MS55348

Administering Microsoft Endpoint Configuration Manager (55348)

5 dagen
Intermediate
Available in English

Volg de Administering Microsoft Endpoint Configuration Manager training en leer Configuration Manager te gebruiken om netwerkbronnen efficiënt te beheren. In deze vijfdaagse training leer je de dagelijkse beheertaken, waaronder het beheren van toepassingen, clientgezondheid, hardware- en software-inventaris, besturingssysteemimplementatie en software-updates met behulp van Configuration Manager.

Na afronding van deze training kun je onder andere:

De functies gebruiken die Configuration Manager en Intune bevatten om pc's en mobiele apparaten in een bedrijfsomgeving te beheren
De Configuration Manager-client implementeren en beheren
Endpoint Protection optimaliseren, compliance beheren en beheerquery's en -rapporten maken
€ 2.495,-
Bekijk beschikbaarheid
Wat je van ons kunt verwachten
Beste lesmethode
Flexibel inplannen
Kleine klassen
100% Slagingsgarantie
Wat onze klanten vinden
Hulp of advies nodig?
Mail Sofie of laat haar je terugbellen.
info@master-it.nl 040-2323390

Training: Administering Microsoft Endpoint Configuration Manager (55348)

This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports.Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10.

  • Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.
  • Analyze data by using queries and reports.
  • Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune.
  • Deploy and manage the Configuration Manager client.
  • Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.
  • Identify and configure the most appropriate method to distribute and manage content used for deployments.
  • Distribute, deploy, and monitor applications for managed users and systems.
  • Maintain software updates for PCs that Configuration Manager manages.
  • Implement Endpoint Protection for managed PCs.
  • Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.
  • Configure an operating-system deployment strategy by using Configuration Manager.
  • Manage and maintain a Configuration Manager site.
  • Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
  • Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
  • Installation, configuration, and troubleshooting for Windows-based personal computers.
  • Basic concepts of public key infrastructure (PKI) security.
  • Basic understanding of scripting and Windows PowerShell syntax.
  • Basic understanding of Windows Server roles and services.
  • Basic understanding of the configuration options for iOS and Android Mobile device platforms.

This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.

Module 1: Managing computers and mobile devices in the enterpriseThis module describes the features of Configuration Manager that you can use to perform complex management tasks, including the following tasks; Hardware and software inventory, Application management, Operating system deployment, Settings management, Software update management, Remote client troubleshooting, and Protection from malware. Microsoft System Center Configuration Manager (Configuration Manager) provides various features that can help you manage devices and users both on-premises and in the cloud. Organizations that use Configuration Manager find that they can provide more effective IT services in relation to software deployment, settings management, and asset management. This module introduces you to the primary features, architecture, and management tools used with Configuration Manager. This module also provides a foundation that relates to all other features and management tasks discussed in the modules that follow this one.Lessons

  • Overview of systems management by using enterprise management solutions
  • Overview of the Configuration Manager architecture
  • Overview of the Configuration Manager administrative tools
  • Tools for monitoring and troubleshooting a Configuration Manager site

Lab 1: Exploring the Configuration Manager tools

  • Exploring the Configuration Manager Tools

After completing this module, students will be able to:

  • Searching in the Configuration Manager console
  • Using Windows PowerShell with Configuration Manager
  • Using Configuration Manager Service Manager to manage components
  • Monitoring site and component status
  • Reviewing log files by using the Configuration Manager Trace tool

Module 2: Analyzing data using queries, reports, and CMPivotThe Microsoft Endpoint Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This module describes queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this module details. This module also covers CMPivot, which allows you to collect and view real-time data on all the connected devices in your environment. It will enable you to make real-time decisionsLessons

  • Introduction to queries
  • Configuring SQL Server Reporting Services
  • Analyzing the real-time state of a device by using CMPivot

Lab 1: Creating and running queries

  • Creating data queries
  • Creating subselect queries

Lab 2: Configuring SSRS

  • Configuring a reporting services point

Lab 3: Analyzing the real-time state of a device by using CMPivot

  • Using CMPivot to Analyze the current state of devices

After completing this module, students will be able to:

  • Analyze data using queries, reports, and CMPivot

Module 3: Preparing the Configuration Manager management infrastructureYou can manage computer and user resources within a Microsoft Endpoint Configuration Manager (Configuration Manager) environment only when Configuration Manager has discovered these resources and assigned them to a site. In this module, you will learn about boundaries and boundary groups that help create logical network locations containing computer devices that you need to manage in your Configuration Manager infrastructure. You can use these boundary configurations for automatic site assignment and to help clients find content and services from associated site systems. You will also learn about the discovery processes that you can use to identify computers, users, and the network infrastructure within your network environment. You will then learn about collections that support logical groupings of resources. You use these groupings for management tasks, such as targeting software updates, managing application deployments, or deploying compliance settings to resources.Lessons

  • Configuring site boundaries and boundary groups
  • Configuring resource discovery
  • Organizing resources using device and user collections

Lab 1: Configuring boundaries and resource discovery

  • Configuring boundaries, boundary groups, and fallback relationships
  • Configuring Active Directory discovery methods

Lab 2: Configuring user and device collections

  • Creating a device collection
  • Creating a user collection
  • Configuring a maintenance window

After completing this module, students will be able to:

  • Prepare a Configuration Manager management infrastructure

Module 4: Deploying and managing the Configuration Manager clientYou can install the Microsoft Endpoint Configuration Manager (Configuration Manager) client software on windows-based devices such as servers, workstations, and laptops. You then can manage these devices and perform operations such as reporting hardware and software inventory information, installing and updating software, and configuring settings required for compliance. Configuration Manager provides several options for installing the client software. This module explains the supported operating systems and devices, software requirements, and different methods for installing the client software. This module also describes some of the default and custom client settings that you can configure. After installing the client software, you can configure client settings and control how the various client components interact between the managed device and the Configuration Manager environment.Lessons

  • Overview of the Configuration Manager client
  • Deploying the Configuration Manager client
  • Configuring and monitoring client status
  • Managing client settings and performing management operations

Lab 1: Deploying the Microsoft Endpoint Configuration Manager client software

  • Preparing the site for client installation
  • Deploying the Configuration Manager client software by using client push installation

Lab 2: Configuring and monitoring client status

  • Configuring and monitoring client health status

Lab 3: Managing client settings

  • Configuring client settings
  • Performing management operations

After completing this module, students will be able to:

  • Deploy and manage the Configuration Manager client.

Module 5: Managing inventory for PCs and applicationsThis module provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This module also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.Lessons

  • Overview of inventory collection
  • Configuring hardware and software inventory
  • Managing inventory collection
  • Configuring software metering
  • Configuring and managing Asset Intelligence

Lab 1: Configuring and managing inventory collection

  • Configuring and managing hardware inventory

Lab 2: Configuring software metering

  • Configuring software metering

Lab 3: Configuring and managing Asset Intelligence

  • Preparing the site for Asset Intelligence
  • Configuring Asset Intelligence
  • Monitoring license agreements by using Asset Intelligence
  • Viewing Asset Intelligence reports

After completing this module, students will be able to:

  • Manage inventory for PCs and applications.

Module 6: Distributing and managing content used for deploymentsMicrosoft Endpoint Configuration Manager (Configuration Manager) clients obtain content, such as packages, applications, software updates, and even operating system images, from a content infrastructure made up of distribution points and peer cache sources. In this module, you will review the content distribution and management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.Lessons

  • Preparing the infrastructure for content management
  • Distributing and managing content on distribution points

Lab 1: Distributing and managing content for deployments

  • Installing a new distribution point
  • Managing content distribution

After completing this module, students will be able to:

  • Describe containers in Windows Server.
  • Explain how to deploy containers.
  • Explain how to install, configure, and manage containers using Docker.

Module 7: Deploying and managing applicationsIn this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications.Lessons

  • Overview of application management
  • Creating applications
  • Deploying applications
  • Managing applications
  • Deploying and managing Windows apps

Lab 1: Creating and deploying applications

  • Creating applications with requirements
  • Deploying applications

Lab 2: Managing application supersedence and removal

  • Managing application supersedence
  • Uninstalling the Excel Viewer application

Lab 3: Using Configuration Manager to deploy Windows apps

  • Configuring support for sideloading Windows apps
  • Configuring a Windows app
  • Deploying Windows apps to user

After completing this module, students will be able to:

  • Deploy and manage applications

Module 8: Maintaining software updates for managed PCsThis module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring Microsoft and third-party software updates to your Configuration Manager clients.Lessons

  • The software updates process
  • Preparing a Configuration Manager site for software updates
  • Managing software updates
  • Configuring automatic deployment rules
  • Monitoring and troubleshooting software updates
  • Enabling third-party updates

Lab 1: Configuring the site for software updates

  • Configuring and synchronizing the software update point

Lab 2: Deploying and managing software updates

  • Determining software update compliance
  • Deploying software updates to clients
  • Configuring automatic deployment rules

After completing this module, students will be able to:

  • Maintain software updates for managed PCs.

Module 9: Implementing Defender Protection for managed PCsThis module explains how to use the security-related features provided by Configuration Manager to help protect client computers from malware threats, and to configure specific Windows Defender Firewall settings for clients. Based on Endpoint Protection functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies, Windows Defender Firewall settings, Windows Defender Application Guard policies, Windows Defender Exploit Guard policies, and Windows Defender Application Control policies on client computers.Lessons

  • Overview of Endpoint Protection in Configuration Manager
  • Configuring, deploying, and monitoring Endpoint Protection policies
  • Configuring and deploying advanced threat policies

Lab 1: Implementing Endpoint Protection

  • Configuring the Endpoint Protection point and client settings
  • Configuring and deploying Endpoint Protection policies
  • Monitoring Endpoint Protection

Lab 2: Implementing advanced threat policies

  • Creating and deploying advanced threat protection policies

After completing this module, students will be able to:

  • Implement Defender Protection for managed PCs

Module 10: Managing compliance and secure data accessMany enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in identifying existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You also can control access to data using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings that you can manage using Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enterprise resources.Lessons

  • Overview of Compliance Settings
  • Configuring compliance settings
  • Viewing compliance results
  • Managing resource and data access

Lab 1: Managing compliance settings

  • Managing configuration items and baselines
  • Viewing compliance settings and reports
  • Configuring remediation in compliance settings
  • Using compliance information to create collections

After completing this module, students will be able to:

  • Manage compliance and secure data access

Module 11: Managing operating system deploymentThis module explains how to use the operating system deployment feature in Configuration Manager to create operating system images that you can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by using task sequences that Configuration Manager creates after you deploy the image to a target system. This module also explains how to use Configuration Manager to create a strategy for operating-system deployments . And also, it explains and how to manage Windows as a service. This module explains how to manage Windows as a service.Lessons

  • An overview of operating system deployment
  • Preparing a site for operating system deployment
  • Deploying an operating system
  • Managing Windows as a service

Lab 1: Preparing the site for operating-system deployment

  • Managing the site system roles used to support operating system deployment
  • Managing packages to support operating system deployment

Lab 2: Deploying operating-system images for bare-metal installations

  • Preparing the operating system image
  • Creating a task sequence to deploy an image
  • Deploying an image

After completing this module, students will be able to:

  • Manage operating system deployments.

Module 12: Managing and maintaining a Configuration Manager siteThis module describes role-based administration, Remote Tools, and the site maintenance tasks that you can manage by using Configuration Manager. This module also describes how to back up and recover a Configuration Manager site system and use the recommendation(s) from Management Insights to simplify administration.Lessons

  • Configuring role-based administration
  • Configuring Remote Tools
  • Overview of Configuration Manager site maintenance and Management Insights
  • Backing up and recovering a Configuration Manager site
  • Updating the Configuration Manager infrastructure

Lab 1: Configuring role-based administration

  • Configuring a new scope for Toronto administrators
  • Configuring a new administrative user

Lab 2: Configuring Remote Tools

  • Configuring the Remote Tools client settings and permissions
  • Managing desktops by using Remote Control

Lab 3: Maintaining a Configuration Manager site

  • Configuring maintenance tasks in Configuration Manager
  • Configuring the Backup Site Server task
  • Recovering a site from a backup

After completing this module, students will be able to:

  • Manage and maintain a Configuration Manager site.

Module 13: What’s new in Microsoft Endpoint Configuration ManagerThis modules describes the features that have been released since Configuration Manager 2012.Lessons

  • Whats new in Microsoft Endpoint Manager covering each semi annual release.

After completing this module, students will be able to:

  • Understand and leverage the new features available in each semi annual release.
10
Jennifer Pereira
Ik heb hier de 2-daagse training Microsoft Dynamics 365 fundamentals gevolgd. Medewerkers zijn zeer hulpvaardig en denken ver mee, dit vond ik TOP! De Active Learning training met vakkundige trainster is me heel goed bevallen. De lunch was royaal en erg lekker! Kortom, wellicht tot ziens!
9,0
Willem de Lang
In Februari een 5-daagse training WS-11 (Server 2019) gevolgd in twee weken. Deze training was op basis van het Active Learning programma en dit is me zeer goed bevallen. De instructeur had voldoende tijd/kennis om vragen te beantwoorden en me verder te helpen wanneer ik vast liep.
9,5
Edwin Kruize
Bij Master IT train ik al jaren on-site in Eindhoven wat mij ontzettend goed bevalt. De Active Learning lesmethode is perfect voor mij en kan ik op mijn eigen tempo en onder goede begeleiding mijn studies volgen. De trainers hebben veel brede kennis en nemen de tijd voor je. 
Lesmethode Master IT

Active Learning

Je maakt samen met je trainer een plan en gaat actief aan de slag. In een kleine klas verdiepen in wat je echt nodig hebt, inzoomen op zaken die je echt interesseren en overslaan wat je al weet of niet nodig hebt. Plan je lesdagen flexibel, neem real-life casussen mee en werk ze uit met je trainer. Verrijk je kennis en verbind het met alles wat je al wist.

Lesmateriaal
Slagingsgarantie
Labomgeving
5 dagen voor € 2.495,-

E-Learning

Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om jouw training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële lesmateriaal waarmee je de juiste kennis opdoet.

Wil je toch graag een dag persoonlijke begeleiding? Dan kan je altijd een extra lesdag bij boeken en de training als blended learning volgen!

Labomgeving
MCT Mentoring
Community Courseware

Incompany

Wist jij dat alle IT trainingen die we aanbieden op de website ook bij jouw bedrijf uitgevoerd kunnen worden? Zo volg je een maatwerk IT training (Incompany training) met al je collega’s. Jij kunt de training nog specifieker voor jouw bedrijf laten inrichten en het is zelfs mogelijk om een geheel maatwerk traject door ons te laten ontwerpen.

Je bespaart reiskosten en reistijd voor de deelnemers, doordat onze trainer bij jou op locatie komt. Op deze manier kun je meerdere deelnemers van jouw organisatie dezelfde training laten volgen. Dat is efficiënt en effectief! Samen heb je een gemeenschappelijke opleidingsbehoefte en daar gaan we je bij helpen.

We hebben jarenlang ervaring in het geven van maatwerk it trainingen. We kijken zorgvuldig naar de opleidingsbehoefte om volledig aan te sluiten bij je wensen. Zo formuleren we haalbare en concrete doelstellingen en deelnemers kunnen het geleerde in de praktijk toepassen. Op deze manier groeien deelnemers persoonlijk en professioneel op meerdere niveaus.

Maatwerktraining
Van A-Z geregeld voor jouw team
Trainer komt op locatie
MS55348
Administering Microsoft Endpoint Configuration Manager (55348)
€ 2.495,-
Bekijk beschikbaarheid