All client settings in Configuration Manager 2012 are managed from the Client Settings node in the Administration workspace of the Configuration Manager console. A set of default settings is supplied with Configuration Manager. When you modify the default client settings, these settings are applied to all clients in the hierarchy. You can also configure custom client settings, which override the default client settings when you assign these to collections.
Many of the client settings are self-explanatory. Use the following sections for more information about the client settings that might require some information before you configure them:
Client Settings for Devices
Background Intelligent Transfer
Use these client settings to configure Background Intelligent Transfer Service (BITS) bandwidth throttling settings that control the transfer of packets on the network between Configuration Manager 2012 clients and distribution points.
To configure BITS throttling to be always enabled, configure the Throttling window start time to be the same time as the Throttling window end time.
Important |
---|
When you specify these BITS settings they might override BITS settings that are configured by another application. Additionally, if you use Windows Group Policy to configure BITS settings, the settings specified in the Group Policy object will override the BITS settings that you specify by using Configuration Manager 2012. |
Computer Agent
Setting Name | Description |
---|---|
Application Catalog |
Configuration Manager uses this setting to connect users to the Application Catalog from Software Center. You can specify a server that hosts the Application Catalog web site point, specify automatic selection, or specify a URL. If you specify automatic selection, clients make a service location request to the management point, which returns a list of available Application Catalogs in the hierarchy. Clients then select an Application Catalog from the list. Automatic selection provides fault tolerance when you have more than one Application Catalog but this method does not guarantee that the closest server is selected. |
Add Application Catalog website to Internet Explorer trusted sites zone |
If this option is configured as True, the website of the Application Catalog is automatically added to the trusted sites zone in Internet Explorer on clients. If you leave this option as False, users might be prompted for their credentials when they connect to the Application Catalog. |
Organization Name displayed in Software Center |
Type the name that users see in Software Center. This branding information helps users to identify this application as a trusted source. |
Install Permissions |
Configure how users can initiate the installation of software, software updates, and task sequences:
|
Suspend Bitlocker PIN entry on restart |
If the Bitlocker PIN entry is configured on computers, this option can bypass the requirement to enter a PIN when the computer restarts after a software installation.
|
Agent extensions manage the deployment of applications and software updates |
Enable this option only if one of the following conditions apply:
|
PowerShell execution policy |
Hardware Inventory
Setting Name | Description |
---|---|
Maximum custom MIF file size (KB) |
Specify the maximum size, in KB, allowed for each custom MIF file that will be collected from a client during a hardware inventory cycle. You can specify a size between 1 and 5,000 KB. By default, this value is set to 250KB. This setting does not affect the size of the regular hardware inventory data file. |
Hardware inventory classes |
If a custom MIF file is larger than the maximum size allowed, the hardware inventory client agent will move the IDMIF file to the \Badmifs folder. In this case, the custom MIF file is not sent to the site server for processing. |
Collect MIF files |
Use this setting to specify whether to collect Management Information Format (MIF) files from Configuration Manager 2012 clients during hardware inventory. For a MIF file to be collected by hardware inventory, it must be located in the correct location on the client computer. By default, the files should be located as follows:
Collect IDMIF files Adds a new architecture—and attributes and classes—to the Configuration Manager 2012 site database. IDMIF files are used to add information to the site database for objects other than Configuration Manager 2012 clients. Collect NOIDMIF files Extends the hardware inventory by adding attributes and classes to existing architectures on a client. NOIDMIF files are used to extend, or add, new information about existing Configuration Manager 2012 clients to the site database. |
Remote Tools
Setting Name | Description |
---|---|
Manage unsolicited Remote Assistance settings |
When set to True, a user at the client computer does not have to request assistance before Configuration Manager can open a Remote Assistance session. |
Manage solicited Remote Assistance settings |
When set to True, a user at the client computer must first request assistance before Configuration Manager can open a Remote Assistance session. |
Require network level authentication on computers that run Windows Vista operation system or later |
Select this more secure option when you are running the Configuration Manager 2012 console on a computer that is running Windows Vista or later, or you have upgraded the Remote Desktop Protocol (RDP) to a version that supports network level authentication. For more information about using RDP and network level authentication see the help topic What types of Remote Desktop connections should I allow in your Windows documentation. |
User and Device Affinity
Setting Name | Description | ||
---|---|---|---|
Usage based affinity threshold (minutes) |
Specify the number of minutes of usage before a user device affinity is created. |
||
Usage based affinity threshold (over days) |
Specify the number of days over which the usage based affinity threshold is measured.
|
||
Usage based affinity threshold (minutes) |
Specify how often that client computers check and report user device affinity information to the site server. |
||
Allow usage data collected from device to define relationship |
From the drop-down list, select True to enable the site to automatically create user device affinities based on usage. |
Client Settings for Users
Mobile Devices
Setting Name | Description | ||
---|---|---|---|
Mobile device enrollment profile |
Before you can configure this setting, you must first set to True the mobile device user setting Allow users to enroll mobile devices. Then you can click Set Profile to specify a mobile device profile that contains information about the certificate template to use during the enrollment process, the site that contains an enrollment point and enrollment proxy point, and the site that will manage mobile devices after the enrollment.
For more information about how to enroll mobile devices, see How to Enroll Mobile Device Clients in Configuration Manager 2012. |
User and Device Affinity
Setting Name | Description |
---|---|
Allow user to define relationship |
Specify whether users are allowed to identify their own primary devices from the Application Catalog, My Systems tab. |