PKI Blog

Pre-Staging a Distribution Point in System Center Configuration Manager (SCCM) 2012

Posted by CSS Technical Team on Apr 10, 2013 4:39:00 AM

I still have a Tandy laptop. It’s not a tablet. It’s not a notebook. It is a LAPtop as in you can sit it on your lap. It runs on four AA batteries, and if I want to upgrade the ram to a screaming 256K I have to find something that looks much like those hex bugs that kids play with. The point is that there was a time when we didn’t have multiple T3s connecting our whole network. Many businesses today still kick it retro style (op, op) with some of their branch locations and inflict these small offices with split Ts or lower. For those of us who look at our System Center Configuration Manager (SCCM) solutions to deliver with optimum efficiency, we used to look at these branches and openly weep because we knew that even if we put distribution points in the branch, there was going to be some late night pushes so we wouldn’t bring the connection to its knees. There were some ways around it (Nomad from 1E is a fine product on any network then and today), but for the most part you were stuck. With the advent of SCCM 2012 there is a little known feature for just such a case and that is what we will be focusing on- Pre-Staging Content.

Read More

Topics: IT Security, Microsoft Security Partner, Microsoft System Center, SCCM 2012, Desktop Security, SCCM Distribution Point, System Center 2012, System Center, SCCM, Blog, Pre-Staging a Distribution Point in System Center, Microsoft System Center Configuration Manager

Merry MBAM 2.0

Posted by CSS Technical Team on Dec 19, 2012 4:55:00 AM

Marley was dead, of that we can be certain. The poor man had died tragically at his desk going over the security auditing logs trying to ascertain if the laptop that had been stolen from their young clerk had been secure or not. To think that the fiendish devil who had procured it could now be drooling over the contents of their money changing shop! Defiling the social security numbers and credit card numbers of clients! Glancing upon confidential documents meant only for the eyes of he and his partners! THE MAN HAD EVEN KEPT A PASSWORD FILE CONTAINING ALL OF THE ADMINISTRATOR PASSWORDS TO THEIR SYSTEMS! The strain of thought had been too much to bear for what was left of his old heart. To that end, Marley was dead as a doornail.

Read More

Topics: Microsoft Security Partner, Desktop Security, Microsoft MBAM, MBAM, Anti-Malware, Blog, Microsoft Bitlocker Administration and Monitoring

The Outer Rings of the System Center Configuration Manager (SCCM) Inferno

Posted by CSS Technical Team on Oct 23, 2012 5:01:00 AM

Since time draws ever closer to the season of the witch, allow me to start out with an excerpt from a timeless techie classic, the poem titled, “The Ramen.” I know not from whom it came but kudos to them:

Read More

Topics: IT Security, Microsoft Security Partner, SCCM 2012, Configuration Manager, Desktop Security, Microsoft SCCM, ConfigMgr, SCCM 2007, SCCM, System Administrator, The Ramen, Blog, Role Based Security, Microsoft System Center Configuration Manager

Using System Center Orchestrator to Automate Security Tasks

Posted by CSS Technical Team on Aug 6, 2012 6:44:00 AM

With System Center Configuration Manager 2012, customers have the ability to use Endpoint Protection capabilities to provide anti-malware services and security to servers and clients. However, to reduce administrator touch points and mistakes, we can use the flexibility of System Center Orchestrator to augment and automate standard security processes. In this post, I will demonstrate how to create a runbook to automate the triggering of a full Endpoint Protection malwarescan in response to a malware detected alert within Configuration Manager.

Read More

Topics: Application Publishing, IT Security, Microsoft Security Partner, Microsoft System Center, SCCM 2012, Configuration Manager, Desktop Security, Sysctr, Infrastructure Management, System Center 2012, SCORCH, workflow, SCCM, System Center Orchestrator, System Center Configuration Manager 2012, Anti-Malware, Blog, SCCM client

SCCM 2012 – Migration Made Easy – Part 3

Posted by CSS Technical Team on May 16, 2012 8:13:00 AM

In Part 1 we discussed the requirements overview on preparing for a migration and in Part 2 we covered the types of objects that are available for migration and the exclusions. In this final write up in the series we will go through the process using the migration utility that has been hyped up by Microsoft within Configuration Manager 2012.

Read More

Topics: Microsoft System Center 2012, IT Security, Microsoft Security Partner, Microsoft System Center, SCCM 2012, Win7, Desktop Security, System Center, sccm microsoft, SCCM 2007, XP End of Life, migrate SCCM 2012, ConfigMgr 2012, Blog, SCCM client, Configuration Manager 2012

How to Perform a Manual SCEP Client Installation

Posted by CSS Technical Team on May 16, 2012 8:02:00 AM

The following is an excerpt from my book Microsoft System Center 2012 Endpoint Protection Cookbook, http://www.packtpub.com/microsoft-system-center-2012-endpoint-protection-cookbook/book

Read More

Topics: FEP, IT Security, Microsoft Security Partner, Microsoft System Center, Win7, Desktop Security, SCEP, XP End of Life, System Center Configuration Manager, SCCM, Microsoft Forefront Endpoint Protection, Anti-Malware, Blog, System Center Endpoint Protection

Tips from the Field - Accelerating Windows XP to Windows 7 Migration using System Center Configuration Manager 2007

Posted by CSS Technical Team on Mar 7, 2012 10:29:45 AM

Read More

Topics: USMT XML Builder, User File Settings SCCM 2007, 4/8/14, Microsoft System Center, SCCM 2012, Win7, Desktop Security, System Center 2012, System Center, SCCM 2007, XP End of Life, System Center Configuration Manager, Windows7, USMT Builder, Blog, Windows XP

SCEP Server Policy Templates

Posted by CSS Technical Team on Jan 31, 2012 4:00:00 AM

One of the best features of Forefront Endpoint Protection (FEP) 2010 was its easy to use server policy templates. In a nutshell, server policy templates let you quickly choose an optimized, preconfigured FEP policy for every- just about every- type of application server that Microsoft produces (Exchange, SharePoint, SQL, etc). So instead of painstakingly going through option by option and creating a policy for a server, you could simply select a server type from a drop down list and create a policy in seconds.

Read More

Topics: Microsoft Forefront Endpoint Protection Best Pract, Microsoft System Center 2012, FEP, IT Security, Microsoft Security Partner, Desktop Security, System Center 2012 Endpoint Protection, System Center 2012, SCEP, Microsoft Forefront Endpoint Protection, Anti-Malware, Microsoft FEP, Blog, SCEP Server

SCCM 2012 – Migration Made Easy – Part 2

Posted by CSS Technical Team on Jan 17, 2012 4:00:00 AM

In Part 1 of this blog series I presented an overview of the requirements for preparing a migration from Configuration Manager 2007 to 2012. With that information in hand I believe that you should have a general understanding of the pre-requisites necessary to begin your migration process.

Migration Objects

We’re going to cover the types of objects that can be migrated and how they are translated to Configuration Manager 2012. Bulleted below are all of the objects that can be migrated from ConfigMgr 2007 to ConfigMgr 2012.

Read More

Topics: Microsoft System Center 2012, IT Security, Microsoft Security Partner, System Center migration, SCCM 2012, Desktop Security, System Center 2012 migration, Infrastructure Management, System Center 2012, sccm microsoft, Microsoft Active Directory, Microsoft AD, Systems Management, ConfigMgr 2012, Blog, SCCM client, Configuration Manager 2012

Best Practices for Preparing your Infrastructure for Office365

Posted by CSS Technical Team on Jan 12, 2012 4:24:00 AM

Office365 is a cloud based solution that provides hosted email, collaboration, and IM solution, enabling organizations to quickly implement these capabilities without needing to implement large, in-house infrastructures to support the products. However, as organizations look to move to cloud based solutions, and Office365 in particular, due diligence and planning should be given to preparing the internal security infrastructure, and the user experience aspect. There are 3 steps that you can start tackling to prepare for your deployment (we assume, of course, that the Office365 service itself is secured).

Read More

Topics: Active Directory Rights Management Services, IT Security, Microsoft Security Partner, Desktop Security, Office365, Microsoft Active Directory, DirSync Tool, Microsoft AD, ADRMS, Blog, Microsoft Office365, AD

Posts by Topic

see all

Want to Learn more about CSS?