Chapter 12. Client Management

Now that you have your Configuration Manager (ConfigMgr) environment installed and configured, it is time to begin client management. The context in which the word client is used refers to any system that has the ConfigMgr client installed and configured. A ConfigMgr client can be a workstation or server operating system, or a mobile device or cash register using Windows Embedded systems. ConfigMgr site servers can also (and usually do) have the ConfigMgr client installed.

ConfigMgr clients communicate with the site server via management points (MPs) and proxy management points (PMPs). When a client communicates with a management point, it may be receiving ConfigMgr policy, forwarding inventory information, updating deployment state, or addressing other client details. This chapter discusses how to configure a management point, configure client agents (hardware inventory, software inventory, and other agents), discover and deploy clients, and troubleshoot client problems.

Tip

Check Privacy Issues in Regards to Configuration Manager

Companies (and employees) are becoming more aware of privacy issues every day. Take time to read Microsoft’s documentation on security best practices and privacy information for ConfigMgr features at http://technet.microsoft.com/en-us/library/bb632704.aspx.

Configuring the Management Point

Configure a management point for any site to which you plan to assign clients. Before installing an MP, review the prerequisites discussed in Chapter 8, “Installing Configuration Manager 2007.” Use the following steps to install the management point on a primary site:

  1. In the ConfigMgr console, navigate to Site Management -> Site Database -> Site Management -> <Site Code> <Site Name> -> Site Settings -> Site Systems. Expand Site Systems, right-click the site server, and select New Roles.
  2. The first page of the New Site Role Wizard should already be configured. Click Next and then select the Management Point role.
  3. After clicking Next, configure the MP, an example of which is displayed in Figure 12.1. Specify the following options:

    • Select “Allow devices to use this management point” if you have devices that you want to manage.

    • Select the type of connections to allow from clients—intranet only, Internet only, or both.

    • If you are using a SQL Replica, specify the database information.

    You will need to specify an MP connection account if you cannot configure the management point’s computer account to access content.

    If the MP needs access to a site database in a different domain (regardless of forest), you must use an MP connection account.

    Figure 12.1. Configuring the MP in the New Site Role Wizard

    image
  4. Review the Summary page. Click Next and then Finish to complete the setup.
  5. Review mpsetup.log and mpmsi.log on the ConfigMgr site server to check for any errors.

The process just completed described creating a management point on a primary site server. Depending on the size of your site, you may consider offloading the management point to a second server to remove some of the processes required of your primary site. Chapter 8 includes information on offloading the management point and enabling you to configure the MP to work with a replica of the SQL database for the site.

Configuring Client Agents

You configure client agents to enable specific client features such as hardware inventory, software updates, and software distribution. Client agents are always configured at the primary site level, which means that all clients assigned to that site will receive the same client agent settings. All ConfigMgr clients are assigned to a primary site—although clients may use a secondary site for proxy management points and other client communication, the client agent configuration is from the primary site.

Figure 12.2 displays all the client agents, which are described in the next sections, along with configurations for consideration.

Figure 12.2. ConfigMgr client agents

image

After the client agents are configured, all clients assigned to that site will receive policy to enable (or disable) the appropriate agents. Most agents have a schedule for when they should perform an operation on the client. The “Client Troubleshooting” section covers methods to manually force actions to occur on the client.

Hardware Inventory

To a new ConfigMgr administrator, hardware inventory sounds like collecting specific hardware information for a client. Although true, that is only a small subset of the information you can collect in hardware inventory. Hardware information is collected from Windows Management Instrumentation (WMI) and the Windows Registry (via WMI). Refer to Figure 12.3, which displays the standard hardware inventory queried from a Windows XP Professional client named Tarzan in the SCCMUnleashed domain.

Figure 12.3. Resource Explorer for a Windows XP Professional client

image

As the Resource Explorer in Figure 12.3 shows, ConfigMgr inventories a significant amount of hardware by default, such as network adapters, SCSI controllers, disk drives, and partitions. You also see information such as Add/Remove Programs (software that appears in Add/Remove Programs), Services (Windows services on the inventoried system), and various operating system information. To launch the Resource Explorer, simply right-click a computer object in a collection and select Start -> Resource Explorer.

Once you are introduced to hardware inventory, you will probably find it to be vital information you want to collect in your environment. Perform the following steps to enable hardware inventory:

  1. Right-click Hardware Inventory Client Agent and then select Properties to view the General tab, displayed in Figure 12.4.

    Figure 12.4. The Hardware Inventory Client agent

    image
  2. Simply check the box “Enable hardware inventory on clients” to enable hardware inventory for the site. Most administrators will select the simple schedule for inventory.

  3. The last option on the General tab of Figure 12.4 (Maximum custom MIF file size) is a bit confusing, because it really applies to the settings on the MIF Collection tab. You can specify the maximum size of MIF or NOIDMIF files that the site can process (choose between 1KB and 5,000KB). ConfigMgr moves MIF files that are larger than the specified size to the inboxesauthdataldr.boxadmifs folder. For the MIF file size configuration to be used at all, you must enable at least one of the check boxes on the MIF Collection tab displayed in Figure 12.5.

    Figure 12.5. The MIF Collection tab of the Hardware Inventory Client agent

    image

    Figure 12.5 shows you can collect IDMIF and NOIDMIF files. Both these file types are legacy, and should be avoided if possible. The documentation at http://technet.microsoft.com/en-us/library/cc180618.aspx provides additional information on IDMIF and NOIDMIF files.

Modifying the SMS_Def.mof File

Figure 12.3 shows hardware inventory is configured by default to inventory a significant amount of data. You may find that you need more or less information. Use the SMS_Def.mof file to enable or disable the inventory of specific classes as well as properties within those classes. The SMS_Def.mof file is located in <ConfigMgrInstallPath>inboxesclifiles.srchinv. Make a backup copy of the file, and then edit the original file using a standard text editor such as Windows Notepad.

The following example modifies the SMS_Def.mof file to inventory ConfigMgr http ports configured on the client. This class is disabled by default, as shown in Figure 12.6.

Figure 12.6. Default inventory configuration for Win32Reg_SMSAdvancedClientPorts from SMS_Def.mof

image

To change SMS_Def.mof to inventory the http ports, perform the following steps:

  1. Using Notepad, open SMS_Def.mof, located in <ConfigMgrInstallPath>inboxesclifiles.srchinv.
  2. Notice all the properties of the Win32Reg_AdvancedClientPorts class (InstanceKey, PortName, and HttpsPortName) are configured to report inventory, because SMS_Def.mof specifies the TRUE value for each. However, notice that the class reporting is disabled (the very first line in Figure 12.6 is for class reporting).
  3. To enable reporting, simply change FALSE in the first line of Figure 12.6 to TRUE, as shown in Figure 12.7.

    Figure 12.7. Inventory enabled for Win32Reg_SMSAdvancedClientPorts from SMS_Def.mof

    image

    You must enable reporting of a class to inventory any of its properties. You can disable the inventory of properties within a class by setting the respective TRUE to FALSE.

  4. Save the SMS_Def.mof file, and view Dataldr.log to see ConfigMgr compile the MOF.
  5. Because the SMS_Def.mof is a sitewide setting, copy your new SMS_Def.mof file to the proper location on all primary sites in your hierarchy to enable the modified inventory for each site.

ConfigMgr hardware inventory is very extensible. All data located in WMI or the Windows Registry can be easily collected using ConfigMgr hardware inventory. If the desired data does not currently exist in WMI or the Registry, you can always use ConfigMgr’s software distribution component to run a script or executable on each system to populate the Registry with desired data and then collect it using hardware inventory.

For additional information, Microsoft provides documentation on extending hardware inventory at http://technet.microsoft.com/en-us/library/bb680609.aspx. You may also want to consider purchasing the SCCM Expert’s book Start to Finish Guide to MOF Editing, by Jeff Gilbert, available at http://www.smsexpert.com/MOF/Guide.aspx. This book provides an in-depth look at modifying and customizing hardware inventory.

For information on how SMS_Def.mof and Configuration.mof are used in Configuration Manager 2007, see Chapter 3, “Looking Inside Configuration Manager.”

Tip

Best Practices for Inventory Security

Collecting inventory can expose potential vulnerabilities to attackers. You will want to read Microsoft’s documentation on inventory security best practices and privacy information at http://technet.microsoft.com/en-us/library/bb680795.aspx.

Software Inventory

Software inventory collects information about files and file locations. The General tab for the Software Inventory Client Agent Properties dialog box is very similar to the General tab for hardware inventory, previously described in the “Hardware Inventory” section of this chapter. Enable the software inventory agent, and select to use a simple or custom schedule (review the “Using a Simple Schedule” sidebar). On the Inventory Collection tab, select the file type and path for files to inventory. As Figure 12.8 shows, ConfigMgr 2007 inventories .exe files by default.

Figure 12.8. The Inventory Collection tab of the Software Inventory Client Agent Properties dialog box

image

To add an additional file type, click the orange starburst in Figure 12.8 to open the Inventoried File Properties tab shown in Figure 12.9.

Figure 12.9. Defining a new filename to inventory

image

Figure 12.9 shows a new rule being created to inventory all pre–Access 2007 databases (*.mdb extension) located in the %PUBLIC% path environment variable. Options specified include searching subdirectories and including compressed and encrypted files. Although this example uses a file extension, you can also inventory for an exact filename (budget.mdb) or partial filename (budget*.mdb). The ConfigMgr integrated help provides additional assistance on wildcard usage.

Use the File Collection tab, visible in Figure 12.8, to collect a file (or files) from each client. Click the orange starburst on that page to create a new file collection entry. Figure 12.10 shows a sample file collection entry. Similar to software inventory, file collection allows you to specify an exact filename or use wildcards. You can also specify a specific path, or accept the default that queries all local hard disks for the file. You will also notice that there is a Maximum Size (KB) option—this specifies the maximum size of all files this rule will collect. As an example, if you specified *.ini as the rule, an attempt would be made to collect all .ini files, but if the sum of the size of those files is greater than the Maximum size, none of the files will be collected.

Figure 12.10. Creating a new file collection entry

image

File collection occurs during a scheduled software inventory cycle. Once files are collected, you can use Resource Explorer to view the files.

The last tab of the Software Inventory Client Agent Properties dialog box (Figure 12.8) is Inventory Names. You can use this to help make more sense out of software inventory data. The header properties in files are not always consistent, which often makes reporting of this data confusing. A name is often listed in multiple ways; as an example, Microsoft can be represented as Microsoft Corp., Microsoft Corporation, Microsoft, and so on. Microsoft has already prepopulated some data for Microsoft products to help make inventory more concise, as shown in Figure 12.11.

Figure 12.11. Configuring inventory names

image

Figure 12.11 shows that each name specified in Inventoried Names will be grouped and considered as the display name of Microsoft Corporation. By clicking on the starburst by Display name, you can easily add to this list to group other software as well.

As an example, say you have six different programs from Acme Corporation and notice that different names are inventoried for Manufacturer (Acme Corp., Acme, Acme Corporation, Acme Corp. International, and so on). You can add a new display name of Acme Corporation and then enter each inventoried name into the Inventoried Names section in the Software Inventory Client Agent Properties dialog box. You can perform this same grouping for the Product property by changing the Name type option in Figure 12.11.

Note

More About ConfigMgr Inventory

As discussed in Chapter 2, “Configuration Manager 2007 Overview,” the initial inventory generated by the client is a full inventory, with subsequent inventories reflecting changes only, as deltas. In addition, ConfigMgr’s Asset Intelligence capability, discussed in Chapter 18, “Reporting,” will match collected hardware and software inventory to its catalog of known devices and applications to convert the inventory data into useable information about the assets in your environment.

Advertised Programs

Configuring the Advertised Programs Client agent enables software distribution for the site. Software distribution is one of the core functions of ConfigMgr. Check the first box in Figure 12.12 to enable software distribution.

Figure 12.12. The General tab of the Advertised Programs Client Agent Properties dialog box

image

The three check boxes in the Client Settings frame help you customize software distribution:

Allow user targeted advertisement requests— Check this box if you will target users for advertisements. If you only target computers, clear this check box to reduce policy data transmitted from server to client. This reduces network bandwidth.

New program notification icon opens Add or Remove Programs— This check box is tied to the Notification tab of the Advertised Programs Client agent as well as individual program properties. If you enable client notifications, the user will see a notification in the system tray to indicate that a new optional program is available to install. When this box is checked, if the user clicks the new program notification, Add or Remove Programs opens, allowing the user to select the option to install a program from the network.

Allow virtual application package advertisement— If ConfigMgr 2007 Release 2 (R2) is installed, this check box is visible and you can enable it to support virtual application deployment for the site.

The Notification tab of the Advertised Programs Client agent gives you the ability to display a notification message and play a sound if desired when new programs become available. You can also configure a countdown for when a mandatory advertisement will run.

Computer Client

The Computer Client agent provides many general settings. Figure 12.13 shows the General tab of the Computer Client Agent Properties dialog box. Specify a Network Access Account to allow ConfigMgr clients to access network resources during software distribution and Operating System Deployment (OSD). This should be a low-rights user account, which simply has access to file shares you may require.

Figure 12.13. The General tab of the Computer Client Agent Properties dialog box

image

You also specify the default policy polling interval on this tab. The polling interval is the interval that the ConfigMgr client checks its management point for new or updated client policy (including software update deployments and software distribution). Depending on your environment, you may have reason to increase or decrease this interval:

• You may consider increasing the polling interval if advertisements and update deployments are not updated frequently and there is no demand for immediate availability.

• If there is high demand for immediate availability of new programs, you may want to decrease the polling interval. Decreasing the interval will cause additional load on your management point. If in doubt, leave the default of every 60 minutes, and change it later if required.

You can also modify the polling interval on a per-collection basis if desired.

The final option on the General tab is configuring the state message reporting cycle (in minutes). Software Updates deployment, task sequence advertisements, and Desired Configuration Management (DCM) use state messages to send state information to the ConfigMgr site. During these operations, the client may create several state messages. Leave the default of 15 minutes, and extend this interval if you start to receive backlogs of state messages.

The Customization tab of the Computer Client Agent Properties dialog box allows you to add customized branding to Software Updates deployments. This can provide a better user experience, and helps your end users know that updates are being deployed by your Information Technology (IT) organization.

The Reminders tab allows you to configure the interval for system tray balloon notifications for software updates, mandatory software distributions, and task sequence advertisements. Gently remind users of possible disruptions to their schedule, and allow them to install mandatory distributions in advance of deadlines when possible.

Configure the BITS tab to manage client communications and the maximum transfer rates for each client. As shown in Figure 12.14, BITS (Background Intelligent Transfer Service) throttling can be configured three different ways:

Not configured— No throttling is managed using ConfigMgr.

Apply to branch distribution points only— This setting will only configure throttling for branch DPs, allowing you to control the bandwidth used by the branch DP when copying source files from its parent site.

Apply to branch distribution points and all clients— Just as the description implies, this setting will control BITS throttling for all ConfigMgr client agents.

Figure 12.14. The BITS tab of the Computer Client Agent Properties dialog box

image

As you can see in Figure 12.14, you specify a throttling window start and end time, as well as the transfer rate during that window. You can set the maximum transfer rate during the throttling window between 0 and 9999 Kbps.

Note

Group Policy Settings Supersede ConfigMgr Settings

Any group policy settings configured to manage BITS will override ConfigMgr settings.

You can also check the box to allow BITS downloads outside the throttling window, and specify the maximum transfer rate outside the window. This gives you the flexibility to restrict transfers during peak hours of network traffic, and then relax your transfer rules during off-peak hours, thus allowing the branch distribution point (and all other clients, if desired) to download content faster from the ConfigMgr site.

The Restart tab of the Computer Client Agent Properties dialog box allows you to specify how much notice a user receives before a restart occurs.

Desired Configuration Management

Simply check the box to enable Desired Configuration Management. By default, the compliance evaluation schedule will be a simple schedule of every 7 days. Similar to configuring hardware inventory, you can create a custom schedule if desired. Chapter 16, “Desired Configuration Management,” provides additional information on DCM.

Mobile Devices

Mobile Device Client Agent Properties is your one-stop-shop to configure those mobile devices that ConfigMgr will manage. From this single dialog box, you define the polling interval, inventory properties, software distribution, and file collection. Figure 12.15 displays the default configuration of the Mobile Device Client agent. The article at http://technet.microsoft.com/en-us/library/bb693474.aspx provides more information about managing mobile devices with ConfigMgr.

Figure 12.15. The Mobile Device Client agent

image

The mobile client performs operations similar to the ConfigMgr client. Table 12.1 lists several differences to consider.

Table 12.1. Mobile Client Nuances

image

Remote Tools

You enable the Remote Tools Client agent to connect to remote systems so you can control the user’s desktop. Figure 12.16 displays the General tab of the Remote Tools Client Agent Properties dialog box.

Figure 12.16. The Remote Tools Client Agent Properties dialog box

image

Check the first box to enable Remote Tools. Use the configuration settings on the General tab to manage the level of access. Some companies prefer not to ask for permission for remotely accessing clients; other companies require that a user is asked for permission before granting remote access.

You can grant rights to users and Active Directory groups to use remote control on a sitewide level or on a collection level. For example, you could grant the Server Operations group Remote Control rights to a collection containing servers, and grant the Service Desk group Remote Control rights to a collection containing workstations. Chapter 20, “Security and Delegation in Configuration Manager 2007,” contains additional information regarding Remote Tools security.

Use the Notification tab to configure if and how you will notify an end user a remote control session is active. This setting applies only to Remote Tools.

You can also control the Remote Assistance and Remote Desktop settings of ConfigMgr clients from the respective tab on the Remote Tools Client Agent Properties dialog box. The settings you configure are sitewide, and they override any local policy configured on the client. Domain policy takes precedence over these settings.

Note

About Remote Tools in ConfigMgr 2007

ConfigMgr has a new version of the Remote Tools Client agent that uses the Microsoft RDP protocol. This is the same protocol that supports Remote Desktop and Remote Assistance. All ConfigMgr-supported operating systems support the RDP protocol except Windows 2000 operating systems. ConfigMgr uses an updated version of the SMS 2003 Remote Tools Client agent on Windows 2000 operating systems in order to support remote control.

The biggest advantage to the new version of Remote Tools (for Windows XP, Windows Server 2003, and newer) is that it is more secure. Unfortunately, due to the enhanced security, you also lose the functionality to manipulate the Ctrl+Alt+Delete screen. For Windows 2000, you still have this functionality by clicking the gold key on the toolbar after initiating a Remote Tools session.

Network Access Protection

Enable the check box on the General tab of the Network Access Protection Client Agent Properties dialog box to configure Network Access Protection (NAP). On the Evaluation tab, specify the frequency of NAP reevaluation after the client has successfully connected to the network. You can also force a fresh scan for each evaluation instead of allowing clients to offer a cached Statement of Health, as displayed in Figure 12.17.

Figure 12.17. The Evaluation tab of the Network Access Protection Client Agent Properties dialog box

image

Note

Statement of Health, Cached or Fresh?

You may be trying to determine whether you should enable the check box to force a fresh scan for each evaluation. This option is added for environments that must ensure a fresh compliance scan is performed at every evaluation cycle. Although this option may be needed for some environments, requiring a new Statement of Health to be generated at each scan can be resource intensive, and may take a few minutes to complete on a client. Although forcing a fresh scan for each evaluation is more secure, it will also create a slower user experience, because the user may not be able to access corporate network resources until the evaluation completes.

For more information, review these Microsoft documents:

Software Metering

Use software metering to monitor and collect software usage data on ConfigMgr clients. Once this is enabled, you can identify users who use a certain application, the peak usage times of the application, and more.

The default schedule collects data from each client every 7 days. After enabling the agent, right-click the Software Metering node in the ConfigMgr console and then select Properties, as shown in Figure 12.18.

Figure 12.18. Software Metering Properties dialog box

image

The Data Retention property in Figure 12.18 specifies how many days the data obtained from the metering rules will be stored in the database. The 90-day default setting should be sufficient, unless you plan to trend usage data for over 3 months. (When using Asset Intelligence, you will need to enable software metering to identify and report on various assets. This is discussed in Chapter 18.)

Enable the check box to auto-create metering rules from recent usage inventory data. The rules ConfigMgr creates require that you enable them. The two additional settings in this frame allow you to configure the requirements for auto-creating rules. By default, rules are auto-created when an executable runs on 10% of the computers in the site, unless the total number of rules for the site exceeds 100. To view rules, simply click the Software Metering node. To enable a rule, right-click a disabled rule and select Enable. By allowing ConfigMgr to auto-create metering rules, you will get a better idea of the software that is installed on a large number of systems in your environment, and have the ability to easily enable metering for the software.

A classic example of using this feature is to find a large number of systems with software such as Microsoft Visio installed. When you see this new rule, you enable it, and from software metering web reports, you find that only 20% of the systems that have the software installed use it on a regular basis. You can now use this information to support the removal of the licensed application on nearly 80% of the installation base, thus reducing your software costs.

To create a new rule, right-click the Software Metering node and select New -> Software Metering Rule to launch the New Software Metering Rule Wizard, as shown in Figure 12.19.

Figure 12.19. The New Software Metering Rule Wizard

image

Figure 12.19 shows a basic rule to meter Microsoft Office Word. Specify the name of the rule and the exact filename (no wildcards). You can manually enter the filename, or you can click the Browse button, navigate to the file, and select it to populate the details automatically on this page. Alternatively, you can specify the original filename, obtained by reading the filename from the header of the file. You can enter a version number to meter a specific version, or use an asterisk to inventory all versions.

Tip

Do Not Leave the Version Property Blank in the New Software Metering Rule Wizard

Leaving the Version property blank results in only metering where the file version is blank in the file header. You may encounter a file in this situation, but not normally.

The default language in the wizard is English. If you are uncertain whether the file you desire to meter will have a consistent language (or if it doesn’t have a language at all), select -Any- from the dropdown. Specify the site code that this rule applies to, and determine whether you want to apply the rule to all child sites of the specified site code.

Tip

Information About Software Metering Privacy

Metering data is encrypted during transfer to the management point but is not stored as encrypted in the site database. Additional information regarding software metering privacy is available at http://technet.microsoft.com/en-us/library/bb680486.aspx.

Software Updates

Configure the Software Updates Client agent to leverage one of the most popular (and most important) features of ConfigMgr 2007—patch management.

Note

Activate the Software Update Point

You must have an active software update point (SUP) in the ConfigMgr site in order to use the Software Updates Client agent. Chapter 8 and Chapter 15, “Patch Management,” contain information about enabling an active SUP.

Simply enable the check box on the General tab for the default configuration of the Software Updates Client agent, as shown in Figure 12.20.

Figure 12.20. The Software Updates Client Agent Properties dialog box

image

You can then choose for the scan to run a simple or custom schedule. The “Using a Simple Schedule” sidebar earlier in this chapter discusses choosing a simple or custom schedule. On the Update Installation tab, you can choose the client to install all mandatory deployments, even if a deployment has a deadline in the future. In this situation, you have multiple deployments targeting a system, with multiple deadlines. If you enable this check box, all mandatory updates will be deployed when the first deadline is reached. This helps to eliminate multiple reboots, and provides a better end-user experience. You can also choose to hide all display notifications from end users if desired—this is a sitewide setting, meaning all Software Updates notifications will be hidden from the user. To hide notifications on a per-deployment basis, modify the properties of the desired deployment. The Deployment Re-evaluation tab allows you to configure enforcement of a patch that was uninstalled. By default, the client will reevaluate every 7 days to ensure compliance. Chapter 15 includes information about patch management.

Client Discovery

With the agents configured, it is time to begin discovering potential clients. Before you enable client discovery, verify that Client Push Installation is configured properly. If you have Client Push enabled and run a system discovery, you will immediately begin to install the ConfigMgr client on all systems assigned to the site (based on site boundaries). Client Push is not a requirement for discovery. It is suggested you first use the Client Push Installation Wizard to install clients, and then enable Client Push. The “Client Deployment” section of this chapter provides additional information about Client Push and the Client Push Installation Wizard.

Two common settings will appear through most discovery methods:

Recursive— When enabled, this specifies that the discovery method searches child objects.

Include Groups— Discovers objects within groups. When this is enabled, you will probably discover more objects, but this also increases the likelihood of discovering the same object more than once.

Another common element between most discovery methods is the Polling Schedule tab. Use this tab to create a recurring schedule. You can also enable the check box to run the discovery as soon as possible.

Active Directory System Group Discovery

Active Directory (AD) System Group Discovery is a discovery method that polls the domain controller for System Group objects in the domain or Lightweight Directory Access Protocol (LDAP) path specified on a schedule configured by the ConfigMgr administrator. Here are the default group account attributes returned by Active Directory System Group Discovery:

• Organizational Unit

• Global Groups

• Universal Groups

• Nested Groups

• Nonsecurity Groups

AD System Group Discovery will only discover these attributes for systems that have previously been discovered by some other method (AD System Discovery, Heartbeat Discovery). After enabling AD System Group Discovery, click the starburst to configure the desired container to search. As displayed in Figure 12.21, you have the ability to select the local domain or local namespace or use a custom LDAP or GC query.

Figure 12.21. Active Directory System Group Discovery

image

Review the log file adsysgrp.log for detailed information when the discovery method executes.

Active Directory Security Group Discovery

Active Directory Security Group Discovery is a discovery method that polls the domain controller for Security Group objects in the domain or LDAP path, based on a schedule configured by the ConfigMgr administrator.

Configuring this discovery method is very similar to configuring AD System Group Discovery. AD Security Group Discovery will only discover these attributes for systems previously discovered by some other method (AD System Discovery, Heartbeat Discovery). Specify the container to discover, and determine if you want to discover recursively, and within groups. Finally, set a polling interval. Review the adsgdis.log file for detailed information when the discovery method executes.

Active Directory System Discovery

Active Directory System Discovery is the key discovery method used to create data discovery records (DDRs) for computers. DDRs contain data such as operating system (OS) name and version, Internet Protocol (IP) addresses and subnets, and AD site names. You can use these DDRs to target installations for client deployment. Active Directory System Discovery is agentless, and you can use it to discover what is in your environment before installing client agents on computers. This capability gives the administrator an understanding of the network infrastructure and deployment challenges in advance.

Configuring this discovery method is very similar to configuring AD System Group Discovery. Specify the container to discover, and determine if you want to discover recursively, and within groups. Finally, set a polling interval.

If you used Systems Management Server (SMS) 2003, you will also notice a new tab named Active Directory Attribute. This tab allows you to add more Active Directory attributes to the system discovery process. You can add any computer object attribute from Active Directory, such as OperatingSystemServicePack and terminalserver. You can find all available attributes using the ADSIEdit MMC snap-in. Microsoft provides documentation on ADSIEdit at http://technet.microsoft.com/en-us/library/cc773354.aspx. You can find a list of AD search computer property attributes at http://www.winzero.ca/Active-Directory-computers.htm. Review the adsysdis.log log file for detailed information when the discovery method executes.

Active Directory User Discovery

Active Directory User Discovery is a discovery method that polls the domain controller for user objects in the domain or LDAP path specified on a schedule configured by the ConfigMgr administrator. Here are the default user attributes returned by Active Directory User Discovery:

User name

• DNS host name

• Object class

• Active Directory domain

• Active Directory container name

The first two tabs are configured the same as the other Active Directory discoveries—simply specify the container and polling interval. The most interesting tab is the Active Directory Attribute tab, shown in Figure 12.22.

Figure 12.22. Active Directory User Discovery Properties dialog box

image

The System Required column indicates whether the Attribute name is a required attribute. All the attributes where System Required is equal to No in Figure 12.22 are attributes manually added to discovery. As you can see, it is possible to discover much more information about users than the defaults. You can identify employeeID, mail (email address), manager, department, and more. You can find all available attributes using the ADSIEdit MMC snap-in.

Review the adusrdis.log file for detailed information when the discovery method executes.

Heartbeat Discovery

Heartbeat Discovery is a ConfigMgr capability that enables deployed ConfigMgr clients to send DDRs to their management point. This enables clients to keep the ConfigMgr database current with discovery-related data that often changes, such as IP addresses. Heartbeat Discovery is the only required discovery method and the only one that must be enabled.

Configure a simple schedule, ensuring the schedule is configured to run more frequently than the client rediscovery period of the Clear Install Flag task in Site Maintenance. The Clear Install Flag task relies on accurate data that is forwarded from Heartbeat Discovery. If a heartbeat is not forwarded within the client rediscovery period, the install flag is cleared, causing a new attempt at installing the client and unnecessary utilization of your site and clients.

Network Discovery

Network Discovery allows ConfigMgr administrators to collect discovery data by IP subnet, domain, Simple Network Management Protocol (SNMP) community, SNMP device, or DHCP server (which must be a Microsoft-based DHCP server).

Enable Network Discovery and then choose the type of discovery to perform:

Topology— Discovers routers and IP subnets. Specify the Maximum hops option on the SNMP tab to allow additional router hops to discover additional systems. Refer to the documentation at http://technet.microsoft.com/en-us/library/bb680992.aspx for additional information regarding router hops.

Topology and client— In addition to discovering topology as described in the previous bullet, this type also discovers potential client computers using an IP address. Specify one or more DHCP servers on the DHCP tab for Network Discovery to query DHCP servers (Microsoft DHCP only) for clients that have an IP address lease. Depending on the size of your network, you may want to limit the number of hops to reduce network traffic.

Topology, client, and client operating system— In addition to topology and client information, the client operating system is also identified by using this network discovery type. Client operating system information is obtained using SNMP, DHCP, the Windows browser, and Windows networking calls.

Figure 12.23 shows Topology selected as the discovery type.

Figure 12.23. Network Discovery Properties dialog box

image

Figure 12.23 also shows the Out of Band (OOB) Management frame currently disabled—you must have ConfigMgr Service Pack (SP) 1 installed to even see this frame at all. You must configure the OOB service point and configure a provisioning account before you can enable discovery of Out of Band management controllers. Here are some points to keep in mind:

• If you are on a slow network, enable the check box on this dialog box to reduce the number of SNMP sessions and increase the SNMP timeout.

• Specify subnets to discover by adding them to the Subnets tab. The desired subnet will not be searched if it exceeds the number of hops specified on the SNMP tab. In addition, the local subnet to the site server will be searched by default.

• Specify specific domains using the Domains tab. By default, local domain search is enabled.

• Specify all community names (they are case sensitive) in the SNMP community names property of the SNMP tab. Take the time to identify all community names used on your network, so that network discovery can search as many routers as possible. Specify the maximum number of router hops from the site server. You can choose from 0 to 10. Microsoft provides documentation about router hops at http://technet.microsoft.com/en-us/library/bb680992.aspx.

Microsoft’s document at http://technet.microsoft.com/en-us/library/bb693986.aspx contains additional information about Network Discovery. You will also want to review netdisc.log for detailed information when the discovery method executes.

Client Deployment

You are now ready to dive into one of the most important configuration steps of ConfigMgr—client deployment. (Actually, just about every step of configuring ConfigMgr is the most important step!) By this point, you have completed many critical tasks, such as installing a site, selecting boundaries, configuring site systems and components, and discovering potential clients. The next sections present several alternatives for deploying the ConfigMgr client agent. More than likely, your environment will require at least two of these methods, and probably more.

Site boundaries are a very important part of client deployment. Your potential clients should be part of a boundary (IP subnet, AD site, IP address range, and so on), and have access to a server locator point (SLP) or Active Directory (and you should have published information to Active Directory according to the discussion in Chapter 8). Once these settings are configured, client deployment will flow quite nicely. For further reading, review Microsoft’s documentation on sample assignment scenarios for Configuration Manager primary sites at http://technet.microsoft.com/en-us/library/bb680334.aspx.

One more document worth mentioning is Microsoft Knowledge Base (KB) article 925282, “How to Troubleshoot Advanced Client Push Installation issues in Systems Management Server 2003,” at http://support.microsoft.com/kb/925282. Although it is an SMS 2003 document, the client installation process is the same as ConfigMgr 2007. Jeff Gilbert also provides a great blog post describing Client Push Installation and common scenarios with primary and secondary sites at http://myitforum.com/cs2/blogs/jgilbert/archive/2007/02/22/sms-2003-client-push-installation-method-explained.aspx.

As you will see throughout all installation methods, command-line options are required to install the ConfigMgr client properly.

Command-Line Properties

When you install the ConfigMgr client, you have more than 50 command-line properties to choose. This section covers the most popular commands. The article at http://technet.microsoft.com/en-us/library/bb680980.aspx provides a complete list.

ConfigMgr uses CCMSetup.exe and CCMSetup.msi as the main programs for client installation. Other files are required (Windows Update Agent, XML Parser, and so on), but only CCMSetup.exe and CCMSetup.msi are called directly with command-line options.

In almost all scenarios, you will call CCMSetup.exe with the appropriate command-line options. CCMSetup.exe then downloads and installs the required components and launches CCMSetup.msi with the proper command-line options. The only exception to this is when you are deploying the ConfigMgr client using Active Directory. Table 12.2 lists popular command-line options for CCMSetup.exe, and Table 12.3 lists popular command-line options for CCMClient.msi. As mentioned previously, you generally will not call CCMClient.msi directly; you will simply execute CCMSetup.exe and pass command-line options for both CCMSetup.exe and CCMSetup.msi.

Table 12.2. Popular CCMSetup.exe Command-Line Properties for Client Installation

image

Table 12.3. Popular CCMSetup.msi Command-Line Properties for Client Installation

image

The command-line options in Tables 12.2 and 12.3 are used throughout the various client installation methods appearing in this chapter.

One other aspect of client installation that is consistent is the client installation logs ccmsetup.log (appears when ccmsetup.exe is used to install the client) and client.msi.log (appears for every client installation). Review these log files in the %windir%system32ccmsetup folder for x86 systems, and in %windir%ccmsetup for x64 systems. Also, check ClientIDManagerStartup.log to verify that the client has successfully registered with its site. A client will not successfully pull policy until it is registered with the site. Additional information on common registration issues is available at

Manual Installation

Although manual client installation is probably not the method you will use to install all clients, it is a method that all environments will use, most often in service desk or on-site support scenarios. Having a well-documented process for reinstalling a ConfigMgr client is essential.

First, you must locate the installation files. By default, you will find these files in the %ProgramFiles%Microsoft Configuration ManagerClient folder. CCMSetup.exe is the file you will use to initiate the installation, and depending on the operating system version, additional windows components (XML Parser, Windows Update Agent, BITS, and so on) are installed from this folder. ConfigMgr requires these additional components for a healthy client. Fortunately, you don’t have to manage the installation of each of these components. There are three primary methods to install the client manually:

The most basic method to install the ConfigMgr client is to copy the entire Client folder (and subfolders) to the local system and then launch CCMSetup.exe from the local drive. By using this method, CCMSetup automatically obtains the dependent source files from the local source. Alternatively, you could map a drive to a remote server and run CCMSetup. Typically, running CCMSetup from a UNC path will be unsuccessful.

• Execute CCMSetup.exe (either remote or local) and specify the /source: command-line switch. For example, if you have a share named \TUMBLEWEEDConfigMgrClient that contains the client installation files, you could execute the following statement:

image

You can use the /source: switch multiple times to give CCMSetup alternative locations to download installation files. Also, verify the user account that launches CCMSetup.exe has read access to the share.

• Execute CCMSetup.exe (either remote or local) and specify the /mp: command-line switch with a valid management point. Note that this switch simply specifies access to client installation source files—it has no impact on site assignment. For example, using the same share mentioned in the previous bullet, you could execute the following statement:

image

Similar to the /source: switch, the /mp: switch can be specified multiple times for alternative download locations.

Now that you have seen these three options, you may ask which one is the best. As with all things technical, it depends. The authors prefer the /mp: switch for almost all manual installation scenarios. Using this switch means you need access to CCMSetup.exe (and of course a healthy management point). ConfigMgr handles the source file folder, and the files are accessed by the client via HTTP.

Client Push Installation

Enable Client Push Installation to deploy the client agent automatically to those systems discovered and assigned to the site. Before enabling Client Push Installation, it is highly recommended you use the Client Push Installation Wizard for testing individual systems and individual collections. The only configuration difference between Client Push Installation and the Client Push Installation Wizard is the first check box in Figure 12.24. Figure 12.24 shows the General tab of the Client Push Installation Properties dialog box.

Figure 12.24. The General tab of the Client Push Installation Properties dialog box

image

As you can see in Figure 12.24, the Enable Client Push Installation to assigned resources box is checked. When you enable this check box, you can then determine the system types to target. Servers and workstations are enabled by default; domain controllers and site systems are disabled. Click the Accounts tab to configure Client Push Installation accounts, as displayed in Figure 12.25.

Figure 12.25. The Accounts tab of the Client Push Installation Properties dialog box

image

Use the Accounts tab to add accounts to install the ConfigMgr client. To add a local account, simply follow the same pattern shown in Figure 12.25. For the local administrator account, simply enter .Administrator and the appropriate password. Enter multiple accounts to ensure you have at least one administrator account for each system you desire to install. To configure installation settings, use the Client tab, as shown in Figure 12.26.

Figure 12.26. The Client tab of the Client Push Installation Properties dialog box

image

By default, the SMSSITECODE public property is visible. You can add Windows Installer command-line properties (see Table 12.3) to configure the client at install time. As an example, to modify the cache size, add the property SMSCACHESIZE=1024, where 1024 is the size (in MB) to configure. The ccm.log file on the site server provides client installation information.

If the site is unable to install the client (because of rights, the system not being on the network, and so on), the site attempts to install the client every hour for 168 hours (1 week). See Microsoft’s document on Client Push at http://technet.microsoft.com/en-us/library/bb632380.aspx for additional information. Note that Client Push does not need to be enabled to push clients, as discussed in the next section.

Client Push Installation Wizard

The Client Push Installation Wizard uses the same process as Client Push Installation. The title makes it obvious that the only difference is the wizard itself. It is highly recommended you test deployments using the Client Push Installation Wizard prior to enabling Client Push Installation, because you have more control.

To configure the Client Push Installation Wizard, simply configure the Accounts and Clients tabs (Figures 12.25 and 12.26, respectively). To use the wizard, perform the following steps:

  1. Right-click a collection or computer object and then select Install Client.
  2. Click Next to continue the Client Push Installation Wizard.
  3. Review the following options, as shown in Figure 12.27:

    Include domain controllers— This selection includes domain controllers.

    Include only clients in this site’s boundaries— This is a default setting. Clear this check box to install the client on systems discovered but not assigned to this site (clients that are not included in your specified site boundaries).

    Include subcollections— This check box is enabled if you are using the Client Push Installation Wizard to target a collection. Enable this check box to target the current collection and all subcollections.

    Always install (repair or upgrade existing client)— This option allows you to force a reinstallation of the ConfigMgr client. This option also helps when upgrading clients. If you install a new service pack to ConfigMgr, Client Push Installation will not automatically upgrade clients. Use the Client Push Installation Wizard to upgrade clients or send using standard software deployment. The “Client Upgrade” section of this chapter discusses alternatives.

    Figure 12.27. Client Push Installation Wizard installation options

    image
  4. Review the Summary page to confirm that you have targeted the intended collection or computer object, and then click Finish. Review ccm.log on the site server for client installation information.

You can use the Client Push Installation Wizard even after you have enabled Client Push to force a reinstall on a client or multiple clients, or to upgrade clients.

Client Installation in Image Deployment

Pre-installing the ConfigMgr client into an operating system allows you to get your ConfigMgr client up and running as soon as the image is deployed.

Note

Use ConfigMgr Operating System Deployment

If you use ConfigMgr to capture and deploy the operating system image, all steps described in this section are automatically performed for you during image capture and restore.

To install the ConfigMgr client, follow the steps described in the “Manual Installation” section of this chapter, and omit the SMSSITECODE property. When the SMSSITECODE property is omitted, the client does not attempt assignment. Delete the SMS section in the Computer Account Certificates Store, displayed in Figure 12.28.

Figure 12.28. ConfigMgr client certificates

image

Microsoft provides additional information for installing ConfigMgr clients using imaging at http://technet.microsoft.com/en-us/library/bb694095.aspx.

Software Update Point Client Installation

You can use group policy and the SUP to install the ConfigMgr client. With this installation method, you are not able to specify Windows Installer properties on the command-line settings, but you can specify the properties using group policy. If you have extended the Active Directory schema, clients will be able to discover their assigned site properly.

A key point to remember with this installation method is that once the ConfigMgr client installation succeeds, it will verify the client is configured to use the correct SUP (according to ConfigMgr Site assignment and site boundaries) and modify it if required. If the deployed group policy configures the client to use a different SUP, the client configuration (of the SUP) will fail and generate errors in the ConfigMgr client logs. See http://technet.microsoft.com/en-us/library/bb633194.aspx for complete details.

Client Uninstall

To uninstall the client, simply run ccmsetup.exe /uninstall—you can use ccmsetup.exe in the client installation directory or copy ccmsetup from a site (there is no need to copy the entire installation directory).

You may encounter failures on some corrupted clients (mostly from WMI errors) when attempting to uninstall. In extreme cases, installations may be successful if you use ccmclean.exe from the SMS 2003 Toolkit. Technically, this is not supported on ConfigMgr, but if you have a corrupt client that you cannot reinstall, or uninstall, try using ccmclean.exe.

Client Upgrade

Say you have successfully deployed ConfigMgr, and you have a healthy site. A few months later, you now have a service pack for ConfigMgr. You have successfully upgraded your site(s) to the new service pack, and now you need to upgrade the clients, because clients do not automatically upgrade.

If you have a small, single site, the easiest method to upgrade clients is to use the Client Push Installation Wizard. Simply right-click the desired collection and then select Install Client. Follow the remaining steps in the “Client Push Installation Wizard” section of this chapter, and force a reinstall/upgrade on targeted clients.

A great method to perform this upgrade in larger environments is to use ConfigMgr software distribution (see Chapter 13, “Creating Packages,” and Chapter 14, “Distributing Packages,” for information on creating and distributing packages). Simply create a package and specify the package source as the ConfigMgr client installation files (by default, %ProgramFiles%Microsoft Configuration ManagerClient). Then send this package to your distribution points. Create a program that executes ccmsetup.exe. Do not specify the SMSSITECODE property, unless you want to change the site code. You can add other Windows Installer properties, such as FSP and the SMSSLP (http://technet.microsoft.com/en-us/library/bb680980.aspx) to change the current configuration of the existing client. Finally, create an advertisement targeting desired systems.

Using either the Client Push Installation Wizard or traditional software distribution, you will not need to specify a different installation for x86, x64, or IA64. CCMSetup.exe will handle the need to install the appropriate client on the appropriate platform.

Client Patches

A client patch is somewhat different to deploy than a client upgrade:

• A client patch may be required when you install a hotfix on the site, or it may even be a client-only patch.

• A client upgrade will normally occur when a ConfigMgr service pack is released.

A client patch will typically be a Windows Installer patch (with an .msp extension). To deploy this patch, create a new package and use traditional software distribution methods. A sample command line for Microsoft Knowledge Base article 955955 would be

image

Although the command line appears as more than one line here, it is actually one line. KB article 955955 at http://support.microsoft.com/kb/955955 provides an example of how to deploy a ConfigMgr client patch.

Client Troubleshooting

ConfigMgr has evolved from the old SMS 1.2 days, where software distribution (using the good old Package Command Manager) and inventory seemed to be the key components of the product. Today, software distribution and inventory are very important, but just part of the full suite. Operating System Deployment, Software Updates management, and DCM are several of the new components of ConfigMgr. Fortunately, the ConfigMgr client has over 30 log files for different client components. Appendix A, “Configuration Manager Log Files,” contains detailed information about log files. The next sections discuss general troubleshooting scenarios, online resources (typically the best method for troubleshooting assistance), common issues such as resolving conflicting hardware IDs and dealing with duplicate records, and using the ConfigMgr Toolkit.

General Scenarios

This section discusses several general troubleshooting scenarios. Table 12.4 lists several common issues to help get you started.

Table 12.4. Common Client Issues and Suggestions for Solutions

image

Online Assistance

The Internet is your best friend for both ConfigMgr documentation and ConfigMgr troubleshooting. Table 12.5 provides some favorite tools and sites for online assistance.

Table 12.5. Online Assistance for ConfigMgr Client Troubleshooting

image

image

Conflicting Hardware IDs

ConfigMgr creates unique hardware IDs to define unique computers. Based on 10 computer properties (SCSI adapter, processor serial number, MAC address, and so on), a unique hardware ID is created. If a system is reimaged (and no hardware replaced), the hardware ID will be consistent from the previous install to the new install.

When this occurs, ConfigMgr will have two records for the same resource, often called duplicate hardware IDs. As discussed in Chapter 8, the Advanced tab of the Site Properties provides the option to create new client records manually or automatically.

ConfigMgr Toolkit

The ConfigMgr Toolkit is available from Microsoft’s download center at http://www.microsoft.com/downloads/details.aspx?FamilyID=948e477e-fd3b-4a09-9015-141683c7ad5f&DisplayLang=en (or at www.microsoft.com/downloads, search for ConfigMgr Toolkit). It includes seven tools to help you manage and troubleshoot Configuration Manager 2007. Table 12.6 describes these tools.

Table 12.6. ConfigMgr Toolkit tools

image

In troubleshooting ConfigMgr, Trace32 (also known as SMS Trace) will be your best friend. You may be used to reading log files using Windows Notepad or another log reader such as Tail. For ConfigMgr, nothing beats Trace32. In addition to being customized to read ConfigMgr logs, it allows you to view those logs in real time, meaning as ConfigMgr writes new data to the log, the data will appear in Trace32. You can open log files using Trace32 on both local and remote systems. Figure 12.29 shows Trace32 viewing the execmgr.log log file.

Figure 12.29. Viewing execmgr.log from Trace32 (a.k.a. SMS Trace)

image

If you have viewed sitecomp.log using Notepad, you will see a significant difference in human readability with Trace32. Trace32 is configured to automatically parse date/time stamps as well as format the data to make it easier for the administrator to view. By default, Trace32 highlights keywords such as Error and Warning. You can also define additional keywords to highlight. Figure 12.30 shows the Filter feature.

Figure 12.30. Filtering content using Trace32

image

Filter (from the Tools option) allows you to customize the view to see only specific words or phrases, and even a specific date/time. You can also open multiple log files in one view, which may help you see the bigger picture when troubleshooting.

Also from the Tools option, you will find Error Lookup. Error Lookup prompts you to enter a Windows error message, and it displays the description for that error. As an example, entering error number 32 displays “The process cannot access the file because it is being used by another process.” Spend some time with Trace32 and the reference documentation located in ConfigMgr Toolkit help.

Clispy, the SMS Advanced Client Troubleshooting Tool and part of the Toolkit, is another great tool for troubleshooting client issues. Clispy allows you to view the following for both the current computer and remote computers:

• Software distribution execution requests.

• Software distribution history. (Quickly see success or failure for software distribution.)

• Software distribution cache information. (Monitor items currently in a download state, items in the local ConfigMgr cache, and cache size.)

• Software distribution pending executions.

Use Policy Spy to view ConfigMgr client policy on either a local or a remote computer. As shown in Figure 12.31, you can view machine policy as well as user policy.

Figure 12.31. Policy Spy from the ConfigMgr Toolkit

image

Policy Spy allows you to view the complete policy, as downloaded from the client’s management point. It also allows you to delete policy instances as well as reset policy (which basically removes all nondefault client policy and then queries the management point for all assigned policies). Check the ConfigMgr Toolkit documentation for more information.

General Troubleshooting Information

Many techs will uninstall and reinstall the ConfigMgr client at the first sign of trouble. It is really best to avoid this process, because it is often more time consuming and does not always solve the problem. Software Updates is a great example. Just because patches are failing to install does not mean that the client is corrupt—it could be that the Automatic Updates agent is not working properly. Before uninstalling the client, perform some basic tests to determine what is working, if anything. Here are several basic functionality tests to try, which may help you narrow the scope of the problem at hand.

Try to install software— This is easiest if you are using Run Advertised Programs, because you can simply launch a test installation to see if it works. By performing this test, you can confirm that the client is talking to its management point and is able to obtain content as well as install software.

Try the same task on another computer in the same locale— It is very important to see if the reported issue is isolated to one computer. One of the easiest ways to confirm this is to verify whether the problem exists on a different computer. Be sure to test using the same environment (same operating system, same IP subnet, even the same logged-on user if possible).

Check to see if other components are working— Hardware and software inventory, as well as Discovery Data Manager (Heartbeat Discovery), are components that hardly encounter issues. Use the Configuration Manager control panel applet to launch one (or all) of these actions, and monitor InventoryAgent.log to verify success.

Rediscover the client— From the Configuration Manager control panel applet, on the Advanced tab, click the Discover button to rediscover the client to its assigned site. If the client successfully assigns to a site, it successfully queried Active Directory (or its SLP) and is in a valid set of site boundaries.

Spend some time troubleshooting clients, and read the client logs carefully. The logs are very detailed, and usually help you determine the root cause of the problem.

The ConfigMgr Client Agent

Access the Configuration Manager applet from the control panel (on x64 systems, look in a subfolder for x86 control panel icons). Table 12.7 describes each of the tabs in the Configuration Manager control panel applet, also called the Configuration Manager Properties dialog box. (All log files mentioned in Table 12.7 are located on the ConfigMgr client.)

Table 12.7. Configuration Manager Properties Dialog Box

image

image

 

Out of Band Management

Out of Band (OOB) Management allows you to remotely connect to and manage a system when the operating system is corrupt or when the system is powered off or in a sleep or hibernate mode. In-band management involves managing a system as you have with ConfigMgr 2007 and SMS 2003—that is, managing a system through the Windows operating system. With Out of Band Management, you can even manage the ConfigMgr system when the hard drive has failed. Think of Out of Band Management as giving you the opportunity to troubleshoot (and hopefully resolve) a problem without sending a person onsite to fix it. Here is a list of basic functions you can perform using the OOB service point:

• Powering on one or many computers (for example, to apply security patches during off-peak business hours)

• Powering off one or many computers

• Restarting a computer into PXE or from a boot image file, to reimage a computer

• Reconfiguring BIOS settings

• Configuring advertisements and Software Updates to use Wake On LAN to wake up systems to apply patches

Microsoft’s article at http://technet.microsoft.com/en-us/library/cc161944.aspx lists additional scenarios for using Out of Band Management.

Chapter 8 describes how to enable the OOB service point. To learn how to discover and provision systems using OOB Management, the document at http://technet.microsoft.com/en-us/library/cc161963.aspx provides a great overview.

Fallback Status Point

If you have an FSP in your environment and specify an FSP during client installation, you can use ConfigMgr Web Reporting to view the status of client installation in your environment. Use the following reports to review client installation received from the fallback status point:

• Client Assignment Detailed Status Report

Client Assignment Failure Details

• Client Assignment Status Details

• Client Assignment Success Details

• Client Deployment Failure Report

• Client Deployment Status Details

• Client Deployment Success Report

Additional information about the fallback status point is available at http://technet.microsoft.com/en-us/library/bb694178.aspx and in Chapter 2.

Client Approval

Another new feature in ConfigMgr 2007 is client approval. If your ConfigMgr site is configured in mixed mode, all clients must be approved to communicate with the assigned site. A client will successfully install and assign to a ConfigMgr site, but client approval must occur before a client can obtain content from the site. You can manually approve clients (the most secure), automatically approve all clients (the least secure), or automatically approve all clients in the trusted domain (somewhere in between the most and least secure).

Summary

This chapter described how to configure the management point, configure client agents, and customize hardware inventory. You also learned how to discover clients, install the client agent, and perform basic client troubleshooting.

Remember that when you enable Client Push Installation, automatic installation occurs on every system assigned to your site. Before enabling Client Push Installation, use the Client Push Installation Wizard to test against single clients, and use small collections to verify your push installation settings are configured properly.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset