Application Management Using SCCM, Operating System Deployment Using SCCM, Endpoint Protection Using SC
Application Management Using SCCM, Operating System Deployment Using SCCM, Endpoint Protection Using SC
Microsoft System Center Configuration Manager (SCCM) has been considered an exemplary tool for managing
Microsoft applications. It does both patch management and software deployment seamlessly. But handling third-
party applications isn't its game. That's why, in addition to patch management, Patch Connect Plus also equips
users with third-party software deployment for SCCM Application Management. You can find a step-by-step
document that explains SCCM application deployment in detail from our knowledge base!
Applications repository
Patch Connect Plus is backed with a strong 300 plus-application-repository that comes with all popular third-party
applications like Java, Apple iTunes, Google Chrome etc. This way, Patch Connect Plus saves you from the
daunting task of downloading your favourite applications from the vendor site.
Pre-defined application templates
Patch Connect Plus offers application templates which you can harness to perform basic and some of the widely
used deployment actions while installing third-party applications. These application template include,
Configuration Manager provides several methods that you can use to deploy an operating system.
There are several actions that you must take regardless of the deployment method that you use:
• Identify Windows device drivers that are required to start the boot image or install the
operating system image that you have to deploy.
• Identify the boot image that you want to use to start the destination computer.
• Use a task sequence to capture an image of the operating system that you will deploy.
Alternatively, you can use a default operating system image.
• Distribute the boot image, operating system image, and any related content to a
distribution point.
• Create a task sequence with the steps to deploy the boot image and the operating
system image.
• Deploy the task sequence to a collection of computers.
• Monitor the deployment.
There are many operating system deployment scenarios in Configuration Manager that you can
choose from depending on your environment and the purpose for the operating system installation.
For example, you can partition and format an existing computer with a new version of Windows or
upgrade Windows to the latest version. To help you determine the deployment method that meets
your needs, review Scenarios to deploy enterprise operating systems. You can choose from the
following operating system deployment scenarios:
There are several methods that you can use to deploy operating systems to Configuration Manager
client computers.
Later in the Configuration Manager environment, the computer starts by using the boot
image provided by the media, and then connects to the site management point for
available task sequences that complete the download process. This method of
deployment can reduce network traffic because the boot image and operating system
image are already on the destination computer. You can specify applications, packages,
and driver packages to include in the pre-staged media. For more information,
see Create prestaged media.
Boot images
A boot image in Configuration Manager is a Windows PE (WinPE) image that is used during an
operating system deployment. Boot images are used to start a computer in WinPE, which is a
minimal operating system with limited components and services that prepare the destination
computer for Windows installation. Configuration Manager provides two boot images: One to
support x86 platforms and one to support x64 platforms. These are considered default boot images.
Boot images that you create and add to Configuration Manager are considered custom images.
Default boot images can be automatically replaced when you update Configuration Manager. For
more information about boot images, see Manage boot images.
Operating system images in Configuration Manager are stored in the Windows Imaging (WIM) file
format and represent a compressed collection of reference files and folders that are required to
successfully install and configure an operating system on a computer. For all operating system
deployment scenarios, you must select an operating system image. You can use the default
operating system image or build the operating system image from a reference computer that you
configure. For more information, see Manage operating system images.
Operating system upgrade packages are used to upgrade an operating system and are setup-
initiated operating system deployments. You import operating system upgrade packages to
Configuration Manager from a DVD or mounted ISO file. For more information, see Manage
operating system upgrade packages.
You can create several kinds of media that can be used to deploy operating systems. This includes
capture media that is used to capture operating system images and stand-alone, pre-staged, and
bootable media that is used to deploy an operating system. By using media, you can deploy
operating systems on computers that do not have a network connection or that have a low
bandwidth connection to your Configuration Manager site. For more information about how to use
media, see Create task sequence media.
Device drivers
You can install device drivers on destination computers without including them in the operating
system image that is being deployed. Configuration Manager provides a driver catalog that contains
references to all the device drivers that you import into Configuration Manager. The driver catalog is
located in the Software Library workspace and consists of two nodes: Drivers and Driver
Packages. The Drivers node lists all the drivers that you have imported into the driver catalog. You
can use this node to discover the details about each imported driver, to change what driver package
or boot image a driver belongs to, to enable or disable a driver, and more. For more information,
see Manage drivers.
When you deploy operating systems, you can save the user state from the destination computer,
deploy the operating system, and then restore the user state after the operating systems is
deployed. This process is typically used when you install the operating system on a Configuration
Manager client computer.
The user state information is captured and restored by using task sequences. When the user state
information is captured, the information can be stored in one of the following ways:
• You can store the user state data remotely by configuring a state migration point. The
Capture task sequence sends the data to the state migration point. Then, after the
operating system is deployed, the Restore task sequence retrieves the data and restores
the user state on the destination computer.
• You can store the user state data locally to a specific location. In this scenario, the
Capture task sequence copies the user data to a specific location on the destination
computer. Then, after the operating system is deployed, the Restore task sequence
retrieves the user data from that location.
• You can specify hard links that can be used to restore the user data to its original
location. In this scenario, the user state data remains on the drive when the old
operating system is removed. Then, after the operating system is deployed, the Restore
task sequence uses the hard links to restore the user state data to its original location.
You can deploy an operating system to computers that are not managed by Configuration Manager.
There is no record of these computers in the Configuration Manager database. These computers are
referred to as unknown computers. Unknown computers include the following:
When you deploy an operating system, you can associate users with the destination computer to
support user device affinity actions. When you associate a user with the destination computer, the
administrative user can later perform actions on whichever computer is associated with that user,
such as deploying an application to the computer of a specific user. However, when you deploy an
operating system, you cannot deploy the operating system to the computer of a specific user. For
more information, see Associate users with a destination computer.
You can create task sequences to perform a variety of tasks within your Configuration Manager
environment. The actions of the task sequence are defined in the individual steps of the sequence.
When the task sequence is run, the actions of each step are performed at the command-line level
without requiring user intervention. You can use task sequences for the following:
When you use Endpoint Protection with Configuration Manager, you have the following benefits:
• Configure antimalware policies, Windows Defender Firewall settings, and manage Microsoft
Defender for Endpoint to selected groups of computers.
• Use Configuration Manager software updates to download the latest antimalware definition files
to keep client computers up to date.
• Send email notifications, use in-console monitoring, and view reports. These actions inform
administrative users when malware is detected on client computers.
Beginning with Windows 10 and Windows Server 2016 computers, Microsoft Defender Antivirus is
already installed. For these operating systems, a management client for Microsoft Defender Antivirus
is installed when the Configuration Manager client installs. On Windows 8.1 and earlier computers,
the Endpoint Protection client is installed with the Configuration Manager client. Microsoft Defender
Antivirus and the Endpoint Protection client have the following capabilities:
The Endpoint Protection client can be installed on a server that runs Hyper-V and on guest virtual
machines with supported operating systems. To prevent excessive CPU usage, Endpoint Protection
actions have a built-in randomized delay so that protection services do not run simultaneously.
You can also manage Windows Defender Firewall settings with Endpoint Protection in the
Configuration Manager console.
Manage malware
Endpoint Protection in Configuration Manager allows you to create antimalware policies that
contain settings for Endpoint Protection client configurations. Deploy these antimalware policies to
client computers. Then monitor compliance in the Endpoint Protection Status node
under Security in the Monitoring workspace. Also use Endpoint Protection reports in
the Reporting node.
Configuration Manager manages and monitors Microsoft Defender for Endpoint, formerly known as
Windows Defender for Endpoint. The Microsoft Defender for Endpoint service helps you detect,
investigate, and respond to advanced attacks on your network. For more information, see Microsoft
Defender for Endpoints.
Endpoint Protection workflow
Use the following diagram to help you understand the workflow to implement Endpoint Protection
in your Configuration Manager hierarchy.
Recommendations
When you configure client settings for Endpoint Protection, don't use the default client settings. The
defaults apply settings to all computers in your hierarchy. Instead, configure custom client settings
and assign these settings to collections of computers in your hierarchy.
When you configure custom client settings, you can do the following:
• Customize antimalware and security settings for different parts of your organization.
• Test the effects of running Endpoint Protection on a small group of computers before you
deploy it to the entire hierarchy.
• Add more clients to the collection over time to phase your deployment of the Endpoint
Protection settings.
If you use Configuration Manager software updates to distribute definition updates, put definition
updates in a package that doesn't include other software updates. This practice keeps the size of the
definition update package smaller which allows it to replicate to distribution points more quickly.