Skip Ribbon Commands
Skip to main content

MS-20696 - Managing Enterprise Devices and Apps using System Center Configuration Manager

Price:

Duration: 5 Days

Audience:

Level:

Technology:

Delivery Method:

Software Assurance Value:

Microsoft CPE:

Course Information

Course Description

​Get expert instruction and hands-on practice configuring and managing clients and devices using Microsoft System Center 2012 R2 Configuration Manager, Windows Intune, and its associated site systems. In this five-day course, you will learn day-to-day management tasks including how to manage software client health, hardware and software inventory, applications. and integration with Windows Intune. You will also learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. This course is also intended for individuals who are interested in taking exam 70-696.

Course Objectives

​After completing this course, students will be able to:

  • Manage desktops and devices in the enterprise.
  • Prepare the infrastructure to support desktop and device management.
  • Deploy and manage the Configuration Manager client.
  • Manage inventory for PCs and applications.
  • Distribute and manage content used for deployments.
  • Deploy and manage applications.
  • Manage mobile devices by integrating Windows Intune with Configuration Manager.
  • Maintain software updates for managed PCs.
  • Implement Endpoint Protection for managed PCs.
  • Manage compliance and secure data access.
  • Manage client status, power management, and remote administration.
  • Maintain Configuration Manager sites and site systems.

Course Audience

​This course is intended for experienced IT Professionals, typically described as Enterprise Desktop Administrator (EDA). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium/large/enterprise organizations. A significant portion of this audience uses or intends to use System Center 2012 R2 Configuration Manager and Windows Intune to manage and deploy PCs, devices, and applications. The Enterprise Desktop Administrator also supports either domain joined or non-domain joined Bring Your Own Device (BYOD) scenarios, mobile device management, and secure data access on common platforms, such as Windows 8.x, Windows Phone 8.x, iOS, and Android by using System Center 2012 R2 Configuration Manager with Windows Intune.

Course Outline

​Module 1: Managing Desktops and Devices in the Enterprise 

This module explains the features included in System Center 2012 R2 Configuration Manager and Windows Intune and how you can use these solutions to manage desktops and devices in an enterprise environment. 

Lessons


Systems Management Using Configuration Manager and Windows Intune

Overview of Configuration Manager and Cloud Services Architecture

Overview of the Configuration Manager Administrative Tools

Monitoring and Troubleshooting a Configuration Manager Site

Introduction to Queries and Reports

Lab : Performing Administrative Tasks by Using the Configuration Manager Tools

Searching in the Configuration Manager Console

Using Windows PowerShell with Configuration Manager

Managing Components by Using Configuration Manager Service Manager

Monitoring Site and Component Status

Reviewing Log Files by Using Configuration Manager Trace Log Tool

Lab : Creating Queries and Configuring Reporting Services

Creating Data Queries

Creating Subselect Queries

Configuring a Reporting Services Point

After completing this module, students will be able to:

Explain how using Configuration Manager and Windows Intune addresses the challenges of managing systems and users in today’s enterprise.

Describe the Configuration Manager, Windows Intune, and Microsoft Azure cloud services architecture.

Describe the management tools that you use to perform administrative functions for Configuration Manager and Windows Intune.

Describe the tools that you use to monitor and troubleshoot a Configuration Manager site.

Describe the Configuration Manager queries and reports.

Module 2: Preparing the Infrastructure to Support Desktop and Device Management

This module explains how to prepare the management infrastructure including the configuration of boundary groups, resource discovery, role-based administration, and mobile device management integration with Exchange Server.

Lessons

Configuring Boundaries and Boundary Groups

Configuring Resource Discovery

Configuring the Exchange Server Connector for Mobile Device Management

Configuring User and Device Collections

Configuring Role-Based Administration

Lab : Configuring Boundaries and Resource Discovery

Configuring Boundaries and Boundary Groups

Configuring Active Directory Discovery Methods

Lab : Configuring User and Device Collections

Creating a Device Collection

Creating a User Collection

Configuring a Maintenance Window

Lab : Configuring Role-Based Administration

Configuring a New Scope for Toronto Administrators

Configuring a New Administrative User

After completing this module, students will be able to:

Configure boundaries and boundary groups.

Configure resource discovery.

Configure the Exchange Server Connector for mobile device management.

Configure user and device collections.

Configure role-based administration.

Module 3: Deploying and Managing the Configuration Manager Client

This module explains how to deploy and manage the Configuration Manager client

.Lessons

Overview of the Configuration Manager Client

Deploying the Configuration Manager Client

Managing Client Settings in Configuration Manager

Lab : Deploying the Configuration Manager Client Software

Preparing the Site for Client Installation

Deploying the Configuration Manager Client Software by Using Client Push Installation

Lab : Managing Client Settings

Configuring Client Settings

After completing this module, students will be able to:

Describe the requirements and considerations for installing the Configuration Manager client.

Deploy the Configuration Manager client.

Manage client settings.

Module 4: Managing Inventory for PCs and Applications

This module explains the inventory collection process and explains how to configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and Software Metering.

Lessons

Overview of Inventory Collection

Configuring Hardware and Software Inventory

Managing Inventory Collection

Configuring Software Metering

Configuring Asset Intelligence

Lab : Configuring and Managing Inventory Collection

Configuring Hardware Inventory

Lab : Configuring Software Metering

Configuring Software Metering

Lab : Configuring and Managing Asset Intelligence

Preparing the Site for Asset Intelligence

Configuring Asset Intelligence

Customizing the Asset Intelligence Catalog

Viewing Asset Intelligence Reports

After completing this module, students will be able to:

Describe inventory collection and identify differences between managing personal and corporate owned devices.

Configure and collect hardware and software inventory.

Manage inventory collection.

Configure and manage Software Metering.

Configure and manageAsset Intelligence.

Module 5: Distributing and Managing Content Used for Deployments

This module explains how to identify and configure the most appropriate method to distribute and manage content used for deployments.

Lessons

Preparing the Infrastructure for Content Management

Distributing and Managing Content on Distribution Points

Lab : Distributing and Managing Content for Deployments

Installing a New Distribution Point

Managing Content Distribution

Implementing Content Prestaging

After completing this module, students will be able to:

Prepare the infrastructure for content management.

Distribute and manage content on distribution points.

Module 6: Deploying and Managing Applications 

This module explains how to distribute, deploy, and monitor applications for managed users and systems. 

Lessons

Overview of Application Management

Creating Applications

Deploying Applications

Managing Applications

Configuring and Deploying Windows Store Apps

Deploying Virtual Applications by Using System Center 2012 R2 Configuration Manager

Lab : Creating and Deploying Applications

Installing and Configuring the Application Catalog Roles

Creating Applications with Requirements

Deploying Applications

Lab : Managing Application Supersedence and Removal

Managing Application Supersedence

Uninstalling the Excel Viewer Application

Lab : Deploying Windows Store Apps by Using System Center 2012 R2 Configuration Manager

Configuring Support for Sideloading Windows Store Apps

Configuring a Windows Store App

Deploying Windows Store Apps to Users

Lab : Deploying Virtual Applications by Using Configuration Manager

Configuring Support for App-V

Creating and Deploying Virtual Applications

After completing this module, students will be able to:

Describe the application management features of Configuration Manager.

Create applications.

Deploy applications.

Manage applications.

Configure and deploy Windows Store apps.

Configure and deploy virtual applications.

Module 7: Managing Mobile Devices by Integrating Windows Intune with Configuration Manager

This module explains how to integrate Windows Intune and System Center 2012 R2 Configuration Manager to manage mobile devices. There is no lab following this module.

Lessons

Overview of Managing Mobile Devices by Using System Center 2012 R2 Configuration Manager

Managing Mobile Devices by Using the Windows Intune Connector

Deploying Applications to Mobile Devices

After completing this module, students will be able to:

Describe mobile device management by using System Center 2012 R2 Configuration Manager.

Configure the Windows Intune connector for Configuration Manager.

Deploy applications to mobile devices.

Module 8: Maintaining Software Updates for Managed PCs 

This module explains how to maintain software updates for PCs managed by Configuration Manager.  

Lessons

Overview of Software Updates

Preparing a Configuration Manager Site for Software Updates

Managing Software Updates

Configuring Automatic Deployment Rules

Monitoring and Troubleshooting Software Updates

Lab : Configuring the Site for Software Updates

Configuring and Synchronizing the Software Update Point

Lab : Deploying and Managing Software Updates

Determining Software Update Compliance

Deploying Software Updates to Clients

Configuring Automatic Deployment Rules

After completing this module, students will be able to:

Describe the software updates process.

Prepare a Configuration Manager site for software updates.

Manage the evaluation and deployment of software updates.

Configure automatic deployment rules.

Monitor and troubleshoot software updates.

Module 9: Implementing Endpoint Protection for Managed PCs

This module explains how to use System Center 2012 R2 Configuration Manager to implement Endpoint Protection.

Lessons

Overview of Endpoint Protection in Configuration Manager

Configuring and Monitoring Endpoint Protection Policies

Lab : Implementing Endpoint Protection

Configuring the Endpoint Protection Point and Client Settings

Configuring and Deploying Endpoint Protection Policies

Monitoring Endpoint Protection

After completing this module, students will be able to:

Describe how Endpoint Protection is used to detect and remediate malware and security vulnerabilities.

Configure, deploy, and manage Endpoint Protection policies.

Module 10: Managing Compliance and Secure Data Access

This module explains how to manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.

Lessons

Overview of Compliance Settings

Configuring Compliance Settings

Viewing Compliance Results

Managing Data Access by Using Profiles

Lab : Managing Compliance Settings

Managing Configuration Items and Baselines

Viewing Compliance Settings and Reports

Configuring Remediation in Compliance Settings

Using Compliance Information to Create Collections

After completing this module, students will be able to:

Describe compliance settings features.

Create and deploy configuration items and baselines.

View compliance results by using reports and log files.

Manage data access by using connection profiles.

Module 11: Managing Client Status, Power Management, and Remote Administration

This module explains how to use Configuration Manager to manage and monitor client activity and health status.

Lessons

Configuring and Monitoring Client Status

Configuring Power Management

Configuring Remote Tools

Lab : Configuring and Monitoring Client Status

Configuring and Monitoring Client Communication and Health Status

Lab : Configuring Power Management Settings

Applying a Power Management Plan

Lab : Configuring Remote Tools

Configuring the Remote Tools Client Settings and Permissions

Managing Desktops by Using Remote Control

After completing this module, students will be able to:

Configure and monitor client status.

Configure power management settings by using Configuration Manager.

Configure remote tools to support client activity.

Module 12: Maintaining Configuration Manager Sites And Site Systems 

This module explains how to configure site maintenance tasks and perform backup and recovery of a site system. 

Lessons

Overview of Configuration Manager 2012 Site Maintenance

Performing Backup and Recovery of a Configuration Manager Site

Lab : Maintaining System Center 2012 R2 Configuration Manager

Configuring Maintenance Tasks in Configuration Manager

Configuring the Site Backup Task

Recovering a Site from a Backup

After completing this module, students will be able to:

Identify Configuration Manager site maintenance tasks.

Back up and recover a Configuration Manager site system.


Course Prerequisites

​In addition to their professional experience, students who attend this training should already have system administrator–level working knowledge of:

  • Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching and addressing.
  • Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
  • Installation, configuration, and troubleshooting for Windows-based personal computers.
  • Basic concepts of public key infrastructure (PKI) security.
  • Basic understanding of scripting and Windows PowerShell syntax.
  • Basic understanding of Windows Server roles and services.

Course Schedule
This course is not scheduled yet.