Home > Store

Microsoft System Center 2012 Unleashed

Register your product to gain access to bonus material or receive a coupon.

Microsoft System Center 2012 Unleashed

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

  • The only complete guide to optimizing systems management by fully leveraging integration and interoperability across all Systems Center products
  • Covers major improvements in Service Manager, Operations Manager, Orchestrator, Data Protection Manager, and Virtual Machine Manager
  • By leading experts who've implemented the new suite in huge global enterprises and innovative smaller firms

Description

  • Copyright 2012
  • Edition: 1st
  • Book
  • ISBN-10: 0-672-33612-X
  • ISBN-13: 978-0-672-33612-6

This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and techniques you just won’t find anywhere else.


You’ll learn how to use System Center’s powerful capabilities to build highly-efficient managed environments that encompass datacenters, cloud environments, client computers, mobile devices, and more. The authors address planning, design, implementation, integration, and administration, and cover every component, including Configuration Manager, Operations Manager, Data Protection Manager, Virtual Machine Manager, Service Manager, and Orchestrator.
  •  Use Configuration Manager 2012 to deliver software and updates in highly-distributed environments including datacenters, clouds, and mobile devices
  •   Reliably manage and report on assets with Configuration Manager 2012
  •   Perform monitoring, alerting, operations, and security reporting with Operations Manager 2012
  •   Use Data Protection Manager 2012to protect file systems, SQL, Microsoft Exchange, and SharePoint
  •   Leverage Data Protection Manager 2012’s improved central monitoring and remote recovery
  •   Run Hyper-V virtualized environments with VMM 2012—including new private clouds and mixed private/public fabrics
  •   Use Service Manager 2012 to provide top-down integration, and use Orchestrator 2012 for bottom-up process automation and integration “glue”
  •   Give users an efficient self-service portal for creating service and incident requests and browsing service catalogs
  •   Manage service offerings and implement enterprise-wide change control with Service Manager 2012
  •   Ensure compliance by creating, executing, and repeating auditable, documented processes with Orchestrator 2012

Sample Content

Online Sample Chapter

Configuration Manager 2012 Implementation and Administration

Sample Pages

Download the sample pages (includes Chapter 3 and Index)

Table of Contents

Introduction    1
1  Overview of the System Center Suite    5
What Is System Center?    6
Understanding System Center Configuration Manager    9
Understanding System Center Operations Manager    18
Understanding System Center Data Protection Manager    26
Understanding System Center Virtual Machine Manager    34
Understanding System Center Service Manager    40
Understanding System Center 2012 Orchestrator    45
Understanding System Center Licensing    50
Summary    51
Best Practices    52
2  Configuration Manager 2012 Design and Planning    55
What’s New in ConfigMgr 2012    56
Explaining How Configuration Manager Works    60
Understanding Content Distribution    66
Understanding Asset Management    70
Reporting from Configuration Manager    74
Configuration Manager Architecture Components    75
Securing Configuration Manager    88
Understanding Component Requirements    92
Configuration Manager Design Considerations    94
Understanding Client Schedules    105
Planning for Internet-Based Client Management    106
Putting It All Together in a Design    110
Summary    112
Best Practices    112
3  Configuration Manager 2012 Implementation and Administration    115
Sample Organization    115
Configuring Installation Prerequisites    118
Implementing the Central Administration Site    124
Deploying the Primary Sites    129
Deploying the Secondary Sites    134
Configuring the Hierarchy    138
Configuring Sites    148
Configuring Client Settings    156
Implementing Internet-Based Client Management    163
Summary    177
Best Practices    178
4  Using Configuration Manager 2012 to Distribute Applications, Updates, and Operating Systems    181
Understanding Content Distribution    181
Defining Collections    185
Understanding Application Management    189
Managing Deployments    203
Understanding Software Updates    215
Deploying Software Updates    219
Understanding Operating System Deployment    225
Deploying Operating Systems    234
Extending with Microsoft Deployment Toolkit    238
Summary    243
Best Practices    243
5  Using Configuration Manager 2012 for Asset Management and Reporting    245
Understanding Asset Data    246
Configuring Client Settings for Inventory Collection    248
Understanding Reporting    249
Customizing Hardware Inventory    261
Understanding Asset Intelligence    269
Understanding Software Metering    277
Understanding Compliance Settings    278
Monitoring the Baselines and Compliance    283
Summary    285
Best Practices    285
6  Operations Manager 2012 Design and Planning    289
What’s New With Operations Manager 2012    290
Understanding How OpsMgr Works    291
OpsMgr Architecture Components    296
Securing OpsMgr    311
Fault Tolerance and Disaster Recovery    317
Understanding OpsMgr Component Requirements    323
OpsMgr Design Considerations    328
Putting It All Together in a Design    335
Planning an Operations Manager Deployment    345
Summary    353
Best Practices    354
7  Operations Manager 2012 Implementation and Administration    355
Installing Operations Manager 2012    356
Deploying OpsMgr Agents    373
Monitoring DMZ Servers with Certificates    385
Configuring Operations Manager 2012    393
Administering Operations Manager 2012    403
Backing Up OpsMgr 2012    411
Summary    418
Best Practices    418
8  Using Operations Manager 2012 for Monitoring and Alerting    421
Using OpsMgr Consoles    422
Working with Management Packs    425
Exploring the Operations Manager Management Pack    432
Exploring the Windows Management Pack    440
Exploring the Active Directory Management Pack    451
Exploring the Exchange 2010 Management Pack    466
Exploring the SQL Server Management Pack    478
Exploring the Cross Platform Management Packs    487
Management Pack Templates    491
Custom Management Packs    503
Summary    508
Best Practices    508
9  Using Operations Manager 2012 for Operations and Security Reporting    511
Reporting from OpsMgr    512
Generating and Scheduling Reports    514
OpsMgr 2012 Maintenance Reports    532
Audit Collection Services Reporting    541
Service Level Tracking    548
OpsMgr 2012 Dashboards    554
Publishing Dashboards into SharePoint 2010    561
Summary    565
Best Practices    566
10  Data Protection Manager 2012 Design, Planning, Implementation, and Administration    567
What Is System Center Data Protection Manager?    568
Data Protection Manager Background    572
Data Protection Manager Prerequisites    578
Planning a Data Protection Manager Deployment    580
Deploying Data Protection Manager    587
Completing Required Configuration Tasks    591
Creating Protection Groups    601
Administrating Data Protection Manager    606
Summary    616
Best Practices    617
11  Using Data Protection Manager 2012 to Protect File Systems, Exchange, SQL, and SharePoint    619
Protecting File Servers    620
Protecting System State    622
Protecting Exchange Servers    624
Protecting SQL Servers    635
Protecting SharePoint Farms    643
Protecting Virtualized Environments    654
Summary    660
Best Practices    661
12  Virtual Machine Manager 2012 Design, Planning, and Implementation    663
Understanding Virtual Machine Manager    663
Virtual Machine Manager Background    673
What’s New in System Center Virtual Machine Manager 2012    677
Virtual Machine Manager Prerequisites    678
Planning a Virtual Machine Manager Deployment    682
Deploying Virtual Machine Manager    687
Summary    700
Best Practices    701
13  Managing a Hyper-V Environment with Virtual Machine Manager 2012    703
Understanding the VMM Private Cloud    704
Using the VMM Management Interfaces    707
Understanding Virtual Machine Conversions    716
Managing VMM User Roles    729
Deploying Virtual Machines    740
Migrating Virtual Machines    747
Understanding and Implementing Server App-V    753
Summary    758
Best Practices    759
14  Service Manager 2012 Design, Planning, and Implementation    761
What’s New in Service Manager 2012    762
Explaining How Service Manager Works    763
Service Manager Design Parameters    769
Putting It All Together in a Service Manager Design    775
Planning a Service Manager Deployment    783
Deploying Service Manager    791
Deploying Service Manager Connectors    805
Backing Up Service Manager 2012    814
Summary    817
Best Practices    817
15  Using Service Manager 2012 for Incident Tracking and Help Desk Support    819
Incidents and Problems    819
Configuring Incident Settings    821
Service Manager Notifications    830
Creating New Incidents    836
Working with Incidents    846
Configuring Problem Settings    856
Working with Problems    859
Incident and Problem Reports    863
Summary    869
Best Practices    870
16  Using Service Manager 2012 for Service Offerings and Change Control Management    871
Service Manager 2012 and the Infrastructure Optimization Model    871
Service Offerings and Request Offerings in SM 2012    872
Release Management in SM 2012    882
Change Requests and Activities    885
Configuring Change Settings    887
Change Management Templates and Workflows    889
Initiating Change Requests    892
Working with and Approving Change Requests    896
Implementing Change Requests    903
Managing Configuration Items    910
Working with Change, Activity, and Configuration Management Reports    914
Summary    919
Best Practices    920
17  System Center Orchestrator 2012 Design, Planning, and Implementation    921
Overview of System Center Orchestrator    921
History of System Center Orchestrator    924
System Center Orchestrator 2012 Installation Prerequisites    924
Orchestrator Security Planning    926
Installing System Center Orchestrator 2012 on a Single Server    928
Installing System Center Orchestrator 2012 on Separate Systems    933
Additional Tasks Following Orchestrator Installation    939
Getting Familiar with the Orchestrator 2012 Management Consoles    942
Installing Integration Packs    949
Designing and Using Runbooks    952
Runbook Permissions    967
Summary    967
Best Practices    968
Index    969

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020