Warning: session_start(): Cannot start session when headers already sent in /home/busin148/public_html/includes/session.php on line 3

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 31

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 43

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 45

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 47
MOC On-Demand: 20703-1-Administering System Center Configuration Manager (SCCM) Online Classes- Business Computer Skills

MOC On-Demand: 20703-1-Administering System Center Configuration Manager (SCCM) - On-Demand Course

Learn System Center at your own pace with our On-Demand training.

Course Details

  The 20703-1: Administering System Center Configuration Manager - 2070A course is a 5-day course that is intended for students looking to learn how to use Configuration Manager 2016 and its associated site systems to efficiently manage network resources.

Students will learn all about earn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. Additionally, students will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports.

Topics covered in the course include:

  • How use the features included in Configuration Manager and Intune to manage PCs and mobile devices in an enterprise environment.
  • Analyzing data by using queries and reports.
  • Preparing a management infrastructure with Microsoft Exchange Server.
  • Deploying and managing the Configuration Manager client.
  • Configuring, managing, and monitoring hardware and software inventory.
  • Identifying and configuring methods to distribute and manage content used for deployments.
  • Distributing, deploying, and monitoring applications for managed users and systems.
  • Maintaining software updates for PCs that Configuration Manager manages.
  • Implementing Endpoint Protection for managed PCs.
  • Managing configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.
  • Configuring an operating-system deployment strategy by using Configuration Manager.
  • Managing and maintaining a Configuration Manager site.

Target Student:This course is designed for experienced information technology (IT) professionals, typically known as Enterprise Desktop Administrators (EDAs).

Students should possess the following experience before attending the course:

  • Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
  • Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
  • Installation, configuration, and troubleshooting for Windows-based personal computers.
  • Understand Basic concepts of public key infrastructure (PKI) security.
  • Understand Basic concepts of scripting and Windows PowerShell syntax.
  • Understand Basic concepts of Windows Server roles and services.
  • Understand Basic concepts of the configuration options for iOS, Android, and Windows Mobile device platforms

Section 1: Managing computers and mobile devices in the enterprise
This section covers the features of Configuration Manager that students can use to perform complex management tasks, including the following tasks: • Hardware and software inventory. • Application management. • Operating system deployment. • Settings management. • Software update management. • Remote client troubleshooting. • Protection from malware.

Topics :
• Overview of systems management by Working with enterprise management solutions
• Overview of the Configuration Manager architecture
• Overview of the Configuration Manager administrative tools
• Tools for monitoring and troubleshooting a Configuration Manager site

Lab :
Exploring the Configuration Manager tools
• Searching in the Configuration Manager console
• Working with Windows PowerShell with Configuration Manager
• Working with Configuration Manager Service Manager to manage components
• Monitoring site and component status
• Reviewing log files by Working with the Configuration Manager Trace tool

Section 2: Analyzing data Working with queries and reports
The Microsoft System Center Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This section covers queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this section details.

Topics :
• Introduction to queries
• Configure Microsoft SQL Server Reporting Services (SSRS)

Lab :
• Creating and running queriesConfigure boundaries and resource discovery
• Create data queries
• Create subselect queries
• Create status message queries

Lab :
Configure SSRS
• Configure a reporting services point
• Create a report by Working with Report Builder

Section 3: Preparing the management infrastructure to support PCs and mobile devices
This section discusses how to prepare the management infrastructure, including Configure boundaries, boundary groups, and resource discovery. Additionally, it describes how Configuration Manager interacts with the Microsoft Exchange Server environment to discover and manage mobile devices.

Topics :
• Configure site boundaries and boundary groups
• Configure resource discovery
• Configure the Exchange Server Connector for mobile device management
• Configure user and device collections

Lab :
Configure boundaries and resource discovery
• Configure boundaries, boundary groups, and fallback relationships
• Configure Active Directory discovery methods

Lab :
Configure user and device collections
• Create a device collection
• Create a user collection
• Configure a maintenance window

Section 4: Deploying and managing clients
This section discusses the supported operating systems and devices, the software requirements, and the different methods for installing the Configuration Manager client. This section also describes some of the default and custom client settings that students can configure. After installing the client software, you can configure the client settings to perform routine management tasks.

Topics :
• Overview of the Configuration Manager client
• Deploying the Configuration Manager client
• Configure and monitoring client status
• Managing client settings in Configuration Manager

Lab :
Deploying the Microsoft System Center Configuration Manager client software
• Preparing the site for client installation
• Deploying the Configuration Manager client software by Working with client push installation

Lab :
Configure and monitoring client status
• Configure and monitoring client health status

Lab :
Managing client settings
• Configure client settings

Section 5: Managing inventory for PCs and applications
This section provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This section also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.

Topics :
• Overview of inventory collection
• Configure hardware and software inventory
• Managing inventory collection
• Configure software metering
• Configure and managing Asset Intelligence

Lab :
Configure and managing inventory collection
• Configure and managing hardware inventory

Lab :
Configure software metering
• Configure software metering

Lab :
Configure and managing Asset Intelligence
• Preparing the site for Asset Intelligence
• Configure Asset Intelligence
• Monitoring license agreements by Working with Asset Intelligence
• Viewing Asset Intelligence reports

Section 6: Distributing and managing content used for deployments
Configuration Manager clients obtain content, such as packages, applications, software updates, and even operating system images, from distribution points. Configuration Manager relies on the distribution point infrastructure to provide content management functionality. In this section, you will review the content management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.

Topics :
• Preparing the infrastructure for content management
• Distributing and managing content on distribution points

Lab :
Distributing and managing content for deployments
• Installing a new distribution point
• Managing content distribution

Section 7: Deploying and managing applications
In this section, you will learn about the methods for Create, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications. In addition, you will learn to install Windows 10 apps and virtualized applications.

Topics :
• Overview of application management
• Create applications
• Deploying applications
• Managing applications
• Deploying virtual applications by Working with System Center Configuration Manager (Optional)
• Deploying and managing Windows Store apps

Lab :
Create and deploy applications
• Installing and Configure the Application Catalog roles
• Create applications with requirements
• Deploying applications

Lab :
Managing application supersedence and removal
• Managing application supersedence
• Uninstalling the Excel Viewer application

Lab :
Deploying virtual applications by Working with Configuration Manager (Optional)
• Configure support for App-V
• Deploying virtual applications

Lab :
Working with Configuration Manager to deploy Windows Store apps
• Configure support for sideloading Windows Store apps
• Configure a Windows Store app
• Deploying Windows 10 apps to users

Section 8: Maintaining software updates for managed PCs
This section discusses how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of Determining, deploying, and monitoring software updates to your Configuration Manager clients.

Topics :
• The software updates process
• Preparing a Configuration Manager site for software updates
• Managing software updates
• Configure automatic deployment rules
• Monitoring and troubleshooting software updates

Lab :
Configure the site for software updates
• Configure and synchronizing the software update point

Lab :
Deploying and managing software updates
• Determining software update compliance
• Deploying software updates to clients
• Configure automatic deployment rules

Section 9: Implementing Endpoint Protection for managed PCs
Configuration Manager provides a number of security-related features that students can use to help protect client computers from malware threats, and to configure specific Windows Firewall settings for clients. Based on System Center Endpoint Protection (Endpoint Protection) functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies and Windows Firewall settings on client computers. This section discusses how to use configure Endpoint Protection Configuration Manager to implement Endpoint Protectionand deploy and monitor Endpoint Protection policies.

Topics :
• Overview of Endpoint Protection in Configuration Manager
• Configure, deploying, and monitoring Endpoint Protection policies

Lab :
Implementing Microsoft System Center Endpoint Protection
• Configure the System Center Endpoint Protection point and client settings
• Configure and deploying Endpoint Protection policies
• Monitoring Endpoint Protection

Section 10: Managing compliance and secure data access
Many enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in Determining existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data Working with folder redirection, offline files, and roaming profiles. You also can control access to data Working with remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This section covers the compliance settings that students can manage Working with Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enterprise resources.

Topics :
• Overview of Compliance Settings
• Configure compliance settings
• Viewing compliance results
• Managing resource and data access

Lab :
Managing compliance settings
• Managing configuration items and baselines
• Viewing compliance settings and reports
• Configure remediation in compliance settings
• Working with compliance information to create collections

Section 11: Managing operating system deployment
You can use the operating system deployment feature in Configuration Manager to create operating system images that students can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by Working with Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by Working with task sequences that Configuration Manager creates after you deploy the image to a target system. This section discusses how to use Configuration Manager to create a strategy for operating-system deployments. And also, it explains how to manage Windows as a service.

Topics :
• An overview of operating system deployment
• Preparing a site for operating system deployment
• Deploying an operating system
• Managing Windows as a service

Lab :
Preparing thea site for operating -system deployment
• Managing the site system roles used to support operating system deployment
• Managing packages to support operating system deployment

Lab :
Deploying operating -system images for bare-metal installations
• Preparing the operating system image
• Create a task sequence to deploy an image
• Deploying an image

Section 12: Managing and maintaining a Configuration Manager site
This section discusses how to use manage and maintain a Configuration Manager site. It describes role-based administration, Remote Tools, and the site maintenance tasks that students can manage by Working with Configuration Manager. Additionally, it explains how to back up and recover a Configuration Manager site system.

Topics :
• Configure role-based administration
• Configure Remote Tools
• Overview of Configuration Manager site maintenance
• Backing up and recovering a Configuration Manager site

Lab :
Configure role-based administration
• Configure a new scope for Toronto administrators
• Configure a new administrative user

Lab :
Configure Remote Tools
• Configure the Remote Tools client settings and permissions
• Managing desktops by Working with Remote Control

Lab :
Maintaining a Configuration Manager site
• Configure maintenance tasks in Configuration Manager
• Configure the Backup Site Server task
• Recovering a site from a backup

 

Please check the course description to find prerequisite information.

 

-10%

MOC On-Demand: 20703-1-Administering System Center Configuration Manager (SCCM)

On-Demand Training Course

$ 995
90/month licence
  • 24/7 Access
  • Hands-On Practice Exercises
  • Free Repeats
  • Professional Instruction
Enroll Today