Presentation is loading. Please wait.

Presentation is loading. Please wait.

System Center 2012 Configuration Manager Concepts & Administration

Similar presentations


Presentation on theme: "System Center 2012 Configuration Manager Concepts & Administration"— Presentation transcript:

0 © 2012 Microsoft Corporation. All rights reserved.
Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

1 System Center 2012 Configuration Manager Concepts & Administration
Module 4: Inventory, Asset Intelligence, Software Metering and Remote Control Your Name Premier Field Engineer Microsoft © 2012 Microsoft Corporation

2 Conditions and Terms of Use
Microsoft Confidential This training package is proprietary and confidential, and is intended only for uses described in the training materials. Content and software is provided to you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the content and/or software included in such packages is strictly prohibited. The contents of this package are for informational and training purposes only and are provided "as is" without warranty of any kind, whether express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non- infringement. Training package content, including URLs and other Internet Web site references, is subject to change without notice. Because Microsoft must respond to changing market conditions, the content should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. Unless otherwise noted, the companies, organizations, products, domain names, addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, address, logo, person, place, or event is intended or should be inferred. Copyright and Trademarks © 2012 Microsoft Corporation. All rights reserved. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. For more information, see Use of Microsoft Copyrighted Content at Microsoft®, Internet Explorer®, and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other Microsoft products mentioned herein may be either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. © 2012 Microsoft Corporation Microsoft Confidential

3 Microsoft Confidential
Overview Hardware and Software Inventory Asset Intelligence Software Metering Remote Tools Lesson 4 covers the core Asset Management features of Configuration Manager as well as the Remote Tools function. For Hardware Inventory and Software Inventory, we will look at the components that make inventory work, how to enable and customize inventory, and how to report on it For Asset Intelligence, we will configure Asset Intelligence, as well as learn how to import MVLS and custom license statements into the Configuration Manager database. For Software Metering, we will enable the agent, create and organize rules, and report on metering data For Remote Tools we will learn about the different settings that allow an administrator to configure Remote Tools, Remote Assistance and Remote Desktop from within Configuration Manager Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

4 Microsoft Confidential
Objective After completing this Module, you will be able to: Configure, customize, troubleshoot and report Hardware and Software Inventory Configure Asset Intelligence, import an MVLS license statement and generate Asset Intelligence reports Configure Software Metering, create rules and generate reports Learn what’s new in Remote Control and how to configure the Remote Tools client Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

5 Hardware and Software Inventory
Types of Inventory Hardware Inventory components and logs Enabling and customizing Hardware Inventory Hardware Inventory reporting Software Inventory components and logs Enabling and customizing Software Inventory Software Inventory reporting Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

6 Microsoft Confidential
Types of Inventory Hardware Inventory Queries WMI for hardware data Can be customized per site or per collection Customize Hardware Inventory MOF files can be imported from the console Inventory Classes can be imported from a local or remote system Software Inventory Scans hard drives for file types Can also collect copies of files during inventory cycle There are a few important changes in Hardware Inventory in System Center 2012 Configuration Manager (Configuration Manager): The administrator no longer has to modify manually the Sms_def.mof file on each site server, in order to customize what is reported during a Hardware Inventory cycle. Now this can be achieved by modifying the Hardware Inventory Classes in the Default Client Setting or Custom Device Settings for a collection. MOF files can be imported from other locations – is useful if settings were standardized on one Configuration Manager site, and the administrator wished to import these settings into other Configuration Manager sites, in order to standardize Hardware Inventory classes reported across an entire hierarchy. The administrator can collect further hardware inventory data by connecting (locally or remotely) to WMI and adding reporting classes. IDMIF and NOIDMIFs can be created and collected during a hardware inventory cycle as in previous versions of Configuration Manager Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

7 Hardware Inventory Components and Logs
1 Client Inventory data generated and sent to Management Point on agent schedule InventoryAgent.log 2 Management Point Report received in MP\outboxes\hinv.box Moved by Hardware Inventory Manager to Site Server MP_Hinv.log 3 Site Server Report received in Inboxes\auth\dataldr.box Data Loader processes data Dataldr.log Database updated Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

8 Enabling and Customizing Hardware Inventory
Administration Node  Client Settings Default Settings  Hardware Inventory The Hardware Inventory Schedule can be a simple or complex schedule (as in previous versions of System Center Configuration Manager and System Management Server) The Hardware Inventory classes setting permits the following actions: Show classes filtered by their use – Asset Intelligence Reporting Classes, Mobile Device Classes or Windows Clients and Servers Classes Show classes filtered by type – Enabled Classes only, or Recently Added Classes Import MOF files from local or remote sources – this is useful if a “Gold Standard” configuration has been exported in MOF format from another site, and the administrator wishes to import these settings into the current site Export settings from this site in MOF format – this is useful if these settings are to be then imported into another Configuration Manager site Add WMI classes by connecting to local or remote WMI namespace Delete WMI Classes – doing this will remove all inventory data and stored data related to that class from the database Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

9 Enabling and Customizing Hardware Inventory
Add/delete options from existing MOF Filter by category to show All Classes AI Classes Mobile Device Classes Windows Clients and Server Classes Filter by type to show Enabled Classes only Recently Added Classes Import settings from local or remote MOF file Export current settings to re-use in another Configuration Manager 2012 site Add WMI classes by connecting to local or remote WMI namespace Delete WMI Classes – doing this will remove all inventory data and stored data related to that class from the database Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

10 Enabling and Customizing Hardware Inventory
Assign different settings for Hardware Inventory by creating custom client device settings Deploy settings to a collection If a device is a member of more than one collection with conflicting device settings, the priority setting determines which setting is enforced. Default client settings have a priority of 10,000 Custom device settings have higher priorities Priorities can be increased or decreased by the administrator Administrators may wish to assign different Hardware Inventory settings ( Enable/Disable agent, schedule, reporting classes, MIF collection) to different collections of devices. When conflicts occurs then the policy with the highest priority (i.e. lowest number) wins. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

11 Creating Custom Device Settings
Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

12 Creating Custom Device Settings
Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

13 Deploy Settings to a Collection
It is important to know which components generate and process Software Inventory for effective troubleshooting. Understanding which client and server logs are generated is very useful for drilling down to pinpoint problems. SKPSWI.dat can still be used to prevent software inventory from scanning a particular drive\folder Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

14 Hardware Inventory Reporting
40+ reports for viewing Hardware Inventory results Hardware – CDROM, Hardware – Disk etc. Useful reports for troubleshooting Hardware Inventory Inventory Classes enabled on a specific computer Inventory Classes assigned to a specific collection Computers not inventoried recently (in a specified number of days) Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

15 Software Inventory Components and Logs
1 Client Software Inventory data generated and sent to Management Point on Agent Schedule InventoryAgent.log 2 Management Point Report received in MP\outboxes\sinv.box Moved by Software Inventory Manager to Site Server MP_Sinv.log 3 Site Server Report received on Inboxes\sinvproc.box Software Inventory Processor processes data Sinvproc.log Database updated Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

16 Enabling and Customizing Software Inventory
Administration Node  Client Settings Default Settings  Software Inventory [PFE] Rushi Faldu: Discuss the difference between the “Inventory these file types” and “Collect Files” settings The Software Inventory Schedule can be a simple or complex schedule (as in previous versions of SCCM and SMS) Note that no file types are inventoried by default – this is different than previous versions. The administrator must define the file types to inventory when enabling the agent. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

17 Enabling and Customizing Software Inventory
Assign different settings for Software Inventory by creating custom client device settings Deploy settings to a collection Default client settings have a priority of 10,000 Custom device settings have higher priorities Priorities can be increased or decreased by the administrator Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

18 Creating Custom Device Settings
Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

19 Creating Custom Device Settings
Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

20 Deploy Settings to a Collection
Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

21 Software Inventory Reporting
40+ reports for viewing Software Inventory results Look in Software – Company and Products, Software – Files categories Useful report for troubleshooting Software inventory Computers not inventoried recently (in a specified number of days) Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

22 Lab: Customizing Hardware and Software Inventory
Scenario You are the administrator of a new Configuration Manager 2012 hierarchy. You need to generate inventory data from newly-installed clients Goals Enable, customize and report Hardware Inventory Enable, customize and report Software Inventory Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

23 Microsoft Confidential
Lesson Review Name two differences in enabling and configuring hardware inventory in System Center 2012 Configuration Manager from Configuration Manager 2007? How can different inventory settings be applied to different groups of clients within a Configuration Manager site? How does an administrator troubleshoot conflicting inventory settings applied to a single computer? Name two differences in enabling and configuring hardware inventory in Configuration Manager 2012 from Configuration Manager 2007 Different Inventory Settings can be applied to different collections within a single site Hardware Inventory reporting classes are configured as part of the client agent, rather than by editing the SMS_Def.mof file How can different inventory settings be applied to different groups of clients within a Configuration Manager 2012 site? By creating multiple custom device settings and deploying them to multiple client based collections How does an administrator troubleshoot conflicting inventory settings applied to a single computer? By looking at the relative priorities of each custom device setting By running the “Inventory Classes enabled on a specific computer” report Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

24 Microsoft Confidential
Lesson Summary In this lesson, you learned: How hardware inventory can be enabled and customized How software inventory can be enabled and customized Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

25 Asset Intelligence Lesson Objectives
In this Lesson you will learn: What’s new in System Center 2012 Configuration Manager? How to configure Asset Intelligence Hardware Inventory and Software Metering Agents Enabling Asset Intelligence Reporting Classes Reporting Class dependencies Installing an Asset Intelligence Synchronization Point Auditing successful logon events Importing an MVLS license statement Asset Intelligence Maintenance Tasks Asset Intelligence Reporting Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

26 What is New in Asset Intelligence
Enable Asset Intelligence reporting classes Changes to MVLS license statement import process 2 Maintenance Tasks Check Application Title with Inventory Information - checks that the software title reported in software inventory is reconciled with the software title in the Asset Intelligence catalog. Summarize Installed Software Data - provides the summary information displayed in the Inventoried Software node under the Asset Intelligence node. Client Access License reports have been removed Enable reporting classes for Asset Intelligence using the Hardware Inventory settings in the Default Client Settings (or Custom Device Settings for Hardware Inventory) Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

27 How to configure Asset Intelligence
Enable Hardware Inventory and Software Metering Agents Edit Asset Intelligence Hardware Inventory reporting classes Install an Asset Intelligence Synchronization Point Enable auditing of success logon events Import software license information Create a general license statement information file for import Configure Asset Intelligence Maintenance Tasks Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

28 Enable Asset Intelligence Reporting Classes
Enabling Asset Intelligence Classes can be done either by:- Editing Inventory Classes in the Asset Intelligence node of the Admin console – this will be reflected in the Default Client Agent Settings. Note: This setting affects the classes being enabled, not the properties within each class – this needs to be configured in the Default Client Agent Settings Editing the Asset Intelligence Reporting Classes in the Hardware Inventory Agent of Default Client Agent Settings or Custom Device Settings. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

29 Reporting Class Dependencies
SMS_Installed_Software The following slides show the dependencies between certain Asset Intelligence Reporting Classes and Asset Intelligence Reports. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

30 Microsoft Confidential
SMS_SystemConsoleUsage Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

31 Reporting Class Dependencies
SMS_SystemConsoleUser SMS_AutoStartSoftware SMS_BrowserHelperObject SMS_SoftwareTag Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

32 Reporting Class Dependencies
Win32_USBDevice SMS_InstalledExecutable SMS_SoftwareShortcut This class is not a currently used to support existing AI reports. However, it can be enabled to support customer reports SoftwareLicensingService SoftwareLicensingProduct This class is not a currently used to support existing AI reports. However, it can be enabled to support customer reports Understand the impact of using the SMS Installed Executable class – collects info on all executables in a system. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

33 Reporting Class Dependencies
SoftwareLicensingProduct Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

34 Install an Asset Intelligence Synchronization Point
By default, the Use this Asset Intelligence Synchronization Point setting is selected and cannot be configured on this page. System Center Online accepts network traffic only over TCP port 443, therefore the SSL port number setting cannot be configured on this page of the wizard. Optionally, you can specify a path to the System Center Online authentication certificate (.pfx) file, and then click Next. Typically, you do not specify a path for the certificate because the connection certificate is automatically provisioned during site role installation. On the Proxy Server Settings page, specify whether the Asset Intelligence synchronization point will use a proxy server when connecting to System Center Online to synchronize the catalog and whether to use credentials to connect to the proxy server, and then click Next. On the Synchronization Schedule page, specify whether to synchronize the Asset Intelligence catalog on a schedule. When you enable the synchronization schedule, you specify a simple or custom synchronization schedule. During scheduled synchronization, the Asset Intelligence synchronization point connects to System Center Online to retrieve the latest Asset Intelligence catalog. You can manually synchronize the Asset Intelligence catalog from the Asset Intelligence node in the Configuration Manager console. For the steps to manually synchronize the Asset Intelligence catalog, see Operations for Asset Intelligence in Configuration Manager. On the Summary page of the New Site Role Wizard, review the settings you have specified to ensure that they are correct before you continue. To make changes to any settings, click Previous until you return to the appropriate page, make the change, and return to the Summary page. Warning: If a proxy server is required to connect to System Center Online, the connection certificate might also be deleted if the user account password expires for the account configured for proxy server authentication. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

35 Install an Asset Intelligence Synchronization Point
On the Proxy Server Settings page, specify whether the Asset Intelligence synchronization point will use a proxy server when connecting to System Center Online to synchronize the catalog and whether to use credentials to connect to the proxy server, and then click Next. Warning : If a proxy server is required to connect to System Center Online, the connection certificate might also be deleted if the user account password expires for the account configured for proxy server authentication Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

36 Install an Asset Intelligence Synchronization Point
On the Synchronization Schedule page, specify whether to synchronize the Asset Intelligence catalogue on a schedule. When you enable the synchronization schedule, you specify a simple or custom synchronization schedule. During scheduled synchronization, the Asset Intelligence synchronization point connects to System Center Online to retrieve the latest Asset Intelligence catalogue. You can manually synchronize the Asset Intelligence catalogue from the Asset Intelligence node in the Configuration Manager console. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

37 Enable Auditing of Successful Logon Events
Required for the following reports Hardware 3A – Primary Computer Users Hardware 3B – Computers for a Specific Computer User Hardware 4A – Shared (multi-user) Computers Hardware 5A – Console Users on a Specific Computer Enable the SMS_SystemConsoleUser reporting class Modify Domain Security Policy Security Settings Local Policies Audit Policy Audit Logon Events – select Success check box Four Asset Intelligence reports display information gathered from the Windows Security event logs on client computers. If the Security event log settings are not configured to log all Success logon events, these reports contain no data even if the appropriate hardware inventory reporting class is enabled. To enable the Hardware Inventory Client Agent to inventory the information required to support these reports, you must first modify the Windows Security event log settings on clients to log all Success logon events, and enable the SMS_SystemConsoleUser hardware inventory reporting class. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

38 Import Software License Information
Import general (non-MVLS) information into the database Create manually in .csv format with the following headers Name Publisher Version Language EffectiveQuantity PONumber ResellerName DateofPurchase SupportPurchased SupportExpirationDate Comments AILW.exe (Asset Intelligence License Wizard) ADD LINK can be used to create a .csv file containing all software titles within the Config Manager DB Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

39 Importing an MVLS License Statement
Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

40 Configure Asset Intelligence Maintenance Tasks
By default, both maintenance tasks are enabled and are configured on a default schedule. Check Application Title with Inventory Information: This maintenance task checks that the software title that is reported in software inventory is reconciled with the software title in the Asset Intelligence catalogue. Summarize Installed Software Data: This maintenance task provides the information that is displayed in the Assets and Compliance workspace, in the Inventoried Software node, under the Asset Intelligence node. When the task runs, Configuration Manager gathers a count for all inventoried software titles at the primary site. Note: The Summarize Installed Software Data maintenance task is available only on primary sites. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

41 Asset Intelligence changes in SP1
Supports the 7 mandatory software identification tags that are defined in ISO/IEC Software identification tags provide authoritative information that is used to identify installed software ISO/IEC standard specifies the structure and basic usage of software identification) Added a new AI class SMS_SoftwareTag Collects inventory of App-V 5 and App-V 4 applications Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

42 Microsoft Confidential
Lesson Review What kind of license statements can be imported into System Center 2012 Configuration Manager? Name the two new Maintenance Tasks for Asset Intelligence data in System Center 2012 Configuration Manager? What kind of License Statements can be imported into Configuration Manager 2012? MVLS License Statements Custom License Statements Name the two new Maintenance Tasks for Asset Intelligence data in Configuration Manager 2012 Check Application Title with Inventory Information Summarize Installed Software Data Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

43 Microsoft Confidential
Lesson Summary In this lesson, you learned: Which components are required to generate successful Asset Intelligence Reports How to import MVLS and license statements Which 2 new Maintenance Tasks have been added to System Center 2012 Configuration Manager for Asset Intelligence Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

44 Microsoft Confidential
Software Metering Software Metering components Enabling and customizing Software Metering Creating Custom Device Settings Creating Metering Rules Software Metering reporting Client and server troubleshooting It is important to know which components generate and process Software Inventory for effective troubleshooting. Understanding which client and server logs are generated is very useful for drilling down to pinpoint problems. SKPSWI.dat can still be used to prevent software inventory from scanning a particular drive\folder Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

45 Software Metering Components and Logs
1 Client Metering data generated and sent to MP on Data Collection Schedule Mtrmgr.log Swmtrreportgen.log 2 Management Point Report received in MP\outboxes\swm.box Moved by File Despatch Manager to Site Server 3 Site Server Report received on Inboxes\swmproc.box Software Metering Processor processes data Swmproc.log Database updated Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

46 Enabling and Customizing Software Metering
Administration Node  Client Settings  Default Settings  Software Metering Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

47 Software Metering Components
Software Metering client agent Mtrmgr.log Software Metering Processor (Site Server component) Swmproc.log Data usage report generation log SWMTRReportGen.log Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

48 Enabling and Customizing Software Metering
Assign different settings for Software Metering by creating Custom Client Device Settings Deploy settings to a collection Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

49 Creating Custom Device Settings
Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

50 Creating Custom Device Settings
Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

51 Creating Metering Rules
Auto-created Metering Rules can be automatically generated (but disabled) based on the percentage of clients using that program in the site. This is configured in the Software Metering Node of Assets and Compliance. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

52 Creating Metering Rules
Manually created Metering Rules can also be manually created by an administrator Name - Give a name to the metering rule (maximum 255 characters) File Name – browse for the file name as it appears in Explorer – this will populate the Original File Name, Version, Language fields. These fields can be modified, for example to meter usage of all Language versions of the executable. Rules can be applied solely in the site where they are created or applied to all sites in the hierarchy. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

53 Software Metering Administration
Metering rules can be organized in folders Metering rules can be enabled, disabled, edited or moved. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

54 Software Metering Reporting
Reports rely on metering data being sent from the client – default is every 7 days Schedule data collection for Software Metering in Default Client Settings Some reports rely on summarization Summarize Software Metering File Usage Data Summarize Software Metering Monthly Usage Data The following reports require the Software Metering Agent to be enabled:- Software 07A - Recently Used Executables by Number of Computers Software 07B - Computers that Recently Used a Specified Executable Software 07C - Recently Used Executables on a Specific Computer Software 08A - Recently Used Executables by Number of Users Software 08B - Users that Recently Used a Specified Executable Software 08C - Recently Used Executables by a Specified User It may take time to get results from the Software Metering data. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

55 Software Metering Reports
Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

56 Lab: Customizing Software Metering
Scenario You are the administrator of the Contoso System Center 2012 Configuration Manager hierarchy. You wish to create new Software Metering rules for a Configuration Manager site Include the Lab slide as a cue that it is time to do the labs Goals Enable Software Metering Create a new software metering rule Generate a software metering report Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

57 Microsoft Confidential
Lesson Review What is the name of the client log that shows metering rules being checked when an executable is run? Name the two ways to create a metering rule? What is the name of the client log that shows metering rules being checked when an executable is run? Mtrmgr.log Name the two ways to create a metering rule? By using Automatic rules and enabling them in the admin console By manually creating a rule in the admin console Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

58 Microsoft Confidential
Lesson Summary In this Lesson, you learned: How to enable and configure the Software Metering Agent How to create rules automatically and manually Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

59 Lesson Objectives Remote Control
What’s new in System Center 2012 Configuration Manager? What’s new with Remote Control, Remote Desktop, Remote Assistance How to configuring the Remote Tools Client Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

60 What’s New in Configuration Manager
Supported Operating Systems for Remote Control Viewer Windows 7 (32 bit and 64 bit) Windows XP SP3 32-bit, Vista 32-bit, Vista 64-bit Install the Remote Desktop Connection (RDC) client update 7.0 (KB969084) No support for the Remote Control Viewer on Windows XP (64 bit), Windows Server 2003 (32 or 64 bit), Windows Server 2008 or R2 (64 bit) operating systems Prerequisites for Remote Control in Configuration Manager - Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

61 What’s New in Configuration Manager?
Pass CTRL+ALT+DEL to client Disable client mouse and keyboard during remote control session Remote Tools are configured in the Default Client Settings or in Custom Device Settings linked to a collection Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

62 What’s New in Configuration Manager? (continued)
Start Remote Control Viewer from a command line <Configuration Manager Installation Folder>\AdminConsole\Bin\i386\CmRcViewer.exe Supported Switches File – Connect File - Disconnect File - Exit View - Full Screen View - Scale to Fit View - Status Bar Action - Send Ctrl+Alt+Del Key Action - Enable Clipboard Sharing Action - Lock Remote Keyboard and Mouse Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

63 Configuring the Remote Tools Client
Client can be used to configure Remote Control, Remote Assistance and Remote Desktop Remote Assistance and Remote Desktop settings are applied as local policy, so can be over-written by domain-based Group Policy Remote Assistance and Remote Desktop needs to be enabled on the client before settings for these features are effective Remote Assistance feature must be installed on the machine initiating the connection Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

64 Remote Control Client Settings
Enable Remote Control on clients Firewall exception profiles Select whether remote control is enabled for all client computers that receive these client settings. Click Configure Firewall to enable remote control and optionally configure firewall settings to allow remote control to work on client computers. Users can change policy or notification settings in Software Center Select whether users can change remote control options from within Software Center. Allow Remote Control of an unattended computer Select whether an administrator can use remote control to access a client computer that is logged off or locked. Only a logged-on and unlocked computer can be remote controlled when this setting is disabled. Prompt user for Remote Control permission Select whether the client computer will display a message asking for the user's permission before allowing a remote control session. Grant Remote Control permission to local Administrators group Select whether local administrators on computer being remote controlled can establish remote control sessions to client computers. Access level allowed If the setting Grant Remote Control permission to local Administrators group is enabled, specify the type of remote control access that will be allowed. Permitted viewers Click Set Viewers to open the Configure Client Setting dialog box and specify the names of the Windows users who can establish remote control sessions to client computers. Show session notification icon on taskbar Select this option to display an icon on the taskbar of client computers to indicate that a remote control session is active. Show session connection bar Select this option to display a high-visibility session connection bar on client computers to indicate that a remote control session is active. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

65 New Text-Only Slide (Hidden)
Play a sound on client Select this option to use sound to indicate when a remote control session is active on a client computer. You can play a sound when the session connects or disconnects, or you can play a sound repeatedly during the session. Manage unsolicited Remote Assistance settings Selecting this option to allow System Center 2012 Configuration Manager to manage unsolicited remote assistance sessions. Unsolicited remote assistance sessions are those where the user at the client computer does not request assistance in order to initiate a session. Manage solicited Remote Assistance settings Select this option to allow System Center 2012 Configuration Manager to manage solicited remote assistance sessions. Solicited remote assistance sessions are those where the user at the client computer sends a request to the administrator for remote assistance. Level of access for Remote Assistance Select the level of access which will be granted to remote assistance sessions initiated from the Configuration Manager console. Manage Remote Desktop settings Select this option to allow System Center 2012 Configuration Manager to manage Remote Desktop sessions for computers. Allow permitted viewers to connect by using Remote Desktop connection Select this option to allow users specified in the permitted viewer list to be added to the Remote Desktop local user group on client computers. Require network level authentication on computers that run Windows Vista operating system and later versions Select this more secure option if you want to use network level authentication to establish Remote Desktop connections to client computers running Windows Vista or later. Network level authentication requires fewer remote computer resources initially as it completes user authentication before establishing a Remote Desktop connection. This is a more secure method as it can help to protect the computer from malicious users or software and it reduces the risk from denial-of-service attacks. Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

66 Demo: Remote Control in Configuration Manager
Scenario You are the administrator of a Configuration Manager hierarchy. You need to use the Remote Tools client to remotely control a Windows 7 client Goals Enable and configure the Remote Tools Client Start a Remote Tools session from the command line Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

67 Microsoft Confidential
Lesson Review Name one new feature of the Remote Tools Client? How can you start the Remote Control viewer from a command line? Name one new feature of the Remote Tools Client CTRL+ALT+DEL passed to the client Disable client keyboard and mouse during a session Start Remote Control Viewer from a command line How can you start a Remote Control Viewer from a command line? <Configuration Manager Installation Folder>\AdminConsole\Bin\x64\CmRcViewer.exe Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential

68 Microsoft Confidential
Lesson Summary In this lesson, you learned: What’s new in Configuration Manager for the Remote Tools Client How to enable and configure the Remote Tools Client Agent Microsoft Confidential © 2012 Microsoft Corporation Microsoft Confidential


Download ppt "System Center 2012 Configuration Manager Concepts & Administration"

Similar presentations


Ads by Google