3DES (Triple Data Encryption Standard) encryption algorithm, 282
access accounts, 41
Access RemoteApp And Desktops dialog box, 29
Active Directory Certificate Services (AD CS), 335
Active Directory Domain Services (AD DS)
authenticating users, 226
Configuration Manager clients, 230–231
Exchange Server connector, 321
ActiveSync
Configuration Manager and, 315–324
Intune and, 76
AD CS (Active Directory Certificate Services), 335
AD DS (Active Directory Domain Services)
authenticating users, 226
Configuration Manager clients, 230–231
Exchange Server connector, 321
Add Applications dialog box, 8–9
Add Dependency dialog box, 19–20
Add Exchange Server Wizard, 322
Add New Collection Alerts dialog box, 211
add-ons, 5
Advanced antimalware policy setting, 206
alerts
client health, 262
All Desktop And Server Clients collection, 243
All Mobile Devices collection, 243
All Systems collection, 243
All Unknown Computers collection, 243
All User Groups collection, 243
All Users And User Groups collection, 243
All Users collection, 243
antimalware
about, 175
automatic deployment rules, 153
configuration item settings, 184
Sequencer and, 7
APK file format, 57
App Package for Android deployment type, 57
App Package for iOS deployment type, 57
App-V (Application Visualization)
about, 1
infrastructure elements, 12–13
objective summary and review, 11–12, 22–23, 34–35
preparing Sequencer environment, 6–7
sequenced applications, 3–6, 16–20
App-V client
Configuration Manager integrated model, 15
configuring dependencies, 18–20
App-V Sequencer
additional information, 7
Configuration Manager integrated model, 15
application cache, streaming and, 18
Application Catalog
user device affinity, 66
Application Conflicts Data object type, 295
Application Dependency Data object type, 295
Application Deployment Asset Details object type, 295
Application Deployment Error Asset Details object type, 295
Application Deployment Error Status object type, 295
Application Deployment Requirement Not Met Asset Details object type, 295
Application Deployment Status object type, 295
application distribution strategy
about, 49
application management features, 43–45
application management server roles, 45–48
applications and packages, 42–43
objective summary and review, 49–51, 115–116
Application Requirement Data object type, 295
Application Requirement Not Met Status object type, 295
application upgrades
about, 82
application revision history, 84–85
application supersedence, 83–84
objective summary and review, 86–87, 118–119
uninstalling applications, 86
Application Virtualization Sequencing Wizard, 4
Application Visualization (App-V)
about, 1
infrastructure elements, 12–13
objective summary and review, 11–12, 22–23, 34–35
preparing Sequencer environment, 6–7
sequenced applications, 3–6, 16–20
APPV file format, 56
APPX file format, 56
Asset Intelligence
benefits, 302
inventory management and, 89–93, 270, 305–306
software metering, 306
Asset Intelligence catalog, 89–92
Asset Intelligence Software Details Conflict Resolution dialog box, 308, 313
Asset Manager security role, 93
authentication
Group Policy settings, 31
Internet-based, 100
Kerberos, 226
Mac OS X computers, 232
RD Gateway, 333
RDC, 28
Wi-Fi access point, 332
Windows, 226
automatic approval rules, 164–167
automatic deployment rules, 153–156
Available deployment purpose, 44
Background Intelligent Transfer Service (BITS), 15
baselines, configuration
configuration packs, 193
copying existing, 192
objective summary and review, 197–198, 216–217
viewing compliance information, 194–196
BITS (Background Intelligent Transfer Service), 15
boundary groups, 100
CA (certification authority)
certificate profiles, 335
Internet-based clients, 226
SCUP requirements, 125
canonical name (CNAME) record, 327
capacity requirements (RemoteApp), 26–27
about, 132
Asset Intelligence, 89–92, 304–305, 308
SCUP supported, 132
Catalogs workspace (SCUP), 132
CcmExec.log file, 283
CCMSetup.log file, 259
CCMSetup.msi file, 231
certification authority (CA)
certificate profiles, 335
Internet-based clients, 226
SCUP requirements, 125
child configuration items, 180
CIM (Common Information Model), 272
Client Coexistence node (Group Policy), 20
Client Health evaluation engine, 260–261
Client Push Installation Properties dialog box, 231, 237
Client Status reports, 261–262
ClientIDManagerStartup.log file, 259
ClientLocation.log file, 259
Client.msi file, 231, 235, 238
Client.msi.log file, 259
cloud-based distribution points, 102–103
CMMAC file format, 57
CNAME (canonical name) record, 327
Collection Data Point object type, 295
collections
limiting, 244
predefined, 243
command-line interface
Configuration Manager clients, 222
RemoteApp, 27
Common Information Model (CIM), 272
company portals, 78
compatibility
local installation and, 16
remote applications and, 25–26
compliance
building configuration items, 175–188
Configuration Manager clients, 227
creating and monitoring baselines, 189–198
rules for, 185
compressed files
inventory collection, 278, 280
troubleshooting, 109
ConfigmgrMacClient.msi file, 233
Configuration Baseline Name dialog box, 192
configuration baselines
configuration packs, 193
copying existing, 192
objective summary and review, 197–198, 216–217
viewing compliance information, 194–196
Configuration Item Name dialog box, 181
configuration items
compliance settings, 176
copying existing, 181
objective summary and review, 187–188, 215–216
Configuration Manager
about, 15
application distribution strategy, 39–51
automatic deployment rules, 153–156
building configuration items, 175–188
configuring dependencies, 18–20
configuring Endpoint Protection, 198–214
creating and monitoring baselines, 189–198
integrating with Intune, 326–328
integrating with SCUP, 127
managing connection profiles, 332–339
managing content distribution, 98–114
managing hardware and software inventory, 269–285
managing software metering, 286–293
monitoring software updates, 148–153
sequenced applications, 17
software update client settings, 141–144
software update points, 137–140
software updates in, 136
troubleshooting software updates, 148–153
Configuration Manager clients
health evaluation and remediation, 260–261
monitoring client status, 257–264
objective summary and review, 240–241, 263–268
site systems used in deployment, 235–237
verifying installation, 257–259
workgroup-based, 225
Configuration Manager Properties dialog box
Cache tab, 224
Components tab, 223
Network tab, 224
Site tab, 224
configuration packs, 193
Configuration.mof file, 275–276
Configure Client Setting dialog box, 277
Connection Groups (App-V), 7–10
content distribution
content library, 105
network bandwidth considerations, 103–104
objective summary and review, 113–114, 120–122
content management
Control Panel
Configuration Manager clients, 194
RD Web Access, 27
Create A New Policy dialog box, 158–160
Create Antimalware Policy dialog box, 206
Create Application Wizard
Application Catalog tab, 53
Content Locations tab, 54
Deployment Types tab, 54
Distribution Settings tab, 54
General Information tab, 52–53
Reference tab, 53
Security tab, 54
Supersedence tab, 54
Create Automatic Approval Rule Wizard
General page, 164
Product Categories page, 165
Summary page, 167
Update Classifications page, 165–166
Create Automatic Deployment Rule Wizard
Alerts page, 155
Deployment Package page, 155
Deployment Schedule page, 155
Deployment Settings page, 154
Distribution Points page, 156
Download Location page, 156
Download Settings page, 155
Evaluation Schedule page, 154
Language Selection page, 156
Software Updates page, 154
Summary page, 156
User Experience page, 155
Create Certificate Profile Wizard, 336
Create Child Configuration Item Wizard, 180
Create Configuration Baseline dialog box, 191
Create Configuration Item Wizard
Compliance Rules page, 179–180
Detection Methods page, 179
Mobile Device Settings page, 180
Platform Applicability page, 180
Supported Platforms page, 179–180
Create Deployment Type Wizard
about, 56
Content section, 59
Dependencies section, 59
Detection Method section, 59
General section, 59
Programs section, 59
Requirements section, 59
Return Codes section, 59
User Experience section, 59
Create Device Collection Wizard, 244–245
Create Direct Membership Rule Wizard, 244
Create Prestaged Content File Wizard, 112
Create Query Wizard, 294
Create Remote Connection Profile Wizard, 333
Create Report Wizard, 300
Create Requirement dialog box, 63
Create Site System Server Wizard
Boundary Groups page, 108
Content Validation page, 108
Distribution Point page, 107
Drive Settings page, 107
Multicast page, 108
Pull Distribution Point page, 108
PXE Settings page, 108
Select A Server To Use As A Site System page, 106–107
Specify Internet Proxy Server page, 107
Specify Roles For This Server page, 107
Create Software Metering Rule Wizard, 94, 288–289
Create Software Update Group dialog box, 145
Create User Collection Wizard, 244
Create Virtual Environment dialog box, 8–9
Create VPN Profile Wizard, 335
Create Wi-Fi Profile Wizard, 337
Create Windows Firewall Policy dialog box, 208
critical updates, 161–162, 164–165
CSV file format, 67
data queries, 294
data source name (DSN), 297
Dataldr.log file, 284
DataTransferService.log file, 259
DDRs (discovery data records), 283
Default Actions antimalware policy setting, 206
Default Antimalware Policy dialog box, 205–206
Default Settings dialog box
Compliance Settings section, 190
Computer Agent section, 140
Endpoint Protection section, 203
Hardware Inventory section, 273
Software Inventory section, 276
Software Metering section, 287
Software Updates section, 141
Definition Updates antimalware policy setting, 207
Delete Aged Collected Files site maintenance task, 282
Delete Aged Inventory History Properties dialog box, 283
Delete Aged Inventory History site maintenance task, 282
denial-of-service attacks, 281
dependencies (deploying applications)
deployment types and, 60
RemoteApp deployment, 26
Deploy Configuration Baselines dialog box, 192–193
Deploy Software Updates Wizard, 147
Deploy Software Wizard
Alerts page, 72
Content page, 68
Deployment Settings page, 69–70
General page, 68
User Experience page, 71
Deploy Windows Firewall Policy dialog box, 208
deploying applications (Configuration Manager)
dependencies, 60
deployment software wizard, 67–72
objective summary and review, 73–75, 116–117
simulated deployment, 73
Deployment Asset Details object type, 295
deployment models (App-V), 13–16
Deployment object type, 295
deployment packages, 145–147, 155–157
deployment purposes, 44–45, 78
Deployment Summary Per Collection object type, 295
deployment types
differences among, 55
deployments, defined, 41
desktop and mobile applications
deploying using Configuration Manager, 51–75
deploying using Microsoft Intune, 75–82
differences between packages and, 42–43
managing content distribution, 98–114
objective summary and review, 115–122
planning distribution strategy, 39–51
Desktop Management Interface (DMI), 272
Despooler.log file, 109
detection methods (deploying applications), 44, 59–60
Detection Rule dialog box, 60
direct rule, 244
discovery data records (DDRs), 283
DistMgr.log file, 109
Distribute Content Wizard, 110
Distribution Point Site System role, 106
distribution points
assigning priority, 104
Configuration Manager clients, 237
configuring, 146
distributing content to, 109–111
network bandwidth considerations, 103–104
pull, 102
Distribution Points Or Distribution Point Groups dialog box, 54
DMI (Desktop Management Interface), 272
DNS (Domain Name System), 236, 327
Domain Name System (DNS), 236, 327
Download Center, 233
Download Definition dialog box, 209
download location, 146–147, 156
Download Software Updates Wizard, 145–146
downloading configuration packs, 193
DSN (data source name), 297
Edit Inventory Classes dialog box, 92, 307
email management
client health alerts, 262
Endpoint Protection, 200
Exchange Server connector, 318–319, 322
maintenance windows, 245
reporting services configuration, 298
encryption
Exchange Server connector, 319
inventory collection, 278, 281–282
Microsoft Azure, 103
Endpoint Protection
automatic deployment rules, 153
objective summary and review, 213–214, 217–219
Windows Firewall policies, 207–208
Endpoint Protection Dash Board Data Point object type, 295
Endpoint Protection Point Site System role, 200–202
enrollment (mobile devices), 328–330
enrollment points, 237
enrollment proxy points, 237
Enrollment Wizard, 233
Enterprise (full infrastructure) model, 13–14
Error compliance state, 88
Exchange Server connector
about, 316
Applications Settings group, 320–321
Email Management Settings group, 318–319, 322
encrypted files, 319
General Settings group, 317
management tasks, 316
objective summary and review, 323–324, 340–341
Password Settings group, 317–318
Security Settings group, 319–320
exclude collections rule, 244
Exclusion Settings antimalware policy setting, 206
EXE file format, 56
Existential condition type, 63
Existential rules, 184
ExtADSch.exe tool, 235
ExtractContent command, 113
Failed VE Data object type, 295
fallback status points, 236
file collection
disabling, 282
status messages regarding, 284
File System detection rule, 60
FileSystemFile.log file, 283
firewalls
bandwidth management settings, 104
Configuration Manager clients, 230
distribution points, 100
Endpoint Protection, 198–200, 207–208
mobile device settings, 184
FQDN (fully qualified domain name), 100, 226
Full Administrator role, 140
full infrastructure (Enterprise) model, 13–14
fully qualified domain name (FQDN), 100, 226
global conditions (deploying applications), 44, 61–62
Group Policy
computer settings, 30
Configuration Manager clients, 230
sequenced applications, 17
hardware inventory
Asset Intelligence, 89–90, 92–93, 306
Configuration Manager clients, 239
Exchange Server connector, 316
inventory collection, 270, 272–274
Linux computers, 229
Mac OS X computers, 227
UNIX computers, 229
Hardware Inventory Classes dialog box, 274–275
health evaluation rules, 260–261
IDMIF file format, 282
IIS (Internet Information Services), 105
Import Configuration Data Wizard, 181, 191
Import Software Licenses Wizard, 93, 307
In Progress compliance state, 88
include collections rule, 244
Install deployment action, 44
Installable Rules dialog box, 131
Installable rules rule type, 134
installation
Configuration Manager clients, 230–234, 257–259
Installed compliance state, 144
Installed rules rule type, 134
instance limitation, deployment models, 13–14
Integration node (Group Policy), 20
Internet-based clients, 226–227
Internet Information Services (IIS), 105
Intune (Microsoft)
automatic approval rules, 164–167
categories and classifications, 161–162
deploying software for automatic installation, 78–79
deploying software to company portal, 78
inventory collection, 270
managing mobile devices, 76, 325–332
objective summary and review, 81–82, 117–118, 168–170, 172–173
operating system support, 76–78
update policies, 79–80, 158–161
inventory management
Asset Intelligence, 89–93, 270, 305–306
Configuration Manager clients, 224, 229, 239
deletion interval, 282
gathering information, 270–272
hardware inventory collection, 272–274
Intune, 77
Linux computers, 229
Mac OS X computers, 227
objective summary and review, 311–314
software inventory collection, 276–278
software metering, 94, 286–293
troubleshooting, 283
UNIX computers, 229
WMI, 89
InventoryAgent.log file, 283
IP Network object type, 295
IPA file format, 57
Kerberos authentication, 226
language selection, 146–147, 156
LDIFDE tool, 235
limiting collections, 244
Linux operating systems
Configuration Manager clients, 222, 228–229, 233–234
Endpoint Protection, 201
hardware inventory collection, 272
software inventory and, 276
LocalSystem account, 282
log files
collections, 254
Configuration Manager client status, 259
content status monitoring, 111
distribution point monitoring, 109
Mac OS X operating system
configuration items, 177, 180, 184–185
Configuration Manager clients, 222, 227–228, 232–233
deployment considerations, 57–58
Endpoint Protection, 201
hardware inventory collection, 272
software inventory and, 276
Macclient.dmg file, 233
maintenance windows, 142–143, 245–247
Manage Deployment dialog box, 160–161
Managed Object Format (MOF) file, 272, 275
management points
Mac OS X computers, 228
Management Server, 12
Management Server database, 13
metadata synchronization, 138–140
Microsoft Action Protection Service antimalware policy setting, 207
Microsoft Application Virtualization deployment type, 56
Microsoft Azure, 103
Microsoft Download Center, 233
Microsoft Intune
automatic approval rules, 164–167
categories and classifications, 161–162
deploying software for automatic installation, 78–79
deploying software to company portal, 78
inventory collection, 270
managing mobile devices, 76, 325–332
objective summary and review, 81–82, 117–118, 168–170, 172–173
operating system support, 76–78
update policies, 79–80, 158–161
Microsoft SQL Server Report Builder, 300–301
Microsoft SQL Server Reporting Services, 46
Microsoft Update
Configuration Manager software update integration, 136–139, 143, 147, 155–156
Sequencer options, 5
WSUS software update integration, 136–139, 143, 147, 155–156
MIF file format, 282
Mifprovider.log file, 283
mobile applications
differences between packages and, 42–43
managing content distribution, 98–114
managing with Configuration Manager, 51–75
objective summary and review, 115–122
planning distribution strategy, 39–51
mobile devices
configuration items, 177, 180, 183–184
inventory collection, 270
managing with Configuration Manager, 332–339
managing with Exchange Server connector, 315–324
managing with Intune, 76, 325–332
objective summary and review, 340–343
MOF (Managed Object Format) file, 272, 275
monitoring
Configuration Manager, 136, 148–153
Configuration Manager client status, 257–264
content status, 111
Endpoint Protection status, 210–211
objective summary and review, 97–98, 119–120
MP_Hinv.log file, 283
MP_Relay.log file, 284
MP_Retry.log file, 284
MSIExec file, 231
multiuser environments
application virtualization, 2
RemoteApp deployment, 26
NAP (Network Access Protection), 136
Network Access Protection (NAP), 136
New-RDRemoteApp cmdlet, 28
NOIDMIF file format, 282
Nokia SIS File deployment type, 57
Not Required compliance state, 144
object types, 295
OMI (Open Management Infrastructure), 272
OOBE state, 7
Open Management Infrastructure (OMI), 272
package accelerators, 5
package definition files, 41
Package Installation Root policy, 21
Package object type, 295
Package Transfer Manager, 111, 149
packages
differences between applications and, 42–43
scripts and, 43
password management
content management, 109
Exchange Server connector, 316–318
mobile devices, 177, 182–183, 328
power management, 250
RD Web Access, 25
Remote Desktop Connection Client, 30–31
PatchDownloader.log file, 152
PKGX file format, 112
PKI (public key infrastructure), 100
planning application distribution strategy
about, 49
application management features, 43–45
application management server roles, 45–48
applications and packages, 42–43
objective summary and review, 49–51, 115–116
plug-ins, 5
policy management
Exchange Server connector, 317–321
PolicyAgent.log file, 259, 283
power management
external dependencies, 248
PowerShell (Windows), 277
Prerequisite dialog box, 131
Program Deployment Asset Details object type, 295
Program Deployment Status object type, 295
Program object type, 295
Properties dialog box
collections, 211, 246, 262, 279
Configuration Manager, 194, 222–223, 258, 280
distribution points, 112, 228–229
management points, 228
queries, 296
query statements, 296
sites, 282
software metering, 95, 289–290
software update components, 149
website point, 48
PS1 file format, 277
public key infrastructure (PKI), 100
Publications workspace (SCUP), 133
Publish RemoteApp Programs Wizard, 27–28
Publishing node (Group Policy), 21
Publishing Server 1 Settings policy, 21
Publishing Servers
about, 12
full infrastructure model, 14
sequenced applications, 17
pull-distribution points, 102
queries
rules for, 244
status message, 284
RD Licensing, 30
RD Web Access (Remote Desktop Web Access), 25–28
RDC (Remote Desktop Connection) client
Advanced tab, 28
computer settings, 30
Display tab, 28
Experience tab, 28
General tab, 28
Local Resources tab, 28
Programs tab, 28
user settings, 31
RDL file format, 301
RDMS (Remote Desktop Management Service), 27
RDP (Remote Desktop Protocol) client, 25
RDP file format, 30
RDS (Remote Desktop Services), 2, 25
Real-time Protection antimalware policy setting, 206
redistributing content, 110–111
Registry detection rule, 60
remediation
remote connection profiles, 332–334
Remote Desktop Connection (RDC) client
Advanced tab, 28
computer settings, 30
Display tab, 28
Experience tab, 28
General tab, 28
Local Resources tab, 28
Programs tab, 28
user settings, 31
Remote Desktop Management Service (RDMS), 27
Remote Desktop Protocol (RDP) client, 25
Remote Desktop Services (RDS), 2, 25
Remote Desktop Session Host servers, 24–28, 30–31
Remote Desktop Users group, 24, 28
Remote Desktop Web Access (RD Web Access), 25–28
RemoteApp
application presentation strategies, 24–26
managing application connections, 28–29
objective summary and review, 32–33, 36–37
publishing and configuring, 27–28
user settings, 31
Reporting node (Group Policy), 21
Reporting Server, 13
Reporting Server database, 13
reporting services
Asset Intelligence, 303–304, 307–308
client health, 262
compliance management, 195–196
Configuration Manager, 46, 111, 136, 296–299
Configuration Manager clients, 258
Exchange Server connector, 316
objective summary and review, 309–310, 313–314
software update groups, 145
Reporting Services Configuration Manager, 297–299
reporting services points, 237, 297
Required compliance state, 144
Required deployment purpose, 44
requirements (deploying applications)
Asset Intelligence, 91–92, 305–306
Configuration Manager, 44, 62–65, 101
Requirements Not Met compliance state, 88
Resource Explorer
about, 271
accessing, 281
viewing file collections, 280
viewing hardware inventory, 227, 229, 281
viewing software inventory, 276, 278, 281
revision history
rules
compliance, 185
detection, 60
health evaluation, 261
for queries, 244
software metering, 94–95, 287–290
Rules workspace (SCUP), 133–134
Scan Settings antimalware policy setting, 206
ScanAgent.log file, 152
Scheduled Scans antimalware policy setting, 206
Scheduler.log file, 109
schedules
inventory collection, 272
reevaluating collection rules, 244
Schema Admins group, 234
schemas
CIM, 272
Script Installer deployment type, 56
Scripting node (Group Policy), 21
scripts, packages and, 43
SCUP (System Center Updates Publisher)
about, 174
additional information, 129
certificate requirements, 125
integrating with Configuration Manager, 127
OS and software requirements, 124
Secure Hash Algorithm 256 (SHA-256), 281
Secure Sockets Layer (SSL), 281
security management
App-V, 22
application virtualization, 3
Asset Intelligence, 93
compliance settings, 176
connection profiles, 333
creating applications, 54
Endpoint Protection, 200–201, 206, 209
event logs, 93
Exchange Server connector, 319–320
Full Administrator role, 140
managing inventory collections, 280–282
Remote Desktop Connection Client, 30
Remote Desktop Session Host, 30–31
SCUP, 131
security updates, 161–162, 164–165
Software Update Manager security role, 140, 145
software updates, 145
Security Roles object type, 295
Security Scopes object type, 295
security updates, 161–162, 164–165
Select Collection dialog box, 206, 208
self-signed certificates
Linux computers, 229
Mac OS X computers, 228
SCUP, 125
UNIX computers, 229
Sender.log file, 109
sequenced applications
additional information, 6
Sequencer
additional information, 7
Configuration Manager integrated model, 15
service (SRV) record, 236
session virtualization
about, 24
application presentation strategies, 24–26
managing connections to applications, 28–29
objective summary and review, 32–33, 36–37
publishing and configuring programs, 27–28
severity levels (noncompliance), 185
SHA-256 (Secure Hash Algorithm 256), 281
Shared Content Store (SCS) mode policy, 18, 21–22
Simple Network Management Protocol (SNMP), 272
simulated deployments, 73
Sinvproc.log file, 284
Site object type, 295
Site Server log files, 152
SMS_COLLECTION_EVALUATOR, 254
SMS_DEF.MOF file, 272
SMSDPProv.log file, 109
SMS_ENDPOINT_PROTECTION _MANAGER, 202
SMS_PACKAGE_TRANSFER_MANAGER, 111, 149
SMSProv.log file, 109
SMSPXE.log file, 109
SMS_SoftwareTag Asset Intelligence Hardware Inventory Reporting class, 89
SMSTSAssignUsersMode task sequence variable, 67
SMSTSUdaUsers task sequence variable, 67
SMS_WSUS_CONFIGURATION_MANAGER, 138
SMS_WSUS_CONTROL_MANAGER, 138
SMS_WSUS_SYNC_MANAGER, 139, 149
SNMP (Simple Network Management Protocol), 272
Software Center
application deployment, 55, 71
customizing settings, 47–48, 222, 225
maintenance windows and, 143
power management settings, 248
software delivery preferences, 225
user experience setting, 155
Software Center Options dialog box, 222
software inventory
Asset Intelligence, 89, 91–93, 305
Configuration Manager clients, 224, 239
configuring file collection, 279
Intune, 77
inventory collection, 270, 276–278
software metering, 94
software metering
Asset Intelligence, 306
objective summary and review, 292–293, 312–313
summarization tasks, 95–96, 290–292
Software Metering Agent, 94, 287–288
Software Metering Rule object type, 295
software update groups, 145
Software Update Manager security role, 140, 145
Software Update Point Synchronization Status, 148
software update points
Configuration Manager clients, 230, 237
log files, 152
software updates
categories and classifications, 161–162
using Configuration Manager and WSUS, 135–157
using Microsoft Intune, 78–79, 158–169
objective summary and review, 170–173
Software Updates agent, 140–144
Software workspace (Intune), 77
SoftwareDistribution.log file, 152
Specify Application dialog box, 8
Specify Required Application dialog box, 19–20
Specify what to load in background (that is, Autoload) policy, 22
SQL (Structured Query Language), 294
SQL Server Report Builder, 300–301
SQL Server Reporting Services (SSRS), 46, 296–299
SRV (service) record, 236
SSL (Secure Sockets Layer), 281
SSRS (SQL Server Reporting Services), 46, 296–299
standalone deployment model, 14
state, application, 45
status message queries, 284, 294
streaming applications
about, 16
App-V application cache and, 18
combining local installation and, 17–18
Streaming node (Group Policy), 21
Structured Query Language (SQL), 294
Success compliance state, 88
summarization tasks, software metering, 95–96, 290–292
Superseded Updates dialog box, 131
synchronizing update points, 138–140
System Center Endpoint Protection
automatic deployment rules, 153
objective summary and review, 213–214, 217–219
Windows Firewall policies, 207–208
System Center Marketplace, 193
System Center Updates Publisher (SCUP)
about, 174
additional information, 129
certificate requirements, 125
integrating with Configuration Manager, 127
OS and software requirements, 124
System Resource object type, 295
task sequence action variables, 67
third-party updates
objective summary and review, 134–135, 170–171
System Center Updates Publisher, 124–129, 174–175
Threat Overrides antimalware policy setting, 207
Triple Data Encryption Standard (3DES) encryption algorithm, 282
troubleshooting
client installation, 259
compressed files, 109
Configuration Manager issues, 284
content distribution, 108
content management, 109
inventory collection, 283
power consumption, 249
query issues, 294
Trusted Root Certification Authorities certificate store, 125
Uninstall deployment action, 44
uninstalling applications, 86
UNIX operating systems
Configuration Manager clients, 222, 228–229, 233–234
hardware inventory collection, 272
software inventory and, 276
Unknown compliance state, 88, 144
Unknown Computer object type, 295
update policies (Intune), 79–80, 158–161
updates (software)
categories and classifications, 161–162
using Configuration Manager and WSUS, 135–157
using Microsoft Intune, 78–79, 158–169
objective summary and review, 170–173
Updates workspace (SCUP)
about, 132
Optional Information section, 131
Package Information section, 130–131
Required Information section, 131
UpdatesDeployment.log file, 153
UpdatesHandler.log file, 152
UpdatesStore.log file, 152
upgrades (application)
about, 82
application revision history, 84–85
application supersedence, 83–84
objective summary and review, 86–87, 118–119
uninstalling applications, 86
User And Device Affinity group, 65
user device affinity (deploying applications), 45, 65–67
User Group Resource object type, 295
User Resource object type, 295
validating content, 99–100, 110–111
Value condition type, 63
VDI (Virtual Desktop Infrastructure), 272
virtual applications, managing environment
about, 12
App-V deployment models, 13–16
deploying sequenced applications, 16–20
objective summary and review, 22–23, 35–36
virtual applications, preparing
about, 1
objective summary and review, 11–12, 34–35
Virtual Desktop Infrastructure (VDI), 272
Wake On LAN (WOL), 70, 136, 147
WBEM (Web-Based Enterprise Management), 272, 295
WCM.log file, 152
Web Application deployment type, 57
Web-Based Enterprise Management (WBEM), 272, 295
Windows App Package, 56
Windows authentication, 226
Windows Firewall
Configuration Manager clients, 230
Endpoint Protection, 199–200, 207–208
Windows Installer
deployment type, 56
detection rule, 60
Windows Internet Naming Service (WINS), 236
Windows Management Instrumentation (WMI), 144, 272, 294
Windows Mobile Cabinet, 56
Windows operating systems
configuration items, 177, 179–180, 182–183
Configuration Manager clients, 222
Endpoint Protection, 200
inventory collection, 270, 278
Windows Phone App Package, 56
Windows PowerShell, 277
Windows Server Update Services (WSUS)
about, 123
automatic deployment rules, 153–156
Configuration Manager clients, 230
monitoring software updates, 148–153
objective summary and review, 156–157, 171–172
software update client settings, 141–144
software update points, 137–140
software updates in Configuration Manager, 136
troubleshooting software updates, 148–153
Windows Update agent, 143
WindowsUpdate.log file, 152
WINS (Windows Internet Naming Service), 236
WMI (Windows Management Instrumentation), 144, 272, 294
WMI Query Language (WQL), 294–295
WOL (Wake On LAN), 70, 136, 147
workgroup-based clients, 225
WQL (WMI Query Language), 294–295
WSUS (Windows Server Update Services)
about, 123
automatic deployment rules, 153–156
Configuration Manager clients, 230
monitoring software updates, 148–153
objective summary and review, 156–157, 171–172
software update client settings, 141–144
software update points, 137–140
software updates in Configuration Manager, 136
troubleshooting software updates, 148–153
WSUS Synchronization Manager, 138–139
WSUSCtrl.log file, 152
wsyncmgr.log file, 152
WUAHandler.log file, 152
XAP file format, 56
XML file format, 56
3.133.158.32