Call : +91 8050580888, +442038072367

SCCM

sccm-banner

APPONIX TECHNOLOGIES IS ENABLING IT PROFESSIONALS LIKE YOU TO UNLOCK YOUR HIDDEN POTENTIAL BY OFFERING GROWTH ORIENTED TRAINING ON LATEST TECHNOLOGIES.

SCCM discovers servers, desktops, tablets, and mobile devices connected to a network through Active Directory and installs client software on each node. Not only that, it then manages application deployments and updates on a device or group basis, allowing for automated patching via Windows Server Update Services and policy enforcement via Network Access Protection. SCCM also includes role-based access control, which enhances system security by only showing end users the interface elements that apply to their specific roles. At Apponix, you will be trained by Industry Experts who work at MNCs on critical projects and by Corporate Trainers.

COURSE OVERVIEW

This 36 hrs instructor-led course describes how to configure and manage client devices and servers using Microsoft System Center 2012 R2 Configuration Manager and its associated site systems. The course focuses on day-to-day management tasks, including managing software deployments, updates, client health, hardware and software inventory, compliance, endpoint protection, application management, mobile device management, querying and reporting.

After Completion of this Trainig you will be able to:

  1. Describe the System Center 2012 R2 Configuration Manager feature set and manage and troubleshoot sites by using the Configuration Manager Console and associated toolset.
  2. Configure boundaries and boundary groups, configure discovery methods, manage user and device collections, and implement role-based administration.
  3. Describe the client deployment process, configure client deployment methods, configure the client agent settings, and monitor client status.
  4. Describe the inventory collection process, configure and manage hardware and software inventory, monitor inventory data flow, and use Asset Intelligence and Software Metering.
  5. Analyze data by creating queries and running reports.
  6. Create, deploy, and manage software packages and programs.
  7. Create and deploy applications by using the System Center 2012 R2 Configuration Manager application model.
  8. Configure multiple deployment types.
  9. Deploy and manage software updates.
  10. ManageIntegrate and implement Endpoint Protection by using System Center 2012 R2 Configuration Manager.
  11. Deploy operating systems by using the Configuration Manager infrastructure.
  12. Manage configuration items, baselines, and profiles to assess and configure settings for devices.
  13. Manage mobile devices by using System Center 2012 R2 Configuration Manager.
  14. Configure Wake On LAN, Power Management policies, and Remote Control.

Module 1: Overview of System Center 2012 Configuration Manager

Training Institute in Bangalore This module explains how to configure discovery methods, configure boundaries and boundary groups, manage user and device collections, and implement role-based security.

Lessons
  1. Configuring Resource Discovery
  2. Configuring Boundaries and Boundary Groups
  3. Configuring User and Device Collections
  4. Configuring Role-Based Administration
  5. Lab: Configuring Resource Discovery and Boundaries
  6. Configuring Active Directory Discovery Methods
  7. Configuring Boundaries and Boundary Groups
  8. Lab: Configuring User and Device Collections
  9. Creating a Device Collection
  10. Creating a User Collection
  11. Configuring a Maintenance Window
  12. Lab: Configuring Role-Based Administration
  13. Configuring a New Scope for Toronto Administrators
  14. Configuring a New Administrative User
After completing this module, students will be able to:
  1. Configure resource discovery.
  2. Configure boundaries and boundary groups.
  3. Configure user and device collections.
  4. Configure role-based administration.

Module 2: Discovering and Organizing Resources

This module explains how to configure discovery methods, configure boundaries and boundary groups, manage user and device collections, and implement role-based security.

Lessons
  1. Configuring Resource Discovery
  2. Configuring Boundaries and Boundary Groups
  3. Configuring User and Device Collections
  4. Configuring Role-Based Administration
  5. Lab: Configuring Resource Discovery and Boundaries
  6. Configuring Active Directory Discovery Methods
  7. Configuring Boundaries and Boundary Groups
  8. Lab: Configuring User and Device Collections
  9. Creating a Device Collection
  10. Creating a User Collection
  11. Configuring a Maintenance Window
  12. Lab: Configuring Role-Based Administration
  13. Configuring a New Scope for Toronto Administrators
  14. Configuring a New Administrative User
After completing this module, students will be able to:
  1. Configure resource discovery.
  2. Configure boundaries and boundary groups.
  3. Configure user and device collections.
  4. Configure role-based administration.

Module 3: Managing the Configuration Manager Client

This module explains how to configure client deployment methods and client settings, and monitor client status.

Lessons
  1. Overview of the Configuration Manager Client
  2. Deploying the Configuration Manager Client
  3. Managing Client Agents
  4. Configuring and Monitoring Client Status
Lab: Deploying the Configuration Manager Client
  1. Preparing the Site for Client Installation
  2. Deploying the Configuration Manager Client by Using Client Push Installation
  3. Deploying the Configuration Manager Client by Using Group Policy (Optional)
Lab: Managing Client Settings
  1. Configuring Client Settings
Lab: Configuring and Monitoring Client Status
  1. Configuring and Monitoring Client Communication and Health Status
  2. After completing this module, students will be able to:
  3. Describe the requirements for installing the Configuration Manager 2012 client.
  4. Describe the site roles and methods used to deploy the Configuration Manager client.
  5. Describe how to configure the client agent settings.
  6. Describe how to monitor client health.

Module 4: Managing Inventory and Software Metering

This module explains how to configure and manage hardware and software inventory, monitor inventory data flow, and use asset intelligence and software metering.

Lessons
  1. Overview of Inventory Collection
  2. Configuring Hardware Inventory
  3. Configuring Software Inventory
  4. Managing Inventory Collection
  5. Configuring Asset Intelligence
  6. Configuring Software Metering
Lab: Configuring and Managing Inventory Collection
  1. Configuring Hardware Inventory
  2. Configuring Software Inventory
Lab: Configuring and Managing Asset Intelligence
  1. Preparing the Site for Asset Intelligence
  2. Configuring Asset Intelligence
  3. Customizing Asset Intelligence
  4. Viewing Asset Intelligence Reports
Lab: Configuring Software Metering
  1. Configuring Software Metering
After completing this module, students will be able to:
  1. Describe inventory collection.
  2. Configure and collect hardware inventory.
  3. Configure and collect software inventory.
  4. Manage inventory collection.
  5. Configure asset intelligence.
  6. Configure software metering.

Module 5: Querying and Reporting Data

This module explains how to create queries and run reports by using SQL Server Reporting Services.

Lessons
  1. Introduction to Queries
  2. Managing Queries
  3. Configuring SQL Server Reporting Services
Lab: Creating and Running Queries
  1. Creating Data Queries
  2. Creating Subselect Queries
  3. Creating Status Message Queries
Lab: Configuring Reporting
  1. Configuring a Reporting Services Point
After completing this module, students will be able to:
  1. Describe data and status message queries.
  2. Configure and manage data and status message queries.
  3. Configure and manage SQL Server Reporting Services in Configuration Manager.

Module 6: Managing Software Deployments by Using Packages and Programs

This module explains how to create and deploy packages and programs.

Lessons
  1. Configuring Software Distribution
  2. Configuring Packages and Programs
  3. Distributing Content to Distribution Points
  4. Deploying Programs to Configuration Manager Clients
Lab: Managing Software Deployment by Using Packages and Programs
  1. Preparing the Infrastructure for Software Deployment
  2. Creating a Package and Configuring Programs
  3. Distributing Content to a Distribution Point
  4. Deploying a Program to Configuration Manager Clients
After completing this module, students will be able to:
  1. Describe the software distribution process and configure software distribution settings.
  2. Configure packages and programs.
  3. Distribute content to distribution points.
  4. Deploy programs to Configuration Manager clients.

Module 7: Creating and Deploying Applications

This module explains how to create and deploy applications by using the System Center 2012 Configuration Manager application model.

Lessons
  1. Overview of Application Management
  2. Creating Applications
  3. Deploying Applications
  4. Configuring the Application Catalog
Lab: Creating and Deploying an Application
  1. Creating and Deploying a Required Application
  2. Creating and Deploying an Available Application
Lab: Deploying Applications from the Application Catalog
  1. Installing and Configuring the Application Catalog
  2. Creating and Deploying Applications to the Application Catalog
  3. Installing Applications from the Application Catalog
After completing this module, students will be able to:
  1. Describe application management in Configuration Manager.
  2. Create applications.
  3. Deploy applications.
  4. Configure the Application Catalog.

Module 8: Managing Application Deployment

This module explains how to configure application deployment requirements, application supersedence, application un-installation, and multiple deployment types.

Lessons
  1. Configuring Requirements and Dependencies for Deployment Types
  2. Configuring Multiple Deployment Types and User Device Affinity
  3. Managing Applications
Lab: Advanced Application Deployment
  1. Configuring User Device Affinity
  2. Creating Applications with Requirements
  3. Deploying Required Applications to Users
  4. Creating an Application with Multiple Deployment Types
Lab: Managing Application Supersedence and Removal
  1. Using Application Supersedence
  2. Uninstalling the Excel Viewer Application
After completing this module, students will be able to:
  1. Describe the requirement rules and dependencies for deployment types.
  2. Configure multiple deployment types and user device affinity.
  3. Manage applications by uninstalling and replacing applications using application supersedence.

Module 9: Deploying and Managing Software Updates

This module explains how to deploy and manage software updates.

Lessons
  1. Overview of Software Updates
  2. Preparing the Configuration Manager Site for Software Updates
  3. Managing Software Updates
  4. Configuring Automatic Deployment Rules
  5. Monitoring and Troubleshooting Software Updates
Lab: Configuring the Site for Software Updates
  1. Configuring and Synchronizing the Software Update Point
Lab: Deploying and Managing Software Updates
  1. Determining Software Update Compliance
  2. Deploying Software Updates to Clients
  3. Configuring Automatic Deployment Rules
After completing this module, students will be able to:
  1. Describe how the software updates feature integrates with Configuration Manager 2012.
  2. Prepare a Configuration Manager site for software updates.
  3. Manage software update evaluation and deployment.
  4. Configure automatic deployment rules.
  5. Monitor and troubleshoot software updates.

Module 10: Implementing Endpoint Protection in Configuration Manager 2012

This module explains how to integrate and implement System Center 2012 Endpoint Protection with System Center 2012 Configuration Manager.

Lessons
  1. Overview of Endpoint Protection in Configuration Manager
  2. Configuring and Monitoring Endpoint Protection Policies
Lab: Implementing Endpoint Protection
  1. Configuring the Endpoint Protection Point and Client Settings
  2. Configuring and Deploying Endpoint Protection Policies
  3. Monitoring Endpoint Protection
After completing this module, students will be able to:
  1. Describe how Endpoint Protection is used to detect and remediate malware and security vulnerabilities.
  2. Configure and monitor Endpoint Protection policies.

Module 11: Managing Operating System Deployment

This module explains how to deploy operating systems by using the System Center 2012 Configuration Manager infrastructure.

Lessons
  1. Overview of Operating System Deployment
  2. Preparing the Site for Operating System Deployment
  3. Capturing an Operating System Image
  4. Deploying an Operating System
Lab: Preparing the Environment for Operating System Deployment
  1. Managing Site System Roles Used to Support Operating System Deployment
  2. Managing Packages to Support Operating System Deployment
Lab: Building and Capturing a Reference Image
  1. Creating a Build and Capture Task Sequence
  2. Capturing the Reference Computer
Lab: Performing an In-Place Upgrade
  1. Preparing the Operating System Image
  2. Creating a Task Sequence to Deploy an Image
  3. Deploying an Image
After completing this module, students will be able to:
  1. Describe operating system deployment.
  2. Prepare a site for operating system deployment.
  3. Capture operating system images.
  4. Deploy operating systems.

Module 12: Managing Compliance Settings

This module explains how to manage configuration items and baselines to assess and remediate the compliance of settings on devices.

Lessons
  1. Overview of Compliance Settings
  2. Configuring Compliance Settings
  3. Viewing Compliance Results
Lab: Managing Compliance Settings
  1. Managing Configuration Items and Baselines
  2. Viewing Compliance Settings Reports
  3. Configuring Remediation in Compliance Settings
  4. Using Compliance Information to Create Collections
After completing this module, students will be able to:
  1. Describe the Compliance Settings feature.
  2. Configure the Compliance Settings feature.
  3. View compliance results.

Module 13: Managing Mobile Devices

This module explains how to configure the mobile device management settings.

Lessons
  1. Configuring Mobile Device Management
  2. Depth Management of Mobile Devices
  3. Deploying Applications to Mobile Devices

Module 14: Configuring Wake On LAN, Power Management, and Remote Control

This module explains how to configure Wake On LAN, power management policies, and Remote Control.

Lessons
  1. Configuring Wake On LAN
  2. Overview of Out of Band Management
  3. Configuring Power Management Settings
  4. Configuring Remote Control
Lab: Configuring Power Management Settings
  1. Applying a Power Management Plan
Lab: Configuring Remote Control
  1. Configuring the Remote Tools Client Settings and Permissions
  2. Managing Desktops by Using Remote Control
After completing this module, students will be able to:
  1. Configure the Wake On LAN feature.
  2. Describe out of band management.
  3. Configure power management settings.
  4. Configure Remote Control features.

Quick Enquiry

OUR TRAINERS

"Our trainers are eager to share their knowledge and experience they have gained while working on critical projects in MNCs."

Mr. Vikas

Microsoft Certified Trainer(MCT), working in a MNC. Delivered trainings across the globe.


Mr.BRKP

33 Yrs of Professional Experience.
15+ Years on Training Experience.

Contact Form

If you have questions, please send us a message.

Back to Top