{"id":13500,"date":"2022-09-05T15:31:20","date_gmt":"2022-09-05T12:31:20","guid":{"rendered":"https:\/\/esi.edu.sa\/?post_type=courses&#038;p=13500"},"modified":"2026-02-04T16:01:01","modified_gmt":"2026-02-04T13:01:01","slug":"system-center-configuration-manager","status":"publish","type":"courses","link":"https:\/\/esi.edu.sa\/en\/courses\/system-center-configuration-manager\/","title":{"rendered":"Microsoft System Center Configuration Manager (SCCM)"},"content":{"rendered":"<p dir=\"ltr\" style=\"text-align: justify;\"><img decoding=\"async\" class=\"alignnone wp-image-20027\" src=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png\" alt=\"\" width=\"188\" height=\"40\" srcset=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png 300w, https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy-50x11.png 50w\" sizes=\"(max-width: 188px) 100vw, 188px\" \/><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Overview<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Configuration management allows organizations to track, map, and monitor all hardware and software integral to completing the business<\/li>\n<li>By taking up Administering System Center Configuration Manager training, learners will understand how to build and manage system center configuration.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Benefits<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Description of all features offered by Configuration Manager and Intune including how to manage and adapt these features to both PC and mobile devices within a<\/li>\n<li>The ability to analyze data using queries and generate reports.<\/li>\n<li>Deployment and management of the Configuration Manager<\/li>\n<li>Preparation of management infrastructure (including boundary configuration, boundary groups, and resource discovery) and integration mobile device management through Microsoft Exchange<\/li>\n<li>Configuration, management, and monitoring of both the hardware and software inventory using asset intelligence and software<\/li>\n<li>Implementation of endpoint protection for managed<\/li>\n<li>Management of configuration items, baselines, and profiles in order to assess and configure compliance settings and data access for both users and<\/li>\n<li>Maintenance of software and hardware updates around the PCs managed by the Configuration<\/li>\n<li>Deploy, monitor, and distribute applications across different users and<\/li>\n<li>Compiling the best methods to distribute and manage content used for<\/li>\n<li>Management and maintenance of a configuration manager site.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>The Main Topic of the Course<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Module 1: Managing computers and mobile devices in the enterprise<\/li>\n<li>Module 2: Analyzing data using queries, reports, and CMPivot<\/li>\n<li>Module 3: Preparing the Configuration Manager management infrastructure<\/li>\n<li>Module 4: Deploying and managing the Configuration Manager client<\/li>\n<li>Module 5: Managing inventory for PCs and applications<\/li>\n<li>Module 6: Distributing and managing content used for deployments<\/li>\n<li>Module 7: Deploying and managing applications<\/li>\n<li>Module 8: Maintaining software updates for managed PCs<\/li>\n<li>Module 9: Implementing Endpoint Protection for managed PCs<\/li>\n<li>Module 10: Managing compliance and secure data access<\/li>\n<li>Module 11: Managing operating system deployment<\/li>\n<li>Module 12: Managing and maintaining a Configuration Manager site<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course Requirements<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">Have good knowledge in<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.<\/li>\n<li>Active Directory Domain Services (AD DS) principles and fundamentals of AD DS<\/li>\n<li>Installation, configuration, and troubleshooting for Windows-based personal<\/li>\n<li>Basic concepts of public key infrastructure (PKI)<\/li>\n<li>Basic understanding of scripting and Windows PowerShell<\/li>\n<li>Basic understanding of Windows Server roles and<\/li>\n<li>Basic understanding of the configuration options for iOS, Android, and Windows Mobile device<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Exam requirements<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">There are no specific prerequisites required to attend the Exam<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>LAB Requirement<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">It is required\u00a0 to have LAB in this course<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course Outlines and Training Plan<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 1: Managing computers and mobile devices in the enterprise<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Overview of the Configuration Manager architecture<\/li>\n<li>Overview of the Configuration Manager administrative tools<\/li>\n<li>Tools for monitoring and troubleshooting a Configuration Manager site<\/li>\n<li>Lab: Exploring the Configuration Manager tools<\/li>\n<li>Searching in the Configuration Manager console<\/li>\n<li>Using Windows PowerShell with Configuration Manager<\/li>\n<li>Using Configuration Manager Service Manager to manage components<\/li>\n<li>Monitoring site and component status<\/li>\n<li>Reviewing log files by using the Configuration Manager Trace tool<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 2: Analyzing data using queries, reports, and CMPivot<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>introduction to queries<\/li>\n<li>Configuring SQL Server Reporting Services<\/li>\n<li>Analyzing the real-time state of a device by using CMPivot<\/li>\n<li>Lab: Creating and running queries<\/li>\n<li>Creating data queries<\/li>\n<li>Creating subselect queries<\/li>\n<li>Lab: Configuring SSRS<\/li>\n<li>Configuring a reporting services point<\/li>\n<li>Lab: Analyzing the real-time state of a device by using CMPivot<\/li>\n<li>Using CMPivot to Analyze the current state of devices<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 3: Preparing the Configuration Manager management infrastructure<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Configuring site boundaries and boundary groups<\/li>\n<li>Configuring resource discovery<\/li>\n<li>Organizing resources using device and user collections<\/li>\n<li>Lab: Configuring boundaries and resource discovery<\/li>\n<li>Configuring boundaries, boundary groups, and fallback relationships<\/li>\n<li>Configuring Active Directory discovery methods<\/li>\n<li>Lab: Configuring user and device collections<\/li>\n<li>Creating a device collection<\/li>\n<li>Creating a user collection<\/li>\n<li>Configuring a maintenance window<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 4: Deploying and managing the Configuration Manager client<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Overview of the Configuration Manager client<\/li>\n<li>Deploying the Configuration Manager client<\/li>\n<li>Configuring and monitoring client status<\/li>\n<li>Managing client settings and performing management operations<\/li>\n<li>Lab: Deploying the Microsoft System Center Configuration Manager client software<\/li>\n<li>Preparing the site for client installation<\/li>\n<li>Deploying the Configuration Manager client software by using client push installation<\/li>\n<li>Lab: Configuring and monitoring client status<\/li>\n<li>Configuring and monitoring client health status<\/li>\n<li>Lab: Managing client settings<\/li>\n<li>Configuring client settings<\/li>\n<li>Performing management operations<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 5: Managing inventory for PCs and applications<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Overview of inventory collection<\/li>\n<li>Configuring hardware and software inventory<\/li>\n<li>Managing inventory collection<\/li>\n<li>Configuring software metering<\/li>\n<li>Configuring and managing Asset Intelligence<\/li>\n<li>Lab: Configuring and managing inventory collection<\/li>\n<li>Configuring and managing hardware inventory<\/li>\n<li>Lab: Configuring software metering<\/li>\n<li>Configuring software metering<\/li>\n<li>Lab: Configuring and managing Asset Intelligence<\/li>\n<li>Preparing the site for Asset Intelligence<\/li>\n<li>Configuring Asset Intelligence<\/li>\n<li>Monitoring license agreements by using Asset Intelligence<\/li>\n<li>Viewing Asset Intelligence reports<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 6: Distributing and managing content used for deployments<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Preparing the infrastructure for content management<\/li>\n<li>Distributing and managing content on distribution points<\/li>\n<li>Lab: Distributing and managing content for deployments<\/li>\n<li>Installing a new distribution point<\/li>\n<li>Managing content distribution<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 7: Deploying and managing applications<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Overview of application management<\/li>\n<li>Creating applications<\/li>\n<li>Deploying applications<\/li>\n<li>Managing applications<\/li>\n<li>Deploying virtual applications by using System Center Configuration Manager (Optional)<\/li>\n<li>Deploying and managing Windows Store apps<\/li>\n<li>Lab: Creating and deploying applications<\/li>\n<li>Creating applications with requirements<\/li>\n<li>Deploying applications<\/li>\n<li>Lab: Managing application supersedence and removal<\/li>\n<li>Managing application supersedence<\/li>\n<li>Uninstalling the Excel Viewer application<\/li>\n<li>Lab: Deploying virtual applications by using Configuration Manager (Optional)<\/li>\n<li>Deploying virtual applications<\/li>\n<li>Lab: Using Configuration Manager to deploy Windows Store apps<\/li>\n<li>Configuring support for sideloading Windows Store apps<\/li>\n<li>Configuring a Windows Store app<\/li>\n<li>Deploying Windows 10 apps to users<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 8: Maintaining software updates for managed PCs<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>The software updates process<\/li>\n<li>Preparing a Configuration Manager site for software updates<\/li>\n<li>Managing software updates<\/li>\n<li>Configuring automatic deployment rules<\/li>\n<li>Monitoring and troubleshooting software updates<\/li>\n<li>Enabling third-party updates<\/li>\n<li>Lab: Configuring the site for software updates<\/li>\n<li>Configuring and synchronizing the software update point<\/li>\n<li>Lab: Deploying and managing software updates<\/li>\n<li>Determining software update compliance<\/li>\n<li>Deploying software updates to clients<\/li>\n<li>Configuring automatic deployment rules<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 9: Implementing Endpoint Protection for managed PCs<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Overview of Endpoint Protection in Configuration Manager<\/li>\n<li>Configuring, deploying, and monitoring Endpoint Protection policies<\/li>\n<li>Configuring and deploying advanced threat policies<\/li>\n<li>Lab: Implementing Microsoft System Center Endpoint Protection<\/li>\n<li>Configuring the System Center Endpoint Protection point and client settings<\/li>\n<li>Configuring and deploying Endpoint Protection policies<\/li>\n<li>Monitoring Endpoint Protection<\/li>\n<li>Lab: Implementing advanced threat policies<\/li>\n<li>Creating and deploying advanced threat protection policies<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 10: Managing compliance and secure data access<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Overview of Compliance Settings<\/li>\n<li>Configuring compliance settings<\/li>\n<li>Viewing compliance results<\/li>\n<li>Managing resource and data access<\/li>\n<li>Lab: Managing compliance settings<\/li>\n<li>Managing configuration items and baselines<\/li>\n<li>Viewing compliance settings and reports<\/li>\n<li>Configuring remediation in compliance settings<\/li>\n<li>Using compliance information to create collections<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 11: Managing operating system deployment<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>An overview of operating system deployment<\/li>\n<li>Preparing a site for operating system deployment<\/li>\n<li>Deploying an operating system<\/li>\n<li>Managing Windows as a service<\/li>\n<li>Lab: Preparing the site for operating -system deployment<\/li>\n<li>Managing the site system roles used to support operating system deployment<\/li>\n<li>Managing packages to support operating system deployment<\/li>\n<li>Lab: Deploying operating -system images for bare-metal installations<\/li>\n<li>Preparing the operating system image<\/li>\n<li>Creating a task sequence to deploy an image<\/li>\n<li>Deploying an image<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 12: Managing and maintaining a Configuration Manager site<\/p>\n<ul dir=\"ltr\">\n<li style=\"text-align: justify;\">Configuring role-based administration<\/li>\n<li style=\"text-align: justify;\">Configuring Remote Tools<\/li>\n<li style=\"text-align: justify;\">Overview of Configuration Manager site maintenance and Management Insights<\/li>\n<li style=\"text-align: justify;\">Backing up and recovering a Configuration Manager site<\/li>\n<li style=\"text-align: justify;\">Updating the Configuration Manager infrastructure<\/li>\n<li style=\"text-align: justify;\">Lab: Configuring role-based administration<\/li>\n<li style=\"text-align: justify;\">Configuring a new scope for Toronto administrators<\/li>\n<li style=\"text-align: justify;\">Configuring a new administrative user<\/li>\n<li style=\"text-align: justify;\">Lab: Configuring Remote Tools<\/li>\n<li style=\"text-align: justify;\">Configuring the Remote Tools client settings and permissions<\/li>\n<li style=\"text-align: justify;\">Managing desktops by using Remote Control<\/li>\n<li style=\"text-align: justify;\">Lab: Maintaining a Configuration Manager site<\/li>\n<li style=\"text-align: justify;\">Configuring maintenance tasks in Configuration Manager<\/li>\n<li style=\"text-align: justify;\">Configuring the Backup Site Server task<\/li>\n<li style=\"text-align: justify;\">Recovering a site from a backup<\/li>\n<\/ul>\n","protected":false},"author":6,"featured_media":13535,"template":"","course_category":[38],"class_list":["post-13500","courses","type-courses","status-publish","has-post-thumbnail","hentry","course_category-it-en","infinite-scroll-item","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":13,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13500\/revisions"}],"predecessor-version":[{"id":33917,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13500\/revisions\/33917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media\/13535"}],"wp:attachment":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=13500"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=13500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}