Este curso es para profesionales experimentados en tecnología de la información (TI), generalmente descritos como administradores de escritorios empresariales (EDA). Estos EDA implementan, administran y mantienen equipos, dispositivos y aplicaciones en organizaciones medianas, grandes y empresariales. Una parte significativa de esta audiencia usa, o tiene la intención de usar, la última versión de Configuration Manager para administrar e implementar equipos, dispositivos y aplicaciones.
55348AC es el equivalente de Community Courseware del MOC 20703-1B retirado : Administración de Microsoft Endpoint Configuration Manager. Este curso de cinco días describe cómo usar Configuration Manager y sus sistemas de sitio asociados para administrar de manera eficiente los recursos de red. En este curso de cinco días, aprenderá las tareas de administración diarias, incluido cómo administrar aplicaciones, el estado del cliente, el inventario de hardware y software, la implementación del sistema operativo y las actualizaciones de software mediante Configuration Manager. También aprenderá a optimizar Endpoint Protection, administrar el cumplimiento y crear consultas e informes de administración.
Acerca de este curso
Este curso de cinco días describe cómo usar Configuration Manager y sus sistemas de sitio asociados para administrar de manera eficiente los recursos de red. En este curso de cinco días, aprenderá las tareas de administración diarias, incluido cómo administrar aplicaciones, el estado del cliente, el inventario de hardware y software, la implementación del sistema operativo y las actualizaciones de software mediante Configuration Manager. También aprenderá a optimizar Endpoint Protection, administrar el cumplimiento y crear consultas e informes de administración.
Aunque este curso y los laboratorios asociados están escritos para Microsoft Endpoint Configuration Manager y Windows 11, las habilidades enseñadas también serán compatibles con versiones anteriores de System Center Configuration Manager y Windows 10.
This module describes the features of Configuration Manager that you can use to perform complex management tasks, including the following tasks; Hardware and software inventory, Application management, Operating system deployment, Settings management, Software update management, Remote client troubleshooting, and Protection from malware. Microsoft System Center Configuration Manager (Configuration Manager) provides various features that can help you manage devices and users both on-premises and in the cloud. Organizations that use Configuration Manager find that they can provide more effective IT services in relation to software deployment, settings management, and asset management. This module introduces you to the primary features, architecture, and management tools used with Configuration Manager. This module also provides a foundation that relates to all other features and management tasks discussed in the modules that follow this one.
The Microsoft Endpoint Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This module describes queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this module details. This module also covers CMPivot, which allows you to collect and view real-time data on all the connected devices in your environment. It will enable you to make real-time decisions
You can manage computer and user resources within a Microsoft Endpoint Configuration Manager (Configuration Manager) environment only when Configuration Manager has discovered these resources and assigned them to a site. In this module, you will learn about boundaries and boundary groups that help create logical network locations containing computer devices that you need to manage in your Configuration Manager infrastructure. You can use these boundary configurations for automatic site assignment and to help clients find content and services from associated site systems. You will also learn about the discovery processes that you can use to identify computers, users, and the network infrastructure within your network environment. You will then learn about collections that support logical groupings of resources. You use these groupings for management tasks, such as targeting software updates, managing application deployments, or deploying compliance settings to resources.
You can install the Microsoft Endpoint Configuration Manager (Configuration Manager) client software on windows-based devices such as servers, workstations, and laptops. You then can manage these devices and perform operations such as reporting hardware and software inventory information, installing and updating software, and configuring settings required for compliance. Configuration Manager provides several options for installing the client software. This module explains the supported operating systems and devices, software requirements, and different methods for installing the client software. This module also describes some of the default and custom client settings that you can configure. After installing the client software, you can configure client settings and control how the various client components interact between the managed device and the Configuration Manager environment..
This module provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This module also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.
Microsoft Endpoint Configuration Manager (Configuration Manager) clients obtain content, such as packages, applications, software updates, and even operating system images, from a content infrastructure made up of distribution points and peer cache sources. In this module, you will review the content distribution and management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.
In this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications
This module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring Microsoft and third-party software updates to your Configuration Manager clients.
This module explains how to use the security-related features provided by Configuration Manager to help protect client computers from malware threats, and to configure specific Windows Defender Firewall settings for clients. Based on Endpoint Protection functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies, Windows Defender Firewall settings, Windows Defender Application Guard policies, Windows Defender Exploit Guard policies, and Windows Defender Application Control policies on client computers.
Many enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in identifying existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You also can control access to data using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings that you can manage using Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enterprise resources.
This module explains how to use the operating system deployment feature in Configuration Manager to create operating system images that you can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by using task sequences that Configuration Manager creates after you deploy the image to a target system. This module also explains how to use Configuration Manager to create a strategy for operating-system deployments . And also, it explains and how to manage Windows as a service. This module explains how to manage Windows as a service.
This module describes role-based administration, Remote Tools, and the site maintenance tasks that you can manage by using Configuration Manager. This module also describes how to back up and recover a Configuration Manager site system and use the recommendation(s) from Management Insights to simplify administration.
This modules describes the features that have been released since Configuration Manager 2012.
Preguntas frecuentes
El precio de los cursos de Excel varía según el nivel. Preguntanos y con gusto te asesoramos.
Para darte mayor información por favor llámanos al 4422150021 o dejanos un WhatsApp 4421817545
Del Mesón 186-Int 12, Col del Prado, 76030 Santiago de Querétaro, Qro.
Estamos junto al edificio de Telmex de Tecnológico a una cuadra de Zaragoza. Puedes estacionarte junto al edificio Tec100 / Nippo en una explanada grande, es una opción muy económica.
Es correcto, al finalizar el curso se entrega una constancia certificada por Executrain, que te ayudará a demostrar tus habilidades.
Claro, en Executrain contamos con más de 30 años de experiencia brindando servicios de capacitación y consultoría a empresas en el Bajío. Puedes buscarnos en Google como Executrain Querétaro para consultar las recomendaciones de los alumnos.
SI claro, solo envía tu constancia de situación fiscal y con gusto te facturamos.
Te ofrecemos una gran cantidad de opciones de certificación, tanto la capacitación como los exámenes pues somos Centro VUE.