Learning objectives Examine Microsoft System Center 2012 Configuration Manager (SCCM) key terms and core services. Review the System Center 2012 Suite of programs. Evaluate the importance and functionality of Site Servers. Explain the need for a Primary Site. Explain the need for a Secondary Site. Review the roles of various site system servers. Diagram the implementation of the site system servers for this class. Review Datacenter infrastructure requirements. Chart the IT project management for this learning plan. Examine and diagram the lab's pre-installed server infrastructure. Complete cost analysis of desired infrastructure. Define classroom roles and conventions for the implementation of SCCM. Examine the network monitoring interface for the existing infrastructure. Complete the installation and configuration of ConfigMgr. (Applying) Chart the IT project management for this learning plan. Expand Active Directory to meet the required prerequisites. Examine SQL Server requirements. Complete the installation of SQL Server 2012 Complete the post-installation procedures for SQL Server 2012 Complete the installation and configuration of Windows Software Update Services 4.0. Complete the installation of the Site Server. Determine that ConfigMgr was successfully installed. Implement a ConfigMgr Package Source directory. Complete final post SQL configuration steps. Administer the configuration of the site server. (Analyzing) Chart the IT project management for this learning plan. Categorize desired features and site system roles. Manage the installation of the site system roles. Illustrate the inner workings of ConfigMgr. Administer backup and basic site maintenance tasks. Administer the configuration of Active Directory discovery. Illustrate the inner workings of the discovery process. Explore collections. Administer role-based administration (RBA). Examine useful log files. Administer the installation and management of ConfigMgr clients. (Analyzing) Chart the IT project management for this learning plan. Categorize desired features to be enabled on the client. Administer the configuration of client settings. Administer custom settings for workstations. Administer custom settings for servers. Categorize client installation methods. Examine client command-line properties. Categorize and configure boundaries and boundary groups. Administer the configuration of a network access account. Administer the configuration of client push installation properties. Manage the installation of clients using client push. Manage the installation of a client manually. Manage the installation of a client through a startup script. Review the installation of a client by using a software group policy. Examine the client interfaces. Manage client notification. Administer and monitor client health. Review working with non-Microsoft clients. Examine useful log files. Administer inventory management and reporting. (Analyzing) Chart the IT project management for this learning plan. Categorize options for inventory management and reporting. Manage the configuration of hardware inventory data. Manage the extension of hardware inventory through custom settings. Administer software metering to track software usage. Use SQL database queries to obtain information from the SQL database. Manage SQL database reporting. Examine useful log files. Administer application deployment. (Analyzing) Chart the IT project management for this learning plan. Categorize content management objects: on-premise and cloud-based. Administer the installation of an on-premise distribution point. Administer content boundary groups. Review the deployment of packages vs. applications. Administer the deployment of packages. Explore the concept of application deployment. Analyze application types. Categorize deployment types. Explore application collections. Explore the deployment of applications. Explore the specification of primary user devices through User Device Affinity (UDA) Deploy applications. Create and deploy modern-style applications. Explore the concept of sideloading applications. Administer post deployment stratagies. Examine useful log files. Incorporate endpoint protection. Incorporate compliance settings.