Client Management Part 2
Welcome to SCCM Features and Capabilities Overview, part two of Client Management.
- In this section we will discuss Compliance Settings, Client Health, Endpoint Protection, and Power Management
- Let’s say that you work in a secure environment and all 1000 laptops in your organization have been upgraded to the latest version of Windows 10. You decide to disable the blue-tooth feature on all the laptops because that device could be used to transmit sensitive information outside the facility.
- With Compliance settings you can push this out to all your laptops to make sure that they are all compliant.
- Devices that you can configure are called Configuration Items.
- Typically, that means that you can configure devices that are managed with or without a configuration manager installed on the device.
- In this case we will install this configuration item on all Windows 10 computers that have the configuration manager installed.
- This means that blue-tooth will be prohibited on every Windows 10 device in the organization that has configuration manager installed.
And that saves us a lot of work.
Using Client Health, you can set filters so you can view the health of SCCM clients in one glance.
At the top left you can select the filters for Client health
- Client Health by collection – Click Browse and you can choose client health by collection, all Systems are the default.
- Active clients by days – You can choose the active clients or those clients that have been communicating back and forth with the database by number of days.
- Client health for offline clients – Client status is updated continually. This filter can be used to display only clients that are offline. If you have computers indicated here. Perhaps these folks are on travel and will get checked for compliance when they return.
- Only show Unhealthy clients – These are clients that don’t have the latest Defender or Windows 10 updates or patches.
- Client Health Percentage – This show that all systems are 100% compliant
- Client Versions – This tells us what version of configuration manager client is installed on our computers, in this case the version is 8790
- Operating System Versions – This indicates that ½ of the computers are servers and half are workstations
- The bars at the bottom show 100% compliance with the selected Software and hardware Inventory.
There are other ways to display client status. You can go to monitoring, reporting and run Client Status Summary.
- An Endpoint is any mobile device laptop, notebook, desktop, or smartphone that connects to a network.
- Microsoft’s System Center Endpoint Protection is an antivirus, antimalware product for the Windows operating system. System Center Endpoint Protection is dependent upon SCCM to deploy the SCEP (System Center Endpoint Protection) agent to clients and distribute updates.
- You can deploy Endpoint Protection to your clients by creating and configuring custom client settings. Here I created a new Client settings policy called EP client settings
- And here we’ve selected and chosen yes to install Endpoint Protection client on client computers. Just right click on the EP client settings and click deploy.
- You can deploy endpoint protection to a collection of computers. You can see that SAW01 is now managed by Endpoint Protection.
- Enables you to reduce the power consumption of the computers and monitors in your organization.
- You can configure custom power plans that fit the need of your company.
- Let’s say you have 2000 computers in your facility and after 9:00 PM you want to turn off all the monitors. You can do this with Configuration Manager Power Management. Here we have Enabled Power Management on our devices by creating and configuring Custom Client Device Settings. In this example, we’ve chosen the Balanced Power Plan and have deployed this plan to the device collection.
- Here you can edit the choices in the balanced plan.
- Please note that Power Management is not supported on Virtual Machines. So we can’t test this on our VM’s. But you can implement any of these plans on your network in your organization.
Sign up to access the rest of this lesson
You must either log in or sign up to access this lesson.