Thursday, 15 December 2016

SCCM 2016 / SCCM CM1511 Planning work Sheet

SCCM 2016 / SCCM CM1511 Planning work Sheet

 

 

 

 

Active Directory Planning

Active Directory Planning

Example Data Needed, Where Applicable, and by Location

Collected Data

Do you plan on using your Active Directory Sites to define your Configuration Manager  boundaries?

If yes, list the Active Directory sites that you will use.

 

Do you plan on extending your Active Directory schema for Configuration Manager ?

If yes, determine whether you have the appropriate permissions to extend the schema.

 

Do you need to manage Configuration Manager  sites across multiple forests?

If yes, be aware of limitations across forests.

 

 

 

 

Discovery Planning

Discovery planning

Example data needed, where applicable, and by location

Collected Data

Active Directory System Discovery. Active Directory System Discovery retrieves details about the computer, such as computer name, Active Directory container name, IP address, and Active Directory site. It generates a DDR for each computer it discovers in Active Directory.

Active Directory container and location (local domain, local forest, custom LDAP or GC query) Polling schedule

 

Active Directory System Group Discovery. Active Directory System Group Discovery works only for systems that are already discovered and assigned to the local primary site and any direct child secondary sites. Active Directory System Group Discovery is not available for secondary sites. If a resource has been discovered and is assigned to the Configuration Manager  site, Active Directory System Group Discovery extends other discovery methods by retrieving details such as organizational unit, global groups, universal groups, and nested groups.

Active Directory container and location (local domain, local forest, custom LDAP or GC query) Polling schedule

 

Active Directory User Discovery. The Active Directory User Discovery method discovers users and the user groups of which they are members. Active Directory User Discovery returns more information from Active Directory domains than Windows User Account Discovery or Windows User Group Discovery and it continues to work with those domains when you switch them to native mode.

Active Directory container and location (local domain, local forest, custom LDAP or GC query) Polling schedule

 

Network Discovery. The Network Discovery method can be configured to discover the topology of your network, as well as potential client computer information. By querying specified network routers, network discovery retrieves information about the network topology and routers in use. Using discovered router information, or specified Microsoft DHCP server IP address lease information, network discovery can also discover potential client computer information such as IP address and operating system version.

Type of Discovery (Topology, Topology and client, Topology, client, and client operating system), IP subnets to search, and Microsoft DHCP server names to query.

 

Active Directory Forest Discovery
Unlike other Active Directory discovery methods, Active Directory Forest Discovery does not discover resources that you can manage. Instead, this method discovers network locations that are configured in Active Directory and can convert those locations into boundaries for use throughout your hierarchy.

Account requied with permissions to the non-trusted forest

 

 

 

 

 

 

Boundaries Planning

Boundary Type

Example data needed, where applicable, and by location

Collected Data

IP subnet

What subnets will you assign as site boundaries for this site?

 

Active Directory site name

What Active Directory sites will you use as site boundaries for this site?

 

IPv6 prefix

What IPv6 prefixes will you use as boundaries for this site?

 

IP range

What IP ranges will you use for this site?

 

 

 

 

 

 

 

Site Systems  Planning

 

 

 

 

 

Site name

Site code

Primary site? (Note if the site is the central site.)

Secondary site? (Indicate parent site name and site code)

Potential number of clients managed by this site:

IP subnet(s) or Active Directory sites associated with this site.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Site Planning Summary Worksheet

 

 

 

 

 

Computer name

Site server

Management point?Indicate whether it is the default or proxy.

Site database server?

Reporting point?Primary site only.

Distribution point and other Roles Servers

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Configuration Manager Console

 

Computer Name

Location

For Which Users / Groups going to Use

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Client Installation Planning

Client installation methods

Explanation

Configuration parameters

Install Clients Using Software Update Point Based Installation

The Software update point (SUP) client installation method installs the Configuration Manager  client software on any computer that can communicate with the site's software update point.

To specify the setup parameter information for the client installation you will need to create the SetupParameters registry string value in the following registry key: HKey_Local_Machine \Software \Policies \Microsoft \CCMSetup 

 

CCMSetup.exe will locate the setup parameters using this registry string value. For example: the registry string value information /mp:[ServerName] is read by CCMSetup.exe and the Configuration Manager client is directed to the server name specified. Specifying parameters through the registry key SetupParameters is the equivalent of specifying the installation parameters using the command line.

 

Client imaging

You can load client software components on the computer when it is originally prepared for service in your organization. Typically, computer preparation work is done by an IT team in a staging area. The client is installed on a computer master image by installing core client components without specifying a site code for assignment. The computer is ready to be assigned to a site when it arrives at the location where will be used in production.

Identify the CCMSetup.exe command line options you will use when installing the client on the master computer to be imaged.

 

Identify any registry modifications that need to be made for the preferred client type.

 

Identify the site code that the client should be assigned to.

 

Client Push installation

Client Push Installation is useful for installing the client software on computers that:

Enabled?

 

 

Have been discovered by Configuration Manager  but do not have the client software installed.

For computers running Windows Vista you must enable the remote registry service or the client push installation will fail on those clients.

 

 

Rarely log on to the network because the users lock their Windows sessions instead of logging out.

Identify the client push installation account that will be used.

 

 

Log on with a user account that does not run a logon script or does not have administrative permissions on the computer.

Identify whether you will push the client to servers, workstations, or domain controllers.

 

 

Are servers that users might not log on to for a long period of time.

 

 

 

Manual installation

You can use CCMSetup.exe to manually install the Configuration Manager  client software to a computer. CCMSetup.exe uses the Client.msi program to install the client software. CCMSetup.exe copies all the files necessary to complete the client installation, including the Client.msi and language-specific files and folders, to the computer.

Identify how and when CCMSetup.exe will be run on each client

 

Identify any specific command line options required.

 

Active Directory Group Policy

You can distribute the Configuration Manager  client software using Active Directory Group Policy. Because of the limitations with customizing this installation method, Group Policy installations should be used for targeting small groups of computers. You can publish or assign the client installation program to computers based on their organizational unit location in Active Directory.

Identify the name(s) of any Group Policy objects.

 

Name(s) of OU, domain, or site the Group Policy object is linked to.

 

Identify any additional Group Policy object settings such as No Override or group filtering.

 

Identify Group Policy object security settings

 

Logon scripts installation

You can use the file CCMSetup.exe in a login script to trigger the client installation.

Identify any logon scripts being used and the commands being processed.

 

Logon script installations can be configured using the same method that you would configure a manual client installation. You can specify the /logon switch with CCMSetup.exe which will cause CCMSetup.exe to skip the installation if there is already a Configuration Manager Client installed.

 

If no installation source is specified using the /Source switch and no management point is specified using the /MP switch, CCMSetup.exe can locate the management point if there is a server locator point and Active Directory Services has been extended.

 

Software distribution

Software distribution can be used to upgrade existing SMS 2003 Advanced Clients.

Identify how and when CCMSetup.exe will be distributed on each client

Outline your plan to distribute CCMSetup.exe to run on each client.

 

 

Identify any specific command line options required.

 

 

 

 

 

 

 

Client Installation Planning

 Agent

Example Data Needed, Where Applicable, and by Location

Client Agent Settings Name

Target Collections Name

Background Intelligent Transfer

Enabled?

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Client Cache Settings

Enabled?

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Client Policy

Enabled?

 

 

 

 

 

 

 

 

 

 

Compliance Settings

Enabled?

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Computer Agent

Enabled?

 

 

 

 

 

 

 

 


Computer Restart

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Endpoint Protection

Enabled?

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Hardware Inventory

Enabled?

 

 

 

 

 

 

 

 

Metered Internet Connections

Enabled?

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Power Management

Enabled?

 

 

Remote Tools

Enabled?

 

 

Software Deployment

Enabled?

 

 

Software Inventory

Enabled?

 

 

Software Updates

Enabled?

 

 

User and Device Affinity

Enabled?

 

 

Mobile Devices

Enabled?

 

 

Enrollment

Enabled?

 

 

User and Device Affinity

Enabled?

 

 

 

No comments:

Post a Comment