Microsoft System Center Configuration Manager 2007 Administrators Companion Steve Kaczmarek Microsoft Corporation PDF Download
Microsoft System Center Configuration Manager 2007 Administrators Companion Steve Kaczmarek Microsoft Corporation PDF Download
https://ebookbell.com/product/microsoft-system-center-
configuration-manager-2007-administrators-companion-steve-
kaczmarek-microsoft-corporation-4124680
https://ebookbell.com/product/microsoft-system-center-configuration-
manager-advanced-deployment-martyn-coupland-50195210
https://ebookbell.com/product/microsoft-system-center-configuration-
manager-field-experience-rushi-faldu-4420076
https://ebookbell.com/product/microsoft-system-center-configuration-
manager-high-availability-and-performance-tuning-marius-sandbu-4701808
https://ebookbell.com/product/microsoft-system-center-configuration-
manager-advanced-deployment-martyn-coupland-6809048
Microsoft System Center 2012 Configuration Manager Administration
Cookbook Mason Brian
https://ebookbell.com/product/microsoft-system-
center-2012-configuration-manager-administration-cookbook-mason-
brian-2620362
https://ebookbell.com/product/microsoft-system-center-troubleshooting-
configuration-manager-rushi-faldu-4544592
https://ebookbell.com/product/microsoft-system-center-troubleshooting-
configuration-manager-introducing-faldu-23889620
https://ebookbell.com/product/deploying-windows-10-automating-
deployment-by-using-system-center-configuration-manager-
monica-22062060
https://ebookbell.com/product/microsoft-system-center-enterprise-
suite-unleashed-amaris-chriskopczynski-22105662
PUBLISHED BY
Microsoft Press
A Division of Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052-6399
Copyright © 2008 by Steven D. Kaczmarek
All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or
by any means without the written permission of the publisher.
Library of Congress Control Number: 2008920200
1 2 3 4 5 6 7 8 9 QWT 3 2 1 0 9 8
A CIP catalogue record for this book is available from the British Library.
Microsoft Press books are available through booksellers and distributors worldwide. For further infor-
mation about international editions, contact your local Microsoft Corporation office or contact Microsoft
Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress.
Send comments to [email protected].
Microsoft, Microsoft Press, Active Directory, BitLocker, Excel, ForeFront, Internet Explorer, MSDN,
PowerPoint, SQL Server, Windows, Windows Mobile, Windows NT, Windows Server, and Windows
Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or
other countries. Other product and company names mentioned herein may be the trademarks of their
respective owners.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places,
and events depicted herein are fictitious. No association with any real company, organization, product,
domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
This book expresses the author’s views and opinions. The information contained in this book is provided
without any express, statutory, or implied warranties. Neither the authors, Microsoft Corporation, nor its
resellers, or distributors will be held liable for any damages caused or alleged to be caused either directly
or indirectly by this book.
Part II
Managing Clients
7 Discovering Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
8 Configuration Manager Client Installation . . . . . . . . . . . . . . . . . . . 287
9 Defining Collections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
10 Collecting Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
11 Distributing Software Packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
12 Deploying Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
13 Deploying Software Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
14 Implementing Desired Configuration Management . . . . . . . . . . . 567
15 Implementing Network Access Protection . . . . . . . . . . . . . . . . . . . 597
16 Managing Clients Across the Internet . . . . . . . . . . . . . . . . . . . . . . 631
17 Managing Clients Remotely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647
18 Monitoring Software Usage with Software Metering . . . . . . . . . . 665
v
vi Contents at a Glance
Part III
Site Database Management
19 Extracting Information Using Queries and Reports . . . . . . . . . . . 685
20 Configuration Manager 2007 Security . . . . . . . . . . . . . . . . . . . . . . 723
21 Backing Up and Recovering the Site . . . . . . . . . . . . . . . . . . . . . . . . 763
22 Maintaining the Configuration Manager Database through
SQL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793
Part IV
Appendixes
A Recommended Web Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815
B Backup Control File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
C Understanding Windows Management Instrumentation . . . . . . . 823
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .825
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .839
Table of Contents
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxix
Part I
Planning, Deploying, and Configuring
1 Introducing Microsoft System Center Configuration
Manager 2007 3
What Is System Center Configuration Manager 2007? . . . . . . . . . . . . . . . . . . . . . 4
What’s Changed Since System Management Server 2003? . . . . . . . . . . . . . . . . . 6
New Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Integrated Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Enhanced Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Security and Site Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Features and Functions of Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . 8
Inventory and Resource Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Diagnosis and Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
System Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Remote Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Logs and Status Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Computer Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Key Elements of Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Configuration Manager Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Configuration Manager Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Configuration Manager Site Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Configuration Manager Site System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Configuration Manager Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Configuration Manager Site Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Microsoft is interested in hearing your feedback about this publication so we can
What do you think of this book? continually improve our books and learning resources for you. To participate in a brief
We want to hear from you! online survey, please visit: www.microsoft.com/learning/booksurvey/
vii
viii Table of Contents
Part II
Managing Clients
7 Discovering Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Understanding Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Examining Resource Discovery Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Network Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Enabling Network Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Network Discovery Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Checkpoints for Using Network Discovery . . . . . . . . . . . . . . . . . . . 279
Heartbeat Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Enabling Heartbeat Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Checkpoints for Using Heartbeat Discovery . . . . . . . . . . . . . . . . . 280
Active Directory Discovery Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Enabling and Configuring an Active Directory
Discovery Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Checkpoints for Using an Active Directory
Discovery Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Discovery Data Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Part III
Site Database Management
19 Extracting Information Using Queries and Reports . . . . . . . . . . . 685
Working with Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Query Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Creating a Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
Modifying a Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
Combining Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
Viewing the Query Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Creating Prompted Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
Executing Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Working with Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
Using Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710
Creating and Modifying a Report . . . . . . . . . . . . . . . . . . . . . . . . . . 710
Copying an Existing Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
Importing and Exporting Reports . . . . . . . . . . . . . . . . . . . . . . . . . . 714
Scheduling a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714
Running a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 716
Using Dashboards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
Creating a Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
Running a Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
Checkpoints for Using Queries and Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
Part IV
Appendixes
A Recommended Web Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815
B Backup Control File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
C Understanding Windows Management Instrumentation . . . . . . . 823
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .825
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .839
xxvii
Introduction
Microsoft has traditionally geared its development of Windows Server applications
toward providing network administrators with tools that can facilitate the functionality
and management of its Windows networks. For example, applications such as Microsoft
Exchange 2007 and Microsoft SQL Server 2008 provide exceptional mail and database
support through centralized management. Microsoft Systems Center Configuration Man-
ager 2007 is just such a product. In this new release you have a superior product that pro-
vides centralized management and support for your install base of computers. Those of
you who have grown up with Systems Management Server (SMS) 2003 and its plethora
of tools, add-ons, and feature packs will be particularly impressed with the improvements
made in this version, which enhances the functionality and scalability within large enter-
prise networks and the integration of features such as operating system deployment and
mobile device management.
This book is designed to provide you with both a learning and practical guide to the
administrative tasks you’ll be performing with Configuration Manager. It is intended to
get the new administrator up and running, and using the features quickly, and for the
more experienced administrator as a quick reference for common tasks. Consequently,
you’ll notice that this book does not cover every nuance of this product. The Configura-
tion Manager Writing Team at Microsoft has already done a terrific job of documenting to
that level of granularity in the Configuration Manager Documentation Library. In fact,
you’ll find many references throughout the book that point you to the core documenta-
tion for more detailed information.
xxix
xxx Introduction
Chapter 3, “Configuring Site Server Properties and Deploying Site Systems,” you’ll learn
how to define and configure the Configuration Manager site and site systems. Chapter 4,
“Implementing Multiple-Site Structures,” suggests planning considerations for a multiple-
site structure, including developing parent-child relationships among primary sites, creat-
ing secondary sites, and establishing Configuration Manager communication mecha-
nisms between sites. Chapter 5, “Upgrading to Configuration Manager,” shows you how
to identify the decision points, and make the best choices, to plan your upgrade strategy
and upgrade Configuration Manager successfully. Chapter 6, “Analysis and Trouble-
shooting Tools,” introduces the reader to the various tools available in Configuration
Manager that enable the administrator to monitor activity in the Configuration Manager
site, track the flow of information, and analyze network and server performance. These
tools are examined in more detail in subsequent chapters.
software updates feature in Configuration Manager 2007 along with the Microsoft-
recommended software updates management process to provide an effective system for
updating software in your environment. Chapter 14, “Implementing Desired Configura-
tion Management,” introduces one of the key new features in Configuration Manager,
desired configuration management. You’ll learn how to configure this feature, download
best practices configuration data, and how to evaluate your computers against this data.
Chapter 15, “Implementing Network Access Protection,” explores how you can use Con-
figuration Manager’s integration with Windows Network Access Protection (NAP) to
help protect network assets, and extend central management of software updates with
compliance enforcement. In Chapter 16, “Managing Clients Across the Internet,” you’ll
learn how to use Configuration Manager to manage clients that are connected to your net-
work through an Internet connection. In Chapter 17, “Managing Clients Remotely,” you’ll
learn how to remotely monitor and troubleshoot a client system through the Configura-
tion Manager console. Chapter 18, “Monitoring Software Usage with Software Metering,”
discusses how you can monitor and report on software usage on client systems.
information about or obtaining support for Configuration Manager and SQL Server 2005
Service Pack 2 or higher. Appendix B, “Backup Control File.” contains the text for the
backup control file used by the SMS Site Backup service when performing a site server
backup scheduled through the SMS Administrator Console, as discussed in Chapter 21.
Appendix C, “Understanding Windows Management Instrumentation,” provides an
overview of Windows Management Instrumentation.
Note Notes include tips, alternative ways to perform a task, or some informa-
tion that needs to be highlighted.
More Info Often there are excellent sources for additional information on key
topics. We use these boxes to point you to a recommended resource.
Best Practices Best Practices provide advice for best practices that this book’s
authors have gained from our own technical experience.
System Requirements
This book is designed to be used with the following software:
■ System Center Configuration Manager 2007
■ Microsoft SQL Server 2005 Service Pack 2 (or higher)
The following are the minimum system requirements to run the companion CD provided
with this book:
■ Microsoft Windows XP, with the latest service pack installed and the latest updates
installed from Microsoft Update Service
■ CD-ROM drive
■ Internet connection
■ Display monitor capable of 1024 x 768 resolution
■ Microsoft Mouse or compatible pointing device
■ Adobe Reader for viewing the eBook (Adobe Reader is available as a download at
http://www.adobe.com)
encourage you to check the download site as well as the Configuration Manager Tech-
Center for updates.
This CD also includes an audio excerpt from each chapter in .MP3 format. These excerpts
were originally published on myITforum.com TV and are included here with permission
from myITforum.com. myITforum.com, Inc. is the premier online destination for IT pro-
fessionals responsible for managing their corporations’ Microsoft Windows systems,
especially for IT pros working with Microsoft Systems Management Server (SMS), System
Center, Microsoft Operations Manager (MOM), Scripting, Windows Mobile, Group Pol-
icy (GPO), and Patching and Security. The centerpiece of myITforum.com, Inc. is a col-
lection of member forums, e-mail lists, and technical articles where IT professionals
actively exchange technical tips, share their expertise, and download utilities that help
them better manage their Windows environments. myITforum.com, Inc. is owned and
managed by Rod Trent, author of the best-selling books Microsoft SMS Installer, Admin911:
SMS, and IIS 5.0: A Beginner’s Guide. He has also written thousands of articles on topics
related to the management of Microsoft Windows installations. Rod is a leading authority
on Microsoft SMS and a regular speaker at the Microsoft Management Summit. Rod is
also a member of a select group of Microsoft “Most Valuable Professionals” (MVPs), an
honor accorded by Microsoft to “standouts in technical communities who share a pas-
sion for technology and the spirit of community."
Please visit http://www.myitforum.com/aboutus/portfolio.asp for a complete discussion of
the value and benefits myITforum.com can bring to you and your organization.
Support
Ever y effort has been made to the accuracy of this book and companion CD
content. Microsoft Press provides corrections to this book through the Web at
http://www.microsoft.com/mspress/support/search.aspx
If you have comments, questions, or ideas regarding the book or companion CD content,
please send them to Microsoft Press using either of the following methods:
E-mail: [email protected]
Postal mail:
Microsoft Press
Attn: Microsoft System Center Configuration Manager 2007 Administrator’s Companion Editor
One Microsoft Way
Redmond, WA 98052-6399
Please note that product support is not offered through the preceding mail addresses.
For support information, please visit the Microsoft Help and Support Web site at
http://support.microsoft.com.
Part I
Planning, Deploying, and
Configuring
Chapter 1:
Introducing Microsoft System Center Configuration Manager 2007. . . . . . 3
Chapter 2:
Planning for and Deploying Configuration Manager Sites . . . . . . . . . . . . . 23
Chapter 3:
Configuring Site Server Properties and Site Systems . . . . . . . . . . . . . . . . . . 93
Chapter 4:
Implementing Multiple-Site Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . .143
Chapter 5:
Upgrading to Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . .187
Chapter 6:
Analysis and Troubleshooting Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211
Chapter 1
Introducing Microsoft System
Center Configuration Manager
2007
Many computers
We will look after them now
Take the pain away
~ Rob Stack, Technical Writer, Configuration Manager
Welcome to Microsoft System Center Configuration Manager 2007, the newly engi-
neered version of Microsoft System Management Server (SMS) 2003. The shorter name,
Configuration Manager, is referred to throughout this book. This book gives you the
insight and tools necessary to successfully plan for, deploy, and administer Configuration
Manager. The fundamental components and features of Configuration Manager, such as
distributing packages, collecting hardware and software inventory, distributing software
updates, and remotely administering a computer, are explored, as well as new features
such as deploying operating systems, managing desired configurations of users’ comput-
ers, restricting noncompliant computers from accessing your network, and managing
mobile devices. Planning and deployment procedures for site systems and clients are dis-
cussed, and the implementation of a Configuration Manager site hierarchy is examined.
Relevant SMS 2003 migration and update readiness issues are also looked at, as well as
disaster recovery and database maintenance recommendations.
3
4 Part I Planning, Deploying, and Configuring
As many of you know, Configuration Manager has gone through many generations and
enhancements since its initial 1.0 release as Systems Management Server. Here’s a brief
history. Noting the shortcomings of the SMS 1.x family unabashedly reported to
Microsoft by all of you SMS administrators, Microsoft released SMS 2.0. This was a com-
plete renovation of the product that addressed many of the issues that SMS administra-
tors raised. That version dropped some functionality (most notably the clunky Program
Group Control), enhanced existing functionality (package distribution, inventory, and
remote control), and added functionality (logon points, client access points, distribution
points, and software metering). SMS 2003 further enhanced and refined the product,
adding Active Directory support and integrating software update management. Configu-
ration Manager represents the next generation of this product, integrating operating sys-
tem deployment functionality, Windows Server Update Services, and desired computer
configuration management among other features, and through sound planning and
deployment, can very well help you to lower the total cost of ownership of computers in
your organization.
To those of you who purchased the previous editions of this book, be assured that this
isn’t a repetition of the previous edition. To be sure, some features remain largely the
same and so the content is refreshed only as needed. However, Microsoft has “touched”
nearly every component in SMS 2003 as it generated Configuration Manager, so there is
new material throughout. As always, there are new Configuration Manager administra-
tors among you, so this chapter begins by introducing Configuration Manager and
describing what this product is all about.
because that user is unwilling to risk converting the documents to a single word-processing
version. On the other end of the spectrum, more businesses are taking advantage of tools
like Configuration Manager, Microsoft Update, and Active Directory Group Policies to pro-
vide their users with a desktop that can not only be centrally maintained but also can’t be
modified at all by the user. Many businesses are now extending these tools and using
other tools such as Systems Center Operations Manager (formerly Microsoft Operations
Manager, or MOM) to support their server platforms as well. Both of these scenarios
exemplify the fact that supporting multiple computers installed with a variety of program
and server applications can be a challenge for even the best-equipped and best-funded IT
support groups.
In addition to application support, IT groups often provide hardware support for their
organization’s users. This too can be a daunting prospect when the install base of com-
puters is in the thousands or tens of thousands, deployed within different departmental,
geographic, or international locations. It’s not always practical—or even possible—to phys-
ically access every computer in an organization.
Many IT managers have acknowledged the need to provide standards for desktop com-
puting and have begun to look for and to implement some kind of centralized desktop
management system. IT support groups need to be able to respond actively and proac-
tively to implement and update software on client systems and to respond to their users’
requests for assistance as quickly, effectively, and consistently as possible. IT support
groups should be able to perform as much user desktop management as possible while
sitting at their own desktop computers. The key to effective remote desktop management
is to provide a reliable set of remote management tools that enable an IT support group
to be as effective as if they had actually laid hands on the user’s desktop.
Configuration Manager is a powerful management product that offers a newly enriched
set of desktop management features, with the capability of leveraging Active Directory.
Configuration Manager, together with the other client management solutions that
Microsoft offers, provides IT managers with perhaps their most effective set of centralized
management tools to date. With Configuration Manager, you’ll be able to remotely diag-
nose and troubleshoot desktop systems, install applications, and manage software.
In this major new release, the Configuration Manager product team has invested in four
key development areas—security, simplicity, manageability, and operating system
deployment—resulting in an end-to-end computer management solution.
6 Part I Planning, Deploying, and Configuring
New Features
To support its commitment to enhancing computer manageability and security, the Con-
figuration Management product team made a significant investment in developing and
testing features that SMS customers had been asking for, and that they felt strongly would
lead to a reduced total cost of ownership for many companies. These are alluded to earlier
in this chapter. Configuration Manager has added the following new features:
■ Desired configuration management The ability to define granular computer con-
figurations within your organization and compare and report compliance or non-
compliance among your managed computers
■ Network Access Protection (NAP) for Configuration Manager The ability to lever-
age Windows Server NAP to identify and remediate managed clients using Configu-
ration Management features such as software updates
■ Wake On LAN (WOL) support The ability to send a wake-up request to a Config-
uration Manager client that is in a sleep state to allow the running of a mandatory
software update, software distribution advertisement, or task sequence
■ Internet-based computer management The ability to manage Configuration
Manager 2007 clients when they are not connected to your company network but
have a standard Internet connection
Integrated Features
Throughout the lifetime of SMS 2003, several feature packs and external wizards were
developed and released. Recognizing the benefit to incorporating the most valuable of
these into the product directly, the Configuration Manager product team invested in not
only incorporating these into the core product, but also enhancing their functionality.
The following external features have been integrated into Configuration Manager:
■ Operating system deployment The ability to create and manage images that can be
deployed to computers managed by Configuration Manager 2007, and to unmanaged
computers using bootable media such as CD set or DVD. The image, in a WIM format
file, contains the desired version of a Microsoft Windows operating system and can
also include any line-of-business applications that need to be installed on the
Chapter 1 Introducing Microsoft System Center Configuration Manager 2007 7
computer. Also provides the ability to create and distribute task sequences—a series of
one or more task steps that can be advertised to a Configuration Manager client—to
customize image deployment and software distribution tasks.
■ Mobile device management The ability to manage Windows Mobile and Win-
dows CE mobile devices similar to the way that Configuration Manager 2007 man-
ages desktop computers, including hardware and software inventory, software
distribution and updates, file collection, and Windows Mobile Settings.
■ Transfer Site Settings Wizard A wizard that facilitates the transfer of Configura-
tion Manager site settings such as client agent properties, discovery configuration,
package properties, and collection properties between Configuration Manager sites.
■ Manage Site Accounts tool A command-line interface that helps you update, cre-
ate, verify, delete, and list user-defined Windows accounts for your Configuration
Manager 2007 sites. It is called MSAC.exe and is located in <ConfigurationManager
InstallDirectory>\AdminUI\bin.
Enhanced Features
The following features, for a long time the mainstay of the core product, have undergone
varying degrees of “plastic surgery.” Wizards have been tightened up or eliminated in
favor of simplified property pages, the “duh!” factor has been eliminated, or the feature
simply has been brought into alignment with other server technologies. These features
have all been enhanced:
■ Configuration Manager console As mentioned earlier in this chapter, the console
has been reconfigured to group management tasks more intuitively, and facilitate
finding tasks and features. It also displays information in three viewing areas: the
console tree, for navigation; the results pane, for showing objects, charts, statistics,
and other data related to the node you’ve selected in the console tree; and the
actions pane, from which you can select actions related to the node you selected.
■ Collections The most notable change to collections is the addition of mainte-
nance windows. A maintenance window lets you define a period of time within
which changes can be made on the computers that are members of that collection.
■ Software updates Greatly enhanced from SMS 2003, software updates integrates
closely with Windows Server Update Services (WSUS) 3.0, synchronizing with the
WSUS database to retrieve the latest software updates from Microsoft Update, as
well as custom published software updates. The Software Updates Client Agent is
enabled by default, and updates are delivered to Configuration Manager clients by
means of a deployment package rather than a software updates advertisement.
8 Part I Planning, Deploying, and Configuring
■ Remote tools Remote tools has been rehabbed to more effectively integrate with
Remote Desktop and Remote Assistance. It includes a new remote tools agent,
which uses the Microsoft RDP protocol supported on client computers running
Windows XP and Windows 2003 Server and later. Windows 2000 clients use a
modified version of the SMS 2003 Remote Tools agent. The Remote Reboot, Chat,
File Transfer, Remote Execute, Ping, and Windows 98 Diagnostics utilities are no
longer available in remote tools.
■ Backup and recovery Configuration Manager leverages the Volume Shadow
Copy Service (VSS) available with Windows XP and Windows Server 2003 and
later operating systems, providing the means to capture a stable backup image of
your Configuration Manager site server, and store that image on the desired
backup media.
In addition to discovery data, Configuration Manager can collect hardware and software
data from a Configuration Manager client. Two of the five client agents that can be
installed on a Configuration Manager client computer are the Hardware Inventory Client
Agent and the Software Inventory Client Agent. The Configuration Manager administra-
tor enables and configures both and then installs them on a Configuration Manager cli-
ent. Collected inventory is stored, viewed, and maintained in the Configuration Manager
site database. This database is created and maintained on an SQL server. The Configura-
tion Manager Administrator Console acts as a front end to this database and provides the
Configuration Manager administrator with the tools to manage that data. For example,
you view a Configuration Manager client’s inventory through the Configuration Manager
Administrator Console by selecting that client in an appropriate collection and executing
a tool called the Resource Explorer. Configuration Manager also provides a number of
pre-defined reports that can be viewed through the Configuration Manager console as
well as through a Web report console.
10 Part I Planning, Deploying, and Configuring
When troubleshooting needs to be performed, it’s not always possible, or even appropri-
ate, that users have full knowledge of their hardware or software configuration. Having a
Configuration Manager client’s inventory readily available and up to date, however, pro-
vides an administrator with the computer configuration data needed to assist a user with
a problem.
The Hardware Inventory Client Agent executes according to an administrator-defined fre-
quency and collects system configuration such as hard drive space, processor type, RAM
size, CD type, monitor type, and so on. In addition, you can configure the Hardware
Inventory Client Agent to collect more granular information from Configuration Manager
clients using the two template files included—SMS_DEF.MOF and Configuration.MOF—
such as the installation date of the system’s basic input/output system (BIOS), asset and
serial number information, program group names, and printers installed. It does so by
using the WMI service. WMI is Microsoft’s implementation of Web-Based Enterprise
Management (WBEM). (You can review the basics of WMI in Appendix C, “Understand-
ing WBEM and WMI.”) Briefly, WMI allows for more detailed system configuration data
to be reported and stored on the workstation for use by management applications such
as Configuration Manager. Once the Hardware Inventory Client Agent on a Configura-
tion Manager client has collected the full inventory, only changes to the inventory on the
client are reported in subsequent inventories. The hardware inventory process and con-
figuration are discussed thoroughly in Chapter 10, “Collecting Inventory.”
The Software Inventory Client Agent also executes according to an administrator-defined
interval and essentially audits the Configuration Manager client for applications installed
on its local hard drives. The Configuration Manager administrator can configure the Soft-
ware Inventory Client Agent to audit other file types and report on specific files, as well
as to collect copies of specific files. As with the Hardware Inventory Client Agent, the first
time the Software Inventory Client Agent runs, a complete software audit or file collec-
tion takes place and the full inventory is gathered and reported. At each successive inven-
tory interval, only changes to the audited files are reported. The software inventory
collection and configuration process is discussed more completely in Chapter 10.
In 2006, Microsoft invested in a software product that can consolidate the software inven-
tory collected by Configuration Manager and present this information in a more useable
manner. This product, called Asset Intelligence, is included with Configuration Manager.
When installed, it provides you with a set of reports that compares the software inventory
against a master list of applications. Through a series of customizable reports, you can
view the software installed on your managed clients by their “friendly” names, by class,
and by suite. You learn more about this terrific feature in Chapter 10.
Chapter 1 Introducing Microsoft System Center Configuration Manager 2007 11
System Monitor
When Configuration Manager is installed on a site server, it also adds several new objects
that contain counters to the Windows 2000 Server and Windows Server 2003 Perfor-
mance Monitor utility. These objects and their corresponding counters, along with the
traditional Windows 2000 Server and Server 2003 objects and counters (Processor, Pro-
cess, Memory, Logical Disk, Physical Disk, and so on) can assist the Configuration Man-
ager administrator in performance-testing site systems and determining optimization
alternatives. See Chapter 6, “Analysis and Troubleshooting Tools,” for more information
about working with Performance Monitor.
Remote Tools
Remote Tools has been perhaps the most appreciated feature of any Configuration Manager
version. This utility enables the Configuration Manager administrator to gain keyboard and
mouse control of a Configuration Manager client from the administrator’s workstation.
Through a video transfer screen, the administrator can “see” the user’s desktop and diag-
nose and troubleshoot problems without having physical access to the remote client. As
with the Hardware Inventory Client Agent and Software Inventory Client Agent, the
amount of remote access that can be initiated is configured by the Configuration Manager
administrator and rendered on the client by a Remote Tools Client Agent.
Remote Tools also includes remote diagnostic utilities specific to Windows NT 4.0 and
later computers and other Windows operating systems that provide real-time access to
system attributes such as interrupt usage, memory usage, services running, and device
settings. You can also configure Remote Tools to manage the remote connection features
of Windows XP Professional and later operating systems. This feature is discussed more
thoroughly in Chapter 17, “Managing Clients Remotely.”
log files aren’t enabled by default to conserve server resources, but the Configuration
Manager administrator can enable and configure them. Client-based log files are enabled
by default and can be disabled through the client registry. You can view log files with any
text editor.
Reports
Configuration Manager offers you the ability to create and manage meaningful reports
directly through the Configuration Manager console. Features such as Asset Intelligence
add to the robust set of reports available to the administrator. You learn more about
reports and how to use them, including a feature called dashboards, in Chapter 19,
“Extracting Information Using Queries and Reports.”
Operating system deployment integrates the SMS 2003 Operating System Deployment
Feature Pack into the product and provides you with a tool for creating operating system
images for Windows operating systems such as Windows Vista that can be deployed to
computers managed by Configuration Manager, and to unmanaged computers using boot-
able media such as CD set or DVD. This feature also provides a robust task-sequencing
functionality that gives you more granular control over operating system deployment as
well as other Configuration Manager tasks. You can read more about operating system
deployment in Chapter 12, “Deploying Operating Systems.”
Security
Configuration Manager gives you the ability to leverage the local system account and
computer accounts to run services, connect between systems, and perform client-based
functions. In addition, it offers the ability to leverage an existing PKI implementation
to more fully secure site-to-client communications. A more detailed discussion of
Configuration Manager security is provided in Chapter 20.
Configuration Manager also integrates Windows Network Access Protection services by
using Configuration Manager to help bring computers determined to be outside defined
security compliance parameters back into compliance. A more detailed discussion of the
Network Access Protection feature is provided in Chapter 15, “Implementing Network
Access Protection.”
ages Active Directory. Configuration Manager clients communicate with the site through
the use of policies passed through management points and other Configuration Manager
site systems. The following operating system platforms are supported by Configuration
Manager clients:
■ Windows 2000 Professional, Service Pack 4
■ Windows XP Professional, Service Pack 2
■ Windows Professional for 64-bit Systems
■ Windows Vista, all editions
■ Windows 2000 Server, Advanced Server, and Datacenter editions, Service Pack 4
■ Windows Server 2003, all editions, Service Pack 1
■ Windows Server 2003 R2 Standard and Enterprise editions
■ Windows Server 2008
Specific installation requirements for site servers are discussed in Chapter 2, “Planning
for and Deploying Configuration Manager Sites.”
Note Configuration Manager no longer supports the Client Access Point role.
This site system role existed to support the Legacy Client—computers running
operating system platforms previously supported by SMS 2.0. Configuration
Manager no longer supports Legacy Client computers.
“I love you, Hugh; I love you more than I have loved any
man,” she murmured.
“You must go, Hugh; you have been here too long, and I
am not well to-day. I want to be alone.”
Slowly she drew down his head towards her face, and then
gave him a warm, passionate kiss.
“Yes,” she replied, with a sigh; “if we love one another, why
should there be any mistrust between us?”
But her arms were about his neck, her head pillowed upon
his shoulder. The sweet perfume of violets intoxicated him.
In a moment he became convinced that she was terribly in
earnest, and was confident of her intense affection.
He took one look back, and saw her totter a few steps after
him with arms outstretched, then stop.
When he had gone she stood motionless and silent for a few
moments, looking wildly around, but mute under the leaden
weight of her thoughts. Then she walked with slow, uneven
steps to the ottoman by the fire, and sank upon it.
The fierce strain had been removed from her nerves, and
her happiness found vent in hysterical sobs.
“So do I.”
The man addressed laid his finger significantly upon his lips
and replied—
“Exactly. But why are you so positive that strict secrecy will
be observed?”
“Egerton.”
The curate thrust his hands into his pockets, and gazed
upon the floor a few moments.
“If I refuse?”
“In that case I’m ready,” said he, rising, at the same time
casting a longing look at the unfinished bottle of cognac
before him. With unsteady gait he stumbled across the
room, and, with the assistance of Pierre, arrayed himself in
his overcoat and hat—not, however, without some difficulty
and much good-humoured banter.
Pierre, who was seated at his side, turned and grasped his
hand. First satisfying himself of the man’s unconsciousness,
he slowly, and with deliberate caution, unbuttoned his
overcoat. As he accomplished this without rousing him,
Bérard withdrew from his pocket a card-case, a folded
paper, and several other articles.
“By all means,” replied Holt, with a laugh. “I’m really afraid,
however, that we shall be compelled to see you home
afterwards.”
By this time the train had left St. James’s Park, and was
travelling at a fair speed midway between that station and
Victoria.
“My most fervent hope is that our usual good luck will not
desert us,” the old solicitor reflected, when the Frenchman
had departed.
Having again touched the gong, the door opening into the
clerk’s office admitted another client—Hugh Trethowen.
The old man’s face grew grave, and much of the hectic flush
vanished from his cheek. Readjusting the inevitable pince-
nez, he leaned back and looked sharply at his visitor.
“Well, if you really don’t know her, I need not take up any
more of your time,” he remarked, rising.
“Young?”
“Yes, sir.”
“Pretty?”
“Get along with you,” laughed his master. “You can yet
distinguish a pretty girl from a fossilised hag, I’ll be bound.
Show her in, and let’s have a look at her.” Rising, he
glanced at himself in the mirror, settled his tie, and
smoothed his hair; for the appearance of a lady was an
unusual phenomenon at his rooms.
“Who?”
“Mademoiselle Dedieu.”
“Yes. Why, surely you, too, are not going to defame her?”
he exclaimed in astonishment. “Come, tell me what you
know concerning her.”
“To save me,” he echoed, with a smile. “Why, any one would
think I was in danger of going by the express route across
Styx.”
“I don’t know, but I heard her say she would pay him
another visit to-day and hear his answer, so I presume he
has to decide upon some matter upon which she is pressing
him.”
“Yes, most probably. She came the other day about four
o’clock.”
Jack and Valérie were seated upon a low divan before the
fire. He was holding her slim hand in his, and was uttering
some low, passionate words. As the door opened their tête-
à-tête was abruptly terminated, for the artist jumped to his
feet, while she turned to face the intruder.
“I don’t believe it,” cried the other, his face crimson with
anger. “You are both playing me false, and I have detected
you.”
Slowly she turned, and with a stiff bow swept haughtily out
of the studio.
“None.”
“Why?”
“Because it is impossible.”
“Do you love her?” asked Hugh fiercely.
“No; I—it’s the first I’ve heard of it. Who told you?”
ebookbell.com