Course
You can manage computer and user resources within a System Center 2012 R2 Configuration Manager environment only when Configuration Manager has discovered...
You can manage computer and user resources within a System Center 2012 R2 Configuration Manager environment only when Configuration Manager has discovered these resources and assigned them to a site. In this module, you will learn about boundaries and boundary groups that help create logical network locations that contain discovered computers based upon IP addresses or Active Directory® sites. You can use these boundary configurations for client site assignment and for helping clients find content from associated site systems. You also will learn about the discovery processes that you can use to identify computers, users, and the network infrastructure within your network environment. You then will learn about collections that support logical groupings of resources. You use these groupings for management tasks such as targeting software updates, managing applications, or deploying compliance settings to resources.
Additionally, you will learn to implement role-based administration by using security roles, security scopes, and collections. Role-based administration determines both the tasks that an administrative user can perform, and the objects and resources on which the user can perform those tasks.
Before attending this course, students must have system administrator–level working knowledge of:
This course is intended for Configuration Manager administrators who are responsible for configuring and managing one or more System Center 2012 Configuration Manager sites and all supporting systems. They have one to three years of experience supporting multiple desktop and server computers running the Windows Server operating system in medium to large enterprise organizations. Administrators may have previous Configuration Manager experience, or be new to the product.