Transcript Module 9

Microsoft Workstation/Image
Management
®
Module 0
Outline & Introduction
Session Overview
Day 1
• Built-In Tools
Deployment Options
• File Server Resource Manager (FSRM)
• Home Directory
• Group Policy
• Windows Server Update Services (WSUS)
• Windows Deployment Server (WDS)
• Windows Automated Installation Kit & Assessment
and Deployment Kit (WAIK / WADK)
• Windows Deployment Tool kit
•
Session Overview
Day 2
• System Center Configuration Manager
Overview
• Manage Software Deployments
• Create and Deploy Applications
• Deploy and Manage Software Updates
• Managing Operating System Deployments
• Managing Compliance Settings
•
Microsoft Workstation/Image
Management
®
Module 1
File Server Resource Manager
(FSRM)
Module Overview
• Issues Surrounding Workstation Management
• Overview of FSRM
• Using FSRM to Manage Quotas, File Screens, and
Storage Reports
What Is an In-Place Deployment?
In-place upgrade: upgrade
existing computers to
Windows 7 and maintain
their configurations
Wipe-and-load: replace
the computers’ current
configuration with new ones,
selectively migrating portions
of their previous configurations
Source and
destination computer
Upgrade
Collect user
state
Restore
user state
Intermediate store
Existing computer
What Is a Side-by-Side Deployment?
Deployment scenario where source and destination
computer are two different computers
Destination computer
Source Computer
Intermediate store
Collect
user state
Restore
user state
Determining a Deployment Scenario
When will you use the following deployment scenarios?
1 In-place (upgrade)
2 Wipe-and-load (refresh)
3 Side-by-side (replace)
Determining a Deployment Scenario
When will you use the following deployment scenarios?
1 In-place (upgrade)
2 Wipe-and-load (refresh)
3 Side-by-side (replace)
What Is Lite-Touch Deployment?
What is Lite-Touch Deployment?
What Is Zero-Touch Deployment?
What is Zero-Touch Deployment?
What Is FSRM?
• FSRM Enables the following functionality:
• Storage quota management
• File screening management
• Storage reports management
• Classification management
• File management tasks
What Is File Screening Management?
File screen management provides a method for
controlling the types of files that can be saved on
file servers
• File screen management consists of:
• Creating file screens
• Defining file screen templates
• Creating file screen exceptions
• Creating file groups
What Are Storage Reports?
Storage reports provide information about file
usage on a file server
• Types of storage reports include:
• Duplicate Files
• File Screening Audit
• Files by File Group, Owner, or Property
• Folders by Property
• Large Files
• Quota Usage
• Least and most recently accessed files
Microsoft Workstation/Image
Management
®
Module 2
Deploying and Maintaining Images
Module Overview
• Overview of Windows Deployment Services
• Implementing Deployment with Windows
Deployment Services
• Administering Windows Deployment Services
Tools Used to Support the Planning Phase
Microsoft Assessment and
Planning Toolkit (MAP) 4.0
Microsoft Application Compatibility
Toolkit (ACT) 5.5
Enterprise Learning Framework (ELF)
Microsoft Deployment Toolkit
(MDT) 4.2
Microsoft Desktop Optimization Pack (MDOP)
for Asset Inventory Planning 1.0
System Center Configuration
Manager 2007
P
L
A
N
Tools Used to Support the Building Phase
B
U
I
L
D
MDT Deployment
Workbench
Windows Automated
Installation Kit (WAIK)
User State
Migration Tool (USMT)
Tools Used to Support the Deploying Phase
DEPLOY
MDT Deployment Workbench
Windows Deployment Services
(WDS)
System Center Configuration
Manager
User State
Migration Tool (USMT)
What Is Windows Imaging File Format?
A file-based disk image format that contains compressed files used
to install operating systems
Resource
Resource
(Image 1)
Image 1
File Resource
File Resource
Header
Lookup Table
XML Data
Integrity Table
File Resource
Metadata
File Resource
File Resource
Metadata
File Resource
WIM
(Image 2)
Image 2
Lookup Table
XML Data
Integrity Table
Windows Image (.wim) File
How Windows Uses Modularization
Modularization allows you to:
Add multiple device drivers and updates to the
 image files
 Customize optional Windows features
 Update individual elements in the image files
Deploy multiple language versions of Windows
 using a single image file
The Imaging Process
The Deployment processes
Deploying
Envisioning
Stabilizing
Planning
Developing
Types of Images
Three different type of images:
Thin images
Thick images
• Core application
•
• Language packs
•
• Other files
Few applications
Few language
packs
Hybrid images
Mix thin and thick
image strategies
What Is an Image Strategy?
An image strategy defines the standard configuration of each common
operating system image that is created by an organization.
An image strategy must include the following elements:
 Type of images
 Number of images
 Number of WIM files
 Pre-configured settings in an image
 Additional operating system elements
Image Strategy Flowchart
Are
Multiple Builds
Required?
Yes
SCCM
Available?
No
No
Yes
Is
Storage Cost a
Factor?
No
Thick Image
Yes
Hybrid Image
Is
Network Traffic a
Factor?
Yes
No
Thin Image
Onsite Image Engineering Process
MDT Initial Setup
Create New Deployment Share
Add Operating System (for master image)
Create and stock the
Deployment Share
Add Applications (for master image)
Add Packages (for master image)
Add Drivers (for master image)
Task Sequence
Add Task Sequence to Build and Capture Master Image
Configure Master Image
Settings
Configure Deployment Properties in CS.ini
Build Master Image and
Capture
Build Reference Machine, Sysprep and Capture WIM
Sharing Best Practices for Designing Images
Identify and discuss several best
practices for image-based
deployment.
Sharing Best Practices for Designing Images
The following list outlines several best practices for image-based
deployment:
• Use a single image strategy to reduce the number of images to maintain
and service.
• Use a multilingual strategy to add multiple language packs to your image
to reduce the number of language-specific images that you support.
• Run the sysprep /generalize command when preparing the Windows
image to be captured, even if all computers have the same hardware
configuration.
• Do not deploy the default image (install.wim) file that is included with the
Windows product DVD directly by using ImageX. You can use the default
image only with Windows Setup (setup.exe).
• Use the imagex /flags option when capturing a Windows image to
create the metadata to apply to the image that you are capturing.
• Do not duplicate features for different architecture types in an answer
file, if you are performing cross-platform deployments.
• Create architecture-specific settings for each configuration pass in an
answer file for cross-platform deployments.
What Is Windows Deployment Services?
Windows Deployment Services is a server role that
is provided with Windows Server 2012
• Windows Deployment Services:
• Enables you to perform network-based installations
• Simplifies the deployment process
• Supports deployment to computers with no operating
system
• Provides end-to-end operating system deployment
• Uses existing technologies, such as Windows PE, .wim
and .vhd files, and image-based deployment.
Windows Deployment Services Components
Windows Deployment Services provides several
functions through these components:
Windows Deployment Services PXE Server
• Windows Deployment Services Client
• Additional Server Components
•
•
•
•
•
TFTP server
Shared folder
Image repository
Multicasting Engine
Why Use Windows Deployment Services?
Consider the following scenarios:
1. In a small network consisting of a single server
and around 25 Windows XP computers, you
want to expedite the upgrade process of the
client computers to Windows 8
2. A medium-sized organization wants to deploy
multiple servers in branch offices that are
geographically dispersed. It would be timeconsuming and expensive to send experienced
IT staff to each location to deploy the servers
Understanding Windows Deployment Services
Components
Windows Deployment Services prerequisites
include:
• AD DS
• DHCP
• DNS
• NTFS volume
Use Windows Automated Deployment Tool Kit to
create answer files for automated deployment
Installing and Configuring Windows Deployment
Services
• Install and configure Windows Deployment
Services by:
•
Installing the Windows Deployment Services server role
•
•
Install the Deployment Server or Transport Server role service
Perform post-installation configuration of Windows Deployment
Services by:
• Specifying an image store location
• Configuring the DHCP server options, if required
• Configuring PXE server configuration
Managing Deployments with Windows
Deployment Services
To service client computers with Windows
Deployment Services, you must:
Configure boot settings
• Configure install settings
• Configure transmission settings
• Configure drivers
•
Common Administration Tasks
There are several common administrative tasks and
tools for Windows Deployment Services
Tasks
Configure DHCP
Create and service images
Manage the boot menu
Prestage client computers
Automate deployment
Configure transmission
Tools
Windows Deployment Services
console
WDSUtil.exe
Dism.exe
Sysprep.exe
ImageX.exe
Windows SIM
Automating Deployments
To automate the Windows Setup process:
1. Create the Unattend.xml file
2. Copy the file to the Windows Deployment
Services server
3. View the properties of the appropriate install
image
4. Enable unattended mode and select the answer
file
Demo
• Install the Windows Automated Installation Kit
• Identify resources and tools included with the Windows
Automated Installation Kit
• Build a custom Answer File by using Windows SIM
• Install a reference computer from a DVD using a custom
Answer File
• Generalize a reference computer by using Sysprep
• Add packages to Windows PE
• Create a bootable Windows PE ISO image
• Start the Windows PE Operating System environment
• Capture an image using ImageX
• Apply an image using ImageX
• Service an offline WIM image
Microsoft Workstation/Image
Management
®
Module 3
Implementing Update
Management
Overview of WSUS
• What Is WSUS?
• The WSUS Update Management Process
• Server Requirements for WSUS
What Is WSUS?
Automatic
updates
Microsoft
Update
website
Server running
Windows Server
Update Services
Test clients
LAN
Automatic
updates
Internet
The WSUS Update Management Process
Assess
Deploy
Update
Management
Evaluate
and Plan
Identify
Configuring Automatic Updates
• You must configure the client computers to use
the WSUS server as the source for updates
• You can use Group Policy to configure clients,
including the following settings:
Update frequency
• Update installation schedule
• Automatic restart behavior
• Default computer group in WSUS
•
WSUS Administration
You can use the WSUS Administration console to:
Manage updates
• Configure computer groups
• View computer status
• View synchronization information
• Configure and view WSUS reports
• Configure WSUS settings and options
•
In Windows Server 2012, WSUS also includes
Windows PowerShell cmdlets for administration
What Are Computer Groups?
• You can use computer groups to organize WSUS
clients
• The default computer groups include:
All Computers
Unassigned Computers
• You can create custom computer groups to
control how updates are applied
Approving Updates
• Updates can be approved automatically, but it is
not recommended
• Updates should be tested before they are
approved for production
• Updates can be declined if they are not needed
• Updates can be removed if they cause problems
Microsoft Workstation/Image
Management
®
Module 4
Overview of System Center 2012
Configuration Manager
Overview of the System Center 2012
Family of Products
System Center Product
Usage
System Center 2012
App Controller
• Self-service access for private cloud and public
System Center 2012
Configuration Manager
• Change and configuration management
System Center 2012 Data
Protection Manager (DPM)
• Data protection for application servers
System Center 2012
Endpoint Protection
• Malware protection for client systems
System Center 2012
Operations Manager
• Monitor applications, services, and devices
System Center 2012
Orchestrator
• Automation of IT processes
• Integration with other management solutions
System Center 2012
Service Manager
• Integrated service desk
• Automation of IT processes
System Center 2012
Virtual Machine Manager
• Manage virtualized infrastructures
• Build private clouds
cloud applications
Overview of Configuration Manager 2012
Asset
Management
Deployment
Compliance
Management
Hardware and
Software
Inventory
Application
Management
Compliance
Settings
Role-based
Administration
Asset Intelligence
Software Update
Management
Power
Management
NAP
Client
Health
Endpoint
Protection
Software
Metering
Operating
System
Deployment
Remote
Management
Content
Management
Reporting
Monitoring
Security
Benefits of Implementing System Center 2012
Configuration Manager in an Organization
Key Benefits of Configuration Manager 2012
• Empower user productivity
• Using the application catalog to allow users to
request software when they need it
• Unify management and security infrastructure
• Compliance settings allows you to ensure your
clients are configured in a secure manner
• Simplify IT administration
• Provides a unified infrastructure that gives a
single pane of glass to manage physical, virtual,
and mobile clients
Overview of the Configuration Manager 2012
Hierarchy
Central Administration Site
SQL Database
Primary Site
Primary Site
SQL Database
SQL Database
Primary Site
SQL Database
Secondary
Site
• Each site is identified by a a unique 3-character
code
SQL
Database
• Central administration site can be used for
reporting and management only
• Primary sites can only be parents of secondary
sites
• Secondary sites now have their own database
What Is a Central Administration Site?
A central administration site:
• Is required to use a multi-site hierarchy
• Must be the first site built if you use a multi-site hierarchy
• Is used for administration and reporting
• Requires a SQL database
• Does not process client data
• Does not support client assignment
• Has a limited number of site system roles
What Is a Primary Site?
To use Configuration Manager, you must have at least one primary site
Primary sites:
• Can be in a child relationship to a Central Administration site,
which can only be set during installation
• Cannot be a child to another primary site
• Manage clients in well-connected networks
• Require a SQL database
• Replicate their data to a Central Administration site if part of a
hierarchy
• Supports client assignment
• Consist of one or more systems hosting various site system roles
What Is a Secondary Site?
A secondary site:
• Is optional
• Must be in a child relationship to a primary site, which is set in the
secondary site during installation
• Is used when network bandwidth usage needs to be controlled
• Requires SQL Server Express or a SQL Server database to store
configuration information
• Replicates its collected client data to its parent site using filebased replication
• Does not support client assignment
• Consists of one or more systems hosting various site system roles
Configuration Manager Site System Roles
• Default site system roles are installed when System Center
Configuration Manager setup is run
• Optional site systems roles are added post installation to support
specific features
Default Site System Roles
Optional Site System Roles
• Site server
• Distribution point
• Site system
• Management point
• Component site server
• Reporting services point
• Site database server
• Software update point
• SMS Provider – not
displayed in the console
• State migration point
How Data Flows and Replicates in a Hierarchy
• SQL Replication is automatically configured at installation
• Secondary sites receive a subset of global data
• Secondary sites do not generate SQL data
Global data is configuration
information
Site data is operational
information
Central Administration Site
Primary
Site
Primary
Site
Secondary
Site
Parent-child file-based
replication
Secondary
Site
Secondary-to-secondary filebased replication
The Configuration Manager Console Panes
Workspaces
Navigation Pane
Ribbon
Results
Pane
Preview
Pane
The Assets and Compliance Workspace
• Has nodes for the users and devices
discovered in your hierarchy
• Has nodes for the collections used to
organize the users and devices in
your hierarchy
• Has other nodes that are used to
monitor and manage the software
and configuration settings on the
client devices in the hierarchy
The Software Library Workspace
• Is split into three main nodes
• Application Management is used to
create and manage the software
that will be deployed in your
hierarchy
• Software Updates is used to
manage the updates for operating
systems and software
• Operating Systems is used to
mange the operating systems being
deployed through Configuration
Manager
The Monitoring Workspace
• Centralizes all the features used to
extract information from the
database about the operations in
you hierarchy
• Alerts are administrator configurable
and provide pop-up in the
management console
• Queries can find any information
stored in the database
• Reporting helps provide
management friendly reports about
the stored data
• The status based nodes report
information reported by clients and
system processes about ongoing
operations
The Administration Workspace
• Provides management capability for
the Configuration Manager
components
• Hierarchy configuration contains the
settings for discovering users and
devices in your hierarchy
• Site configuration contains the
settings for the sites and the servers
in the sites
• Security contains the settings for the
security applied to you hierarchy
Using Console Organization Features
• Some nodes allow you
to create folders
• Folders can be nested to
create a hierarchy of
objects
• Objects can only be in
one folder
• Configuration Items, Baselines, Drivers,
and Applications can be categorized
• Categories are not stored in a hierarchy
• Categories are used with the Search
feature
• Objects can be tagged with multiple
categories
Monitoring Site and Component Status
Overview of Status Message Queries
• You can view status messages sent to a site from client
devices by using a status message query
• You can run default queries or create customized queries
Microsoft Workstation/Image
Management
®
Module 5
Deploying and Managing Software
Updates
Module Overview
• Overview of Software Updates
• Preparing the Configuration Manager Site for
Software Updates
• Managing Software Updates
• Configuring Automatic Deployment Rules
• Monitoring and Troubleshooting Software
Updates
Lesson 1: Overview of Software Updates
• Overview of the Software Updates Feature
• Prerequisites for the Software Updates Feature
• The Software Update Point Site System Role
• Synchronizing the Software Update Catalog
Metadata
• Scanning for Compliance
• Compliance States
• The Software Updates Deployment Process
Overview of the Software Updates Feature
The software updates feature scans, analyzes, and then deploys
software updates to client computers
Configuration Manager supports the following:
Seamless and flexible update deployment
Automatic deployment rules
Enhanced monitoring and reporting
Wake-On-LAN and power management support
Internet-based client management
Support for NAP
System Center Updates Publisher
Prerequisites for the Software Updates Feature
Prerequisites include:
 WSUS 3.0 SP2 or newer
 WSUS 3.0 Administration Console (SP2 or newer)
 Windows Update Agent 3.0 installed on clients
 Network Load Balancing (for >100,000 clients)
 Reporting services point
 Security permissions
The Software Update Point Site System Role
The Software update point system role works with WSUS for software
update configuration and management
Deployment scenarios:
Installation within a Configuration Manager hierarchy
Installation as an active role in a secondary site
Configuration as an Internet-based software update point
Deployment as an NLB cluster
Synchronizing the Software Update Catalog
Metadata
Microsoft Update
3
2
Site Database
2
3
Site Server
3
1
WSUS Server
2
1
Admin
Console
Management
Point
Software
Update Point
WSUS Database
Distribution
Point
Scanning for Compliance
4
WMI Repository
Reports
6
5
Site Database
Managed
Computer
2
2
Site Server
1
3
4
WSUS Server
1
Admin
Console
Management
Point
Software
Update Point
WSUS Database
Distribution
Point
5
Compliance States
Compliance states include:
Required
Installed
Not Required
Unknown
The Software Updates Deployment Process
Microsoft Update
Software Updates
Local Source
2
2
2
2
6
7
Site Server
Managed
Computer
7
1
4
5
5
4
6
7
Admin
Console
6
Management
Point
Distribution
Point
3
Site Database
Lesson 2: Preparing the Configuration Manager
Site for Software Updates
• Installing the Software Update Point
• Configuring Software Updates Client Settings
• Software Update Client Actions
• Demonstration: Installing and Configuring the
Software Update Point
Installing the Software Update Point
Install WSUS 3.0 SP2

Choose to locally store updates

Choose between the default or custom website

Configure NLB if required

Install the WSUS administration console on the
site server if using a remote WSUS installation
Install the Software Update Point Site System

Choose to create a new site system or modify an
existing site system

Provide the appropriate port configuration if a custom
WSUS website is used

Review SUPSetup.log for details
Configuring Software Updates Client Settings
The Software Updates section provides configuration options
to enable software updates and configure settings on
client computers
Software Update Client Actions
The Configuration
Manager Properties
dialog box provides
actions to manually run
evaluation and scan
cycles
Managing Software Updates
• Methods for Determining Software Update Status
• What are Software Update Groups?
• Downloading Content and Distributing
Deployment Packages
• Demonstration: Creating Software Update Groups
and Deployment Packages
• Deploying Software Updates to Client Computers
• Demonstration: Deploying Software Updates
Methods for Determining Software Update
Status
To identify when software updates are required:
 Sort, filter, or search the All Software Updates list
 Review Software Updates compliance reports
What Are Software Update Groups?
A software update group organizes multiple software updates into a
single object
Advantages to using a
software update
group:
• Easier to track
compliance status
• Provides a method
to delegate software
update
administration
Downloading Content and Distributing
Deployment Packages
Deployment packages are created by using the Download Software
Updates Wizard
Wizard pages include:
Deployment Package
Distribution Points
Distribution Settings
Download Location
Language Selection
Deploying Software Updates to Client
Computers
To deploy software updates:
1
Provide the name and target collection
2 Specify the type of deployment
(Required or Available)
3
Specify the schedule
4 Configure user notifications and
restart behavior
5
Configure alert settings
6 Specify installation behavior based upon
boundary connection type
What Are Automatic Deployment Rules?
Automatic Deployment Rules automate the process of:

Selecting specific software updates based upon criteria

Creating a software update group containing the updates

Distributing the software updates content

Deploying the software updates to clients
Process for Creating Automatic Deployment
Rules
To create and configure an automatic deployment rule:

Specify general settings such as the name, target
collection, software update group, and enabling
deployment

Specify deployment settings such as Wake-On-LAN and
detail level

Define software update filters and search criteria

Define the schedules for the evaluation and deployment

Define the user experience and console alerts

Specify how to run the program according to the type
of boundary the client is connected to

Specify deployment package settings
Monitoring Software Updates Deployments
Methods used to monitor the software update deployment
process include:
Status messages
Alerts
Monitoring workspace
Software Updates Reports
Report categories related to software updates include:
Software Updates – A Compliance
Software Updates – B Deployment Management
Software Updates – C Deployment States
Software Updates – D Scan
Software Updates – E Troubleshooting
Microsoft Workstation/Image
Management
®
Module 6
Managing Operating System
Deployments
Module Overview
• Overview of Operating System Deployment
• Preparing the Site for Operating System
Deployment
• Capturing an Operating System Image
• Deploying an Operating System
What Is Operating System Deployment?
Operating system deployment refers to the combined technologies used
to install a complete operating system to workstations and servers. You
can include additional hardware drivers and software packages in an
operating system deployment task sequence.
Operating system deployment includes the following:
• Operating system image capture
• Windows® Automated Installation Kit (Windows AIK)
• Task sequences
• Operating system image deployment
• User state migration
Operating System Deployment Terminology
Category
Term
Category Term
• Boot image
Image
• Reference computer
• Operating system
image
• Windows Image File
Computer
Format (.wim)
• Source computer
• Target computer
• Unknown computer
• Task sequence step
Task
• Task sequence group
• Operating system
installer
• Task sequence
• Windows device
driver (or driver)
Driver
• Preboot Execution
Other
Environment (PXE)
Boot
• Drivers node
• Windows PE
• Driver package
• Sysprep
Overview of Operating System Deployment Scenarios
The operating system deployment scenarios include:
• Bare-metal installation
• Operating system refresh
• In-place upgrade
• Side-by-side migration
The various methods that initiate an operating system
deployment include:
• Configuration Manager software distribution
• PXE
• Bootable media
• Stand-alone media
• Prestaged media
Server Roles Used in Operating System
Deployment Processes
Systems
Used
for
aSide-by-side
Bare-Metal
Installation
Systems
Used
for
an
In-place
Upgrade
Systems
Used
forfor
an
System
Refresh
Systems
Used
aOperating
Migration
Import computer
information
Uses
existing Client
Uses
or existing clients
Creates
an association
Enable unknown
with
a new support
computer
computer
Management point
Management point
Management point
Distribution point
Distribution point
State
Migration
point
Distribution
point
State migration
point
Primary Site
Primary
Primary Site
Site
Primary Site
Createimage
imagefor
for
Create
installationand
anddistribute
distribute
installation
installation
and
distribute
todistribution
distributionpoint
point
to
to
distribution
point
for
Createdeployment
deploymentfor
Create
for
clients
clients
clients
Client downloads policy from management
Client
downloads
policy
from
point
and
uploads state
information
to
management
point
state
migration
Client
downloads
policy from
Client performs a PXE boot from
management
point
Client
uploads
state information
to
New
computer
perform
PXE boot from
distribution
point
distribution
point
state migration
point
Client
installs
operating
system from
Client reads instructions from
distribution
point
Client
instructions
Clientreads
installs
operatingfrom
system from
management
point
management
and
installs operating
distribution
pointto
Results
reported
management
point
Client installs
operating point
system from
system
from distribution
Client downloads
state information
distribution
point
Client
state information
from
from downloads
state migration
point
state
migration
point
Results
reported
to management point
Results reported to management point
Results reported to management point
Prerequisites for Operating System Deployment
The prerequisites for operating system deployment are :
Prerequisite
Description
• Install the Windows AIK for Windows 7 to:
Primary site server
• Install WinPE boot Images
• Install the Windows User State Migration
Tool (USMT) 4.0
Distribution point
• Enabling PXE and/or Multicast support install
the Windows Deployment Services (WDS) role
State migration point
• Supports User State Migration
DHCP
• Supports PXE and multicast
Firewalls need to allow PXE traffic
Configuration Manager Settings and
Component Requirements
The Network
Drivers
and Access
account:
Driver
Packages
• Allows site-wide setting
You
can import any
• Is used to access
Windows
drivers
distribution point during
• You
must add
a
operating
system
deployment
operations
driver
to a driver
• Must have
to
package
toread
useaccess
it
shares containing the
• You can enable or
images and the drivers
disable
node drivers
• You can categorize
drivers
• You can add drivers
to boot images
•
Preparing the Boot Images
The boot image
properties include:
• Enable prestart
command


Specify commands to
run before the task
sequence; for example,
set a Task Sequence
variable
Use to add files to boot
image; for example,
CMTrace
Default x64 and x86
boot images based on
Windows PE
• Set custom background
• Enable command
support to view logs
You can import additional
boot images
Operating System Images and Operating
System Installers
There are two methods to store the operating system files
that will be used for operating system deployment
Image file:
• Is typically used to deploy to
target computers
• Is created from a reference
computer
• Stores as a single .wim file, a
compressed file format
• Can contain captured operating
system images that include
installed applications and
patches
Installer package:
• Is typically used to build a
reference computer
• Copies the installation media
• Does not compress the files
• Does not preinstall applications
and patches in the operating
system image
Additional Packages Used by Operating
System Deployment
• The Configuration Manager client software
•
•
Is created by default during the Configuration Manager site
installation; the name of the software is Configuration Manager
Client Package
Is used in the Setup Windows and ConfigMgr task
• USMT package (optional package)
•
•
Is created by using the Create Package wizard
Can be used with a state migration point
• Application packages (optional)
•
•
Can be included in an operating system deployment task sequence
Must run in the local system context without user intervention
Configuring a Reference Computer
Build Method
Advantages
Disadvantages
• Unattended
• Time required to validate
Automated
automated build
configuration • Reusable task sequence
• Changes often require
• Task sequence can be
revalidation of entire build
modified
• Effort involved in building
packages such as the
operating system install
package
• Does not need to create • Depends on the
Manual
a task sequence
administrator for accuracy
configuration
• Can install directly from • Requires a test and
removable media
verification method
• Cannot reuse the
configuration method
• Requires active user
involvement
Regardless of the method used, the reference computer cannot be a
member of a domain
Task Sequence Overview
A series of steps or tasks that are performed automatically
The following terms are used when
describing task sequences:
• Action
• Built-in action
• Custom action
• Condition
• Step
• Group
Creating a Build and Capture Task Sequence
Some steps in the task sequence are not
exposed in the wizard
Deploying a Build and Capture Task Sequence
When deploying a build and capture task sequence:
1. Determine whether you plan to use PXE boot or boot
media; if using PXE boot, determine how PXE will
respond by using the following options:
•
Enable unknown computer support
•
Import computer information
2. Determine the collection to use; options include:
•
All Unknown Computers
•
Administrator created collection
3. Use the Deploy Software Wizard to deploy the task
sequence:
•
Select the Make available to boot media and PXE check box
Capturing a Reference Computer by Using Task
Sequence Media
• Use capture media from within the reference computer to start
the capture process
The Process for Deploying an Operating System
Image
To deploy an operating system image, perform the following
steps:
1. Import the operating system image metadata to
Configuration Manager:
•
Import the information about the captured .wim file
2. Distribute the operating system image content to
distribution points:
•
The content must be on a distribution point to be usable
3. Create the task sequence to install the operating
system:
•
Select a deployment scenario
4. Deploy the task sequence:
•
Select an initiation method that is congruent with the chosen
scenario
Adding an Operating System Image to
Configuration Manager
• Before you can use an
operating system
image, the metadata
must be imported into
Configuration Manager
•
Includes information
about the source location
• After the operating
system metadata is
imported, the operating
system content can be
distributed to a
distribution point
•
Site database stores
operating system
image metadata
Is copied from the source
location to the distribution
point
Operating
system
.wim file
Content stored on a
distribution point
Creating and Deploying a Task Sequence to
Install an Existing Image
• Start the Create
Task Sequence
Wizard, Wizard
and select
Software
and
select
the collection
to
the Install
an
deploy to
existing image
• Configure one or more
package option
distribution points for
task sequence
•the
Complete
the
wizard with
• Configure
the the
deployment
settings
appropriate
information
• Modify the task
sequence as
necessary
• Start the Deploy
Methods for Running the Installation Task Sequence
The methods for running the installation task sequence are:
• Configuration Manager deployment
•
Deploy to collection with existing clients
• PXE boot
•
Start the system and press the F12 key to start the PXE boot process
• Boot media
•
Create the boot media; CD/DVD set or USB flash drive with the files needed to
start a system and connect to Configuration Manager
• Stand-alone media
•
Create the boot media, CD/DVD set, with all the files needed for operating system
installation
• Prestaged media
•
Used by original equipment manufacturers (OEM) to prestage hard drives for new
systems
Maintaining Updates for System Images
• Use the Update Operating System Image wizard
to schedule updates to keep the images in your
.wim file patched and current
Microsoft Workstation/Image
Management
®
Module 7
Managing Software Deployments
Module Overview
• Configuring Software Distribution
• Configuring Packages and Programs
• Distributing Content to Distribution Points
• Deploying Programs to Configuration Manager
Clients
Benefits of Software Distribution
Software distribution helps reduce total cost of ownership for application
deployment by:
Eliminating the need to provide software CDs/DVDs and
installation instructions to users
Allowing you to control how and when software is
distributed to clients
Providing users the ability to install software without
requiring administrative rights
Offering a mechanism for running any executable or
command on the client
Software distribution does not package the executables
or source files to be delivered
Software Distribution Concepts
Package
Packages
contain
containing
the
Definition
files to be
distributed
Files
Deployments
Distribution
Points
Target
Collections
Programs
Deployments
of a
Distributioninstruct
points members
store packages
to accesstoa clients
package and run one
for distribution
Package collection
Source
the
package’s
programs
Access
accounts
areSource
used to
manage
definitionoffiles
Source
Programs
instruct
MediaMedia
permissions
automate
the
Media
the
computer
how
creation
of the
to
process
packages and
package
programs
“setup exe /silent /unattended”
The Software Distribution Process
1 Prepare site for software distribution
2 Create software distribution objects
Distribution
point
Management
point
Client
3 Client runs deployed
programs and returns
status
4 Monitor and troubleshoot
software distribution
Site Configuration Tasks for Software Deployment
Site configuration tasks may include configuring:
Software Distribution Component to specify concurrent distribution
settings
Network Access Account
Client Settings such as:
• Client policy polling interval
• Notification settings
• State message reporting
Distribution point and content management settings
Package Configuration Options
To create a package, use the Create Package and Program Wizard to
specify:



Package: General and data source information
Program Type: Standard program, Program for device, and
Do not create a program
Standard program\Program for device: Name,
Command Line, and Run options
Run another program first, Platform
 Requirements:
Requirements, Estimated disk space, and Maximum allowed
run time
To create a package and programs from a package
definition file, use the Create Package from Definition
Wizard
Program Configuration Options
To create a program:


Specify a unique name for the program

Define the requirements

Define the environment

Define the advanced settings

Specify the Windows Installer product information

Specify the OpsMgr Maintenance Mode settings
Specify the command line
Process for Installing and Configuring a
Distribution Point
To install a distribution point:
1
2
Provide the name and site code
Select the Distribution point system role
3 On the Distribution Point page,
configure communication settings
4 Configure locations for the content library
and package share
5
Configure PXE and Multicast settings
6 Configure a Content Validation schedule, if
required
7 Configure Boundary Group associations
Monitoring Distribution Point Configuration
Status
Methods to monitor distribution point status
include:
Distribution Point Configuration Status
Distribution Manager component
Distmgr.log
Smsdpprov.log
Content Management Tasks for Distribution Points
Content management tasks include:
Distributing content to distribution points
Updating content on distribution points
Redistributing, validating, or removing content
Prestaging content on distribution points
Monitoring Content Status
Methods to monitor content distribution include:
Content status
Package Transfer Manager
PkgXferMgr.log
Software Distribution – Content reports
Configuring Program Deployments
To create and configure a deployment:


Specify the program and target collection

Define deployment settings such as Purpose and Priority

Define the schedule for the deployment

Define the user experience

Specify how to run the program according to the type
of boundary the client is connected to
Verify content destination
How Clients Run Deployments
Method
Description
Required
Program is run after an event (for example, on
logon or logoff, or at a specific date and time)
Available
Users choose when to run the deployed program
Download content from distribution point and run locally: Client uses
BITS to download the package and then runs the program locally.
Run program from distribution point: Client uses SMB to download the
package.
One method to manually run an available program:

From the Start menu, run Software Center
Monitoring Software Deployment Status
Methods to monitor software deployment include:
Deployment status
Software Distribution – Packages and
Program Deployment
Software Distribution – Packages and
Program Deployment Status
Microsoft Workstation/Image
Management
®
Module 8
Creating and Deploying
Applications
Module Overview
• Overview of Application Management
• Creating Applications
• Deploying Applications
• Configuring the Application Catalog
Overview of the Configuration Manager
Application Model
The Configuration Manager application model is user centric
For Example:
When deploying an application to a
user
Application is installed locally on a
computer with affinity relationship
•
When the user logs on to
another computer, the
application, installed as a virtual
application, follows the user
•
When the user logs off, the
virtual application is not
retained
Applications vs. Packages
• Applications:
• Contain extensive
information about the
software
• Can use multiple
deployment types; the
deployment type used is
determined by rules at run
time
• Packages:
• Contain limited
information about the
software
• Can use multiple
programs, and the one to
deploy has to be
specified at the time of
deployment
Prerequisites for the Application Catalog
• The server role requirements for application management include:
Server Role
If Required
Description
Management
point
Required
Clients download policy and content location
information and upload state messages
Distribution
point
Application
Catalog
website point
Application
Catalog web
service point
Reporting
services point
Required
Clients download deployed content from the
distribution point
Optional
Provides users with a list of available software
Optional
Provides information from Software Library to
the Application Catalog website
Optional
Used for reporting on application management
tasks
• The client system requirement for application management
include:
•
App-V 4.6 SP1 or later if deploying App-V deployment types
Deployment Types
The Create Application Wizard presents you with the
following deployment types when creating an application:
•
•
•
•
Windows Installer (Native)
Microsoft Application Virtualization
Windows Mobile Cabinet
Nokia (SIS or SISx files)
The Create Deployment Type Wizard presents you with the
following deployment type in addition to the other
deployment types:
•
Script Installer (Native)
Application Management Features
Requirement rules:
• Require that client devices match requirements
• Are configured on a deployment type and only apply to that
deployment type
Global conditions:
• Are configured in the Global Conditions node or through a
deployment type when creating a custom requirement rule
• Are used as the basis for requirement rules
User device affinity:
• You can associate users with a specific device or multiple
devices
Deployment action and purpose:
• Specify the deployment action as Install or Uninstall
• Specify the purpose as Available or Required
What Is Software Center?
Software Center is the users’ default interface for managing software
deployments that have been deployed to the computer as Available
• Users can install software
that was:
•
Deployed as Required and
has not reached the
deadline
•
Deployed as Available to a
device-based collection of
which the system is a
member
• Users can configure
personal settings such as
•
•
Business hours
Work days
The Application Catalog
The Application Catalog is an optional website that provides users
with advanced features for software management
Client Settings for Application Management
The Computer Agent settings control many aspects of application
management
The User and Device Affinity settings control the:
The Software Deployment settings control how often
• Automatic affinity assignment settings
deployments are re-evaluated
• User defined affinity
Lesson 2: Creating Applications
• Creating an Application by Using Automatically
Detected Settings
• Demonstration: Creating an Application from an
MSI file
• Creating Applications Manually
• Creating Deployment Types Manually
• What Is a Detection Method?
• Overview of User Experience Settings
• Demonstration: Creating an Application and a
Deployment Type Manually
Creating an Application by Using Automatically
Detected Settings
• Use the Create
Application Wizard
to create a new
application; when using
the automatic
configuration, only some
properties are configured
• Modify the application
after creation to set
Application Catalog
properties and other
settings
• Modify the deployment
type to add requirement
rules
Creating Applications Manually
• Application information
is entered manually on
the General page
• Application Catalog and
Deployment types pages
appear in the wizard
only when manually
creating applications
• Deployment types can
also be created manually
or automatically
Creating Deployment Types Manually
You can add a deployment type by using the automatic method
or the manual method
When manually creating a
deployment type:
• On the General Information page,
you must supply a name
• On the Content page, you must
provide the installation command
line
• On the Detection Method page,
you must specify a detection
method for the deployment type
• On the User Experience page,
there are no mandatory fields
What Is a Detection Method?
A procedure that enables the deployment process to determine
whether or not an application is already present on a system
Detection methods:
• Perform evaluation
before an application
installs
• Are evaluated
periodically on the client
to detect uninstalled
applications
• Can examine the
registry, file system, and
Windows Installer
database
Overview of User Experience Settings
User Experience Settings control what the user is allowed to view
and do when the deployment type is used
Logon requirement depends
on the target
Shows or hides the application
Determines if application
must complete without user
interaction
By default, reboots are
controlled by the return
codes
Lesson 3: Deploying Applications
• Deploying an Application to a User or a Device
• The Process for Deploying Applications
• Demonstration: Distributing Content to
Distribution Points
• Options for Deploying Applications
• Demonstration: Deploying an Application
• Monitoring Application Deployment
Deploying an Application to a User or a Device
You can deploy applications to users or devices
• If you deploy an application
to users, the application
shortcuts are only created for
the targeted users regardless
of who logs onto the system
• If you deploy the application
to a system, the application is
installed for all users of the
system
The Process for Deploying Applications
Management
point
Site server
in a primary
site
The process for deploying
an application is as follows:
•
Distribution
point
•
•
•
•
An administrator creates a new
application and distributes the
content to distribution point
An administrator creates a
deployment for the application
The client system checks for policy
updates
The client system contacts the
management point for content
location
The client system downloads the
content from the distribution point
and installs the application
Options for Deploying Applications
When deploying
applications, you can:
Target a user or device
collection
• Specify an action:
•
•
•
Specify a purpose:
•
•
Install or Uninstall
Required or Available
Specify a schedule:
•
•
Available Time in UTC or
local
Installation Deadline can
be UTC or local; default
is As soon as possible
Monitoring Application Deployment
All devices send state messages about deployments that have run locally
regardless of whether they were deployed to the device or the user
In the Monitoring workspace, under the Deployments node,
there is an object for each deployment
Each state category can have subcategories
Lesson 4: Configuring the Application Catalog
• Overview of the Application Catalog
• System Roles Required for the Application Catalog
• Demonstration: Installing the Application Catalog
System Roles
• Making Applications Appear in the Application
Catalog
• Demonstration: Deploying and Requesting
Applications in the Application Catalog
Overview of the Application Catalog
With the Application Catalog, users can:
Install software that was deployed as Available to a userbased collection
• Request software that was deployed as Available to a
user-based collection; but this requires administrator
approval for installation
• Specify systems as their primary devices
• Wipe their mobile devices
•
System Roles Required for the Application Catalog
Site server in
a primary
•
site
Application Catalog consists of
two roles:
•
Application
Catalog web
service points
Application Catalog website point
•
•
Application Catalog web service point
•
Application
Catalog website
points
HTTP or
HTTPS
HTTPS
only
Users connect to this role
Supports the website point
• Install the roles on a Web Server
with a certificate to provide
HTTPS support
• Customize the Application Catalog
website point with:
• Organization name
• Theme color
Intranet Client
Internet Client
Making Applications Appear in the
Application Catalog
• To deploy applications through the Application Catalog, deploy
the application to user-based collections with the purpose set
as Available; users can then request the applications from the
Application Catalog
• To require administrator approval for a user’s request for an
application, select the Require administrator approval if users request
this application check box
Configuring Requirements and Dependencies for
Deployment Types
• What Are Global Conditions?
• Demonstration: Creating a Global Condition
• What Are Requirement Rules?
• Categories for Requirement Rules
• Demonstration: Adding a Device Requirement
• Dependencies for Deployment Types
What Are Global Conditions?
Global conditions:
• Defines conditions to be tested
• Can be used in multiple deployment types and across multiple
applications
• Allow you to customize the settings you use to determine whether
a deployment type is available to a user or device
• Vary between Windows devices, Windows Mobile devices, and
Nokia devices
Some global conditions available for Windows Devices are:
Setting Type
Description
Active Directory query You can use this type to construct a query to find values in AD DS
File system
Registry key
Registry value
You can use this type to specify a file or folder to assess for
compliance on computers
You can use this type to specify a registry key to assess for
compliance on computers
You can use this type to specify a registry value to assess for
compliance on computers
What Are Requirement Rules?
• Meets requirements?
• Requirement rules specify the
conditions that must be met
before an application can be
installed
• Requirement rules are
defined in a deployment type
• When a deployment type is
evaluated, the requirement
rule must be satisfied to be
run or made available
• Requirement rules can be
created for many different
reasons such as:
• Hardware requirements
• Drive space requirements
Categories for Requirement Rules
Requirement Rules:
• Are classified based on the types of settings they are used to
evaluate
• In general, there are two way to evaluate a rule
• Value. A value based rule allows you to specify a value and an
operator to use for comparison
• Existential. A existential based rule checks the existence of the
specified condition
The categories and some example Requirement Rules:
Category
Conditions
Possible Values
Operators
Custom
Administrator created
Varies
Varies
User
Primary Device
Equals
True
One of
False
One or more Active
Directory site(s)
Device
Active Directory site
None of
Dependencies for Deployment Types
• Dependencies are defined on a
deployment type
• Dependencies allow you to ensure that
application requirements can be
enforced or remediated
• Dependencies define the application
deployment types that must be
installed before the deployed
deployment type can be installed
• After the dependencies are fulfilled, the
application will install
• Dependent applications can be
configured to install automatically
Configuring Multiple Deployment Types and
User Device Affinity
• Reasons for Implementing Multiple Deployment
Types
• The Process for Creating Multiple Deployment
Types
• What Is a Simulated Deployment?
• What Is User Device Affinity?
• Methods for Configuring User Device Affinity
• Demonstration: Configuring User Device Affinity
Reasons for Implementing Multiple Deployment
Types
• Using multiple deployment types
lets you customize the installation
based on the target computer
• The deployment type is
determined by requirements and
priority of deployment types
• For example
One deployment type locally installs
the application on a desktop
computer
• A different deployment type installs
the application as a virtual application
on a laptop
•
The Process for Creating Multiple Deployment Types
Automatic Deployment Type
Creation
Manual Deployment Type
Creation
• Information is imported
• You must provide all
from an installation file
required information

Name

Name

Installation program

Installation program

Installation behavior

Detection method

Detection method

Uninstall program
• Optional information:
• Optional information

Installation behavior

Uninstall program

Requirements

Requirements

Dependencies

Dependencies

Additional information

Additional information
What Is a Simulated Deployment?
Simulated deployment allows you to test a deployment without
distributing files
A simulated deployment is treated like a normal deployment
for evaluation purposes
The results of the simulation are found in the Monitoring
workspace under the Deployments node with other deployments
The status shows you the number of systems that would have
attempted to install a deployment type and which one it would have
attempted to use for the installation
The status also shows which systems did not meet the requirements
such as detection rules and dependencies including the requirements
they did not meet
Deploy to device collections for best results when using
device based requirements
What Is User Device Affinity?
• User device affinity allows a user to
be associated with a device
• Users can have an affinity with
multiple devices
• User device affinity can be used as
a requirement in an application so
that applications are automatically
installed on users’ systems if the
system meets any other requirement
rules
• When a user accesses a device
without an affinity relationship:
•
•
Applications could be configured not
to install
Applications could use a different
deployment type such as deploying
a virtualized application
Methods for Configuring User Device Affinity
• Client Settings:
• If Automatically configure user device
• If Allow user to define their primary
devices is set to True, users use
Application Catalog to set the UDA
relationship
affinity from user data is set to False, the
usage data is still recorded and
administrators can approve or deny the
request for relationship
Managing Applications
• What Is Application Revision History?
• Retiring Applications
• Uninstalling Applications
• What Is Application Supersedence?
• Demonstration: Configuring Application
Supersedence
What Is Application Revision History?
• Whenever an application is
modified, the changes are
tracked and stored in the
Configuration Manager
database
• You can view a previous
version using the View
button
• You can restore previous
versions of an application if
you need to
• Restoring a previous version
creates a new revision of
the application
Retiring Applications
• You cannot create new
deployments with retired
applications
• You cannot modify a
retired application
• You can reinstate a
retired application at any
time
Uninstalling Applications
• You can uninstall an application by
creating a deployment with the uninstall
action
• An uninstall will not execute if the client
is the target of a deployment with the
install action
What is Application Supersedence?
• Application supersedence allows
you to specify an upgrade path for
applications
• When you configure application
supersedence, the old application
is no longer available
• You can leave the old application
on the system, upgrade it, or
completely uninstall it
• You can view the relationships with
the View Relationships button in
the ribbon
Microsoft Workstation/Image
Management
®
Module 9
Managing Compliance Settings
Overview of Compliance Settings
• Introduction to Compliance Settings
• What Are Configuration Items?
• What Are Configuration Baselines?
• What Are Configuration Packs?
• The Process for Deploying Compliance Settings
• Scenarios for Using Compliance Settings
Introduction to Compliance Settings
Compliance settings:
• Provide an interface to monitor client
configuration and remediate noncompliant
settings
• Can be used for business requirements such as:
•
•
•
Verifying configuration of devices
Identifying compliance issues
Reporting compliance for regulatory reasons
What Are Configuration Items?
Configuration items define one or more settings that you wish to
assess for compliance
In a configuration item, you can:

Specify the compliance rule

Define the severity levels for noncompliance

Specify remediation, if supported

A child configuration item is a linked copy
of a parent configuration item

An administrator cannot edit copied settings
but can add additional settings
Configuration
Item
What Are Configuration Baselines?
A configuration baseline is a group of configuration items
Configuration baselines:
• Can contain:

Configuration items

Software updates

Other configuration baselines
• Can be configured for remediation
• Are deployed to collections
• Use a default schedule for evaluations; you
can customize the schedule
• You can deploy multiple configuration baselines
to a single collection
Configuration
Baseline
What Are Configuration Packs?
Configuration packs are preconfigured configuration items
or configuration baselines
You can import configuration packs from:
• Microsoft System Center Management Pack Catalog
• Existing Configuration Manager 2007 Packs
• Microsoft or third-party sources that define
best practices
• Online communities on the Internet
• Custom configuration baselines from your organization
• Another Configuration Manager site
The Process for Deploying Compliance Settings
1
Configuration items
imported or created
Configuration
Manager
Database
Configuration
Management Packs
2
7
Configuration baseline
imported or created
Compliance reports
are run
Compliance
data stored
in database
Configuration
Baseline
Configuration Manager
Server
Managed Client
4
Configuration baseline
downloaded with
policy
5
Evaluation run on
schedule
6
3
Compliance state
messages sent from
the client
Configuration
baseline deployed
Scenarios for Using Compliance Settings
The Compliance Settings feature can help you solve different kinds
of issues such as:
• To find misconfigured systems, you can:
1.
2.
3.
Download best practice baseline
Evaluate systems against best practices
Remediate identified issues
• To remediate noncompliance of settings, you
can:
1.
2.
3.
Configure compliance checking
Create configuration items for autoremediation of settings
Configure applications with requirements rules and
dependencies
Configuring Client Settings to Support Compliance
• Default settings allows you to:
•
•
Enable or disable compliance evaluation
Configure the schedule
• Custom setting allows you only to:
•
Enable or disable compliance evaluation
Creating Configuration Items
Specify a name and
description for the
Specify
all or
specific
configuration
item
Create
compliance
rules
Create settings that need
for the configuration
versions
of supported
to be monitored
item
clients
Specify
the type of
configuration item:
• Windows clients
• Mobile devices
Types of Configuration Item Settings
The operators in a compliance rule: Equals, Not equal to,
Greater
than,
Greater
thangroups
or Windows
equal
to, Less
than,
The
mobile
device
setting
include:
There
are
10
setting
types
for
configuration
items:
Less than or equal to, Between, One of or None of.
Configuring Remediation
• Remediation is only available for the following settings:
• Registry values
• Scripts
• WMI Query Language (WQL) Query configuration items
• All mobile phones
• Remediation can be in the form of:
• Create the value if it doesn’t exist
• Set the value if it exists but is not compliant
• Run a remediation script
• Set the value for the phone settings if supported
• For remediation to occur, you need to configure
remediation on both the configuration item and the
deployment
Creating Configuration Baselines
Create a configuration
baseline in one of the
following ways:
• Use the Create
Configuration Baseline
dialog box (most
common method)
• Import configuration
data
• Copy an existing
configuration baseline
Deploying Configuration Baselines
• Select this option to allow
configuration items with
remediation enabled to
apply the appropriate
remediation action
• Select the user or device
collection in which this
baseline will be deployed
• Use the default schedule
as in the Client Agent
settings or create a
custom schedule
Viewing Compliance in the Configuration
Manager Client
You can perform the
following actions on the
Configurations tab:
• Evaluate. This option
causes the selected
baseline to be evaluated on
demand
• View Report. This option
generates a report of the
selected baseline if you
have local administrator
rights
• Refresh. This option causes
the view to be refreshed
Viewing Compliance Results in the Configuration
Manager Console
You can use the
compliance results
reported by the client
for:
• Monitoring. View
and monitor results
in the Deployments
node
• Creating collections.
Create collections
by using the
compliance state of
configuration items
• Viewing reports.
There are several
reports for viewing
compliance results
[email protected]