Introduction 11 Overview of the System Center Suite 5What Is System Center? 6Understanding System Center Configuration Manager 9Understanding System Center Operations Manager 18Understanding System Center Data Protection Manager 26Understanding System Center Virtual Machine Manager 34Understanding System Center Service Manager 40Understanding System Center 2012 Orchestrator 45Understanding System Center Licensing 50Summary 51Best Practices 522 Configuration Manager 2012 Design and Planning 55What's New in ConfigMgr 2012 56Explaining How Configuration Manager Works 60Understanding Content Distribution 66Understanding Asset Management 70Reporting from Configuration Manager 74Configuration Manager Architecture Components 75Securing Configuration Manager 88Understanding Component Requirements 92Configuration Manager Design Considerations 94Understanding Client Schedules 105Planning for Internet-Based Client Management 106Putting It All Together in a Design 110Summary 112Best Practices 1123 Configuration Manager 2012 Implementation and Administration 115Sample Organization 115Configuring Installation Prerequisites 118Implementing the Central Administration Site 124Deploying the Primary Sites 129Deploying the Secondary Sites 134Configuring the Hierarchy 138Configuring Sites 148Configuring Client Settings 156Implementing Internet-Based Client Management 163Summary 177Best Practices 1784 Using Configuration Manager 2012 to Distribute Applications, Updates, and Operating Systems 181Understanding Content Distribution 181Defining Collections 185Understanding Application Management 189Managing Deployments 203Understanding Software Updates 215Deploying Software Updates 219Understanding Operating System Deployment 225Deploying Operating Systems 234Extending with Microsoft Deployment Toolkit 238Summary 243Best Practices 2435 Using Configuration Manager 2012 for Asset Management and Reporting 245Understanding Asset Data 246Configuring Client Settings for Inventory Collection 248Understanding Reporting 249Customizing Hardware Inventory 261Understanding Asset Intelligence 269Understanding Software Metering 277Understanding Compliance Settings 278Monitoring the Baselines and Compliance 283Summary 285Best Practices 2856 Operations Manager 2012 Design and Planning 289What's New With Operations Manager 2012 290Understanding How OpsMgr Works 291OpsMgr Architecture Components 296Securing OpsMgr 311Fault Tolerance and Disaster Recovery 317Understanding OpsMgr Component Requirements 323OpsMgr Design Considerations 328Putting It All Together in a Design 335Planning an Operations Manager Deployment 345Summary 353Best Practices 3547 Operations Manager 2012 Implementation and Administration 355Installing Operations Manager 2012 356Deploying OpsMgr Agents 373Monitoring DMZ Servers with Certificates 385Configuring Operations Manager 2012 393Administering Operations Manager 2012 403Backing Up OpsMgr 2012 411Summary 418Best Practices 4188 Using Operations Manager 2012 for Monitoring and Alerting 421Using OpsMgr Consoles 422Working with Management Packs 425Exploring the Operations Manager Management Pack 432Exploring the Windows Management Pack 440Exploring the Active Directory Management Pack 451Exploring the Exchange 2010 Management Pack 466Exploring the SQL Server Management Pack 478Exploring the Cross Platform Management Packs 487Management Pack Templates 491Custom Management Packs 503Summary 508Best Practices 5089 Using Operations Manager 2012 for Operations and Security Reporting 511Reporting from OpsMgr 512Generating and Scheduling Reports 514OpsMgr 2012 Maintenance Reports 532Audit Collection Services Reporting 541Service Level Tracking 548OpsMgr 2012 Dashboards 554Publishing Dashboards into SharePoint 2010 561Summary 565Best Practices 56610 Data Protection Manager 2012 Design, Planning, Implementation, and Administration 567What Is System Center Data Protection Manager? 568Data Protection Manager Background 572Data Protection Manager Prerequisites 578Planning a Data Protection Manager Deployment 580Deploying Data Protection Manager 587Completing Required Configuration Tasks 591Creating Protection Groups 601Administrating Data Protection Manager 606Summary 616Best Practices 61711 Using Data Protection Manager 2012 to Protect File Systems, Exchange, SQL, and SharePoint 619Protecting File Servers 620Protecting System State 622Protecting Exchange Servers 624Protecting SQL Servers 635Protecting SharePoint Farms 643Protecting Virtualized Environments 654Summary 660Best Practices 66112 Virtual Machine Manager 2012 Design, Planning, and Implementation 663Understanding Virtual Machine Manager 663Virtual Machine Manager Background 673What's New in System Center Virtual Machine Manager 2012 677Virtual Machine Manager Prerequisites 678Planning a Virtual Machine Manager Deployment 682Deploying Virtual Machine Manager 687Summary 700Best Practices 70113 Managing a Hyper-V Environment with Virtual Machine Manager 2012 703Understanding the VMM Private Cloud 704Using the VMM Management Interfaces 707Understanding Virtual Machine Conversions 716Managing VMM User Roles 729Deploying Virtual Machines 740Migrating Virtual Machines 747Understanding and Implementing Server App-V 753Summary 758Best Practices 75914 Service Manager 2012 Design, Planning, and Implementation 761What's New in Service Manager 2012 762Explaining How Service Manager Works 763Service Manager Design Parameters 769Putting It All Together in a Service Manager Design 775Planning a Service Manager Deployment 783Deploying Service Manager 791Deploying Service Manager Connectors 805Backing Up Service Manager 2012 814Summary 817Best Practices 81715 Using Service Manager 2012 for Incident Tracking and Help Desk Support 819Incidents and Problems 819Configuring Incident Settings 821Service Manager Notifications 830Creating New Incidents 836Working with Incidents 846Configuring Problem Settings 856Working with Problems 859Incident and Problem Reports 863Summary 869Best Practices 87016 Using Service Manager 2012 for Service Offerings and Change Control Management 871Service Manager 2012 and the Infrastructure Optimization Model 871Service Offerings and Request Offerings in SM 2012 872Release Management in SM 2012 882Change Requests and Activities 885Configuring Change Settings 887Change Management Templates and Workflows 889Initiating Change Requests 892Working with and Approving Change Requests 896Implementing Change Requests 903Managing Configuration Items 910Working with Change, Activity, and Configuration Management Reports 914Summary 919Best Practices 92017 System Center Orchestrator 2012 Design, Planning, and Implementation 921Overview of System Center Orchestrator 921History of System Center Orchestrator 924System Center Orchestrator 2012 Installation Prerequisites 924Orchestrator Security Planning 926Installing System Center Orchestrator 2012 on a Single Server 928Installing System Center Orchestrator 2012 on Separate Systems 933Additional Tasks Following Orchestrator Installation 939Getting Familiar with the Orchestrator 2012 Management Consoles 942Installing Integration Packs 949Designing and Using Runbooks 952Runbook Permissions 967Summary 967Best Practices 968Index 969
Chris Amaris, MCITP, MCTS, CISSP/ISSAP, CHS III, is the chief technology officer and cofounder of Convergent Computing. He has more than 20 years experience consulting for Fortune 500 companies, leading companies in the technology selection, design, planning, and implementation of complex information technology projects. Chris has worked with Microsoft System Center products, such as Operations Manager and Configuration Manager, since their original releases in 2000 and 1994. He specializes in messaging, security, performance tuning, systems management, and migration. Receiving his first Microsoft technologies certification in 1993, Chris is a current Microsoft Certified IT Professional (MCITP) with multiple Microsoft Certified Technology Specialist designations (MCTS) in System Center technologies, a Certified Information Systems Security Professional (CISSP) with an Information System Security Architecture Professional (ISSAP) concentration, Certified Homeland Security (CHS III), a Novell CNE, a Banyan CBE, and a Certified Project Manager. Chris is also an author, writer, and technical editor for a number of IT books, including Network Security for Government and Corporate Executives, Exchange 2010 Unleashed, and Microsoft Windows Server 2008 R2 Unleashed. Rand Morimoto, Ph.D., MVP, MCITP, CISSP, has been in the computer industry for over 30 years and has authored, coauthored, or been a contributing writer for dozens of books on Windows, Security, Exchange, BizTalk, and Remote and Mobile Computing. Rand is the president of Convergent Computing, an IT-consulting firm in the San Francisco Bay area that has been one of the key early adopter program partners with Microsoft, implementing the latest Microsoft technologies, including Microsoft Windows Server 2008 R2, System Center 2012, Windows 7, Exchange Server 2010, Windows Server 2012, and SharePoint 2010 in production environments over 18 months before the initial product releases. Pete Handley, MCITP, CISSP, has more than 15 years of experience in IT, including extensive knowledge of Active Directory, Microsoft Exchange, Windows Server 2008, and the System Center suite of products. He has been a contributing author for the Sams books Microsoft Exchange 2003 Unleashed and Windows PowerShell Unleashed. Pete specializes in Visual Basic and PowerShell scripting and is a subject matter expert on the integration and migration of Novell technologies to Microsoft technologies. Pete holds the Microsoft Certified Systems Engineer 2003 (MCSE) certification, the Microsoft Certified Information Technology Professional (MCITP) certification, the Novell Certified Directory Engineer (CDE) certification, and the Certified Information Systems Security Professional (CISSP) certification. David E. Ross, MCITP, VCP, CCEA, CCSP, has over 13 years of experience in IT consulting, the majority of which have been spent playing the lead architect role on network design and implementation projects throughout the San Francisco Bay area. David is currently acting as a principal engineer for Convergent Computing, and is frequently involved in creating hybrid solutions involving multiple vendor technologies for organizations of all sizes. Specialties for David include Active Directory, Exchange, System Center, Lync, Citrix XenApp and XenDesktop design, virtualization solutions using VMware vSphere and Microsoft Hyper-V, and Cisco routing, switching, and security technologies.