Get your server issues fixed by our experts for a price starting at just 25 USD/Hour. Click here to register and open a ticket with us now!

Author Topic: Microsoft System Center Configuration Manager 2012 (SCCM)  (Read 3778 times)

0 Members and 1 Guest are viewing this topic.


  • Guest
Microsoft System Center Configuration Manager 2012 (SCCM)
« on: November 25, 2013, 10:45:53 pm »

   Microsoft System Center Configuration Manager 2012 (SCCM 2012) is a Windows product that enables administrators to manage the deployment and security of devices and applications across an enterprise.

The SCCM integrated console. which enables management of App-V, Microsoft Enterprise Desktop Virtualization (Med-V), Citrix XenApp, Microsoft Forefront and Windows Phone applications from a single location, is part of the Microsoft System Center 2012 systems management suite.

System Center Configuration Manager 2012 discovers servers, desktops, tablets, and mobile devices connected to a network through Active Directory and installs client software on each node. It then manages application deployments and updates on a device or group basis, allowing for automated patching via Windows Server Update Services and policy enforcement via Network Access Protection. System Center Endpoint Protection Manager 2012, formerly known as Forefront Endpoint Protection, is built into System Center Configuration Manager to ensure security of data stored on those devices.

Several key features of System Center Configuration Manager 2012 help administrators address the bring-your-own-device (BYOD) trend in the enterprise, including user-centric management. End users can search for applications via a self-service Software Center and define the times when installations and upgrades take place. IT shops can install applications in different ways on different devices – for example, as a native application on a primary device and as a Remote Desktop Services app or App-V program on a tablet.  SCCM 2012 also includes role-based access control, which enhances system security by only showing end users the interface elements that apply to their specific roles.