System Center 2012 Configuration Manager Concepts & Administration

Slides:



Advertisements
Similar presentations
Symantec 2010 Windows 7 Migration Global Results.
Advertisements

1 A B C
AP STUDY SESSION 2.
1
Select from the most commonly used minutes below.
Copyright © 2003 Pearson Education, Inc. Slide 7-1 Created by Cheryl M. Hughes The Web Wizards Guide to XML by Cheryl M. Hughes.
ASTM Member Website Tools Jeff Adkins Diane Trinsey 1 September 2012 Officers Training Workshop.
David Burdett May 11, 2004 Package Binding for WS CDL.
Microsoft Access 2007 Advanced Level. © Cheltenham Courseware Pty. Ltd. Slide No 2 Forms Customisation.
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
Create an Application Title 1Y - Youth Chapter 5.
Add Governors Discretionary (1G) Grants Chapter 6.
CALENDAR.
The 5S numbers game..
Office 2003 Introductory Concepts and Techniques M i c r o s o f t Windows XP Project An Introduction to Microsoft Windows XP and Office 2003.
© Tally Solutions Pvt. Ltd. All Rights Reserved Shoper 9 License Management December 09.
The following 10 questions test your knowledge of client site assignment in Configuration Manager Configuration Manager 2007 Client Site Assignment.
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
The following 10 questions test your knowledge of Internet-based client management in Configuration Manager Configuration Manager 2007 Internet-Based.
Break Time Remaining 10:00.
The following 10 questions test your knowledge of desired configuration management in Configuration Manager Configuration Manager Desired Configuration.
PP Test Review Sections 6-1 to 6-6
Employee & Manager Self Service Overview
1 IMDS Tutorial Integrated Microarray Database System.
© Copyright by Deitel & Associates, Inc. and Pearson Education Inc. All Rights Reserved. 1 Outline 24.1 Test-Driving the Ticket Information Application.
INTRODUCTION Lesson 1 – Microsoft Word Word Basics
Office 2003 Introductory Concepts and Techniques M i c r o s o f t Office 2003 Integration Integrating Office 2003 Applications and the World Wide Web.
Operating Systems Operating Systems - Winter 2010 Chapter 3 – Input/Output Vrije Universiteit Amsterdam.
Dynamic Access Control the file server, reimagined Presented by Mark on twitter 1 contents copyright 2013 Mark Minasi.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Adding Up In Chunks.
Services Course Windows Live SkyDrive Participant Guide.
FAFSA on the Web Preview Presentation December 2013.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
Facebook Pages 101: Your Organization’s Foothold on the Social Web A Volunteer Leader Webinar Sponsored by CACO December 1, 2010 Andrew Gossen, Senior.
GEtServices Services Training For Suppliers Requests/Proposals.
: 3 00.
5 minutes.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
1 Titre de la diapositive SDMO Industries – Training Département MICS KERYS 09- MICS KERYS – WEBSITE.
FIGURE 12-1 Op-amp symbols and packages.
Converting a Fraction to %
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
Clock will move after 1 minute
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
Physics for Scientists & Engineers, 3rd Edition
Select a time to count down from the clock above
Copyright Tim Morris/St Stephen's School
1.step PMIT start + initial project data input Concept Concept.
Open XML Developer Workshop DrawingML Basics. Open XML Developer Workshop Disclaimer The information contained in this slide deck represents the current.
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
South Dakota Library Network MetaLib User Interface South Dakota Library Network 1200 University, Unit 9672 Spearfish, SD © South Dakota.
Outlook 2013 Web App (OWA) User Guide Durham Technical Community College.
SpreadsheetML Advanced
DrawingML Basics.
© 2014 Microsoft Corporation. All rights reserved.
System Center 2012 Configuration Manager Concepts & Administration
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.
Vital Signs: Performance Monitoring Windows Server
Conditions and Terms of Use
© 2012 Microsoft Corporation. All rights reserved.
Systems Management Server 2.0: Backup and Recovery Overview SMS Recovery Web Site location: Updated.
Microsoft Confidential © 2012 Microsoft Corporation. All rights reserved.
Using Parallelspace TEAM Models to Design and Create Custom Profiles
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
Presentation transcript:

© 2012 Microsoft Corporation. All rights reserved. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

System Center 2012 Configuration Manager Concepts & Administration Module 4: Inventory, Asset Intelligence, Software Metering and Remote Control Your Name Premier Field Engineer Microsoft © 2012 Microsoft Corporation

Conditions and Terms of Use Microsoft Confidential This training package is proprietary and confidential, and is intended only for uses described in the training materials. Content and software is provided to you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the content and/or software included in such packages is strictly prohibited. The contents of this package are for informational and training purposes only and are provided "as is" without warranty of any kind, whether express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non- infringement. Training package content, including URLs and other Internet Web site references, is subject to change without notice. Because Microsoft must respond to changing market conditions, the content should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Copyright and Trademarks © 2012 Microsoft Corporation. All rights reserved. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. For more information, see Use of Microsoft Copyrighted Content at http://www.microsoft.com/about/legal/permissions/ Microsoft®, Internet Explorer®, and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other Microsoft products mentioned herein may be either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Overview Hardware and Software Inventory Asset Intelligence Software Metering Remote Tools Lesson 4 covers the core Asset Management features of Configuration Manager as well as the Remote Tools function. For Hardware Inventory and Software Inventory, we will look at the components that make inventory work, how to enable and customize inventory, and how to report on it For Asset Intelligence, we will configure Asset Intelligence, as well as learn how to import MVLS and custom license statements into the Configuration Manager database. For Software Metering, we will enable the agent, create and organize rules, and report on metering data For Remote Tools we will learn about the different settings that allow an administrator to configure Remote Tools, Remote Assistance and Remote Desktop from within Configuration Manager Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Objective After completing this Module, you will be able to: Configure, customize, troubleshoot and report Hardware and Software Inventory Configure Asset Intelligence, import an MVLS license statement and generate Asset Intelligence reports Configure Software Metering, create rules and generate reports Learn what’s new in Remote Control and how to configure the Remote Tools client Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Hardware and Software Inventory Types of Inventory Hardware Inventory components and logs Enabling and customizing Hardware Inventory Hardware Inventory reporting Software Inventory components and logs Enabling and customizing Software Inventory Software Inventory reporting Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Types of Inventory Hardware Inventory Queries WMI for hardware data Can be customized per site or per collection Customize Hardware Inventory MOF files can be imported from the console Inventory Classes can be imported from a local or remote system Software Inventory Scans hard drives for file types Can also collect copies of files during inventory cycle There are a few important changes in Hardware Inventory in System Center 2012 Configuration Manager (Configuration Manager): The administrator no longer has to modify manually the Sms_def.mof file on each site server, in order to customize what is reported during a Hardware Inventory cycle. Now this can be achieved by modifying the Hardware Inventory Classes in the Default Client Setting or Custom Device Settings for a collection. MOF files can be imported from other locations – is useful if settings were standardized on one Configuration Manager site, and the administrator wished to import these settings into other Configuration Manager sites, in order to standardize Hardware Inventory classes reported across an entire hierarchy. The administrator can collect further hardware inventory data by connecting (locally or remotely) to WMI and adding reporting classes. IDMIF and NOIDMIFs can be created and collected during a hardware inventory cycle as in previous versions of Configuration Manager Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Hardware Inventory Components and Logs 1 Client Inventory data generated and sent to Management Point on agent schedule InventoryAgent.log 2 Management Point Report received in MP\outboxes\hinv.box Moved by Hardware Inventory Manager to Site Server MP_Hinv.log 3 Site Server Report received in Inboxes\auth\dataldr.box Data Loader processes data Dataldr.log Database updated Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Enabling and Customizing Hardware Inventory Administration Node  Client Settings Default Settings  Hardware Inventory The Hardware Inventory Schedule can be a simple or complex schedule (as in previous versions of System Center Configuration Manager and System Management Server) The Hardware Inventory classes setting permits the following actions: Show classes filtered by their use – Asset Intelligence Reporting Classes, Mobile Device Classes or Windows Clients and Servers Classes Show classes filtered by type – Enabled Classes only, or Recently Added Classes Import MOF files from local or remote sources – this is useful if a “Gold Standard” configuration has been exported in MOF format from another site, and the administrator wishes to import these settings into the current site Export settings from this site in MOF format – this is useful if these settings are to be then imported into another Configuration Manager site Add WMI classes by connecting to local or remote WMI namespace Delete WMI Classes – doing this will remove all inventory data and stored data related to that class from the database Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Enabling and Customizing Hardware Inventory Add/delete options from existing MOF Filter by category to show All Classes AI Classes Mobile Device Classes Windows Clients and Server Classes Filter by type to show Enabled Classes only Recently Added Classes Import settings from local or remote MOF file Export current settings to re-use in another Configuration Manager 2012 site Add WMI classes by connecting to local or remote WMI namespace Delete WMI Classes – doing this will remove all inventory data and stored data related to that class from the database Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Enabling and Customizing Hardware Inventory Assign different settings for Hardware Inventory by creating custom client device settings Deploy settings to a collection If a device is a member of more than one collection with conflicting device settings, the priority setting determines which setting is enforced. Default client settings have a priority of 10,000 Custom device settings have higher priorities Priorities can be increased or decreased by the administrator Administrators may wish to assign different Hardware Inventory settings ( Enable/Disable agent, schedule, reporting classes, MIF collection) to different collections of devices. When conflicts occurs then the policy with the highest priority (i.e. lowest number) wins. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Creating Custom Device Settings Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Creating Custom Device Settings Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Deploy Settings to a Collection It is important to know which components generate and process Software Inventory for effective troubleshooting. Understanding which client and server logs are generated is very useful for drilling down to pinpoint problems. SKPSWI.dat can still be used to prevent software inventory from scanning a particular drive\folder Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Hardware Inventory Reporting 40+ reports for viewing Hardware Inventory results Hardware – CDROM, Hardware – Disk etc. Useful reports for troubleshooting Hardware Inventory Inventory Classes enabled on a specific computer Inventory Classes assigned to a specific collection Computers not inventoried recently (in a specified number of days) Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Software Inventory Components and Logs 1 Client Software Inventory data generated and sent to Management Point on Agent Schedule InventoryAgent.log 2 Management Point Report received in MP\outboxes\sinv.box Moved by Software Inventory Manager to Site Server MP_Sinv.log 3 Site Server Report received on Inboxes\sinvproc.box Software Inventory Processor processes data Sinvproc.log Database updated Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Enabling and Customizing Software Inventory Administration Node  Client Settings Default Settings  Software Inventory [PFE] Rushi Faldu: Discuss the difference between the “Inventory these file types” and “Collect Files” settings The Software Inventory Schedule can be a simple or complex schedule (as in previous versions of SCCM and SMS) Note that no file types are inventoried by default – this is different than previous versions. The administrator must define the file types to inventory when enabling the agent. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Enabling and Customizing Software Inventory Assign different settings for Software Inventory by creating custom client device settings Deploy settings to a collection Default client settings have a priority of 10,000 Custom device settings have higher priorities Priorities can be increased or decreased by the administrator Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Creating Custom Device Settings Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Creating Custom Device Settings Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Deploy Settings to a Collection Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Software Inventory Reporting 40+ reports for viewing Software Inventory results Look in Software – Company and Products, Software – Files categories Useful report for troubleshooting Software inventory Computers not inventoried recently (in a specified number of days) Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Lab: Customizing Hardware and Software Inventory Scenario You are the administrator of a new Configuration Manager 2012 hierarchy. You need to generate inventory data from newly-installed clients Goals Enable, customize and report Hardware Inventory Enable, customize and report Software Inventory Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Lesson Review Name two differences in enabling and configuring hardware inventory in System Center 2012 Configuration Manager from Configuration Manager 2007? How can different inventory settings be applied to different groups of clients within a Configuration Manager site? How does an administrator troubleshoot conflicting inventory settings applied to a single computer? Name two differences in enabling and configuring hardware inventory in Configuration Manager 2012 from Configuration Manager 2007 Different Inventory Settings can be applied to different collections within a single site Hardware Inventory reporting classes are configured as part of the client agent, rather than by editing the SMS_Def.mof file How can different inventory settings be applied to different groups of clients within a Configuration Manager 2012 site? By creating multiple custom device settings and deploying them to multiple client based collections How does an administrator troubleshoot conflicting inventory settings applied to a single computer? By looking at the relative priorities of each custom device setting By running the “Inventory Classes enabled on a specific computer” report Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Lesson Summary In this lesson, you learned: How hardware inventory can be enabled and customized How software inventory can be enabled and customized Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Asset Intelligence Lesson Objectives In this Lesson you will learn: What’s new in System Center 2012 Configuration Manager? How to configure Asset Intelligence Hardware Inventory and Software Metering Agents Enabling Asset Intelligence Reporting Classes Reporting Class dependencies Installing an Asset Intelligence Synchronization Point Auditing successful logon events Importing an MVLS license statement Asset Intelligence Maintenance Tasks Asset Intelligence Reporting Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

What is New in Asset Intelligence Enable Asset Intelligence reporting classes Changes to MVLS license statement import process 2 Maintenance Tasks Check Application Title with Inventory Information - checks that the software title reported in software inventory is reconciled with the software title in the Asset Intelligence catalog. Summarize Installed Software Data - provides the summary information displayed in the Inventoried Software node under the Asset Intelligence node. Client Access License reports have been removed Enable reporting classes for Asset Intelligence using the Hardware Inventory settings in the Default Client Settings (or Custom Device Settings for Hardware Inventory) Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

How to configure Asset Intelligence Enable Hardware Inventory and Software Metering Agents Edit Asset Intelligence Hardware Inventory reporting classes Install an Asset Intelligence Synchronization Point Enable auditing of success logon events Import software license information Create a general license statement information file for import Configure Asset Intelligence Maintenance Tasks Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Enable Asset Intelligence Reporting Classes Enabling Asset Intelligence Classes can be done either by:- Editing Inventory Classes in the Asset Intelligence node of the Admin console – this will be reflected in the Default Client Agent Settings. Note: This setting affects the classes being enabled, not the properties within each class – this needs to be configured in the Default Client Agent Settings Editing the Asset Intelligence Reporting Classes in the Hardware Inventory Agent of Default Client Agent Settings or Custom Device Settings. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Reporting Class Dependencies SMS_Installed_Software The following slides show the dependencies between certain Asset Intelligence Reporting Classes and Asset Intelligence Reports. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential SMS_SystemConsoleUsage Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Reporting Class Dependencies SMS_SystemConsoleUser SMS_AutoStartSoftware SMS_BrowserHelperObject SMS_SoftwareTag Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Reporting Class Dependencies Win32_USBDevice SMS_InstalledExecutable SMS_SoftwareShortcut This class is not a currently used to support existing AI reports. However, it can be enabled to support customer reports SoftwareLicensingService SoftwareLicensingProduct This class is not a currently used to support existing AI reports. However, it can be enabled to support customer reports Understand the impact of using the SMS Installed Executable class – collects info on all executables in a system. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Reporting Class Dependencies SoftwareLicensingProduct Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Install an Asset Intelligence Synchronization Point By default, the Use this Asset Intelligence Synchronization Point setting is selected and cannot be configured on this page. System Center Online accepts network traffic only over TCP port 443, therefore the SSL port number setting cannot be configured on this page of the wizard. Optionally, you can specify a path to the System Center Online authentication certificate (.pfx) file, and then click Next. Typically, you do not specify a path for the certificate because the connection certificate is automatically provisioned during site role installation. On the Proxy Server Settings page, specify whether the Asset Intelligence synchronization point will use a proxy server when connecting to System Center Online to synchronize the catalog and whether to use credentials to connect to the proxy server, and then click Next. On the Synchronization Schedule page, specify whether to synchronize the Asset Intelligence catalog on a schedule. When you enable the synchronization schedule, you specify a simple or custom synchronization schedule. During scheduled synchronization, the Asset Intelligence synchronization point connects to System Center Online to retrieve the latest Asset Intelligence catalog. You can manually synchronize the Asset Intelligence catalog from the Asset Intelligence node in the Configuration Manager console. For the steps to manually synchronize the Asset Intelligence catalog, see Operations for Asset Intelligence in Configuration Manager. http://technet.microsoft.com/en-us/library/gg712316.aspx On the Summary page of the New Site Role Wizard, review the settings you have specified to ensure that they are correct before you continue. To make changes to any settings, click Previous until you return to the appropriate page, make the change, and return to the Summary page. Warning: If a proxy server is required to connect to System Center Online, the connection certificate might also be deleted if the user account password expires for the account configured for proxy server authentication. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Install an Asset Intelligence Synchronization Point On the Proxy Server Settings page, specify whether the Asset Intelligence synchronization point will use a proxy server when connecting to System Center Online to synchronize the catalog and whether to use credentials to connect to the proxy server, and then click Next. Warning : If a proxy server is required to connect to System Center Online, the connection certificate might also be deleted if the user account password expires for the account configured for proxy server authentication Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Install an Asset Intelligence Synchronization Point On the Synchronization Schedule page, specify whether to synchronize the Asset Intelligence catalogue on a schedule. When you enable the synchronization schedule, you specify a simple or custom synchronization schedule. During scheduled synchronization, the Asset Intelligence synchronization point connects to System Center Online to retrieve the latest Asset Intelligence catalogue. You can manually synchronize the Asset Intelligence catalogue from the Asset Intelligence node in the Configuration Manager console. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Enable Auditing of Successful Logon Events Required for the following reports Hardware 3A – Primary Computer Users Hardware 3B – Computers for a Specific Computer User Hardware 4A – Shared (multi-user) Computers Hardware 5A – Console Users on a Specific Computer Enable the SMS_SystemConsoleUser reporting class Modify Domain Security Policy Security Settings Local Policies Audit Policy Audit Logon Events – select Success check box Four Asset Intelligence reports display information gathered from the Windows Security event logs on client computers. If the Security event log settings are not configured to log all Success logon events, these reports contain no data even if the appropriate hardware inventory reporting class is enabled. To enable the Hardware Inventory Client Agent to inventory the information required to support these reports, you must first modify the Windows Security event log settings on clients to log all Success logon events, and enable the SMS_SystemConsoleUser hardware inventory reporting class. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Import Software License Information Import general (non-MVLS) information into the database Create manually in .csv format with the following headers Name Publisher Version Language EffectiveQuantity PONumber ResellerName DateofPurchase SupportPurchased SupportExpirationDate Comments AILW.exe (Asset Intelligence License Wizard) ADD LINK can be used to create a .csv file containing all software titles within the Config Manager DB http://blogs.technet.com/b/yasc/archive/2010/09/18/asset-intelligence-license-wizard-v1-4.aspx Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Importing an MVLS License Statement Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Configure Asset Intelligence Maintenance Tasks By default, both maintenance tasks are enabled and are configured on a default schedule. Check Application Title with Inventory Information: This maintenance task checks that the software title that is reported in software inventory is reconciled with the software title in the Asset Intelligence catalogue. Summarize Installed Software Data: This maintenance task provides the information that is displayed in the Assets and Compliance workspace, in the Inventoried Software node, under the Asset Intelligence node. When the task runs, Configuration Manager gathers a count for all inventoried software titles at the primary site. Note: The Summarize Installed Software Data maintenance task is available only on primary sites. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Asset Intelligence changes in SP1 Supports the 7 mandatory software identification tags that are defined in ISO/IEC 19770-2. Software identification tags provide authoritative information that is used to identify installed software ISO/IEC 19770-2 standard specifies the structure and basic usage of software identification) Added a new AI class SMS_SoftwareTag Collects inventory of App-V 5 and App-V 4 applications Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Lesson Review What kind of license statements can be imported into System Center 2012 Configuration Manager? Name the two new Maintenance Tasks for Asset Intelligence data in System Center 2012 Configuration Manager? What kind of License Statements can be imported into Configuration Manager 2012? MVLS License Statements Custom License Statements Name the two new Maintenance Tasks for Asset Intelligence data in Configuration Manager 2012 Check Application Title with Inventory Information Summarize Installed Software Data Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Lesson Summary In this lesson, you learned: Which components are required to generate successful Asset Intelligence Reports How to import MVLS and license statements Which 2 new Maintenance Tasks have been added to System Center 2012 Configuration Manager for Asset Intelligence Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Software Metering Software Metering components Enabling and customizing Software Metering Creating Custom Device Settings Creating Metering Rules Software Metering reporting Client and server troubleshooting It is important to know which components generate and process Software Inventory for effective troubleshooting. Understanding which client and server logs are generated is very useful for drilling down to pinpoint problems. SKPSWI.dat can still be used to prevent software inventory from scanning a particular drive\folder Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Software Metering Components and Logs 1 Client Metering data generated and sent to MP on Data Collection Schedule Mtrmgr.log Swmtrreportgen.log 2 Management Point Report received in MP\outboxes\swm.box Moved by File Despatch Manager to Site Server 3 Site Server Report received on Inboxes\swmproc.box Software Metering Processor processes data Swmproc.log Database updated Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Enabling and Customizing Software Metering Administration Node  Client Settings  Default Settings  Software Metering Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Software Metering Components Software Metering client agent Mtrmgr.log Software Metering Processor (Site Server component) Swmproc.log Data usage report generation log SWMTRReportGen.log Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Enabling and Customizing Software Metering Assign different settings for Software Metering by creating Custom Client Device Settings Deploy settings to a collection Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Creating Custom Device Settings Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Creating Custom Device Settings Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Creating Metering Rules Auto-created Metering Rules can be automatically generated (but disabled) based on the percentage of clients using that program in the site. This is configured in the Software Metering Node of Assets and Compliance. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Creating Metering Rules Manually created Metering Rules can also be manually created by an administrator Name - Give a name to the metering rule (maximum 255 characters) File Name – browse for the file name as it appears in Explorer – this will populate the Original File Name, Version, Language fields. These fields can be modified, for example to meter usage of all Language versions of the executable. Rules can be applied solely in the site where they are created or applied to all sites in the hierarchy. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Software Metering Administration Metering rules can be organized in folders Metering rules can be enabled, disabled, edited or moved. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Software Metering Reporting Reports rely on metering data being sent from the client – default is every 7 days Schedule data collection for Software Metering in Default Client Settings Some reports rely on summarization Summarize Software Metering File Usage Data Summarize Software Metering Monthly Usage Data The following reports require the Software Metering Agent to be enabled:- Software 07A - Recently Used Executables by Number of Computers Software 07B - Computers that Recently Used a Specified Executable Software 07C - Recently Used Executables on a Specific Computer Software 08A - Recently Used Executables by Number of Users Software 08B - Users that Recently Used a Specified Executable Software 08C - Recently Used Executables by a Specified User It may take time to get results from the Software Metering data. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Software Metering Reports Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Lab: Customizing Software Metering Scenario You are the administrator of the Contoso System Center 2012 Configuration Manager hierarchy. You wish to create new Software Metering rules for a Configuration Manager site Include the Lab slide as a cue that it is time to do the labs Goals Enable Software Metering Create a new software metering rule Generate a software metering report Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Lesson Review What is the name of the client log that shows metering rules being checked when an executable is run? Name the two ways to create a metering rule? What is the name of the client log that shows metering rules being checked when an executable is run? Mtrmgr.log Name the two ways to create a metering rule? By using Automatic rules and enabling them in the admin console By manually creating a rule in the admin console Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Lesson Summary In this Lesson, you learned: How to enable and configure the Software Metering Agent How to create rules automatically and manually Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Lesson Objectives Remote Control What’s new in System Center 2012 Configuration Manager? What’s new with Remote Control, Remote Desktop, Remote Assistance How to configuring the Remote Tools Client Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

What’s New in Configuration Manager Supported Operating Systems for Remote Control Viewer Windows 7 (32 bit and 64 bit) Windows XP SP3 32-bit, Vista 32-bit, Vista 64-bit Install the Remote Desktop Connection (RDC) client update 7.0 (KB969084) No support for the Remote Control Viewer on Windows XP (64 bit), Windows Server 2003 (32 or 64 bit), Windows Server 2008 or R2 (64 bit) operating systems Prerequisites for Remote Control in Configuration Manager - http://technet.microsoft.com/en-us/library/gg699352.aspx Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

What’s New in Configuration Manager? Pass CTRL+ALT+DEL to client Disable client mouse and keyboard during remote control session Remote Tools are configured in the Default Client Settings or in Custom Device Settings linked to a collection Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

What’s New in Configuration Manager? (continued) Start Remote Control Viewer from a command line <Configuration Manager Installation Folder>\AdminConsole\Bin\i386\CmRcViewer.exe Supported Switches File – Connect File - Disconnect File - Exit View - Full Screen View - Scale to Fit View - Status Bar Action - Send Ctrl+Alt+Del Key Action - Enable Clipboard Sharing Action - Lock Remote Keyboard and Mouse Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Configuring the Remote Tools Client Client can be used to configure Remote Control, Remote Assistance and Remote Desktop Remote Assistance and Remote Desktop settings are applied as local policy, so can be over-written by domain-based Group Policy Remote Assistance and Remote Desktop needs to be enabled on the client before settings for these features are effective Remote Assistance feature must be installed on the machine initiating the connection Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Remote Control Client Settings Enable Remote Control on clients Firewall exception profiles Select whether remote control is enabled for all client computers that receive these client settings. Click Configure Firewall to enable remote control and optionally configure firewall settings to allow remote control to work on client computers. Users can change policy or notification settings in Software Center Select whether users can change remote control options from within Software Center. Allow Remote Control of an unattended computer Select whether an administrator can use remote control to access a client computer that is logged off or locked. Only a logged-on and unlocked computer can be remote controlled when this setting is disabled. Prompt user for Remote Control permission Select whether the client computer will display a message asking for the user's permission before allowing a remote control session. Grant Remote Control permission to local Administrators group Select whether local administrators on computer being remote controlled can establish remote control sessions to client computers. Access level allowed If the setting Grant Remote Control permission to local Administrators group is enabled, specify the type of remote control access that will be allowed. Permitted viewers Click Set Viewers to open the Configure Client Setting dialog box and specify the names of the Windows users who can establish remote control sessions to client computers. Show session notification icon on taskbar Select this option to display an icon on the taskbar of client computers to indicate that a remote control session is active. Show session connection bar Select this option to display a high-visibility session connection bar on client computers to indicate that a remote control session is active. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

New Text-Only Slide (Hidden) Play a sound on client Select this option to use sound to indicate when a remote control session is active on a client computer. You can play a sound when the session connects or disconnects, or you can play a sound repeatedly during the session. Manage unsolicited Remote Assistance settings Selecting this option to allow System Center 2012 Configuration Manager to manage unsolicited remote assistance sessions. Unsolicited remote assistance sessions are those where the user at the client computer does not request assistance in order to initiate a session. Manage solicited Remote Assistance settings Select this option to allow System Center 2012 Configuration Manager to manage solicited remote assistance sessions. Solicited remote assistance sessions are those where the user at the client computer sends a request to the administrator for remote assistance. Level of access for Remote Assistance Select the level of access which will be granted to remote assistance sessions initiated from the Configuration Manager console. Manage Remote Desktop settings Select this option to allow System Center 2012 Configuration Manager to manage Remote Desktop sessions for computers. Allow permitted viewers to connect by using Remote Desktop connection Select this option to allow users specified in the permitted viewer list to be added to the Remote Desktop local user group on client computers. Require network level authentication on computers that run Windows Vista operating system and later versions Select this more secure option if you want to use network level authentication to establish Remote Desktop connections to client computers running Windows Vista or later. Network level authentication requires fewer remote computer resources initially as it completes user authentication before establishing a Remote Desktop connection. This is a more secure method as it can help to protect the computer from malicious users or software and it reduces the risk from denial-of-service attacks. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Demo: Remote Control in Configuration Manager Scenario You are the administrator of a Configuration Manager hierarchy. You need to use the Remote Tools client to remotely control a Windows 7 client Goals Enable and configure the Remote Tools Client Start a Remote Tools session from the command line Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Lesson Review Name one new feature of the Remote Tools Client? How can you start the Remote Control viewer from a command line? Name one new feature of the Remote Tools Client CTRL+ALT+DEL passed to the client Disable client keyboard and mouse during a session Start Remote Control Viewer from a command line How can you start a Remote Control Viewer from a command line? <Configuration Manager Installation Folder>\AdminConsole\Bin\x64\CmRcViewer.exe Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

Microsoft Confidential Lesson Summary In this lesson, you learned: What’s new in Configuration Manager for the Remote Tools Client How to enable and configure the Remote Tools Client Agent Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential