SCCM Client Installation | How To Install Configuration Manager


SCCM Client Installation – Table of Content

Introduction to SCCM

Microsoft System Center Configuration Manager (SCCM), a modern product from Microsoft, is designed to streamline the management and updating of software products. SCCM stands out for its highly adaptable, automated approach to deploying and configuring various devices, including desktops and laptops, starting from any initial state, such as bare-metal deployments. This tool empowers IT admins by offering an end-to-end solution for Windows installation and configuration. It simplifies the delivery of apps, patches, and security updates through a unified distribution system. 

A standout feature of SCCM is its capacity to manage many computers running various OS like Windows, Linux, UNIX, and iOS, demonstrating its versatility in diverse IT environments.

Get ahead in your career by learning SCCM through hkrtrainings Microsoft SCCM Online Course

SCCM Client Installation

SCCM: Installation Guide

The installation process for SCCM 2012 R2 is outlined in a series of steps crafted to simplify the user experience. The process begins with setting up the primary server and accompanying SQL server, typically housed on the same device.

Step1: Prepare active directory for configuration manager

a) Create the system management container:

Please navigate to the domain controller, load the ADSI file, and edit it. In the system OU, create a new object named ‘System Management.’

Complete the wizard, closing the ADSI editor. Grant control of the system to the configuration system server for the new system configurator object.

Create the system management container

Choose the container and click next.

container

Enter the name of system management and click next

system management

b)Complete the wizard browser and close the ADSI editor.

Now pass the system control to the configuration system server to the newly created system configurator object, this can be done by using the navigation, choose the folder -> existing object -> create the new objects.

wizard browser

ADSI

Check all the boxes (use the right tick) and complete the browser wizard.

Step2: Extend the system configuration Schema:

Navigate to \SMSSetup\bin\x64, accessing the folder controlling the system schema rules. Ensure the account used is a member of the AD admins’ group. Run Extadsch.exe as an admin and verify the successful extension in the Extadsch.log file.

system configuration Schema

Log into Extadsch.log file-> it will take you to the root, C: Drive. Check for the entry then you will notify with a message as “successfully extended to the active schema director”.

<02-02-2013 23:21:22=””> successfully extended the schema directory.

To check the activity of extadsch.exe -> go to the directory file “ConfigMgr_ad_schema.idf” that is located in the same folder in the system.

Step 3: Install the Site server prerequisites:

Essential SCCM site server management components include BITS, Remote Differential Compression, .NET Framework 3.5, and IIS components.

a. BITS

b. Access the remote differential compression

c. .NET framework 3.5

d. IIS components.

Step 4: Install the window assessments and Deploy kits (Windows ADK):

Download ADK 8.1 and follow the installation steps, including running the adksetup.exe file, accepting licenses, and choosing components like User State Migration Tools and Windows Deployment Tools.

a. Run the executable file adksetup.exe file -> accept the license agreements -> it will download and install the.Net framework 4.5.

Install the window assessments

Now restart the system when you accessed,

restart

If you have any doubts on SCCM, then get them clarified from SCCM Industry experts on our SCCM Tutorial !

SCCM Training

  • Master Your Craft
  • Lifetime LMS & Faculty Access
  • 24/7 online expert support
  • Real-world & Project Based Learning

After that system setup will resume-> accept the default location-> click next.

system setup

Select to join the CEIP -> click next

join the CEIP

Now accept the license agreements

Install the component and click the “install” button

  • User state migration tools
  • Windows deployment tools
  • Windows pre installment environment (windows PE).

install

installl

Once they complete the installation and click close.

installation and click close

HKR Trainings Logo

Subscribe to our YouTube channel to get new updates..!

Step 5: Install the SQL server:

For the SCCM database, install SQL Server 2012 by running the setup.exe file and following the installation wizard.

Run the executable file -> setup.exe

Install stand-alone SQL database server

Install the SQL server

Click OK-> it will open the new browser;

open the new browser

Install the product key -> run in evaluation mode -> click next

product key

Accept the SQL license agreement -> click next -> add any product updates-> click next -> now it’s time to choose the installation features -> click next

                                   Check out here for frequently asked  SCCM Interview Questions & Answers

Set SQL to run with adding an appropriate domain name, network service, and local system account.

Step6: Install the SCCM R12:

Execute the splash.hta file and follow the guided installation process. It includes selecting the primary site installation, entering the license key, and configuring SQL database server settings.

1. Run the splash.hta -> click install

Install the SCCM R12

Now click next

click next

Choose to install the primary site-> click next

primary site

Enter the license key->click next

Now accept the license key -> click next

license key

SCCM Training

Weekday / Weekend Batches

 Accept the pre-required license agreement->click next

 license agreement

Create any file solder to store the installation updates and Store the SCCM executable file in any folder-> click next

SCCM executable file

Updates will download -> installation begins-> select any language for the SCCM server-> click next.

Choose any client language-> click next-> enter the 3 digit site code and add the description.

Choose to run SCCM installation as a stand-alone -> click next

SCCM installation as a stand-alone

Click yes to accept -> select the default database server configuration-> click next.

Now specify the path to store the SQL database server and log files-> click next to set the current server -> set the configure the communication on each site system role”-> next install both MP and DP -> site server -> SCCM will begin the installation-> close the browser when it completes.

Launch the SCCM console -> make sure that all the database entries you have done are right -> start monitoring the workspace -> site status.

Launch the SCCM console

This finishes the installation process of SCCM.

Functionalities of SCCM:

The updated version of SCCM software adds much functionality to the applications. Let me explain them one by one;

Site infrastructure:

Supports Microsoft Office 365 file updates and features keyboard shortcuts for easy navigation within the configuration manager.Under the site infrastructure we can see the following features;

  • Site infrastructure’s client peer cache will support the updating of files for Microsoft office 365 and distributed express installed files for configuration of Microsoft Windows 10.
  • With the addition to this, there are few functionalities available such as,
  1. Ctrl + D -> this keyword indicates the detailed panel
  2. Ctrl +I -> this keyword indicates the breadcrumb bar
  3. Ctrl + L -> this keyword indicates the search field
  4. Ctrl + M -> this keyword indicates the main central panel
  5. Ctrl + T -> this indicates the top node in the navigation panel.
  • This central administration site and primary configuration sites both include the configuration manager updates. Rest tolls will be used for downloading or replicating problems.
  • With the help of this update, the configuration console manager can be measured and display them on the user interface applications.

Related article : SCCM Deployment

Compliance settings:

Include various device settings adjustments, such as password encryption, name modification, and storage settings.

The settings are as follows;

  • Password -> device encryption
  • Device ->
  1. Modification of device name
  2. Modification of region settings (only desktops)
  3. Language setting modifications
  4. Modification of power and sleep settings
  5. Modification of system time and language settings
  • Storage -> it uses only the private storage
  1. Auto-update available for the apps
  2. Available store-oriented app launch
Application management:

It facilitates script deployment for client device management, including PowerShell script integration and result analysis.In this application management configuration setting, users can deploy the scripts to manage the client devices in the form of packages and programming codes. The following actions included are,

  • Users can run the script on-premises managed windows and windows client PCs.Here no need to deploy the scripts, they only run in real-time client devices.
  • Importing of PowerShell scripts to the system configuration manager
  • Edit the whole script from the system configuration console.
  • Need to mark the scripts whether it is approved or denied
  • Finally, examine the results which will return the script in the configuration manager console.
Operating system deployment:
  • Collapsible task sequence groups: this deployment version will expand and collapse the task management, sequence groups. Here user can expand or collapse all the groups or individual groups at once.
  • Hardware inventory collects the secured boot information: this hardware inventory collects information such as client enabled boot data. This information will be stored in the SMS_firmware class and enabled in the hardware inventory by default.

Software updates

Improvements to express the update download time:

Features improvements in express update download times, Microsoft Surface driver updates management and configurations for Windows Update for Business deferral policies.

Manage Microsoft Surface driver updates:

Here user can use the configuration manager to manage any Microsoft software driver updates.

Configure Windows Update for Business deferral policies:

Now you can configure the whole deferral policies for windows 10 quality features and also quality updates for the windows 10 software devices. This will manages the windows updates directly which will be used for the business later. You can manage the business referral policies in any newly updated system as follows; Software library -> Windows 10 servicing.

Improved user notifications for Microsoft office 365 Updates:

Improvements will be made to leverage the Microsoft office click-to-run user experience when a client installs new office 365b software updates. This update should consist of pop-up and in-app notifications.

Reporting:

Integrates with Windows Analytics for insights into the software environment.

Using windows Analytics with configuration manager:

Windows analytics is nothing but a collection of solutions that run on the Microsoft operational management suite. This solution allows users to form any kind of insight into the current state of the software environment. Devices in the software environment also report the telemetry data. The data can be accessed through the operations management suite web portals.

Mobile device management:

Updates to Android devices for work-sharing configuration management:

Includes updates for Android work profile settings and enrollment restrictions for Android and iOS devices.

Android and IOS enrollment restrictions:

Here users can be allowed to specify the enrollment in any personal Android or IOS devices. With the Android devices, there is a limit restriction on enrollment but with the IOS devices, users can easily block the enrollment with the help of Apple device enrollment settings.

Protect devices:

Newly software update includes the specific trust files and data folders options in Device Guard policy settings. And also advanced capabilities are added to this device guard policy management.

Advantages of SCCM:

There are a lot of advantages of using SCCM, let me explain them one by one,

  • Empowers User Productivity: It allows users to access necessary devices and applications while ensuring corporate compliance and control.
  • Unified Infrastructure: It offers a single platform for managing physical, virtual, and mobile devices.
  • Efficient Change and Configuration Management: It provides tools for seamlessly managing software changes and configurations on the Microsoft platform.
  • Rapid Software and Update Deployment: It facilitates quick and cost-effective distribution of software apps and updates, including security patches.
  • Comprehensive Hardware and Software Inventory Management: It streamlines hardware and software inventory collection and management.
  • Operating System Deployment: It supports efficient deployment of operating systems across various devices.
  • Software Usage Metering: It monitors and reports software usage, aiding and resource management.
  • Affordable IT Management Solution: It offers a cost-effective solution for comprehensive IT management.
  • Database Growth Tracking: Enables monitoring of SQL Server database growth for optimized database management.
  • Remote Computer Control: It allows remote control of computers for troubleshooting and support.
  • Enhanced IT Environment Visibility: It provides greater insight into the IT infrastructure, improving decision-making and management.

Conclusion

In this blog, I have tried my best to explain the key factors involved in installing SCCM software and its advantage. SCCM is a popular Microsoft product; SCCM is used to update system management. The complete SCCM installation guide enables you to become a master in this. This blog may help a few of those who are Windows server professionals, and also for Microsoft social community forums.

Related articles:



Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Last updated on
Jan 19, 2024

Cyber Security VS Software Engineering – Table of Content

What is Cyber Security?

The cyber security industry is a fascinating field in the IT sector and apt for those who are ready to accept the challenges. The term cyber security can be defined as it is a type of IT application that designs and implements secure network solutions specially designed to act as a shield against hackers, persistence attacks, and any cyber-attacks.

Cyber security engineers are those who involve in designing and implementing security solutions to defend against various threats, cyber-attacks, and malware attacks. They are also involved in testing and monitoring the system devices to make us assure that all the system devices are up-to-date and ready to defend against any type of attack.

Wish to make a career in the world of Cyber Security? Start with Cyber Security Training!

What is Software Engineering?

Software engineering is also known as a Software architect or programming engineer, which involves analyzing the specific needs and creating the tools that are required to build software-related applications as per your or your client’s requirement.  The software engineer should have knowledge of software design, computer programming skills, such as python, Java, JS, Ruby, and other operating system knowledge like UNIX, and LINUX.  

Software developers are those who create software applications from already existing software applications whereas Software engineers are those who create the frameworks on the new software product which you are going to build.

Cyber Security Training

  • Master Your Craft
  • Lifetime LMS & Faculty Access
  • 24/7 online expert support
  • Real-world & Project Based Learning

Cyber security VS Software Engineering:

In this section, we explain the major differences between cyber security and software engineer as per a few categories. Let’s start;

1. Cyber security VS software engineering: Roles and responsibilities

 First, start with knowing the roles and responsibilities of aby cyber security engineer:

  •   Cyber security engineers or we can call them cyber security analysts they involve in implementing and creating plans, security portals to protect the computer network integrity, mobile devices from any kind of malware attacks or ransom attacks.
  • They are responsible for creating software and updating the computer hardware devices to implement security-related plans.
  • The information security analyst must involve in the constant monitoring of the networking devices to have a security breach.
  • They must involve in creating security incident responses to help minimize the damage caused by any type of malware attack.
  • Experienced cyber security professionals involved in communicating the plans or protocols to work enough to detect the intruders.
Software engineering roles and responsibilities:
  • Software engineers are responsible for building, maintaining, evaluating, and testing the new software.
  • They should have a deep understanding of information systems,  information technology, and programming. 
  • Sometimes they involve in developing the applications and should have a piece of knowledge in mathematics, and algorithms.

2. Cyber security and software engineering skills and qualifications:

Cyber Security Skills and qualifications:

  • Candidates must hold a bachelor’s degree in computer science, and IT system engineering.
  • They should possess a minimum of two years of work experience in cybersecurity-related roles such as incident detection, responses, and forensics. 
  • Should have experience with the functionalities, operations, and maintenance of firewalls and various forms of endpoint system device security.
  • Must have proficiency in languages and tools such as C++, Java, Node, Python, Go, Power shells, and Go.
  • They should have the ability to work in fast-paced work environments, often under some work pressure.
  • Posses the right eye for details and must have outstanding problem-solving skills.
  • Must have a piece of up-to-date knowledge of cyber security industries, trends, and hacker tactics.
Software engineers skills and qualifications:
  • Strong knowledge in engineering, computer science, and mathematics.
  • Should have strong experience in software development.
  • Should have proven programming experience (various programming language skills).
  • Experience in using different kinds of tools and techniques the software development.
  • Creative and adaptive at problem-solving.
  • Deep knowledge of concepts and algorithms.
  • Strong coding knowledge is a plus.

3. Cyber security and software engineers salary:

Cyber security engineer salary:

According to ziprecruiters.com, an average salary for any cyber security engineer earns $49, 750 and a software security architect earns $135,800.

Software engineer salary:

According to indeed.com, an average salary for any software engineer earns $50, 000 and an experienced software architect earns $111, 430.

If you have any doubts on Cyber Security, then get them clarified from Industry experts on our Cyber Security Tutorial !

HKR Trainings Logo

Subscribe to our YouTube channel to get new updates..!

4. Cyber security and software engineers: career path

Cyber Security Career path

In the cyber security field, you will get to see various kinds of specializations. Let us know them;

  • Cyber security analyst: should have a piece of strong knowledge of analytical and thinking. They must be creative problem solvers.
  • Cyber security engineers: they should have experience in different operating systems and strong experience in various database platforms.
  • Cyber security managers or administrators: should have a strong experience with firewalls, and a basic understanding of proxy servers, packet shapers, and load balancers.\
  • Cyber security consultants: must have an in-depth knowledge of IT security measures and protocols, and methods to detect intruders. Must have experience in finding and repairing the damages. 
  • Information security Analyst: Experience in providing IT support, and have an organized or in-depth knowledge of intrusion detection systems. Effective problem solver, organized, and detail-oriented.
Software engineer career path:

Below are the few niches where you can get specialized;

  • System engineers: should have a basic understanding of principles and techniques. They must be able to use databases and MYSQL.
  • Full-stack engineer: must have a strong coding knowledge, able to manage both front-end and back-end development tasks. Understanding of system protocols and techniques. 
  • Software engineers: a deep understanding of the developments, coding, building, and deploying applications. Should be proficient with various and multiple coding knowledge. Must have hands-on experience in software-oriented architecture. Able to work independently and must involve in team building. 
  • IT security specialists: must have an in-depth knowledge of IT security tools, anti-virus software management, content filtering, and firewalls. Should have experience with coding, and be able to identify any malicious attacks.
  • Cloud engineers: able to create roadmaps that take you into the storage capacity, and should be a problem solver. Should be able to communicate with all the levels of employees.
  • Take your career to next level in Cyber Security. Enroll now to get Cyber Security Training In London!

5. Cyber security and software engineers: Certification lists

Cyber security engineer certification lists:

Below is the list of major cyber security engineer certifications:

  • COBIT 5 control objectives for information and related technologies.
  • COBIT 5 Professional certification.
  • CompTIA security+certification -SYO-601.
  • CISA certification and training
  • CND – certified network defender
  • CHFI – Computer hacking forensic investigator certification
    CISSP certification
Software engineer certification lists:

Below is the list of major software engineer certification lists:

  • Certified secure software lifecycle professionals.
  • Certified software development professionals
  • Certified software engineer
  • CIW web development professionals
  • C programmer certification
  • C++ certified associate
  • MYSQL Oracle certification
  • Microsoft fundamental certifications 
  • aws associate certification
  • Salesforce fundamental certifications

Which career is best for you?

Here we are going to list out a few reasons to choose the best career;

You should consider cyber security if;

  • You intend to get a 4-years of degree
  • You can handle anxiety or work pressure
  • You can communicate verbally and orally.
  • You enjoy solving puzzles
  • You can multi-task 

You should consider software engineer if;

  • You like to learn things hands-on (real-time).
  • You have a genuine interest in programs or coding
  • You are a self-learner 
  • You are a good team handler 
  • You are unique, creative, and innovative.

frequently asked Cyber security Interview questions and Answers !!

Cyber Security Training

Weekday / Weekend Batches

Final words:

It is very difficult to say which one is the best without determining the parameters for that. If you are someone who has a desire to get a college degree, then we must say the cyber security profession is the easy choice for you. Suppose if you are more interested in self-learning, then cyber security would be a difficult field for you. If you are someone who has a desire to learn to code, then you can choose the software engineering field. But both careers require mathematical knowledge, and how the algorithm works. So our advice is to choose the right profession based on your priority, and educational background. We must say it’s a wise decision to take! In this Cybersecurity VS software engineer post, we have mentioned important differentiations based on a few parameters. Hope you found this information helpful.

Related Articles:

  1. 1.Cyber Security VS Data Science
  2. 2.Cyber security Technologies
  3. Quickbooks Interview Questions



Source link