Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
 Windows 8
 Adobe CS6
 CCNA 2012
 CCNP 2012
 Web Design
 Project Management
 Mobile Devices
 Windows Server 2012
 SQL Server 2012
Economics and Business
 Business Information Systems
 Human Resources

Microsoft System Center Enterprise Suite Unleashed

by: Chris Amaris, Tyson Kopczynski, Alec Minty, Rand Morimoto

Notify me when in stock

On-line Price: TBAPaperbackpackage, 1056

Retail Price: TBA

Publisher: Pearson Education,21.04.10

Category: Level:

ISBN: 0672333198
ISBN13: 9780672333194

Add to Shopping Cart

Provides users with the information they need to leverage all of the capabilities provided in the System Center suite.

# Written by System Center experts who have implemented the entire suite of products in some of the largest enterprises in the world
# Packed with tips, tricks, shortcuts, and examples
# Only book that covers the entire System Center Suite and the interoperability of the products as a unified strategy for Microsoft systems management.

Table of Contents



1 Introduction to the System Center Suite


What Is System Center?


Understanding System Center Configuration Manager


Understanding System Center Operations Manager


Understanding System Center Data Protection Manager


Understanding System Center Virtual Machine Manager


Understanding System Center Service Manager


Understanding System Center Capacity Planner


Understanding System Center Mobile Device Manager


Understanding System Center Essentials


Understanding System Center Licensing




Best Practices


2 System Center Configuration Manager 2007 R2 Design and Planning


Explaining How Configuration Manager Works


Understanding Content Distribution


Understanding Asset Management


Reporting from Configuration Manager


Configuration Manager Architecture Components


Securing Configuration Manager


Understanding Fault Tolerance and Disaster Recovery


Understanding Component Requirements


Configuration Manager Design Considerations


Planning for Native Mode


Understanding Client Schedules


Planning for Internet-Based Client Management


Putting It All Together




Best Practices


3 System Center Configuration Manager Implementation and Administration


Reviewing ConfigMgr 2007 R2 Architecture


Understanding the AD Site Topology


Creating a Public Key Infrastructure


Deploying Certificates


Preparing the Site Database Server


Extending the Active Directory Schema


Configuring Active Directory


Implementing Internet Information Services (IIS)


Implementing the Central Site


Deploying the Child Primary Sites.


Configuring the Hierarchy


Implementing Asset Management


Implementing Patch Management


Implementing OS Deployment


Implementing Regional Server Infrastructure


Discovering and Managing Clients




Best Practices


4 Using Configuration Manager to Distribute Software, Updates, and Operating Systems


Understanding the Infrastructure


Understanding How Clients Locate Content


Understanding How Internet Clients Locate Content


Understanding Computer Management


Configuring the Computer Client Agent .


Configuring the Advertised Programs Client Agent


Understanding Distribution Points


Defining Collections


Understanding Software Distribution


Publishing Software


Deploying Software Automatically


Monitoring Software Deployment


Understanding Update Distribution


Understanding Operating System Deployment


Preparing Required Packages


Managing Operating System Install Packages


Deploying Operating Systems




Best Practices


5 Configuration Manager Asset Management and Reporting


Understanding the Database


Understanding Inventory Collection


Using IDMIF and NOIDMIF Files


Configuring Client Agents for Inventory Collection


Customizing Hardware Inventory


Validating Inventory Data.


Viewing Inventory Data


Understanding Reporting. . .


Understanding Software Metering


Understanding Asset Intelligence


Importing Software License Data


Customizing the AI Catalog


Using System Center Online Services


Understanding Asset Intelligence Reporting


Understanding Desired Configuration


Monitoring the Baselines and Compliance.




Best Practices


6 Operations Manager Design and Planning


Explaining How OpsMgr Works


OpsMgr Architecture Components


Securing OpsMgr


Fault Tolerance and Disaster Recovery


Understanding OpsMgr Component Requirements


OpsMgr Design Considerations


Putting It All Together in a Design


Planning an Operations Manager Deployment




Best Practices


7 Operations Manager Implementation and Administration


Installing Operations Manager 2007 R2


Deploying OpsMgr Agents


Monitoring DMZ Servers with Certificates .


Configuring Operations Manager 2007 R2 .


Administering Operations Manager 2007 R2


Backing Up OpsMgr 2007 R2.




Best Practices


8 Using Operations Manager for Monitoring and Alerting


Using OpsMgr Consoles


Administering OpsMgr


Working with Management Packs


Exploring the Operations Manager Management Pack


Exploring the Windows Management Pack


Exploring the Active Directory Management Pack


Exploring the Exchange 2007 Management Pack


Exploring the SQL Server Management Pack


Exploring the Cross Platform Management Packs


Management Pack Templates.


Custom Management Packs


Distributed Application Monitoring


Exploring SNMP Device Monitoring




Best Practices


9 Using Operations Manager for Operations and Security Reporting


Reporting from OpsMgr


Generating and Scheduling Reports


OpsMgr 2007 R2 Maintenance Reports


Audit Collection Services Reporting


Service Level Tracking


Service Level Dashboards




Best Practices


10 Data Protection Manager 2010 Design, Planning, Implementation, and Administration


What Is System Center Data Protection Manager?


Data Protection Manager Background


Data Protection Manager Prerequisites .


Planning a Data Protection Manager Deployment


Deploying Data Protection Manager


Administrating Data Protection Manager




Best Practices


11 Using Data Protection Manager 2010 to Protect File Systems, Exchange, SQL, and SharePoint


Protecting File Servers


Protecting System State


Protecting Exchange Servers


Protecting SQL Servers


Protecting SharePoint Farms


Protecting Virtualized Environments


Integrating Data Protection Manager with Operations Manager




Best Practices


12 Virtual Machine Manager 2008 R2 Design, Planning, and Implementation


What Is Virtual Machine Manager?


Virtual Machine Manager Background


Virtual Machine Manager Prerequisites


Planning a Virtual Machine Manager Deployment


Deploying Virtual Machine Manager




Best Practices


13 Managing a Hyper-V Environment with Virtual Machine Manager 2008 R2


Using the VMM Management Interface


Understanding Virtual Machine Conversions


Managing VMM User Roles


Deploying Virtual Machines


Migrating Virtual Machines




Best Practices


14 Service Manager 2010 Design, Planning, and Implementation


Explaining How Service Manager Works


Service Manager Design Parameters


Putting It All Together in a Service Manager Design


Planning a Service Manager Deployment


Deploying Service Manager


Deploying Service Manager Connectors


Backing Up Service Manager 2010




Best Practices


15 Using Service Manager 2010 for Incident Tracking and Help Desk Support


Incidents and Problems


Configuring Incident Settings


Service Manager Notifications


Creating New Incidents


Working with Incidents


Configuring Problem Settings


Working with Problems


Incident and Problem Reports




Best Practices


16 Using Service Manager 2010 Change-Control Management


Change Requests and Activities


Configuring Change Settings


Change Management Templates and Workflows


Initiating Change Requests


Working with and Approving Change Requests


Implementing Change Requests


Managing Configuration Items


Change, Activity, and Configuration Management Reports




Best Practices


17 Using System Center Capacity Planner for Predeployment Planning


What Is System Center Capacity Planner?


System Center Capacity Planner Features


System Center Capacity Planner Background


System Center Capacity Planner Prerequisites


Installing System Center Capacity Planner


Creating a Capacity Model




Best Practices


18 Using Mobile Device Manager to Manage Mobile Devices


Why Mobile Management?


Background of Mobile Device Manager


Planning and Designing the Implementation of MDM


Prerequisites for Mobile Device Manager 2008 SP1


Installing System Center Mobile Device Manager


Self-Service Tasks with Mobile Device Manager


Device Management Tasks with Mobile Device Manager


Policy-Based Tasks with Mobile Device Manager


Mobility Access Controls Using Mobile Device Manager


Adding Exchange and Configuration Manager to an MDM Rollout




Best Practices


19 Using System Center Essentials for Midsized Organizations


What Is System Center Essentials?


Background of the System Center Essentials Product


System Center Essentials 2010 Prerequisites


Installing System Center Essentials 2010 on a Single Server


Installing System Center Essentials 2010 on Separate Servers


Getting Familiar with the SCE 2010 Management Console


Performing Computer and Device Discovery


Checking the Monitored Status of a Server and Application


Using Remote Assist and Remote Desktop


Using Essentials for Patching and Updating Systems


Creating Packages to Push Out New Software


Inventorying Systems Using System Center Essentials


Authoring an Agent to Monitor a Custom Website


Using the Virtualization Management Features of Essentials


Generating Reports Out of Essentials


Installing Agents on Target Systems


Troubleshooting Common Problems in SCE


Regular (Every 2-3 Days) Tasks an Administrator Should Perform


Weekly Tasks an Administrator Should Perform


Monthly Tasks an Administrator Should Perform




Best Practices




About the Authors

Chris Amaris, MCSE, CISSP/ISSAP, CHS III, is the chief technology officer and cofounder of Convergent Computing. He has more than 20 years experience consulting for Fortune 500 companies, leading companies in the technology selection, design, planning, and implementation of complex information technology projects. Chris has worked with Microsoft System Center products such as Operations Manager and Configuration Manager since their original releases in 2000 and 1994. He specializes in messaging, security, performance tuning, systems management, and migration. A Certified Information Systems Security Professional (CISSP) with an Information System Security Architecture Professional (ISSAP) concentration, Certified Homeland Security (CHS III), Windows 2003 MCSE, Novell CNE, Banyan CBE, and a Certified Project Manager, Chris is also an author and technical editor for a number of IT books, including Network Security for Government and Corporate Executives, Exchange 2010 Unleashed, and Microsoft Windows Server 2008 R2 Unleashed. Chris presents on messaging, systems management, security, and information technology topics worldwide.

Tyson Kopczynski, CISSP, GCIH, with more than ten years of experience in IT, has become a specialist in Active Directory, information assurance, Windows automation, PKI, and IT security practices. Tyson is also the founding author of the Windows PowerShell Unleashed series and has been a contributing author for such books as Microsoft Internet Security and Acceleration (ISA) Server 2006 Unleashed and Microsoft Windows Server 2008 R2 Unleashed. He has also written many detailed technical papers and guides covering various technologies. As a consultant at Convergent Computing, Tyson works with and has provided feedback for next generation Microsoft technologies since their inception and has also played a key role in expanding the automation and security practices at Convergent Computing. Tyson also holds such certifications as the Certified Information Systems Security Professional (CISSP), the SANS Security Essentials Certification (GSEC), SANS Certified Incident Handler (GCIH), and the Application Platform, Active Directory, and Network Infrastructure (MCTS).

Alec Minty, MCSE, is a senior engineer for a large Internet company in the San Francisco Bay area. He has more than 10 years' industry experience with extensive knowledge designing and implementing enterprise-class solutions for a diverse array of organizations. Alec has been an early adopter of database technologies, operations management, systems management, and security technologies. He specializes in designing, implementing, migrating, and supporting complex infrastructures for a variety of large utility, telecommunications, and engineering organizations. Alec's experience spans the business and technology areas; he has in-depth experience in the deployment, migration, and integration of key business technologies such as SQL Server, Windows, Exchange Server, Active Directory, ISA, and Identity Management. Alec is coauthor of SQL Server 2005 Management and Administration and MOM 2005 Unleashed and is a contributing author on Exchange Server 2007 Unleashed and ISA 2004 Unleashed, all published by Sams Publishing.

Rand H. Morimoto, Ph.D., MVP, MCITP, CISSP, has been in the computer industry for more than 30 years and has authored, coauthored, or been a contributing writer for dozens of books on Windows, Security, Exchange Server, BizTalk, and Remote and Mobile Computing. Rand is the president of Convergent Computing, an IT-consulting firm in the San Francisco Bay area that has been one of the key early adopter program partners with Microsoft, implementing the latest Microsoft technologies including Microsoft Windows Server 2008 R2, System Center Service Manager 2010, Windows 7, Exchange Server 2010, and SharePoint 2010 in production environments more than 18 months before the initial product releases.