Configuration Manager 2012 Documentation Library
Documentation Home
System Center 2012 Configuration Manager
Getting Started with System Center 2012 Configuration Manager
Introduction to Configuration Manager
What’s New in Configuration Manager
What’s New in Configuration Manager SP1
What’s New in the Documentation for Configuration Manager
Fundamentals of Configuration Manager
Supported Configurations for Configuration Manager
Frequently Asked Questions for Configuration Manager
Accessibility Features of Configuration Manager
Information and Support for Configuration Manager
Site Administration for System Center 2012 Configuration Manager
Introduction to Site Administration in Configuration Manager
Planning for Configuration Manager Sites and Hierarchy
Supported Configurations for Configuration Manager
Interoperability between Different Versions of Configuration Manager
Planning for Hardware Configurations for Configuration Manager
PKI Certificate Requirements for Configuration Manager
Identify Your Network and Business Requirements to Plan a Configuration Manager Hierarchy
Determine Whether to Migrate Configuration Manager 2007 Data to System Center 2012 Configuration Manager
Determine Whether to Extend the Active Directory Schema for Configuration Manager
Planning for Sites and Hierarchies in Configuration Manager
Planning to Upgrade System Center 2012 Configuration Manager
Planning for Publishing of Site Data to Active Directory Domain Services
Planning for Discovery in Configuration Manager
Planning for Client Settings in Configuration Manager
Planning for Site Systems in Configuration Manager
Planning for Cloud Services in Configuration Manager
Planning for Content Management in Configuration Manager
Planning for Boundaries and Boundary Groups in Configuration Manager
Planning for Security in Configuration Manager
Planning for Communications in Configuration Manager
Planning for Site Operations in Configuration Manager
Planning for High Availability with Configuration Manager
Example Scenarios for Planning a Simplified Hierarchy with Configuration Manager
Configuring Sites and Hierarchies in Configuration Manager
Prepare the Windows Environment for Configuration Manager
Install Sites and Create a Hierarchy for Configuration Manager
Expand a Stand-Alone Primary Site into a Hierarchy with a Central Administration Site
Upgrade Configuration Manager to a New Service Pack
Configure Sites and the Hierarchy in Configuration Manager
Configuring Security for Configuration Manager
Configuring Discovery in Configuration Manager
Configuring Sites to Publish to Active Directory Domain Services
Configuring Settings for Client Management in Configuration Manager
Configuring Distribution Point Groups in Configuration Manager
Configuring Boundaries and Boundary Groups in Configuration Manager
Configuring Alerts in Configuration Manager
Configuring Site Components in Configuration Manager
Install and Configure Site System Roles for Configuration Manager
Configure Database Replicas for Management Points
Migrate Data from Configuration Manager 2007 to Configuration Manager
Operations and Maintenance for Site Administration in Configuration Manager
Manage Site and Hierarchy Configurations
Configure the Status System for Configuration Manager
Configure Maintenance Tasks for Configuration Manager Sites
Monitor Configuration Manager Sites and Hierarchy
Manage Cloud Services for Configuration Manager
Backup and Recovery in Configuration Manager
Update System Center 2012 Configuration Manager
Reporting in Configuration Manager
Introduction to Reporting in Configuration Manager
Planning for Reporting in Configuration Manager
Prerequisites for Reporting in Configuration Manager
Best Practices for Reporting
Configuring Reporting in Configuration Manager
Operations and Maintenance for Reporting in Configuration Manager
Creating Custom Report Models in SQL Server Reporting Services
Security and Privacy for Reporting in Configuration Manager
Technical Reference for Reporting in Configuration Manager
Security and Privacy for Site Administration in Configuration Manager
Technical Reference for Site Administration in Configuration Manager
Technical Reference for Site Communications in Configuration Manager
Technical Reference for Ports Used in Configuration Manager
Technical Reference for Log Files in Configuration Manager
Technical Reference for Accounts Used in Configuration Manager
Technical Reference for Cryptographic Controls Used in Configuration Manager
Technical Reference for Language Packs in Configuration Manager
Technical Reference for Unicode and ASCII Support in Configuration Manager
Technical Reference for the Hierarchy Maintenance Tool (Preinst.exe) in Configuration Manager
Technical Reference for the Prerequisite Checker in Configuration Manager
Technical Reference for International Support in Configuration Manager
Step-by-Step Example Deployment of the PKI Certificates for Configuration Manager: Windows Server 2008 Certification Authority
Migrating Hierarchies in System Center 2012 Configuration Manager
Introduction to Migration in System Center 2012 Configuration Manager
Planning for Migration to System Center 2012 Configuration Manager
Prerequisites for Migration in System Center 2012 Configuration Manager
Administrator Checklists for Migration Planning in System Center 2012 Configuration Manager
Determine Whether to Migrate Configuration Manager 2007 to System Center 2012 Configuration Manager
Planning a Source Hierarchy Strategy in System Center 2012 Configuration Manager
Planning a Migration Job Strategy in System Center 2012 Configuration Manager
Planning a Client Migration Strategy in System Center 2012 Configuration Manager
Planning a Content Deployment Migration Strategy in System Center 2012 Configuration Manager
Planning for the Migration of Configuration Manager Objects to System Center 2012 Configuration Manager
Planning to Monitor Migration Activity in System Center 2012 Configuration Manager
Planning to Complete Migration in System Center 2012 Configuration Manager
Configuring Source Hierarchies and Source Sites for Migration to System Center 2012 Configuration Manager
Operations for Migrating to System Center 2012 Configuration Manager
Security and Privacy for Migration to System Center 2012 Configuration Manager
Deploying Clients for System Center 2012 Configuration Manager
Introduction to Client Deployment in Configuration Manager
Planning for Client Deployment in Configuration Manager
Prerequisites for Windows Client Deployment in Configuration Manager
Best Practices for Client Deployment in Configuration Manager
Determine How to Manage Mobile Devices in Configuration Manager
Planning for Client Deployment for Linux and UNIX Servers
Determine the Site System Roles for Client Deployment in Configuration Manager
Determine the Client Installation Method to Use for Windows Computers in Configuration Manager
Determine Whether to Block Clients in Configuration Manager
Configuring Client Deployment in Configuration Manager
How to Configure Client Communication Port Numbers in Configuration Manager
How to Configure Client Computers to Find Management Points by using DNS Publishing in Configuration Manager
How to Prevent the Client Software from Installing on Specific Computers in Configuration Manager
How to Configure Client Settings in Configuration Manager
How to Install Clients on Windows-Based Computers in Configuration Manager
How to Assign Clients to a Site in Configuration Manager
How to Install Clients on Mac Computers in Configuration Manager
How to Install Clients on Linux and UNIX Computers in Configuration Manager
How to Install Clients on Mobile Devices and Enroll Them by Using Configuration Manager
How to Configure Client Status in Configuration Manager
Operations and Maintenance for Client Deployment in Configuration Manager
How to Manage Mobile Devices by Using the Exchange Server Connector in Configuration Manager
How to Manage Mobile Devices by Using the Windows Intune Connector in Configuration Manager
How to Manage Clients in Configuration Manager
How to Monitor Clients in Configuration Manager
How to Manage Linux and UNIX Clients in Configuration Manager
How to Monitor Linux and UNIX Clients in Configuration Manager
Security and Privacy for Clients in Configuration Manager
Technical Reference for Client Deployment in Configuration Manager
About Client Settings in Configuration Manager
About Client Installation Properties in Configuration Manager
About Client Installation Properties Published to Active Directory Domain Services in Configuration Manager
Administrator Checklist: Deploying Clients in Configuration Manager
Windows Firewall and Port Settings for Client Computers in Configuration Manager
Example Scenario for Deploying and Managing Configuration Manager Clients on Windows Embedded Devices
Technical Reference for the Configuration Manager Client for Linux and UNIX
Administrator Checklist: Configuring Configuration Manager to Manage Mobile Devices by Using Windows Intune
Deploying Software and Operating Systems in System Center 2012 Configuration Manager
Content Management in Configuration Manager
Introduction to Content Management in Configuration Manager
Planning for Content Management in Configuration Manager
Prerequisites for Content Management in Configuration Manager
Best Practices for Content Management in Configuration Manager
Configuring Content Management in Configuration Manager
Operations and Maintenance for Content Management in Configuration Manager
How to Prestage Content to Distribution Points Located on a Site Server
Security and Privacy for Content Management in Configuration Manager
Technical Reference for Content Management in Configuration Manager
Application Management in Configuration Manager
Introduction to Application Management in Configuration Manager
Planning for Application Management in Configuration Manager
Prerequisites for Application Management in Configuration Manager
Best Practices for Application Management in Configuration Manager
Planning to Deploy Windows 8 Apps in Configuration Manager
Planning for App-V Integration with Configuration Manager
Configuring the Application Catalog and Software Center in Configuration Manager
Operations and Maintenance for Application Management in Configuration Manager
How to Create Applications in Configuration Manager
How to Create Deployment Types in Configuration Manager
How to Create and Deploy Applications for Mac Computers in Configuration Manager
How to Deploy Applications in Configuration Manager
How to Simulate an Application Deployment in Configuration Manager
How to Manage Applications and Deployment Types in Configuration Manager
How to Manage Application Revisions in Configuration Manager
How to Use Application Supersedence in Configuration Manager
How to Uninstall Applications in Configuration Manager
How to Monitor Applications in Configuration Manager
How to Manage User Device Affinity in Configuration Manager
How to Create Global Conditions in Configuration Manager
How to Create App-V Virtual Environments in Configuration Manager
Packages and Programs in Configuration Manager
How to Create Packages and Programs in Configuration Manager
How to Deploy Packages and Programs in Configuration Manager
How to Monitor Packages and Programs in Configuration Manager
How to Manage Packages and Programs in Configuration Manager
Deploying Software to Linux and UNIX Servers in Configuration Manager
Security and Privacy for Application Management in Configuration Manager
Technical Reference for Application Management in Configuration Manager
Example Scenario for Managing Applications by Using Configuration Manager
Software Updates in Configuration Manager
Introduction to Software Updates in Configuration Manager
Planning for Software Updates in Configuration Manager
Prerequisites for Software Updates in Configuration Manager
Best Practices for Software Updates in Configuration Manager
Configuring Software Updates in Configuration Manager
How to Configure a Software Update Point to Use Network Load Balancing (NLB) Cluster
How to Determine the Port Settings Used by WSUS
How to Enable CRL Checking for Software Updates
Operations and Maintenance for Software Updates in Configuration Manager
Security and Privacy for Software Updates in Configuration Manager
Technical Reference for Software Updates in Configuration Manager
Technical Reference for the Icons Used for Software Updates
Example Scenario for Using Configuration Manager to Deploy and Monitor the Security Software Updates Released Monthly by Microsoft
Operating System Deployment in Configuration Manager
Introduction to Operating System Deployment in Configuration Manager
Planning How to Deploy Operating Systems in Configuration Manager
Prerequisites For Deploying Operating Systems in Configuration Manager
Supported Operating Systems and Hard Disk Configurations for Operating System Deployment
Determine the Operating System Deployment Method to Use in Configuration Manager
Planning Site System Roles for Operating System Deployments in Configuration Manager
Planning for Deploying Operating System Images in Configuration Manager
Planning for Capturing Operating System Images in Configuration Manager
Planning for Boot Image Deployments in Configuration Manager
Planning a Device Driver Strategy in Configuration Manager
Planning for PXE-Initiated Operating System Deployments in Configuration Manager
Planning a Multicast Strategy in Configuration Manager
Planning for Media Operating System Deployments in Configuration Manager
Planning a Task Sequences Strategy in Configuration Manager
Planning for Operating System Deployments in a NAP-Enabled Environment
Planning for Operating System Deployment Interoperability
Configuring Configuration Manager for Operating System Deployments
How to Manage Operating System Images and Installers in Configuration Manager
How to Manage Boot Images in Configuration Manager
How to Manage the Driver Catalog in Configuration Manager
How to Manage Task Sequences in Configuration Manager
How to Manage the User State in Configuration Manager
How to Manage Unknown Computer Deployments in Configuration Manager
How to Associate Users with a Destination Computer
How to Manage Multicast in Configuration Manager
Operations and Maintenance for Deploying Operating Systems in Configuration Manager
How to Deploy Operating Systems in Configuration Manager
How to Deploy Operating Systems by Using Media in Configuration Manager
How to Deploy Operating Systems by Using PXE in Configuration Manager
How to Deploy Operating Systems to Offline Computers in Configuration Manager
Security and Privacy for Deploying Operating Systems in Configuration Manager
Technical Reference for Deploying Operating Systems in Configuration Manager
Example Scenario for PXE-Initiated Operating System Deployment by Using Configuration Manager
Task Sequence Variables in Configuration Manager
Task Sequence Action Variables in Configuration Manager
Task Sequence Built-in Variables in Configuration Manager
Task Sequence Steps in Configuration Manager
Task Sequence Scenarios in Configuration Manager
How to Provision Windows To Go in Configuration Manager
Prestart Commands for Task Sequence Media in Configuration Manager
How to Create a PXE-Initiated Windows 8 Deployment for UEFI-Based or BIOS-Based Computers in Configuration Manager
Assets and Compliance in System Center 2012 Configuration Manager
Collections in Configuration Manager
Introduction to Collections in Configuration Manager
Planning for Collections in Configuration Manager
Prerequisites for Collections in Configuration Manager
Best Practices for Collections in Configuration Manager
Operations and Maintenance for Collections in Configuration Manager
How to Create Collections in Configuration Manager
How to Manage Collections in Configuration Manager
How to Use Maintenance Windows in Configuration Manager
Security and Privacy for Collections in Configuration Manager
Technical Reference for Collections in Configuration Manager
Queries in Configuration Manager
Introduction to Queries in Configuration Manager
Operations and Maintenance for Queries in Configuration Manager
How to Create Queries in Configuration Manager
How to Manage Queries in Configuration Manager
Security and Privacy for Queries in Configuration Manager
Technical Reference for Queries in Configuration Manager
Inventory in Configuration Manager
Hardware Inventory in Configuration Manager
Introduction to Hardware Inventory in Configuration Manager
Planning for Hardware Inventory in Configuration Manager
Prerequisites for Hardware Inventory in Configuration Manager
Best Practices for Hardware Inventory in Configuration Manager
Configuring Hardware Inventory in Configuration Manager
How to Configure Hardware Inventory in Configuration Manager
How to Extend Hardware Inventory in Configuration Manager
Operations and Maintenance for Hardware Inventory in Configuration Manager
How to Use Resource Explorer to View Hardware Inventory in Configuration Manager
Hardware Inventory for Linux and UNIX in Configuration Manager
Security and Privacy for Hardware Inventory in Configuration Manager
Technical Reference for Hardware Inventory in Configuration Manager
Software Inventory in Configuration Manager
Introduction to Software Inventory in Configuration Manager
Planning for Software Inventory in Configuration Manager
Prerequisites for Software Inventory
Configuring Software Inventory in Configuration Manager
How to Configure Software Inventory in Configuration Manager
How to Exclude Folders from Software Inventory in Configuration Manager
Operations and Maintenance for Software Inventory in Configuration Manager
How to Use Resource Explorer to View Software Inventory in Configuration Manager
Security and Privacy for Software Inventory in Configuration Manager
Technical Reference for Software Inventory in Configuration Manager
Asset Intelligence in Configuration Manager
Introduction to Asset Intelligence in Configuration Manager
Prerequisites for Asset Intelligence in Configuration Manager
Configuring Asset Intelligence in Configuration Manager
Operations for Asset Intelligence in Configuration Manager
Security and Privacy for Asset Intelligence in Configuration Manager
Technical Reference for Asset Intelligence in Configuration Manager
Example Validation State Transitions for Asset Intelligence
Example Asset Intelligence General License Import File
Power Management in Configuration Manager
Introduction to Power Management in Configuration Manager
Planning for Power Management in Configuration Manager
Prerequisites for Power Management in Configuration Manager
Best Practices for Power Management in Configuration Manager
Administrator Checklist for Power Management in Configuration Manager
Configuring Power Management in Configuration Manager
Operations and Maintenance for Power Management in Configuration Manager
How to Monitor and Plan for Power Management in Configuration Manager
How to Create and Apply Power Plans in Configuration Manager
Security and Privacy for Power Management in Configuration Manager
Technical Reference for Power Management in Configuration Manager
Remote Control in Configuration Manager
Introduction to Remote Control in Configuration Manager
Planning for Remote Control in Configuration Manager
Prerequisites for Remote Control in Configuration Manager
Configuring Remote Control in Configuration Manager
Operations and Maintenance for Remote Control in Configuration Manager
How to Remotely Administer a Client Computer by Using Configuration Manager
How to Audit Remote Control Usage in Configuration Manager
Security and Privacy for Remote Control in Configuration Manager
Technical Reference for Remote Control in Configuration Manager
Keyboard Shortcuts for the Remote Control Viewer in Configuration Manager
Software Metering in Configuration Manager
Introduction to Software Metering in Configuration Manager
Planning for Software Metering in Configuration Manager
Prerequisites for Software Metering in Configuration Manager
Configuring Software Metering in Configuration Manager
How to Configure Software Metering in Configuration Manager
Operations and Maintenance for Software Metering in Configuration Manager
How to Create Software Metering Rules in Configuration Manager
How to Configure Automatic Software Metering Rule Generation in Configuration Manager
How to Manage Software Metering Rules in Configuration Manager
How to Monitor Software Metering in Configuration Manager
Security and Privacy for Software Metering in Configuration Manager
Technical Reference for Software Metering in Configuration Manager
Example Scenario for Software Metering in Configuration Manager
Maintenance Tasks for Software Metering in Configuration Manager
Out of Band Management in Configuration Manager
Introduction to Out of Band Management in Configuration Manager
Planning for Out of Band Management in Configuration Manager
Prerequisites for Out of Band Management in Configuration Manager
Best Practices for Out of Band Management in Configuration Manager
Determine Whether to Use a Customized Firmware Image From Your Computer Manufacturer
Configuring Out of Band Management in Configuration Manager
Administrator Checklist: Out of Band Management in Configuration Manager
How to Provision and Configure AMT-Based Computers in Configuration Manager
How to Manage AMT Provisioning Information in Configuration Manager
Operations and Maintenance for Out of Band Management in Configuration Manager
How to Manage AMT-based Computers Out of Band in Configuration Manager
How to Manage the Audit Log for AMT-Based Computers in Configuration Manager
How to Monitor Out of Band Management in Configuration Manager
Security and Privacy for Out of Band Management in Configuration Manager
Technical Reference for Out of Band Management in Configuration Manager
About the AMT Status and Out of Band Management in Configuration Manager
Example Scenario for Implementing Out of Band Management in Configuration Manager
Example Scenarios for Using Out of Band Management in Configuration Manager
AMT Provisioning Process for Out of Band Management in Configuration Manager
Compliance Settings in Configuration Manager
Introduction to Compliance Settings in Configuration Manager
Planning for Compliance Settings in Configuration Manager
Prerequisites for Compliance Settings in Configuration Manager
Configuring Compliance Settings in Configuration Manager
Operations and Maintenance for Compliance Settings in Configuration Manager
How to Create Windows Configuration Items for Compliance Settings in Configuration Manager
How to Create Mobile Device Configuration Items for Compliance Settings in Configuration Manager
How to Create Mac Computer Configuration Items in Configuration Manager
How to Create Configuration Baselines for Compliance Settings in Configuration Manager
How to Create Child Configuration Items in Configuration Manager
How to Deploy Configuration Baselines in Configuration Manager
How to Manage Configuration Baselines for Compliance Settings in Configuration Manager
How to Manage Configuration Items for Compliance Settings in Configuration Manager
How to Monitor for Compliance Settings in Configuration Manager
How to Import Configuration Data in Configuration Manager
How to Create User Data and Profiles Configuration Items in Configuration Manager
Security and Privacy for Compliance Settings in Configuration Manager
Technical Reference for Compliance Settings in Configuration Manager
Example Scenario for Compliance Settings in Configuration Manager
Example Scenario for User Data and Profiles Management in Configuration Manager
Endpoint Protection in Configuration Manager
Introduction to Endpoint Protection in Configuration Manager
Planning for Endpoint Protection in Configuration Manager
Prerequisites for Endpoint Protection in Configuration Manager
Best Practices for Endpoint Protection in Configuration Manager
Administrator Workflow for Endpoint Protection in Configuration Manager
Configuring Endpoint Protection in Configuration Manager
How to Configure Endpoint Protection in Configuration Manager
How to Configure Alerts for Endpoint Protection in Configuration Manager
How to Configure Definition Updates for Endpoint Protection in Configuration Manager
Operations and Maintenance for Endpoint Protection in Configuration Manager
How to Create and Deploy Antimalware Policies for Endpoint Protection in Configuration Manager
How to Create and Deploy Windows Firewall Policies for Endpoint Protection in Configuration Manager
How to Manage Antimalware Policies and Firewall Settings for Endpoint Protection in Configuration Manager
How to Monitor Endpoint Protection in Configuration Manager
Security and Privacy for Endpoint Protection in Configuration Manager
Technical Reference for Endpoint Protection in Configuration Manager
Example Scenario for Protecting Computers From Malware by Configuring Endpoint Protection in Configuration Manager
Security and Privacy for System Center 2012 Configuration Manager
Planning for Security in Configuration Manager
Configuring Security for Configuration Manager
Configuration Manager Privacy Statement
Configuration Manager Privacy Statement - Mobile Device Addendum
Security Best Practices and Privacy Information for Configuration Manager
Security and Privacy for Site Administration in Configuration Manager
Security and Privacy for Reporting in Configuration Manager
Security and Privacy for Migration to System Center 2012 Configuration Manager
Security and Privacy for Clients in Configuration Manager
Security and Privacy for Content Management in Configuration Manager
Security and Privacy for Application Management in Configuration Manager
Security and Privacy for Software Updates in Configuration Manager
Security and Privacy for Deploying Operating Systems in Configuration Manager
Security and Privacy for Collections in Configuration Manager
Security and Privacy for Queries in Configuration Manager
Security and Privacy for Hardware Inventory in Configuration Manager
Security and Privacy for Software Inventory in Configuration Manager
Security and Privacy for Asset Intelligence in Configuration Manager
Security and Privacy for Power Management in Configuration Manager
Security and Privacy for Remote Control in Configuration Manager
Security and Privacy for Software Metering in Configuration Manager
Security and Privacy for Out of Band Management in Configuration Manager
Security and Privacy for Compliance Settings in Configuration Manager
Security and Privacy for Endpoint Protection in Configuration Manager
Technical Reference for Cryptographic Controls Used in Configuration Manager
Technical Reference for Ports Used in Configuration Manager
Technical Reference for Accounts Used in Configuration Manager
Scenarios and Solutions Using System Center 2012 Configuration Manager
Example Scenarios for Planning a Simplified Hierarchy with Configuration Manager
Example Scenario for Deploying and Managing Configuration Manager Clients on Windows Embedded Devices
How to Manage Mobile Devices by Using the Windows Intune Connector in Configuration Manager
Example Scenario for Managing Applications by Using Configuration Manager
Example Scenario for Using Configuration Manager to Deploy and Monitor the Security Software Updates Released Monthly by Microsoft
Example Scenario for PXE-Initiated Operating System Deployment by Using Configuration Manager
How to Provision Windows To Go in Configuration Manager
How to Create a PXE-Initiated Windows 8 Deployment for UEFI-Based or BIOS-Based Computers in Configuration Manager
Example Scenario for Software Metering in Configuration Manager
Example Scenario for Implementing Out of Band Management in Configuration Manager
Example Scenarios for Using Out of Band Management in Configuration Manager
Example Scenario for Compliance Settings in Configuration Manager
Example Scenario for User Data and Profiles Management in Configuration Manager
Example Scenario for Protecting Computers From Malware by Configuring Endpoint Protection in Configuration Manager
Glossary for System Center 2012 Configuration Manager
Documentation Home