steve sofian_arvato
The journey to share point steve sofian_arvatoThe journey to share point steve sofian_arvato
The journey to share point steve sofian_arvato
 
Business productivity value, pricing and licensing hau lu ms
Business productivity value, pricing and licensing hau lu msBusiness productivity value, pricing and licensing hau lu ms
Business productivity value, pricing and licensing hau lu ms
 
Building a service excellence with ms dynamics crm phua chieh sze ccc
Building a service excellence with ms dynamics crm phua chieh sze cccBuilding a service excellence with ms dynamics crm phua chieh sze ccc
Building a service excellence with ms dynamics crm phua chieh sze ccc
 
Microsoft hyper v cloud licensing myths & truths david tang
Microsoft hyper v cloud licensing myths & truths david tangMicrosoft hyper v cloud licensing myths & truths david tang
Microsoft hyper v cloud licensing myths & truths david tang
 
Private cloud virtual reality to reality a partner story daniel mar_technicom
Private cloud virtual reality to reality a partner story daniel mar_technicomPrivate cloud virtual reality to reality a partner story daniel mar_technicom
Private cloud virtual reality to reality a partner story daniel mar_technicom
 
Cloud taxonomy yong kigkeat
Cloud taxonomy yong kigkeatCloud taxonomy yong kigkeat
Cloud taxonomy yong kigkeat
 
Building your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison leeBuilding your private cloud the ncs experience harrison lee
Building your private cloud the ncs experience harrison lee
 
Work smarter with the future of productivity hau lu
Work smarter with the future of productivity hau luWork smarter with the future of productivity hau lu
Work smarter with the future of productivity hau lu
 
Future of productivity hau lu
Future of productivity hau luFuture of productivity hau lu
Future of productivity hau lu
 
Ms cloud vision_strategy_chris_sharp
Ms cloud vision_strategy_chris_sharpMs cloud vision_strategy_chris_sharp
Ms cloud vision_strategy_chris_sharp
 
Next gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forteNext gen bi and datawarehouse solutions ross lo forte
Next gen bi and datawarehouse solutions ross lo forte
 
Converged application solutions yujin lee(hp)
Converged application solutions yujin lee(hp)Converged application solutions yujin lee(hp)
Converged application solutions yujin lee(hp)
 
Information platform of the future mark jewett
Information platform of the future mark jewettInformation platform of the future mark jewett
Information platform of the future mark jewett
 
microsoft-tag-overview-presentation-for-agency-day-singapore
microsoft-tag-overview-presentation-for-agency-day-singaporemicrosoft-tag-overview-presentation-for-agency-day-singapore
microsoft-tag-overview-presentation-for-agency-day-singapore
 
Xinmsn wl jonathan hardy
Xinmsn wl jonathan hardyXinmsn wl jonathan hardy
Xinmsn wl jonathan hardy
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Sccm 2012 overview - chris_estonina

  • 2.
  • 3. What is in SCCM 2012?
  • 4. What is in SCCM 2012? IT Asset Intelligence Software Update Management Software Metering Remote Control classic and App-V Support for Applications the Mobile Selfservice Portal Workforce Power OS Deployment Management Network Access Antivirus* Protection Settings Management (aka DCM)
  • 5.
  • 6. Configuration Manager 2007: Configuration Manager 2012: • Optimized for Systems Management scenarios • Still committed and focused on System Management scenarios • Challenging to manage users: • Embrace User Centric scenarios: • Forced to translate a user to a device • Moving to a state based design, for apps, • Explicit: run a specific program on a specific deployments, content on DPs. device • Full application lifecycle model. Install, • Software Distribution is a glorified script Revision Mgt, Supersedence and Uninstall execution. • Understand and intelligently target the relationships between user systems • Management solution tailored for applications
  • 7. Application Installation Application Uninstall Application Revision Application Retirement) Application Supersedence
  • 8.
  • 9. Office 2000 and 2007 Eliminate Application-to- running Application Compatibility together… issues App-V applies to your custom applications as well… Run different versions of Java together…
  • 10.
  • 11.
  • 12. Peter as „ConfigMgr Admin‟ has rights to entire console Peter assigns Application Deployment role to Meg Meg is responsible for deploying software Meg has a limited view
  • 13.
  • 14. CENTRAL CENTRAL SITE SITE Desktop Security management management solution solution BRANCH BRANCH BRANCH BRANCH BRANCH BRANCH SITE SITE SITE SITE SITE SITE Security solutions such as Anti-Virus, Applications, OS and application Desktop Firewall, NAP, Host Intrusion patches, Asset Inventory, etc Prevention, etc
  • 15. Security + Management IMPROVED PROTECTION LOWER COSTS Security personnel have access One server infrastructure to to desktop configuration data maintain Healthstatus and protection A single mechanism to deploy status in a single interface, with software updates to clients consolidated reporting Central policy implementation Incident response (identify / for security and management patch / remediate) is more targeted One set of training for administrators Riga Stradins A single license to purchase University (Core CAL) “The integration of management and security makes our IT organization more agile. We‟re more efficient in the way that we use our personnel. We‟ve increased the number of people available to respond to security incidents by 20% with no increase in headcount.”
  • 16. One infrastructure for desktop management and protection FEP is now part of Core CAL Slovenia Telecom “The integration of Forefront Endpoint Protection with System Center Configuration Manager lets us break down the silos within our organization and increase efficiency.”
  • 17. Windows 7 Built-in Features Anti-Spyware Windows Defender Desktop Firewall Windows Firewall Host Intrusion Prevention (HIPS) User Access Protection (UAC) Network Access Control (NAC) Network Access Protection Hard Disk Encryption (new) BitLocker* and BitLocker to Go* Virtual Private Network (VPN) DirectAccess* Typically, your end point security solution Most of these features are already part alone will consume 500~600MB of disk of Windows 7. Windows 7 is secure by space default. You basically need only one security agent – Anti-Virus . FEP is now part of Core CAL. *Windows Enterprise feature
  • 18. Network Security Internet Explore 8 DirectAccess • Policy based networking Help protect users against: • Security enhanced, seamless, always on • Multi-Home Firewall Profiles • Social engineering, privacy, connection to corporate network • DNSSec Support Browser based, and Web server • Improved management of remote users • Multiple Active Firewalls exploits • Consistent security for all access • Internet Protocol security (IPSec) scenarios improvements User Account Control • Streamlined UAC • Standard user can do even more Network Access Protection • Ensure compliance upon access AppLocker • Access remediation enforcement • Application “with listing” control • Enables application standardization BitLocker Right Management Encrypting File System • BitLocker encryption for local Services • User-based file and folder encryption HDD • Policy based, collaboration and • BitLocker To Go for USB document level rights • Group Policy enforcement management *Comparison to Enterprise Version
  • 19.
  • 20. Unified compliance-settings management across servers, desktops laptops, and mobile devices Simplify administrator experience Browse gold system when creating configuration items Simplified Baseline creation experience Deployment of Baselines User and Device targeting of Baselines Define compliance SLAs for Baseline deployments and generate Alerts Monitoring Baseline deployment compliance status Automatic remediation (aka DCM “set”) CI revisioning and change control
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Offline Servicing of Images Support for Component Based Servicing compatible updates Uses updates already approved Boot Media Updates Hierarchy wide boot media – no longer need one per site Unattended boot media mode – no longer need to press “next” Use pre-execution hooks to automatically select a task sequence – no longer see many optional task sequences USMT 4.0 - UI integration and support for hard- link, offline and shadow copy features
  • 27.