Microsoft System Center 2012 Unleashed

( 1 )

Overview

This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and techniques you just won’t find anywhere else.

You’ll learn how to use System Center’s powerful capabilities to build highly-efficient managed environments that encompass ...

See more details below
Paperback
$39.16
BN.com price
(Save 34%)$59.99 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (14) from $33.46   
  • New (9) from $35.24   
  • Used (5) from $33.46   
Microsoft System Center 2012 Unleashed

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac

Want a NOOK? Explore Now

NOOK Book (eBook)
$27.49
BN.com price
(Save 42%)$47.99 List Price

Overview

This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and techniques you just won’t find anywhere else.

You’ll learn how to use System Center’s powerful capabilities to build highly-efficient managed environments that encompass datacenters, cloud environments, client computers, mobile devices, and more. The authors address planning, design, implementation, integration, and administration, and cover every component, including Configuration Manager, Operations Manager, Data Protection Manager, Virtual Machine Manager, Service Manager, and Orchestrator.

  • Use Configuration Manager 2012 to deliver software and updates in highly-distributed environments including datacenters, clouds, and mobile devices
  • Reliably manage and report on assets with Configuration Manager 2012
  • Perform monitoring, alerting, operations, and security reporting with Operations Manager 2012
  • Use Data Protection Manager 2012to protect file systems, SQL, Microsoft Exchange, and SharePoint
  • Leverage Data Protection Manager 2012’s improved central monitoring and remote recovery
  • Run Hyper-V virtualized environments with VMM 2012—including new private clouds and mixed private/public fabrics
  • Use Service Manager 2012 to provide top-down integration, and use Orchestrator 2012 for bottom-up process automation and integration “glue”
  • Give users an efficient self-service portal for creating service and incident requests and browsing service catalogs
  • Manage service offerings and implement enterprise-wide change control with Service Manager 2012
  • Ensure compliance by creating, executing, and repeating auditable, documented processes with Orchestrator 2012
Read More Show Less

Product Details

  • ISBN-13: 9780672336126
  • Publisher: Sams
  • Publication date: 6/15/2012
  • Series: Unleashed Series
  • Edition number: 1
  • Pages: 1032
  • Sales rank: 479,720
  • Product dimensions: 7.00 (w) x 9.00 (h) x 2.20 (d)

Meet the Author

Chris Amaris, MCITP, MCTS, CISSP/ISSAP, CHS III, is the chief technology officer and cofounder of Convergent Computing. He has more than 20 years experience consulting for Fortune 500 companies, leading companies in the technology selection, design, planning, and implementation of complex information technology projects. Chris has worked with Microsoft System Center products, such as Operations Manager and Configuration Manager, since their original releases in 2000 and 1994. He specializes in messaging, security, performance tuning, systems management, and migration. Receiving his first Microsoft technologies certification in 1993, Chris is a current Microsoft Certified IT Professional (MCITP) with multiple Microsoft Certified Technology Specialist designations (MCTS) in System Center technologies, a Certified Information Systems Security Professional (CISSP) with an Information System Security Architecture Professional (ISSAP) concentration, Certified Homeland Security (CHS III), a Novell CNE, a Banyan CBE, and a Certified Project Manager. Chris is also an author, writer, and technical editor for a number of IT books, including Network Security for Government and Corporate Executives, Exchange 2010 Unleashed, and Microsoft Windows Server 2008 R2 Unleashed.

Rand Morimoto, Ph.D., MVP, MCITP, CISSP, has been in the computer industry for over 30 years and has authored, coauthored, or been a contributing writer for dozens of books on Windows, Security, Exchange, BizTalk, and Remote and Mobile Computing. Rand is the president of Convergent Computing, an IT-consulting firm in the San Francisco Bay area that has been one of the key early adopter program partners with Microsoft, implementing the latest Microsoft technologies, including Microsoft Windows Server 2008 R2, System Center 2012, Windows 7, Exchange Server 2010, Windows Server 2012, and SharePoint 2010 in production environments over 18 months before the initial product releases.

Pete Handley, MCITP, CISSP, has more than 15 years of experience in IT, including extensive knowledge of Active Directory, Microsoft Exchange, Windows Server 2008, and the System Center suite of products. He has been a contributing author for the Sams books Microsoft Exchange 2003 Unleashed and Windows PowerShell Unleashed. Pete specializes in Visual Basic and PowerShell scripting and is a subject matter expert on the integration and migration of Novell technologies to Microsoft technologies. Pete holds the Microsoft Certified Systems Engineer 2003 (MCSE) certification, the Microsoft Certified Information Technology Professional (MCITP) certification, the Novell Certified Directory Engineer (CDE) certification, and the Certified Information Systems Security Professional (CISSP) certification.

David E. Ross, MCITP, VCP, CCEA, CCSP, has over 13 years of experience in IT consulting, the majority of which have been spent playing the lead architect role on network design and implementation projects throughout the San Francisco Bay area. David is currently acting as a principal engineer for Convergent Computing, and is frequently involved in creating hybrid solutions involving multiple vendor technologies for organizations of all sizes. Specialties for David include Active Directory, Exchange, System Center, Lync, Citrix XenApp and XenDesktop design, virtualization solutions using VMware vSphere and Microsoft Hyper-V, and Cisco routing, switching, and security technologies.

Read More Show Less

Table of Contents

Introduction 1
1 Overview of the System Center Suite 5
What Is System Center? 6
Understanding System Center Configuration Manager 9
Understanding System Center Operations Manager 18
Understanding System Center Data Protection Manager 26
Understanding System Center Virtual Machine Manager 34
Understanding System Center Service Manager 40
Understanding System Center 2012 Orchestrator 45
Understanding System Center Licensing 50
Summary 51
Best Practices 52
2 Configuration Manager 2012 Design and Planning 55
What’s New in ConfigMgr 2012 56
Explaining How Configuration Manager Works 60
Understanding Content Distribution 66
Understanding Asset Management 70
Reporting from Configuration Manager 74
Configuration Manager Architecture Components 75
Securing Configuration Manager 88
Understanding Component Requirements 92
Configuration Manager Design Considerations 94
Understanding Client Schedules 105
Planning for Internet-Based Client Management 106
Putting It All Together in a Design 110
Summary 112
Best Practices 112
3 Configuration Manager 2012 Implementation and Administration 115
Sample Organization 115
Configuring Installation Prerequisites 118
Implementing the Central Administration Site 124
Deploying the Primary Sites 129
Deploying the Secondary Sites 134
Configuring the Hierarchy 138
Configuring Sites 148
Configuring Client Settings 156
Implementing Internet-Based Client Management 163
Summary 177
Best Practices 178
4 Using Configuration Manager 2012 to Distribute Applications, Updates, and Operating Systems 181
Understanding Content Distribution 181
Defining Collections 185
Understanding Application Management 189
Managing Deployments 203
Understanding Software Updates 215
Deploying Software Updates 219
Understanding Operating System Deployment 225
Deploying Operating Systems 234
Extending with Microsoft Deployment Toolkit 238
Summary 243
Best Practices 243
5 Using Configuration Manager 2012 for Asset Management and Reporting 245
Understanding Asset Data 246
Configuring Client Settings for Inventory Collection 248
Understanding Reporting 249
Customizing Hardware Inventory 261
Understanding Asset Intelligence 269
Understanding Software Metering 277
Understanding Compliance Settings 278
Monitoring the Baselines and Compliance 283
Summary 285
Best Practices 285
6 Operations Manager 2012 Design and Planning 289
What’s New With Operations Manager 2012 290
Understanding How OpsMgr Works 291
OpsMgr Architecture Components 296
Securing OpsMgr 311
Fault Tolerance and Disaster Recovery 317
Understanding OpsMgr Component Requirements 323
OpsMgr Design Considerations 328
Putting It All Together in a Design 335
Planning an Operations Manager Deployment 345
Summary 353
Best Practices 354
7 Operations Manager 2012 Implementation and Administration 355
Installing Operations Manager 2012 356
Deploying OpsMgr Agents 373
Monitoring DMZ Servers with Certificates 385
Configuring Operations Manager 2012 393
Administering Operations Manager 2012 403
Backing Up OpsMgr 2012 411
Summary 418
Best Practices 418
8 Using Operations Manager 2012 for Monitoring and Alerting 421
Using OpsMgr Consoles 422
Working with Management Packs 425
Exploring the Operations Manager Management Pack 432
Exploring the Windows Management Pack 440
Exploring the Active Directory Management Pack 451
Exploring the Exchange 2010 Management Pack 466
Exploring the SQL Server Management Pack 478
Exploring the Cross Platform Management Packs 487
Management Pack Templates 491
Custom Management Packs 503
Summary 508
Best Practices 508
9 Using Operations Manager 2012 for Operations and Security Reporting 511
Reporting from OpsMgr 512
Generating and Scheduling Reports 514
OpsMgr 2012 Maintenance Reports 532
Audit Collection Services Reporting 541
Service Level Tracking 548
OpsMgr 2012 Dashboards 554
Publishing Dashboards into SharePoint 2010 561
Summary 565
Best Practices 566
10 Data Protection Manager 2012 Design, Planning, Implementation, and Administration 567
What Is System Center Data Protection Manager? 568
Data Protection Manager Background 572
Data Protection Manager Prerequisites 578
Planning a Data Protection Manager Deployment 580
Deploying Data Protection Manager 587
Completing Required Configuration Tasks 591
Creating Protection Groups 601
Administrating Data Protection Manager 606
Summary 616
Best Practices 617
11 Using Data Protection Manager 2012 to Protect File Systems, Exchange, SQL, and SharePoint 619
Protecting File Servers 620
Protecting System State 622
Protecting Exchange Servers 624
Protecting SQL Servers 635
Protecting SharePoint Farms 643
Protecting Virtualized Environments 654
Summary 660
Best Practices 661
12 Virtual Machine Manager 2012 Design, Planning, and Implementation 663
Understanding Virtual Machine Manager 663
Virtual Machine Manager Background 673
What’s New in System Center Virtual Machine Manager 2012 677
Virtual Machine Manager Prerequisites 678
Planning a Virtual Machine Manager Deployment 682
Deploying Virtual Machine Manager 687
Summary 700
Best Practices 701
13 Managing a Hyper-V Environment with Virtual Machine Manager 2012 703
Understanding the VMM Private Cloud 704
Using the VMM Management Interfaces 707
Understanding Virtual Machine Conversions 716
Managing VMM User Roles 729
Deploying Virtual Machines 740
Migrating Virtual Machines 747
Understanding and Implementing Server App-V 753
Summary 758
Best Practices 759
14 Service Manager 2012 Design, Planning, and Implementation 761
What’s New in Service Manager 2012 762
Explaining How Service Manager Works 763
Service Manager Design Parameters 769
Putting It All Together in a Service Manager Design 775
Planning a Service Manager Deployment 783
Deploying Service Manager 791
Deploying Service Manager Connectors 805
Backing Up Service Manager 2012 814
Summary 817
Best Practices 817
15 Using Service Manager 2012 for Incident Tracking and Help Desk Support 819
Incidents and Problems 819
Configuring Incident Settings 821
Service Manager Notifications 830
Creating New Incidents 836
Working with Incidents 846
Configuring Problem Settings 856
Working with Problems 859
Incident and Problem Reports 863
Summary 869
Best Practices 870
16 Using Service Manager 2012 for Service Offerings and Change Control Management 871
Service Manager 2012 and the Infrastructure Optimization Model 871
Service Offerings and Request Offerings in SM 2012 872
Release Management in SM 2012 882
Change Requests and Activities 885
Configuring Change Settings 887
Change Management Templates and Workflows 889
Initiating Change Requests 892
Working with and Approving Change Requests 896
Implementing Change Requests 903
Managing Configuration Items 910
Working with Change, Activity, and Configuration Management Reports 914
Summary 919
Best Practices 920
17 System Center Orchestrator 2012 Design, Planning, and Implementation 921
Overview of System Center Orchestrator 921
History of System Center Orchestrator 924
System Center Orchestrator 2012 Installation Prerequisites 924
Orchestrator Security Planning 926
Installing System Center Orchestrator 2012 on a Single Server 928
Installing System Center Orchestrator 2012 on Separate Systems 933
Additional Tasks Following Orchestrator Installation 939
Getting Familiar with the Orchestrator 2012 Management Consoles 942
Installing Integration Packs 949
Designing and Using Runbooks 952
Runbook Permissions 967
Summary 967
Best Practices 968
Index 969

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Posted September 13, 2013

    more from this reviewer

    Very helpful to pass MSCE:Private Cloud

    Very helpful. But you should by the companions to be awesome at System Center 2012 Configure Manager and others.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)