Get some know-how from the field on what broken systems management looks likeRead More So, what does the status quo look like?
Do you want to keep non-compliant devices from accessing critical company data and prevent otherwise authenticated end users from opening their Exchange store from a non-compliant device, whether it is hosted or on-premise? Oh snap, y’all. Something relatively (but not, really) new in ConfigMgr is conditional access for managed devices. Now, this is not your father’s […]Read More An introduction to conditional access in ConfigMgr (current branch)
With the forthcoming service packs for SCCM 2012 and SCCM 2012 R2, you can now scale a hierarchy to 600,000 managed devices (50% increase from 400k) and a standalone primary site now can manage a maximum of 150,000 devices (also 50% increase from 100k). We’ll be testing these scalability numbers over at ITS Partners in […]Read More SCCM 2012 & 2012 R2 Scalability Improvements
Those of you installing shiny new instances of Windows Server 2012 R2 and SQL Server 2014 may be disappointed when you fire up prereqchk.exe and find out you can’t proceed with your ConfigMgr installation. SQL Server 2014 is supported for CAS, Primary Site and Secondary Site databases in SCCM 2012 R2 with CU4+ but you must first install a […]Read More Support for SQL Server 2014 in System Center 2012 R2 Configuration Manager (SCCM)
We recently conducted a survey of our customers to understand how they are using various image creation and deployment tools available on the market. Our sample group contained a lot of long-time customers and included active deployments. I have observed a trend over the past couple years of successfully leveraging MDT to build reference images (aka gold master, […]Read More How are my customers using Symantec’s (Altiris) Deployment Solution and the Microsoft Deployment Toolkit in 2014?
The foundation of a layered approach to security for both core and edge is configuration management. For a long time now we have seen other IT darlings like security and process automation eat up any budget not consumed by your ERP project. I’d argue that you can’t really accomplish any of your organizational goals for […]Read More From infrastructure management to infrastructure security