SIM311. Built on top of Microsoft ® System Center Configuration ManagerBuilt on top of Microsoft ® System Center Configuration Manager Supports all.

Slides:



Advertisements
Similar presentations
SIM348. “ConfigMgr appeared in Gartner client buying decisions more frequently than any other product in the market in 2010.”
Advertisements

What’s New in Active Directory in Windows Server 2012 Dean Wells Active Directory Product Group Microsoft SIA312.
SIM317 Built on top of Microsoft ® System Center Configuration ManagerBuilt on top of Microsoft ® System Center Configuration Manager Supports all.
Upgrading SSIS Packages to SQL Server 2012 Sven Aelterman Lecturer in Information Systems & Web/Technology Specialist Troy University, Sorrell College.
SIM201. Announcing… copyright chappellseminars.com some hosts comply; RST = closed no = response open some hosts comply; RST = closed no = response.
SIM403. Claims Provider Trust Relying Party x Relying Party Trust Claims Provider Trust Your ADFS STS Partner ADFS STS & IP Relying Party Trust Partner.
WSV304 Manual Deployment High cost Fully Automated Low cost.
OSP303. demo Status Bar Notification.
Windows Intune: Cloud Based PC Management (Technical Overview) Elias Mereb Erdal Ozkaya MVP – Windows Expert-IT Pro WideTech Consulting FastLane – AP.
Richard Hundhausen People Process Tools Process Tools People.
Sample Fill demo WorkflowServiceHostFactory Tracking Persistence Custom Behaviour Creation Endpoint Control Endpoint Exception Behaviour.
Self Assessment COS202 a-Expense.
SIM Separate solution install paths can be taken, stand alone and SCOM integrated. Both require core AVIcode web apps and DB’s.
DBI331. Cube Measure Group Measure Partition Cube Dimension Dimension Attribute Relationship Hierarchy Level Cube Attribute Cube Hierarchy Measure.
WCL209. GA3/23GA3/23 Manage & Secure PCs Anywhere All you need is an internet connection The Best Windows Experience Standardize your OS on the latest.
DBI405. Agenda Reporting Services Scale Out Architecture Report Catalog Best Practices Scale Out Deployment Best Practices Performance Optimization.
SIM346. General information about the software application.
SIM339. Mobile workforce Different users with different needs Large scale.
DEV314. Entity Data Model demo Entity Data Model.
WCL M units by 2015 Designed to always be connected to a server-based desktop Examples of Thin Clients Typically runs a light-weight embedded.
SIM361. Services Cloud Deployment Fabric Hyper-V Bare Metal Provisioning Hyper-V, VMware, Citrix XenServer Hyper-V, VMware, Citrix XenServer Network Management.
WCL309. Demo.
WCL 319. fast clean trusted interoperable IT friendly.
SIM329. Certificate Enrollment Without CEP/CES Certificate Authority Active Directory Client Workstations LDAP RPC/DCOM.
SIM332 UserManagement GroupManagement CredentialManagement Common Platform WorkflowConnectorsLogging Web Service API Synchronization PolicyManagement.
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
VIR319 Overview of MED-V Enterprise Application Compatibility Challenges Solutions from Microsoft for Application Compatibility Lifecycle of MED-V.
VIR314. Understand the scenarios Application support Understand the scenarios Application support Review of the sequencing process Demo Review of the.
SIM314 Introduction Transport Layer Summary Network Layer.
SIM351. Package binaries / files Content: Packages, Configuration Items (DCM), Software Update Deployments, OS Images, etc. Objects: Site Role Settings.
SIM335 Demo 6 7 NetApp Confidential - Internal Use Only.
demo.
Planning a high availability model Validate and understanding support policies Understanding Live Migration Deployment Planning VM Failover Policies Datacenter.
SIM 302. Unprepared UninformedUnaware Untrained Unused.
Margin Content Padding Border.
DBI329. video.
DBI326. PhraseGoal “Data Mining”Inform actionable decisions “Machine Learning”Determine best performing algorithm.
WCL308. (While you’re sitting there, sign up for the GPanswers.com Tip of the Week … (Scan a tag.. Fill out the little form…) and enter to win a copy.
DPR302.
EXL321. Lync 2010 Planning tool+ Planning guides+ * new in LS significant enhancements in LS 2010.
2.
VIR317 Number of physical servers shipments used for virtualization will grow to 1.7M+ in 2012 at a CAGR of 15% 19% of physical server shipments will.
WCL304.
SIM310. 1) “Malware Author’ grows BOTNET & makes available to “buyers” 2) Access is purchased via ‘MarketPlace’ 4) BOTNET attacks seen at multiple.
DPR305. Controller Model View Client Business Objects Server Business Objects Data.
OSP310. What is a SharePoint® Farm? A collection of one or more SharePoint Servers and SQL Servers® providing a set of basic SharePoint.
DEV211. The simplest way to create business applications for the desktop and the cloud.
SIM315. FIM Service Resource Management Service (WCF Endpoint) Request Dispatcher.
SIM333 Microsoft Confidential Simplified Management Manage FPE 2010 and FPSP 2010 Server Discovery and Grouping FPSMC agent deployment Deploy.
DBI325. Monitoring Analytics Support will extend to Analysis Services in the Denali release.
WPH301. announcement Overview Roadmap for Business Risk Management (security model, application security, security management) Deploying Windows Phone.
DPR301 demo Executable Requirements.
Data transport Cloud Backend Data transport Cloud Backend Cloud Provider Backend Virtualization Sidechannels You Clients Logons Who’s responsibility.
DEV351.
DEV332. Required Slide Speakers, please list the Breakout Sessions, Interactive Discussions, Labs, Demo Stations and Certification Exam that.
DEV327. tag – you’re it! Application Tier (AT) Data Tier (DT) Configuration Database Relational Warehouse OLAP Cube Database Collection Databases.
#TEDEV342 A A B B I currently deploy via FTP directly to my host. My deployment is manual because I need to set permissions on the target server.
DEV203. Coded workflows Declarative workflows Web part hook-up Professional developerBusiness Analyst/Process Designer List definitions Event receivers.
Learn more: Download SCM: Join the TechNet Wiki community:
Redeploying from on-premises to the cloud SharePoint burst out to Azure Hybrid event based applications Building a private cloud.
OSP-302. DescriptionUri All lists on a site.../_vti_bin/ListData.svc All Items in a named list.../_vti_bin/ListData.svc/MyList 2nd Item in the list.../_vti_bin/ListData.svc/MyList(2)
WCL305. App and desktop virtualization Improved control and automation Reduced helpdesk costs Simplified PC management with cloud services and enhanced.
SIM357. Services Cloud Deployment Fabric Bare Metal to Hyper-V Cluster Hyper-V, VMware, Citrix XenServer Network Management Storage Management Update.
DEV348. demo Valid HTML5 Syntax demo.
WSV303. I live here... DC DNS DHCP WDS Clients DC DNS WDS/DHCP DC/DNS.
WCL301. demo Basic Custom XML-file.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.

DEV355 Jack Swigert demo my wife demo.
DEV353. Required Slide Speakers, please list the Breakout Sessions, Interactive Discussions, Labs, Demo Stations and Certification.
Presentation transcript:

SIM311

Built on top of Microsoft ® System Center Configuration ManagerBuilt on top of Microsoft ® System Center Configuration Manager Supports all System Center Configuration Manager topologies and scaleSupports all System Center Configuration Manager topologies and scale Facilitates easy migrationFacilitates easy migration Deploy across various operating systems Windows ® client and ServerDeploy across various operating systems Windows ® client and Server Protection against all type of malwareProtection against all type of malware Proactive security against zero day threatsProactive security against zero day threats Productivity-oriented default configurationProductivity-oriented default configuration Integrated management of host firewallIntegrated management of host firewall Backed by Microsoft Malware Protection CenterBacked by Microsoft Malware Protection Center Unified management interface for desktop administratorsUnified management interface for desktop administrators Effective alertsEffective alerts Simple, operation-oriented policy administrationSimple, operation-oriented policy administration Historical reporting for security administratorsHistorical reporting for security administrators Ease of Deployment Enhanced Protection Simplified Desktop Management

Deploy Monitor Requirements Create

You should consider managing policy with CfgMgr if… You should consider managing policy with Group Policy if…  You want unified management (Recommended)  You have CfgMgr deployed on all the computers you will manage  You have non domain-joined machines  You do not want to have to understand and manage many low level settings  You don’t need more than one policy per computer, even on servers  Some of the computers you want to manage don’t have CfgMgr  You prefer to manage policy with group policy  You want extremely granular control over settings  You prefer to “layer” policies, that is to apply more than one policy per computer

StandardHigh SecurityPerf. Optimized Enable NIS  Scheduled ScansWeekly QuickDaily Quick Weekly Full Weekly Quick Scan only when idle  Force if 2 scans missed (on reboot)  Throttle CPU50%-30% Force definition update after 1 day - FirewallBlock incoming in all profiles Not Configured

#Server Role or Server Application 1SQL 2005 Ent/Std (with clustering) 2SQL 2008 Ent/Std (with clustering) 3SCOM 2007 R2 (with clustering) in FEP-S Configuration 4SCCM 2007 (with clustering) in FEP Configuration 5Exchange2007 (HubTransport, ClientAccess, Mailbox) 6Exchange2010 (HubTransport, ClientAccess, Mailbox) 7SharePoint 8File Services 9Internet Information Services 6 10Internet Information Services 7 11DNS Server 12Active Directory Domain Services (including SYSVOL/FRS/DFS/DFS-R) 13DHCP Server 14Terminal Services 15Hyper-V 16Forefront Protection for Exchange

demo

Deploy Monitor Requirements Create

Deploy Monitor Requirements Create

There are new reports that can help with troubleshooting of policies. You can reach these reports by going to Computer Manager  Reporting  Reports. “Policy Distribution Overview” - This report displays the breakdown of policy distribution states per collection. This report will only enumerate computers with Microsoft Forefront Endpoint Protection 2010 installed. “Policy Distribution for a specific collection” - This report displays the policy distribution states for a specific collection. This report is divided into three sections. The Applied Policy section lists the number of computers and the applied policy. The Pending State section lists the number of computers that in a pending state. The Failure section lists the number of computers that have reported failures in applying their policy. “Policy Distribution for a specific collection in a specific state” - This report displays a list of computers in a specific collection and specific policy state (applied, pending, and failure). NOTE: Since policy distribution is similar to client roll out (both use the Configuration Manager software distribution capabilities), troubleshooting follows the same concepts and uses similar reports.

demo

Malware Detection Malware detected on a sensitive computer Threshold: Computer to monitor (collections) Sensitivity (High = Any, Medium = Manual Action, Low = Infected) Admin expected response: Open Computer Details report. Learn more about the malware Malware Outbreak A specific malware is being detected on multiple computers in a period of 24 hours Threshold: Number of computers Admin expected response: Open Malware Details report Identify FEP mitigation Scope the infection Learn more about the malware Repeated Malware A specific malware is detected multiple times on the same computer(s) Threshold: Computer to monitor (collections) Number of detections Detection interval Admin expected response: Open Computer Details report Learn more about the malware Multiple Malware Several types of malware are detected on a computer(s) Threshold: Computer to monitor (collections) Number of malware types Detection interval Admin expected response: Open Computer Details report Learn more about the malware

Convergence of Management and Security Built on System Center Configuration Manager 2012 Advanced protection with lower impact on productivity New Enhancements Simplified hierarchy model Role Based Access Control Definition Updates and automatic approval rules through ConfigMgr Improved alert timings Evaluation Options FEP 2012 Beta available now: Join Community Evaluation Program (included in ConfigMgr CEP)

Required Slide Speakers, please list the Breakout Sessions, Interactive Discussions, Labs, Demo Stations and Certification Exam that relate to your session. Also indicate when they can find you staffing in the TLC.

Sessions On-Demand & CommunityMicrosoft Certification & Training Resources Resources for IT ProfessionalsResources for Developers Connect. Share. Discuss.

Scan the Tag to evaluate this session now on myTechEd Mobile