• Classroom
  • Online, Instructor-Led
Course Description

In this course, you will use Configuration Manager and its associated site systems to efficiently manage network resources. You will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You will also discover how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports.

Learning Objectives

Describe the features of Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports Prepare a management infrastructure, including configuring boundaries, boundary groups, resource discovery, and integrating mobile-device management with Microsoft Exchange Server Deploy and manage the Configuration Manager client Configure, manage, and monitor hardware and software inventory as well as use Asset Intelligence and software metering Identify and configure the most appropriate method to distribute and manage content used for deployments Distribute, deploy and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager administers Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices Configure an operating system deployment strategy by using Configuration Manager Manage and maintain a Configuration Manager site

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cyber Investigation
  • Digital Forensics
  • Exploitation Analysis
  • Network Services
  • Risk Management
  • Software Development
  • Test and Evaluation
  • Threat Analysis
  • Training, Education, and Awareness
  • Vulnerability Assessment and Management