SCCM discovery methods | Types of Microsoft SCCM discovery methods


What are SCCM Discovery Methods?

SCCM is required to find gadgets before it can handle them. It’s not compulsory to find PCs, on the off chance that you physically install the customer, it will show up in the console and it tends to be executed properly. The issue is that on the off chance that you have a thousand PCs, it tends to be a particular interaction. By utilizing Active Directory System Discovery, every one of your PCs will appear in the console, from that point you can decide to install the customer utilizing different SCCM techniques. Obviously in the event that you require data about your client and gatherings, you have to design User and Group discovery, it’s the best way to acquire this data SCCM. 

Why SCCM discovery methods?

The discovery recognizes PC and client assets that you can handle utilizing Configuration Manager. It can likewise find the organization framework in your environment. Discovery makes a discovery data record (DDR) for each found item and stores this data in the SCCM data set. At the point when a resource is found the data about the asset is placed in a document that is alluded to as a DDR. DDRs are handled by site servers and get into the SCCM database. From that point they are repeated by database replication with all destinations. 

Get ahead in your career by learning SCCM through hkrtrainings Microsoft SCCM online course

Types of SCCM Discovery Methods

There are six types of Discovery Methods that can be arranged. Every one focuses on a particular item type (Computers, Groups, Users, Active Directory) : 

1. Active Directory System Discovery

Finds PCs in your association from indicated areas in Active Directory. To push the SCCM customer to the PCs, the resources should be found first. You can indicate to find just PCs which have signed on to the area in a given timeframe. This choice is valuable to avoid old PC accounts from Active Directory. You likewise have the choice to get custom Active Directory Attributes. This is helpful if your association stores custom data in AD.

  • Open the SCCM Console
  • Go to Administration / Hierarchy Configuration / Discovery Methods
  • Right-Click Active Directory System Discovery and choose Properties

Active Directory System Discovery

  • You can enable the method by analysing Enable Active Directory System Discovery on the General tab.
  • Click the Star icon shown and choose the Active Directory container which you need to incorporate in the discovery process.

Active Directory container

  • Choose the frequency on which you require the discovery to occur on the Poling Schedule tab.
  • A 7 day cycle with a 5 minutes delta interval is usually applicable in most conditions.

Poling Schedule tab

  • You can choose custom ascribes to incorporate during discovery on the Active Directory Attribute tab. 
  • This is helpful on the off chance that you have custom information in the Active Directory that you need to use in SCCM. 

Active Directory Attribute

  • You can choose to find just records which have logged or refreshed their passwords since a particular number of days, on the Options tab. 
  • This is valuable if your Active Directory isn’t perfect. Utilize this to find great records.

Options tab

Check out here for frequently asked sccm interview questions & answers

SCCM Training

  • Master Your Craft
  • Lifetime LMS & Faculty Access
  • 24/7 online expert support
  • Real-world & Project Based Learning

2. SCCM Active Directory Group Discovery

Discovers groups from indicated areas in Active Directory. The discovery cycle finds local, worldwide or general security gatherings. At the point when you arrange the Group discovery you have the alternative to find the participation of distribution teams. With the Active Directory Group Discovery you can likewise find the PCs that have signed in to the space in a given timeframe. When found, you can utilize data for example, to make organization dependent on Active Directory groups. Be cautious while arranging this strategy : If you find a group that includes a PC object that isn’t found in Active Directory System Discovery, the PC will be found. On the off chance that automatic customer push is empowered, this could prompt undesirable customers PCs. 

To find resources utilising this methods :

  • Open the SCCM Console
  • Go to Hierarchy Configuration /Administration / Discovery Methods
  • Right-Click Active Directory Group Discovery and choose Properties.

 Discovery Methods

  • You can enable the method by analysing Enable Active Directory Group Discovery on the General tab.
  • Click on the Add button on the bottom to include a particular location or a specific group.
  • If you discover a group which includes a computer object which is NOT discovered in Active Directory System Discovery, the computer would be discovered.

General tab

  • Choose the frequency on which you require the discovery to occur on the Poling Schedule tab.
  • A 7 day cycle with a 5 minutes delta interval is usually applicable in most conditions.

 Poling Schedule tab

  • You can choose to find just records which have logged or refreshed their passwords since a particular number of days, on the Options tab. 
  • This is valuable if your Active Directory isn’t perfect. Utilize this to find great records.

the Options tab

3. Configuration Manager Active Directory User Discovery

Discovery process finds client accounts from determined areas in Active Directory. You additionally have the choice to bring custom Active Directory Attributes. This is valuable if your association stores custom data in AD about your clients. When found, you can utilize group data for instance to make client based arrangements. 

To find resources using this methods :

  • Open the SCCM Console
  • Go to Administration / Hierarchy Configuration / Discovery Methods
  • Right-Click Active Directory User Discovery and Choose Properties

Configuration Manager Active Directory User Discovery

  • You can enable the method by analysing Enable Active Directory User Discovery on the General tab.
  • Select the Star icon and choose the Active Directory container which you need to include in the discovery process.

Active Directory User Discovery

  • Choose the frequency on which you require the discovery to occur on the Poling Schedule tab.
  • A 7 day cycle with a 5 minutes delta interval is usually applicable in most conditions.

Enable Active Directory User Discovery

  • You can choose custom attributes to incorporate during discovery on the Active Directory Attribute tab.
  • It is useful if you have custom data in Active Directory which you need to utilise in SCCM.

delta interval

If you want to Explore more about sccm? then read our article SCCM Tutorial !

HKR Trainings Logo

Subscribe to our YouTube channel to get new updates..!

4. Active Directory Forest Discovery

Finds Active Directory subnets and sites, and makes Configuration Manager limits for each site and subnet from the forests that have been arranged for revelation. Utilizing this discovery strategy you can naturally make the Active Directory or IP subnet limits which are inside the discovered Active Directory Forests. It is valuable in the event that you have various AD Site and Subnet, rather than making them manually, utilize this technique to do the work for you. 

To find assets utilizing this methods :

  • Open the SCCM Console
  • Go to Administration / Hierarchy Configuration / Discovery Methods
  • Right-Click Active Directory Forest Discovery and select Properties

custom attributes to incorporate

  • You can enable the method by analysing Enable Active Directory Forest Discovery on the General tab.
  • Choose the required options

Active Directory Forest Discovery

5. Heartbeat Discovery

HeartBeat Discovery operates on each customer and to refresh their discovery records in the database. The records (Discovery Data Records) are shipped off the Management Point in a determined span of time. Heartbeat Discovery can drive disclosure of a PC as another resource record, or could also repopulate the information record of a PC which was erased from the database. 

HeartBeat Discovery is empowered and planned to execute each 7 days. To find resources utilizing this strategies : 

  • Open the SCCM Console
  • Move to Hierarchy Configuration /  Administration / Discovery Methods
  • Right click the Heartbeat Discovery and choose Properties

Heartbeat Discovery

  • You can enable the technique by analysing Enable Heartbeat Discovery on the General tab.
  • Ensure that this setting is empowered and that the timetable operates less much of the time than the Clear Install Flag maintenance task.

Install Flag maintenance task

6. Network Discovery

The Network Discovery scans your network framework for network gadgets which includes an IP address. It can look through the spaces, SNMP tools and DHCP servers to discover the resources. It likewise finds gadgets that probably won’t be located by other discovery strategies. This incorporates printers, bridges, and routers. 

SCCM Training

Weekday / Weekend Batches

 Conclusion

Configuration Manager utilizes an assortment of discovery strategies to assemble resource data and every one of the discovery techniques accumulates data about various items. You ought to comprehend its accessible configurations and restrictions to proficiently utilize a discovery technique. Hope this article assists you in understanding more about SCCM discovery methods.

Related articles:



Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Last updated on
Jun 12, 2024

What is VPC in AWS – Table of Content

What is Amazon VPC?

Amazon Virtual Private Cloud or Amazon VPC is an AWS service that provides you with a separate area of the cloud. Having this separate area, you can launch your own defined AWS services in a virtual network.

Here, in VPC you have complete control of your virtual environment which includes IP address range, the configuration of route tables, the creation of subnets, and network gateways. Also, the network configurations can be easily customised for the Amazon VPC. 

Like all the other AWS services, Amazon VPC provides top-notch security. It has multiple layers of security which include network access control lists and security groups to manage the Amazon EC2 instances’ access in each subnet.

We have the perfect professional AWS Training course for you. Enroll now!

Now to understand the entire scenario of VPC, even better, let’s have a look at the architecture of VPC.

Architecture of VPC

Architecture of VPC

  • The above picture shows the architecture of VPC, so there’s an outer region and inside that outer region there’s an Internet Gateway and Virtual Private Gateway.
  • Internet Gateway and Virtual Private Gateway are what help in the connection with the VPC. These connections pass through the router which directs the coming traffic to the router table.
  • The two Router Tables then direct the traffic to Network ACL, which is like a firewall for security purposes. 
  • The Network ACLs can either accept or deny the roles. Also, the IP Address can be blocked on the Network ACL. 
  • The respective Network ACL signals to their respective security groups to access lines against the EC2 Instance. 
  • Now, there are two subnets – Public Subnet and Private Subnet. 
    As the name suggests, in the public subnet internet can be accessed by the EC2, while in the private subnet EC2 instance cannot be accessed through the internet. 
  • There’s also a process called “Jump Boxes” which enables you to connect the EC2 Instances (the public subnet can be connected to the private subnet’s instance).

Now, when we know about the architecture of VPC, it’s time to understand the different elements of VPC. 

Top 50+ Frequently Asked AWS Interview Questions !

AWS Training

  • Master Your Craft
  • Lifetime LMS & Faculty Access
  • 24/7 online expert support
  • Real-world & Project Based Learning

Elements of Amazon VPC.

The elements included in the Amazon VPC are:

IPv6 and IPv4 address blocks

VPC IP addresses use CIDR (Classless Interdomain Routing) IPv6 and IPv4 blocks to define their ranges. Primary and secondary CIDR blocks can be added to the VPC if the secondary Classless Interdomain Routing block comes from a similar address range as the primary block.

Subnet Creation

The EC2 Instance that is launched runs inside a specific VPC subnet. And, each subnet’s CIDR as a subset of the VPC Classless Interdomain Routing block. Every subnet separates its respective traffic from all the other VPC subnet traffic. It must be noted that a subnet can only have one CIDR block and different subnets are to be designated to handle diverse traffic types. 

Route Tables

Route Tables are actually the rule book that decides how much network traffic must be directed inside the VPC and subnets. A default route table is created by the VPC called the main route table. And, this main route table has an automatic association with other VPC subnets. 

There are two options – either the main route table can be updated and used to direct network traffic OR a new route table can be created for individual subnet traffic.

Internet Connectivity

Each VPC configuration is able to host one Internet Gateway and hence provide NAT or the Network Address Translation services using a NAT Gateway or NAT instances.

Elastic IP Addresses (EIPs)

Elastic IP Addresses or EIPs are IPv4 addresses permanently allocated to the user’s AWS account. The EIPs enable public internet access to the following:

  • An instance
  • Elastic Network Interface or ENI
  • Miscellaneous services that require a public IP address.
Network/Subnet Security

In the VPC architecture, you had seen there’s something called the “security group,” so VPCs use those security groups to give protection for instances. These security groups are referred to as firewalls by AWS.  

Additional Networking Services

There are several more services provided by a VPC. The VPC can also be used to configure the following: 

  • Virtual Private Networks or VPNs
  • Direct connectivity between VPCs or VPC peering
  • Gateways
  • Mirror sessions

Now, when you are well versed with the basics of Amazon VPC, let’s have a look at what you can do with a VPC.

HKR Trainings Logo

Subscribe to our YouTube channel to get new updates..!

What can you do with a VPC?

  • Instances can be launched in a subnet that you choose. 
  • Custom IP address ranges can be assigned in each subnet
  • Route Tables can be configured between subnets.
  • An internet gateway can be created and attached to your VPC. 
  • You get excellent security over your AWS resources.
  • Security groups can be assigned to individual instances.

Conclusion 
By now you would be well versed with everything you need to begin with Amazon Virtual Cloud. In the beginning, we learnt the basics of Amazon VPC and continued to learn its architecture. While at the architecture of VPC, we saw different parts of it and saw each of them briefly. 

Once you knew all the architectural parts, you saw the elements of VPC and studied them in brief. Finally, after learning about different elements and several other basics of Amazon Virtual Cloud, we saw the applicability of the same.

AWS Training

Weekday / Weekend Batches

 Related Articles:



Source link