SCCM 2012 R2 Boundaries and Security Considerations


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
In this course, you will learn how to create and manage SCCM Boundary Groups for segmenting your network for management. You will also learn about security considerations for connecting clients to SCCM, overall data integrity, and administrative delegation. This course provides additional information on using boundary groups to organize devices on the network for SCCM management using Boundary groups. It also covers security considerations for communicating with clients and other endpoints in the SCCM infrastructure as well as role-based administrative delegation.

Target Audience
The course is intended for IT professionals who need to manage the deployment and management of both operating system and applications as well as administrators responsible for patch and security update management.

Prerequisites
None

Expected Duration (hours)
1.7

Lesson Objectives

SCCM 2012 R2 Boundaries and Security Considerations

  • start the course
  • describe managing boundaries
  • describe managing boundary groups
  • describe assigning content locations
  • describe preferred management points
  • describe overlapping boundaries
  • describe best practices
  • implement boundaries
  • implement boundary groups
  • describe certificates
  • describe managing security features
  • describe PKI certificate revocation
  • describe HTTPS client connections
  • implement HTTPS client connections
  • describe role-based security
  • describe security roles
  • describe collections and administrative scopes
  • describe security scopes
  • describe object types within security scopes
  • describe assigning roles for administration
  • implement assigning roles for administration
  • use security roles
  • Course Number:
    cl_sccm_a06_it_enus

    Expertise Level
    Intermediate