Presentation is loading. Please wait.

Presentation is loading. Please wait.

System Center 2012 R2 Configuration Manager with Windows Intune Product Overview Tomáš „Kanty“ Kantůrek.

Similar presentations


Presentation on theme: "System Center 2012 R2 Configuration Manager with Windows Intune Product Overview Tomáš „Kanty“ Kantůrek."— Presentation transcript:

1 System Center 2012 R2 Configuration Manager with Windows Intune Product Overview Tomáš „Kanty“ Kantůrek

2 Disclaimer 2 4/19/2017 Disclaimer
The following slides contain preliminary information that may be changed substantially prior to final commercial release of the software described herein. The information contained represents the current view of Microsoft Corporation on the issues discussed as of the date of the presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of the presentation. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THE ROADMAP PORTION OF THIS PRESENTATION. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this presentation. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this information does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2013 Microsoft Corporation. All rights reserved. 2

3 System Center Marketing
4/19/2017 Today’s challenges The explosion of devices is eroding the standards-based approach to corporate IT. Devices Users expect to be able to work in any location and have access to all their work resources. Users Deploying and managing applications across platforms is difficult. Apps Data Users need to be productive while maintaining compliance and reducing risk. The explosion in use and number of consumer devices and ubiquitous information access is changing the way that people perceive their technology, in addition to how that technology shapes their personal and work lives. The constant use of information technology throughout the day, along with the easy access of information, is blurring traditional boundaries between work and home life. These shifting boundaries are accompanied by a belief that personal technology—selected and customized to fit users’ personalities, activities, and schedules—should extend into the workplace. Accommodating the consumerization of IT presents a variety of challenges. Historically, most or all devices used in the workplace were owned, and therefore managed, by the organization. Policies and processes were focused on device management—and usually on a relatively small, tightly controlled, and managed set of corporate-approved hardware that was subject to predetermined corporate replacement cycles. The consumerization of IT dramatically alters this scenario. There is greatly increased device and operating system diversity and volume in the organization. This can fundamentally change the IT landscape and necessitate a shift in management objectives from tight control over hardware to effective, user-centric governance. The way resources and applications are accessed and consumed is also changing. With the shift to personal devices and mobility, there is a need to adapt how applications work. IT departments must also now consider authentication of the user, validation of the device, and updated service consumption models when planning their consumerization policies and implementation. The best organizational response is IT policies that match business realities and priorities, moving toward a people-centric model that replaces the older paradigm of device-centric policies and management. The Microsoft people-centric vision helps IT administrators increase their organizations’ productivity by enabling access to corporate resources, regardless of location or device used. This shift in focus requires policies, processes, and technologies that give people the freedom to select the devices they want to use, along with device-agnostic access to applications and data. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

4 System Center Marketing
4/19/2017 People-centric IT Users Devices Apps Data Enable your end users Allow users to work on the devices of their choice and provide consistent access to corporate resources. Unify your environment Deliver a unified application and device management on- premises and in the cloud. Microsoft has a history of providing rich IT-infrastructure solutions to help manage every aspect of enterprise operations. Microsoft’s people-centric solution consists of products and technologies that can help IT departments handle the influx of consumer-oriented technology and the work style expectations of users, thereby helping increase productivity and satisfaction for the people within their organizations. Microsoft’s people-centric IT vision helps organizations enable and embrace the consumerization of IT by: Enabling your end users by allowing users to work on the device(s) of their choice and providing consistent access to corporate resources from those devices. Unifying your environment by delivering comprehensive application and device management from both your existing on-premises infrastructure, including System Center Configuration Manager, Windows Server, and Active Directory, as well as cloud-based services, including Windows Intune and Windows Azure. Helping protect your data by protecting corporate information and managing risk. Protect your data Help protect corporate information and manage risk. Management. Access. Protection. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

5 Selecting the Management Platform
System Center Marketing 4/19/2017 Selecting the Management Platform Unified Device Management System Center 2012 R2 Configuration Manager with Windows Intune Build on existing Configuration Manager deployment Full PC management (OS Deployment, Endpoint Protection, application delivery control, rich reporting) Deep policy control requirements Scale to 100,000 devices Extensible administration tools (RBA, PowerShell, SQL Reporting Services) Cloud-based Management Standalone Windows Intune No existing Configuration Manager deployment Simplified policy control Less than 7,000 devices and 4,000 users Simple web-based administration console © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6 System Center 2012 R2 Configuration Manager
System Center Marketing 4/19/2017 System Center 2012 R2 Configuration Manager Empower Users Unify Infrastructure Simplify Administration Empower people to be more productive from almost anywhere on almost any device. Reduce costs by unifying IT management infrastructure. Improve IT effectiveness and efficiency. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

7 System Center Marketing
4/19/2017 Empower Users Unified Device Management User-centric Application Delivery © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

8 Unified Device Management
System Center Marketing 4/19/2017 Unified Device Management Windows PCs (x86/64, Intel SoC), Windows to Go Windows Embedded Mac OS X IT Single Admin Console Windows RT, Windows Phone 8 iOS, Android © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

9 System Center Marketing
4/19/2017 Platform Support OS Platform Management Agent End User Experience Windows 8.1 PC ConfigMgr Agent Or Management Agent(OMA-DM) Software Center/Application Catalog Windows Company Portal app Windows PC (Win8,Win7,Vista,XP) Windows RT Management agent (OMA-DM) Windows Phone 8 Windows Phone 8 Company Portal app iOS Apple MDM Protocol Native iOS Company Portal App Android Android MDM agent (OMA-DM) Native Android Company Portal App Mac Limited self service experience Linux/Unix N/A © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

10 Registering and Enrolling Devices
System Center Marketing 4/19/2017 Registering and Enrolling Devices Users can enroll devices that configure the device for management with Windows Intune; the user can then use the Company Portal for easy access to corporate applications Data from Windows Intune is in sync with Configuration Manager, which provides unified management across both on-premises and in the cloud Active Authentication Active Directory When a user wants to use their own device, this immediately raises requirements from both the user and IT. The user needs access to apps and data, and IT needs to ensure that corporate information remains secure and that the business continues to deliver on its compliance and regulatory requirements. With Windows Server 2012 R2, we introduce a new concept known as device registration. Users can register their BYO devices for single sign-on and access to corporate data using Workplace Join. As part of this registration process, a certificate is installed on the device, and a new device object is created in Active Directory. This device object establishes a link between the user and their device, making it known to IT, and allowing the device to be authenticated, effectively a seamless 2nd factor authentication. In return for registering their device and making in known to IT, the user gains access to corporate resources that were previously not available outside of their domain joined PC. IT can publish access to corporate resources with the Web Application Proxy based on device awareness (for example is it registered?) and the user’s identity. Multi-factor authentication can be used through Windows Azure Active Authentication (previously known as PhoneFactor). Users can enroll devices, which configures the devices for management with Windows Intune. The user can then use the Company Portal for easy access to corporate applications and data, and to be able to manage their own devices, performing tasks such as remote wiping them in the event they are lost, stolen, or replaced. And in order to provide administrators with a unified view of their entire environment, the data from Windows Intune is synchronized with Configuration Manager, which provides unified management across both on-premises and in the cloud. Users can register BYO devices for single sign-on and access to corporate data with Workplace Join. As part of this, a certificate is installed on the device Web Application Proxy ADFS IT can publish access to corporate resources with the Web Application Proxy based on device awareness and the user’s identity.; multi-factor authentication can be used through Windows Azure Active Authentication (formerly PhoneFactor) As part of the registration process, a new device object is created in Active Directory, establishing a link between the user and their device © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

11 What’s New in Mobile Device Inventory?
System Center Marketing 4/19/2017 What’s New in Mobile Device Inventory? Personal vs. Corporate Owned Devices App inventory App Management By default, user-enrolled devices are “Personal” Admin can specify corporate-owned devices Personal devices – Inventory of applications installed by ConfigMgr/Intune only Corporate devices – Complete inventory of all applications on the device* New global condition to differentiate app installs on corporate versus personal * iOS – Apple MDM allows only inventory of MDM provisioned apps © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

12 Mobile Device Settings in ConfigMgr 2012 R2
System Center Marketing 4/19/2017 Mobile Device Settings in ConfigMgr 2012 R2 Category Windows 8.1 PC & RT Windows Phone 8 iOS Android VPN Wi-Fi Certificates Password (*)  (*) Device restrictions Store access Browsers Content Rating Cloud Synch Encryption Security * Subset of settings Note: Table applicable to direct MDM and not EAS © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

13 Resource Access Configuration
System Center Marketing 4/19/2017 Resource Access Configuration New Features* Configure networking profiles VPN profiles Support for Windows 8.1 Automatic VPN Wi-Fi protocol and authentication settings Management and distribution of certificates Benefits End users get access to company resources with no manual steps for them Platforms Windows 8.1 Windows 8.1 RT iOS Android * Varies based on device platform © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

14 VPN Profile Management
System Center Marketing 4/19/2017 VPN Profile Management Support for major SSL VPN vendors Support for VPN standards Automatic VPN connection SSL VPNs from Cisco, Juniper, Check Point, Microsoft, Dell SonicWALL, F5 Subset of vendors have Windows Windows RT VPN plug-in PPTP ,L2TP, IKEv2 DNS name-based initiation support for Windows 8.1 and iOS Application ID based initiation support for Windows 8.1 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

15 Wi-Fi and Certificate Profiles
System Center Marketing 4/19/2017 Wi-Fi and Certificate Profiles Wi-Fi settings Manage and distribute certificates Manage Wi-Fi protocol and authentication settings Provision Wi-Fi networks that device can auto connect Specify certificate to be used for Wi-Fi connection Deploy trusted root certificates Support for Security Center Endpoint Protection(SCEP) protocol © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

16 System Center Marketing
4/19/2017 Work Folders Sync files and data across devices Configuration Manager and Windows Intune support New feature in Windows 8.1 client and Windows Server 2012 R2 New settings to help provision the Work Folder discovery settings Company Portals have links to Work Folders © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

17 Protect your Data Help protect corporate information and manage risk
System Center Marketing 4/19/2017 Protect your Data Help protect corporate information and manage risk Lost or Stolen Lost or Stolen Retired Enrollment Personal Apps and Data Personal Apps and Data Company Apps and Data Company Apps and Data Company Apps and Data Retired Personal Apps and Data Centralized Data Remote App Remote App Remote App Users can access corporate data regardless of device or location Remote working is not just about devices and applications, it’s also about data. Access to distributed data (i.e. stored on the local device) or having an integrated way of gaining access back to centralized data is required to ensure the user is productive when working remotely. Windows Server provides the ability to sync data from a centralized file repository to user devices Windows Server provides the ability to connect via desktop virtualization from remote devices to centralized data sources IT can create business driven access policies based on user, device and location As data growth continues at a rapid pace, maintaining disparate security policies at the storage level becomes challenging and time consuming. Access policies are centrally maintained and deployed using Group Policy, and allow for expression based access policies such as “must be in the Finance team and be based in the San Francisco office and be running Windows 8”. IT can enforce access policies based on the content being accessed When access policies are created they can also be configured to be applied and enforced based on the content of the documents. For example, you can have a restriction on who can access a document based on a specific phrase or key words in a document. This is again expression based, so you can build out rules that look for patterns in information such as credit card numbers. IT can centrally audit access policies and user access to help with compliance Compliance is all about being able to set configuration, security and policies to meet the rules set, and then be able to prove that you are adhering to the requirements. Being able to centrally set auditing policy and then be able to report to confirm helps our customers meet their compliance requirements. IT can protect corporate information by selectively wiping apps and data Applications which were installed through Windows Intune Sideloading keys Remove MDM policies (not but reset) Wi-Fi/VPN profiles Policies Policies Policies © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

18 Unified Device Management Recap
Unregistered Registered MDM Enrolled Fully Managed Publish to users (EAS) Yes Publish work folders to users Conditional access based on user, device, location Block device only Audit logging and monitoring Unified Device Management Unified Application Management Selective data wipe Compliance reporting Group Policy and login scripts OS deployment and imaging Configuration management Patch management Anti malware management Full application management BitLocker management

19 User-centric Application Delivery Windows 8 Modern Apps
System Center Marketing 4/19/2017 User-centric Application Delivery Windows 8 Modern Apps IT Benefits of Modern Apps Runs across x86 and Windows RT Inherently more secure Easier and faster to deploy Software distribution updated New object for Appx packages Same deployment process Similar management functionality End user installation same as today End users have one location for all enterprise apps Corporate Applications Firewall Windows 8 Windows RT Windows Store © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

20 User-centric Application Delivery Administration
4/19/2017 User-centric Application Delivery Administration Delivery Evaluation Criteria User Device type Network connection User/Device Relationships Primary Devices MSI App-V Windows 8 Apps Windows 8 Apps in the Windows Store Non-primary Devices VDI Remote Desktop © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

21 User-centric Application Delivery New Application Model
System Center Marketing 4/19/2017 User-centric Application Delivery New Application Model Application “Package” General Information Administrator Properties End User Metadata Keep your apps organized and managed The “friendly” information for your users (appears in Catalog) Deployment Type App-V Detection Method Install Command Requirement Rules Dependencies Supersedence Is app installed? Windows Script Command line and options Windows Installer Can/cannot install app .XAP, .APK, .IPA Apps that must be present Application version control © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

22 Application Lifecycle
New Application installation Update Application Replace Application (Application Supersedence) Applicatin Uninstall Retire Application

23 User-centric Application Delivery End User Self-Service
System Center Marketing 4/19/2017 User-centric Application Delivery End User Self-Service Administrators publish software titles to catalog, complete with meta data to enable search Deliver best user experience on each device IT Users can browse, select and install directly from Catalog Application model determines format and policies for delivery User © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

24 System Center Marketing
4/19/2017 Unify Infrastructure Software Update Management Compliance and Settings Management Unify Infrastructure Reduce costs by unifying IT management infrastructure. Endpoint Protection Distribution Point for Windows Azure Reduced Infrastructure Requirements Content Management © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

25 Reduced Infrastructure Requirements
Central Administration Site Scale Support multiple primary sites Future proofing your hierarchy (SP1) Primary Sites Client assignment (up to 100k) Reduce impact of a primary site failing Political reasons Delegated administration Different client agent settings Language packs DMZ/Internet Facing Untrusted forests (new in R2) Secondary Sites Content fan-out Manage upward flow of WAN traffic Content routing Throttling (now in Distribution Points) Distribution Points Distribute Content Branch Distribution Points Reasons Why Obsolete Reasons

26 Unified Device Management Configuration
System Center Marketing 4/19/2017 Unified Device Management Configuration Device management integrated directly into console Simple Windows Intune Subscription set-up Centralized branding and customization of Company Portal experience Windows Intune Connector deployed as a Site System Role © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

27 Consolidation and Cross-platform Integration
4/19/2017 Consolidation and Cross-platform Integration Consolidation Co-locating site system roles onto single server. Eliminating servers required for client security. Simplifying system architecture by reducing number of sites. Cross-platform Integration Manage non-Windows desktops including Mac OS X Manage non-Windows servers including Linux and UNIX Access business apps on non-Windows machines via Citrix XenApp integration * Cross-platform integration enhancements are available with Configuration Manager Service Pack 1 (beta released in September 2012) “We spend almost [U.S.] $800 per server on annual maintenance activities. Configuration Manager scales to our organization size and now we are able to reduce the number of servers from 110 to 35, thus saving on the maintenance costs.” – Systems management administrator at a US based manufacturing company From: B2AF9AE5E/System_Center_Configuration_Manager_2012_Business_Value_White_Paper.pdf Consolidation: Organizations were able to cut down on the number of physical servers by… Co-locating site system roles onto single server instead of spreading these across multiple servers; Eliminating the servers required for client security as System Center 2012 Endpoint Protection integrates with Configuration Manager; and Simplifying system architecture by reducing the number of primary and secondary sites and the distribution points. Moreover, Configuration Manager now supports configuring distribution points that run as a cloud service in Microsoft® Windows Azure. This eliminates the need to plan for, purchase, and maintain the hardware for installing the site system roles – further reducing the infrastructure requirements and costs. [Note: Above feature requires System Center 2012 Configuration Manager SP1 (beta available September 2012). Also requires subscription to Windows Azure cloud service. All costs are determined by the customer’s Windows Azure licensing, and the volume of data that is stored and downloaded by clients. No additional licensing costs are added by Configuration Manager.] Cross-platform Integration: With Service Pack 1, Configuration Manager supports installation of the client on computers that run Mac OS X and servers running various Linux or UNIX operating systems. This allows administrators to perform compliance settings, deploy software, and include these devices in the hardware inventory collection tasks. Furthermore, through integration with Citrix XenApp, non-Windows users can still access business applications that are compatible with Configuration Manager. 600 hours or U.S. $30,000 saved each year due to reduced administration overhead Business Value of Microsoft® System Center 2012 Configuration Manager © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

28 Security and Compliance Endpoint Protection
System Center Marketing 4/19/2017 Security and Compliance Endpoint Protection Unified Infrastructure Simplified server and client deployment. Streamlined updates. Consolidated reporting. Comprehensive Protection Stack Behavior monitoring. Antimalware. Dynamic Translation. Windows Firewall Management. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

29 Security and Compliance Settings Management
System Center Marketing 4/19/2017 Security and Compliance Settings Management ConfigMgr MP Baseline ConfigMgr Agent Assignment to collections Baseline drift Auto Remediate OR Create Alert (to Service Manager) ! WMI XML Registry IIS MSI Script SQL Software Updates File Active Directory Baseline Configuration Items Improved functionality Pre-built industry standard baseline templates through IT Governance, Risk & Compliance(GRC) Solution Accelerator Copy settings Trigger console alerts Richer reporting Enhanced versioning and audit tracking Ability to specify versions to be used in baselines Audit tracking includes who changed what © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

30 Security and Compliance Software Update
System Center Marketing 4/19/2017 Security and Compliance Software Update Auto Deployment Faster deployment through search. Schedule content download and deployment to avoid reboot during work hours. State-based Updates Allows individual or group deployment. Updates added to groups auto deploy to targeted collections . Optimized for New Content Model Reduce replication and storage. Expired updates and content deleted. Microsoft Update Identifies who needs updates and reports on compliance Downloads updates CAS Primary Site SUP Role/WSUS Primary Site DP Role Primary Site MP Role Distributes updates Assigns policy to scan for update status or to deploy update Reports compliance © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

31 Distribution Point for Windows Azure
System Center Marketing 4/19/2017 Distribution Point for Windows Azure Windows Azure PR1 Distribution Point Policy Content Firewall MP MP Microsoft Update DP Rich feature set Provision from the admin console Most capabilities as on-premises. Except: Operating System Deployment and task sequences Custom updates App-V streaming Full BranchCache support Software updates from Microsoft Update Integrated monitoring In-console content monitoring Ability to monitor storage and traffic out usage Content is fully encrypted Corporate Network © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

32 Content Management in R2
System Center Marketing 4/19/2017 Content Management in R2 In-console monitoring improved to make is easier to track the status of content distribution Optimized content download for superseded apps so only changes across versions are brought down The sources for a pull DP can be randomized to achieve load balancing and flexibility. Pull DP in-console monitoring on par with standard DP. Enable pull distribution point to send state messages via MP. Pull DP improvements Reduced the amount of interaction between remote DPs and the Distribution Manager. Optimized content distribution by adding distribution point priority and keeping send requests in SQL. New report: Distribution Point Usage – shows how much a particular DP gets used. Infrastructure improvements © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

33 Simplify Administration
System Center Marketing 4/19/2017 Simplify Administration Operating System Deployment Client Health Role-based Administration Simplify Administration Improve IT effectiveness and efficiency. Asset Intelligence Modern Management Console © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

34 Modern Management Console
System Center Marketing 4/19/2017 Modern Management Console Intuitive ribbon interface In-console alerts Global search capability New collection membership rules allow better filtering of members Windows PowerShell enablement © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

35 Unified Device Management Console
System Center Marketing 4/19/2017 Unified Device Management Console Mobile device management integrated directly in to console experience Common tools for policy and application management Unified reporting across device platforms User collections enable user-centric setting and application deployment across device types © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

36 Role-based Administration
System Center Marketing 4/19/2017 Role-based Administration Map the organizational roles of your administrators to defined security roles Security organization role Geography Reduces error, defines span of control for the organization RBA enhanced in R2 includes SQL Reporting Meg - WW Central System Administrator Louis - Software Update Manager for France Bob - US and France Security Admin Can see & update “France” desktops Cannot modify security settings on “France” desktops Cannot see “All Systems” or “U.S.” desktops Can see and modify security settings on “France” and “U.S.” desktops Cannot update “France” or “U.S.” desktops Cannot see “All Systems” Functionality ConfigMgr 2007 ConfigMgr 2012 What types of objects can I see and what can I do to them? Class rights Security roles Which instances can I see and interact with? Object instance permissions Security scopes Which resources can I interact with? Site specific resource permissions Collection limiting © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

37 Operating System Deployment
System Center Marketing 4/19/2017 Operating System Deployment CAS Primary Site MP Role Primary Site DP Role Image Task Sequence Report WDS PXE Server Multiple Deployment Method Support PXE initiated deployment allows client computers to request deployment over the network Multi-cast deployment to conserve network bandwidth Stand-alone media deployment for no network connectivity or low bandwidth Pre-staged media deployment allows you to deploy an operating system to a computer that is not fully provisioned User State Migration Tool (USMT) 4.0 UI integration makes it easier transfer files and user settings from one machine to another © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

38 Deployment tools Windows Assessment and Deployment Kit (Windows ADK)
Microsoft Deployment Toolkit (MDT) Internet Explorer Administrator Kit (IEAK) System Center 2012 R2 Configuration Manager Deployment Products and Tools Key Messages: Microsoft provides the products, tools, and technologies to make deployments easier and repeatable Windows Assessment and Deployment Kit (Windows ADK) Internet Explorer Administration Kit (IEAK) Microsoft Deployment Toolkit (MDT) Microsoft provides the products, tools, and technologies to perform successful deployments. Many of these deployment aids are available for free and can help organizations deploy Windows 8 and applications with less effort and risk. These same products, tools, and technologies help IT professionals be more efficient and effective at performing their job functions so that they can do more with the same level of effort. The Windows ADK is a collection of tools that help in the assessment and deployment of Windows 8. The Windows ADK will be discussed in more detail later in this session. The IEAK helps customize Internet Explorer branding and configuration settings. The IEAK will be discussed in more detail later in this session. The MDT helps manage deployment content in preparation for deployment, then collects deployment information through wizards at the time of deployment. The MDT allows you to control the level of information required at deployment time. The MDT also allows you to perform fully automated deployments that require no deployment information at the time of deployment. The MDT can be used by itself or in conjunction with System Center 2012 Configuration Manager and System Center Configuration Manager The MDT will be discussed in more detail later in this session.

39 Core Operating System Deployment Scenarios
TechReady 16 4/19/2017 Core Operating System Deployment Scenarios Scenario Key Functionality New computer Fresh install of a new operating system on client or server system New or repurposed hardware PXE boot Integrate with Windows Deployment Services (WDS) PXE server Self-provisioning via F12 Wipe-and-load Install new version of operating system Reinstall applications and user state under new operating system Side-by-side Similar to wipe-and-load, except between two different devices Offline with removable media With low bandwidth or no connectivity Large software packages are on the media Prestaged Media Optimized for network bandwidth Speeds up end to end deployment © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

40 Client Activity and Health
System Center Marketing 4/19/2017 Client Activity and Health In-console view of client health Threshold-based console alerts Heartbeat DDRs HW/SW inventory and status Remediation © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

41 Asset Intelligence, Inventory, and Software Metering
System Center Marketing 4/19/2017 Asset Intelligence, Inventory, and Software Metering Consolidated/simplified reporting that allows you to Understand software installation profiles Plan for hardware upgrades Identify over or under licensing issues Track custom apps or groups of titles Software Metering and License Reports Real-Time Application and Hardware Intelligence Asset Intelligence Service ConfigMgr Inventory Asset Intelligence Catalog © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

42 System Center Marketing
4/19/2017 Summary 2012 2012 SP1 2012 R2 Empower Modern Device Management EAS Unified Improved User-centric Application Delivery User-centric Win 8 Apps Web App deployment Unify Reduced Infrastructure Requirements New Flexible hierarchies Endpoint Protection Integrated Real-time actions Updated engine Compliance and Settings Management Auto remediation User profile and data Software Update Management Improved Improved Distribution Point for Windows Azure New Content Management Improved New Windows PowerShell Additional cmdlets Simplify Modern Management Console Role-based Administration New RBA in Reporting Operating System Deployment Improved Improved Windows 8.1 support Client Health Improved Improved Asset Intelligence, Inventory and Software Metering Improved Improved © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

43 Zdroje informací TechNet Blog: Microsoft Virtual Academy: System Center 2012: Configuration Manager What‘s new in System Center 2012 R2 Jump Start Windows Intune for IT Professionals Jump Start

44 System Center Marketing
4/19/2017 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

45 Windows Server Management Marketing
4/19/2017 Appendix © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

46 Full and Selective Wipe
Category Windows 8.1 (x86/RT OMA-DM managed) Windows 8 RT Windows Phone iOS Android Full Wipe Selective Wipe  ( through EAS) Corporate Apps (from ConfigMgr / Intune)  (Uninstalled + sideloading key removed) Sideloading key removed VPN and Wifi Profiles Certificates Revoked on server N/A Settings Policy enforcement is removed Management Agent N/A. Built into OS Management profile removed “Device administrator” privilege is revoked Corporate App Data Data remains encrypted if app is EFS aware App container removed during uninstall

47 Windows Embedded Support
System Center Marketing 4/19/2017 Windows Embedded Support Windows XP Embedded Windows Embedded Standard 2009 Windows Embedded Standard 7 Windows Embedded Standard 8 Thin Clients Supported Write Filters File Based Write Filters (FBFW) (preferred for scalability) Enhanced Write Filters (EWF) RAM Ability to force persistence of changes for Applications Packages and programs Software updates Task sequences Endpoint Protection client installation Eventual persistence of changes for Client agent settings Settings management remediation Power management Without write filters enabled, embedded devices can be managed like any other Windows client. When write filters are enabled, they require special handling, now provided seamlessly. Same as Thin Clients, plus POS Ready 2009 POS Ready 8 POS/Kiosk Windows Embedded Standard 2009 Windows Embedded Standard 7 Windows Embedded Standard 8 Digital Signage Windows Thin PC Repurposed PC © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

48 System Center Marketing
4/19/2017 Linux and UNIX Servers Supported Operating System’s across both: Configuration Manager Operations Manager Earlier versions supported as long as vendor provides support Broader Linux distro support being evaluated for future releases Red Hat Enterprise Linux Version 4 (x86/x64) Version 5 (x86/x64) Version 6 (x86/x64) Solaris Version 9 (SPARC) Version 10 (SPARC/x86) Hardware and Software Inventory Software Deployment Using the Package and Program model Deploy/patch software, deploy OS patches and run maintenance scripts that target a collection Consolidated reports SUSE Linux Enterprise Server Version 9 (x86) Version 10 SP1 (x86/x64) Version 11 (x86/x64) The SP1 CU will add support for 6 additional OSs: UNIX: AIX, HP-UX Linux: CentOS, Debian, Oracle Linux, Ubuntu The exact versions numbers supported are still TBC. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

49 System Center Marketing
4/19/2017 Mac OS X Configuration Manager native client 10.6 (Snow Leopard) 10.7 (Lion) 10.8 (Mountain Lion) Key management capabilities Push Software Distribution Settings Management Hardware and Software Inventory Improved enrollment in R2 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

50 Flexible Licensing that Fits Your Needs
4/19/2017 Flexible Licensing that Fits Your Needs Per User Licensing Up to 5 devices/user Don’t Have Configuration Manager Windows Intune (includes ConfigMgr license) ($6 per user per month) Windows Intune & Windows Enterprise (includes ConfigMgr license) ($11 per user per month) Already have Configuration Manager Windows Intune (Add-On) ($4 per user per month) © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "System Center 2012 R2 Configuration Manager with Windows Intune Product Overview Tomáš „Kanty“ Kantůrek."

Similar presentations


Ads by Google