Indian SCCM Professionals

This group is a discussion forum in LinkedIn.

Ideal place to get introduced to the world of SCCM with lot discussions for freshers  (as well as for experience people). The motive of this group/forum is to help others by sharing the knowledge between the IT professionals based on their common interest of ConfigMgr (SCCM).

Indian SCCM Professionals LinkedIn Group

This is just a starting. Please wait for further update on this space.

Happy Config Mgr !!!

FAQs – SCCM (ConfigMgr)

What is Config Mgr / Configuration Manager /SCCM / Formerly SMS  ?

This is a System Management software product from Microsoft. You can manage Mobiles, Desktops, Laptops and servers etc through this software.

In 1994, Microsoft introduced Systems Management Server (SMS) 1.0. It was the beginning of client management solution, but more in the non-Active Direc¬tory era. SMS 2003 truly ushered in an era of advanced client management that leveraged Active Directory and all of its functionality. The adoption and popular¬ity of SMS has continued to grow since SMS 2003, and Microsoft has pushed the limits of the solution and its ability over time.

Microsoft System Center Configuration Manager 2007 changed the game with the vision of an integrated solution along with other System Center products. Microsoft introduced many new features and firsts with Configuration Manager 2007 and took client management to a whole new level with System Center 2012 Configuration Manager. Now, Configuration Manager (both 2007 and 2012) is now an integral part of the IT infrastructure of many companies, and expertise with Configuration Manager has become one of the most sought after IT skills around the globe.

•Comprehensive client management across physical, virtual, and mobile environments.

•Optimized for Windows

•Maximizes investments in existing infrastructure

•Ensures systems comply with desired configuration states

What is the Latest Version of SCCM or Config Mgr

SCCM 2007 SP2 R3 is the latest version which is in production. Next release of SCCM would SCCM / ConfigMgr 2012.

Where I can get ROI (Return On Investment) calculator for Config Mgr?

There is an awesome tool available to do these analysis for you and it will create a power point presentation with the details.

https://roianalyst.alinean.com/microsoft/system_center/launch.htm

What is new in ConfigMgr (SCCM) 2012 ? Where to start ?

1. SCCM 2012 shift toward User Centric Management (UCM). This management approach puts the users first, not the systems.

2. Manage Applications More Efficiently. Each application can have multiple types of deployments. Requirement rules should minimize the need for complex queries. They’re also a lot easier to define.

3. Role-Based Access Control.There may be more than the current 13 roles by the time released to manufacturing rolls around.

4. New SCCM Console is based on the System Center framework, SCCM 2012 has a totally new console. It no longer relies on the Microsoft Management Console.

I have put together some cool blog posts that will help to install ConfigMgr 2012 in your LAB environment. Please Go-ahead and start exploring.

http://anoopcnair.com/2011/08/10/configmgr-sccm-2012-starter-kit-very-useful-links/

Daily, Monthly and Periodic Checklist (Maintenance Tasks) for ConfigMgr Administrators

https://anoopcnair.com/2011/11/10/configmgr-sccmdaily-monthly-and-periodic-checklist-maintenance-tasks-for-administrators/

SCCM /ConfigMgr 2012 Glossary Via TechNet 

TermDefinition
Active Directory Delta DiscoveryA discovery option that allows Configuration Manager to discover only new or changed resources in Active Directory independently of a full discovery cycle.
Active Directory Forest Discovery methodA Configuration Manager discovery method that searches for Active Directory sites and subnets in Active Directory forests.
Active Directory Group Discovery methodA Configuration Manager discovery method that searches for the group memberships of computers and users by polling Active Directory Domain Services.
Active Directory System Discovery methodA Configuration Manager discovery method that searches for system resources by polling Active Directory Domain Services.
Active Directory User Discovery methodA Configuration Manager discovery method that searches for computer user resources by polling Active Directory Domain Services.
Active Management Technology (AMT)See Other Term: Intel Active Management Technology
active software update pointThe software update point for a site that interacts with Windows Server Update Services (WSUS) to configure software updates settings and manage software updates synchronization. The active software update point can accept connections from the intranet and the Internet.
Application AdministratorA security role that grants permissions to administrative users so that they can perform both the Application Deployment Manager role and the Application Author role.
Application AuthorA security role that grants permissions to administrative users so that they can create, modify, and retire applications.
Application Catalog web service pointA site system role that provides software information to the Application Catalog website from the Software Library.
Application Catalog website pointA site system role that provides users with a list of available software from the Application Catalog.
Application Deployment ManagerA security role that grants permissions to administrative users so that they can deploy and monitor applications.
Asset IntelligenceA Configuration Manager feature that allows administrators to inventory and manage software license usage throughout their enterprise.
Asset Intelligence catalogA Configuration Manager catalog that contains categorization and identification information for software titles and versions, which is used to classify inventoried software.
Asset Intelligence synchronization pointA site system role that connects to System Center Online to download Asset Intelligence catalog information and upload uncategorized titles so that they can be considered for future inclusion in the catalog.
Asset ManagerA security role that grants permissions to administrative users so that they can manage the Asset Intelligence synchronization point, Asset Intelligence reporting classes, software inventory, hardware inventory, and metering rules.
assigned management pointA management point in a primary site that is assigned to the Configuration Manager client.
assigned siteA site to which a Configuration Manager client is currently assigned.
binary delta replicationA Configuration Manager process that copies only the changed portions of a package or content  file rather than the entire file when an update has been made.
boundaryAn IP subnet, IP address range, IPv6 prefix, or Active Directory site that identifies the network location of clients in the Configuration Manager hierarchy.
central administration siteThe central administration site coordinates intersite data replication across the hierarchy by using Configuration Manager database replication. It also enables the administration of hierarchy-wide configurations for client agents, discovery, and other operations.
collectionA set of resources in the Configuration Manager hierarchy.
Compliance Settings ManagerA security role that grants permissions to administrative users so that they can define and monitor Compliance Settings.
component serverA server that runs Configuration Manager services. When you install all the site system roles except for the distribution point role, Configuration Manager automatically installs the component server.
Configuration Manager Application CatalogThe web-based view of the applications that are available for a user to search, browse, request, and install.
Configuration Manager Software CenterThe end-user program that allows the user to set preferences for how their software is installed. End users can also use Configuration Manager Software Center to request, install, remove, and monitor the software that is deployed by using System Center 2012 Configuration Manager.
Configuration Manager software inventoryA Configuration Manager feature that automatically gathers information about software on client computers.
Configuration Manager software meteringThe Configuration Manager feature that monitors software usage on client computers.
data discovery record (DDR)The file format (.ddr) and the actual file that is used by Configuration Manager to report discovery data to a Configuration Manager site database.
database replicationA type of data replication in System Center 2012 Configuration Manager that uses SQL Server replication.
delta inventory fileA file generated after Configuration Manager performs a complete inventory, containing only hardware or software properties that were added, removed, or changed since the previous inventory cycle.
delta replicationThe copying of only the changed files in a Configuration Manager package when an update has been made to the package.
deployment purposeAn application state that is associated with the deployment of software, such as Available or Required.
deployment typeA technology that is used to deploy an application to devices. A deployment type is contained within an application; for example, Windows Installer could be a deployment type for the “Visio 2007” application.
discovery dataA set of properties collected by a discovery method that reflects the attributes of a Configuration Manager resource.
discovery data record (DDR)The file format (.ddr) and the actual file that is used by Configuration Manager to report discovery data to a Configuration Manager site database.
distribution pointA site system role that contains source files for clients to download, such as application content, software packages, software updates, operating system images, and boot images.
distribution point groupA set of distribution points that you can manage as a single entity.
Endpoint Protection ManagerA security role that grants permissions to administrative users so that they can define and monitor security policies.
Endpoint Protection pointA site system role that Configuration Manager uses to accept the Endpoint Protection license terms and to configure the default membership for Microsoft Active Protection Service.
enrollment pointA site system role that uses PKI certificates to complete mobile device enrollment and to provision Intel AMT-based computers.
enrollment proxy pointA site system role that manages enrollment requests from mobile devices so that they can be managed by Configuration Manager.
Exchange Server connectorA Configuration Manager technology that connects to Exchange Server to discover and manage mobile devices.
fallback siteThe site in the hierarchy that clients are assigned to when they are installed by using automatic site assignment and they are not in a boundary group that has an assigned site.
fallback status pointA site system role that helps you monitor client installation and identify the clients that are unmanaged because they cannot communicate with their management point.
Full AdministratorA security role that grants all permissions in Configuration Manager to an administrative user.
global conditionsA setting or an expression that is used to define rules that specify how an application is deployed on client devices.  See Also: requirement rules
global dataA set of administrator-created objects that are replicated to all sites throughout the hierarchy. Secondary sites receive a subset of this data.  See Also: local data
Heartbeat Discovery methodA Configuration Manager discovery method that is used to update data discovery records (DDRs) for each Configuration Manager client on a set schedule to ensure that they remain current in the site database.
IDMIF fileA type of Management Information Format (MIF) file that can be used to add new architectures or updates to existing architectures in the Configuration Manager site database to accommodate custom hardware inventory properties.
incremental collection evaluationA feature that enables you to evaluate new or changed members of a collection.
incremental collection member evaluationA process that periodically scans for new or changed resources from the previous collection evaluation and then updates the collection membership with only these resources.
Infrastructure AdministratorA security role that grants permissions to administrative users so that they can perform migration tasks and create, delete, and modify the Configuration Manager server infrastructure.
Intel Active Management Technology (AMT)An Intel networking management technology that is supported by Configuration Manager out of band management, which enables a Configuration Manager administrator to manage desktop computers independently from the Configuration Manager client or the computer operating system.
Internet-based client managementA feature in Configuration Manager that allows you to manage computers that have the Configuration Manager client agent but do not connect into the network through a VPN or dial-up connection.
Internet-based site systemA site system role that allows connections from clients when they are managed over the Internet.
Internet-based software update pointThe software update point for a site that accepts communication from only client computers on the Internet. There can be only one active Internet-based software update point.
local dataA set of objects that are automatically created by Configuration Manager. This data is not replicated to other sites.  See Also: global data
maintenance windowA period of time, defined by administrators, when changes can be made on the computers that are members of a Configuration Manager collection.
Managed Object Format (MOF)The file type, based on the Interface Definition Language (IDL), that describes management information. The MOF syntax is a way to describe object definitions in textual form.
management controllerThe hardware and firmware component on computer motherboards that supports out of band management.
Management Information Format (MIF) fileThe file type (.mif) that can be used to modify the Configuration Manager database by creating architectures, object classes, and attributes.
management pointA site system role that provides policy and service location information to clients and receives configuration data from clients.
membership ruleThe criteria by which Configuration Manager evaluates whether a resource belongs to a particular collection.
Network Discovery methodThe Configuration Manager discovery method that enables the Configuration Manager administrator to discover any network resources that are IP addressable.
NOIDMIF fileA custom Management Information Format (MIF) file that Configuration Manager administrators can use to modify or append object classes and properties to existing client inventory data.
non-peak power planA Configuration Manager power plan that you can configure with power settings that are applied outside peak hours or business hours.
operating system deploymentA Configuration Manager feature that allows you to create operating system images and deploy those images to target computers
Operating System Deployment ManagerA security role that grants permissions to administrative users so that they can create, deploy, and manage operating system images.
Operations AdministratorA security role that grants permissions to administrative users so that they can perform all actions in Configuration Manager except for those that are required to manage security.
out of band managementA feature in Configuration Manager that allows computers to be managed outside standard management channels by connecting to a supported management controller. This management channel is independent from the Configuration Manager client and the operating system.
out of band service pointA site system role that provisions and configures Intel AMT-based computers for out of band management.
packageA Configuration Manager object that contains the content files and instructions for distributing programs, software updates, boot images, operating system images, and drivers to Configuration Manager clients.
package definition fileAn ASCII text file that contains predefined software distribution objects, such as programs and packages that are used for software deployment.
package shareA network share that includes the software installation files for a package.
package source directoryA directory that contains Configuration Manager package source files that are used for package distribution.
package updateA Configuration Manager operation that increments the package version and updates all distribution points with only the files that have changed in the package.
peak power planA Configuration Manager power plan that you can configure with power settings that are applied during the peak hours or business hours that you specify.
power planA group of Windows-based power settings that you can apply to computers by using Configuration Manager power management.
preferred distribution pointA distribution point with an associated boundary group that includes the client’s current location on the network.
prestart commandA script or an executable file that supports operating system deployment and that can interact with the user in Windows PE before a task sequence runs.
primary deviceA software deployment condition that defines one or more devices that a specific user uses. A primary device is typically determined either by frequency of use or by business requirements.
primary siteA Configuration Manager site that has clients assigned to it and that processes client-generated data.
primary userThe main user of a device. (A device can have more than one primary user.)
Read-only AnalystA security role that grants permissions to administrative users so that they can view all objects in Configuration Manager.
reinstateTo bring an application out of retirement and back into service.
remediation serverA server that is used to update the computer state by providing software updates, new antivirus signatures, additional intrusion detection signatures, and so on.
Remote Tools OperatorA security role that grants permissions to administrative users so that they can run and audit remote administration tools.
Replication Link AnalyzerA Configuration Manager tool that detects, analyzes, and remediates database replication issues in a hierarchy.
reporting services pointA site system role that integrates with SQL Server Reporting Services to create and manage reports for Configuration Manager.
Resource ExplorerA Configuration Manager console feature that displays the hardware and software inventory that has been collected from clients.
retireTo remove an application from service.
role-based administrationThe method in which System Center 2012 Configuration Manager secures objects.
secondary siteA child of a primary Configuration Manager site.
Security AdministratorA security role that grants permissions to administrative users so that they can add, remove, and modify administrative users and their administrative assignments.
security roleA set of permissions that defines what an administrative user can do and see in the Configuration Manager console.
security scopeA method that, when used in conjunction with security roles, limits which objects an administrative user can use and see.
senderA Configuration Manager communication mechanism that lets you create and send package information to another Configuration Manager site by using standard network channels.
shared distribution pointA distribution point in a Configuration Manager 2007 hierarchy that clients can use to download the content and packages that have been migrated to System Center 2012 Configuration Manager.
site assignmentThe process of including selected resources in a Configuration Manager site.
site codeA three-character code that Configuration Manager uses to uniquely identify a Configuration Manager site.
site control fileAn ASCII text file that contains the settings of a Configuration Manager site.
site dataThe operational information that is created by a Configuration Manager site and that is replicated to the central administration site. Site data includes hardware inventory data, status messages, alerts, and the results of query-based collection rules.
site database serverA server that hosts the SQL Server database, which stores information about Configuration Manager assets and site data.
site serverA computer on which you run the Configuration Manager setup program and which provides the core functionality for the site.
site systemA server that provides Configuration Manager functionality to a Configuration Manager site.
SMS ExecutiveThe primary Configuration Manager service that accesses and updates the database and manages many different process threads.
SMS ProviderA WMI provider that allows both read and write access to the Configuration Manager site database.
software update pointA site system role that integrates with Windows Server Update Services (WSUS) to provide software updates to Configuration Manager clients.
stand-alone siteA Configuration Manager primary site with no parent sites and no child sites.
state messageA message type that is used to identify at what stage a Configuration Manager client process has succeeded, failed, or stopped.
state migration pointA site system role that stores user state data when a computer is migrated to a new operating system.
status filter ruleA filtering rule that controls how status messages are reported and viewed.
status messageA message generated by a Configuration Manager component and viewed in the Status Message Viewer.
status message thresholdThe limit that defines when the summary status for a component or site system should indicate OK, Warning, or Critical status.
Status Message ViewerA tool in the Configuration Manager console that is used to browse the status messages in the Configuration Manager site database.
status summarizerA component that consolidates the data generated by Configuration Manager status messages into a succinct view of the status of a component, a server, a package, or an advertisement.
supersedenceA deployment behavior that specifies how new software replaces existing software.
System Health Validator pointA site system role that validates Configuration Manager Network Access Protection (NAP) policies. It must be installed on a NAP health policy server.
task sequenceThe mechanism in Configuration Manager for performing multiple steps or tasks on a client computer at the command-line level without requiring user intervention.
tiered secondaryIn Configuration Manager, a secondary site that receives deployment content from another secondary site.
trusted root keyAn encryption key used in Configuration Manager to help clients identify valid management points.
uninterpreted configuration itemAn imported configuration item that cannot be interpreted by the Configuration Manager console and whose properties cannot be viewed or edited in the console.
unmanaged clientA client that is not communicating with its assigned site in the Configuration Manager hierarchy and therefore cannot receive policy or upload inventory data.
user device affinityThe mapping of a user to a device, which enables deployment conditions and simplifies the complexity of the deployment.
wake-up packetA packet that is sent by a Configuration Manager primary site server to bring computers out of a sleep state so that they can perform a management function, such as installing a mandatory software update.
wipeTo remove all data from a mobile device that has been lost, stolen, or compromised.

 

TermDefinition
Active Directory Delta DiscoveryA discovery option that allows Configuration Manager to discover only new or changed resources in Active Directory independently of a full discovery cycle.
Active Directory Forest Discovery methodA Configuration Manager discovery method that searches for Active Directory sites and subnets in Active Directory forests.
Active Directory Group Discovery methodA Configuration Manager discovery method that searches for the group memberships of computers and users by polling Active Directory Domain Services.
Active Directory System Discovery methodA Configuration Manager discovery method that searches for system resources by polling Active Directory Domain Services.
Active Directory User Discovery methodA Configuration Manager discovery method that searches for computer user resources by polling Active Directory Domain Services.
Active Management Technology (AMT)See Other Term: Intel Active Management Technology
active software update pointThe software update point for a site that interacts with Windows Server Update Services (WSUS) to configure software updates settings and manage software updates synchronization. The active software update point can accept connections from the intranet and the Internet.
Application AdministratorA security role that grants permissions to administrative users so that they can perform both the Application Deployment Manager role and the Application Author role.
Application AuthorA security role that grants permissions to administrative users so that they can create, modify, and retire applications.
Application Catalog web service pointA site system role that provides software information to the Application Catalog website from the Software Library.
Application Catalog website pointA site system role that provides users with a list of available software from the Application Catalog.
Application Deployment ManagerA security role that grants permissions to administrative users so that they can deploy and monitor applications.
Asset IntelligenceA Configuration Manager feature that allows administrators to inventory and manage software license usage throughout their enterprise.
Asset Intelligence catalogA Configuration Manager catalog that contains categorization and identification information for software titles and versions, which is used to classify inventoried software.
Asset Intelligence synchronization pointA site system role that connects to System Center Online to download Asset Intelligence catalog information and upload uncategorized titles so that they can be considered for future inclusion in the catalog.
Asset ManagerA security role that grants permissions to administrative users so that they can manage the Asset Intelligence synchronization point, Asset Intelligence reporting classes, software inventory, hardware inventory, and metering rules.
assigned management pointA management point in a primary site that is assigned to the Configuration Manager client.
assigned siteA site to which a Configuration Manager client is currently assigned.
binary delta replicationA Configuration Manager process that copies only the changed portions of a package or content  file rather than the entire file when an update has been made.
boundaryAn IP subnet, IP address range, IPv6 prefix, or Active Directory site that identifies the network location of clients in the Configuration Manager hierarchy.
central administration siteThe central administration site coordinates intersite data replication across the hierarchy by using Configuration Manager database replication. It also enables the administration of hierarchy-wide configurations for client agents, discovery, and other operations.
collectionA set of resources in the Configuration Manager hierarchy.
Compliance Settings ManagerA security role that grants permissions to administrative users so that they can define and monitor Compliance Settings.
component serverA server that runs Configuration Manager services. When you install all the site system roles except for the distribution point role, Configuration Manager automatically installs the component server.
Configuration Manager Application CatalogThe web-based view of the applications that are available for a user to search, browse, request, and install.
Configuration Manager Software CenterThe end-user program that allows the user to set preferences for how their software is installed. End users can also use Configuration Manager Software Center to request, install, remove, and monitor the software that is deployed by using System Center 2012 Configuration Manager.
Configuration Manager software inventoryA Configuration Manager feature that automatically gathers information about software on client computers.
Configuration Manager software meteringThe Configuration Manager feature that monitors software usage on client computers.
data discovery record (DDR)The file format (.ddr) and the actual file that is used by Configuration Manager to report discovery data to a Configuration Manager site database.
database replicationA type of data replication in System Center 2012 Configuration Manager that uses SQL Server replication.
delta inventory fileA file generated after Configuration Manager performs a complete inventory, containing only hardware or software properties that were added, removed, or changed since the previous inventory cycle.
delta replicationThe copying of only the changed files in a Configuration Manager package when an update has been made to the package.
deployment purposeAn application state that is associated with the deployment of software, such as Available or Required.
deployment typeA technology that is used to deploy an application to devices. A deployment type is contained within an application; for example, Windows Installer could be a deployment type for the “Visio 2007” application.
discovery dataA set of properties collected by a discovery method that reflects the attributes of a Configuration Manager resource.
discovery data record (DDR)The file format (.ddr) and the actual file that is used by Configuration Manager to report discovery data to a Configuration Manager site database.
distribution pointA site system role that contains source files for clients to download, such as application content, software packages, software updates, operating system images, and boot images.
distribution point groupA set of distribution points that you can manage as a single entity.
Endpoint Protection ManagerA security role that grants permissions to administrative users so that they can define and monitor security policies.
Endpoint Protection pointA site system role that Configuration Manager uses to accept the Endpoint Protection license terms and to configure the default membership for Microsoft Active Protection Service.
enrollment pointA site system role that uses PKI certificates to complete mobile device enrollment and to provision Intel AMT-based computers.
enrollment proxy pointA site system role that manages enrollment requests from mobile devices so that they can be managed by Configuration Manager.
Exchange Server connectorA Configuration Manager technology that connects to Exchange Server to discover and manage mobile devices.
fallback siteThe site in the hierarchy that clients are assigned to when they are installed by using automatic site assignment and they are not in a boundary group that has an assigned site.
fallback status pointA site system role that helps you monitor client installation and identify the clients that are unmanaged because they cannot communicate with their management point.
Full AdministratorA security role that grants all permissions in Configuration Manager to an administrative user.
global conditionsA setting or an expression that is used to define rules that specify how an application is deployed on client devices.  See Also: requirement rules
global dataA set of administrator-created objects that are replicated to all sites throughout the hierarchy. Secondary sites receive a subset of this data.  See Also: local data
Heartbeat Discovery methodA Configuration Manager discovery method that is used to update data discovery records (DDRs) for each Configuration Manager client on a set schedule to ensure that they remain current in the site database.
IDMIF fileA type of Management Information Format (MIF) file that can be used to add new architectures or updates to existing architectures in the Configuration Manager site database to accommodate custom hardware inventory properties.
incremental collection evaluationA feature that enables you to evaluate new or changed members of a collection.
incremental collection member evaluationA process that periodically scans for new or changed resources from the previous collection evaluation and then updates the collection membership with only these resources.
Infrastructure AdministratorA security role that grants permissions to administrative users so that they can perform migration tasks and create, delete, and modify the Configuration Manager server infrastructure.
Intel Active Management Technology (AMT)An Intel networking management technology that is supported by Configuration Manager out of band management, which enables a Configuration Manager administrator to manage desktop computers independently from the Configuration Manager client or the computer operating system.
Internet-based client managementA feature in Configuration Manager that allows you to manage computers that have the Configuration Manager client agent but do not connect into the network through a VPN or dial-up connection.
Internet-based site systemA site system role that allows connections from clients when they are managed over the Internet.
Internet-based software update pointThe software update point for a site that accepts communication from only client computers on the Internet. There can be only one active Internet-based software update point.
local dataA set of objects that are automatically created by Configuration Manager. This data is not replicated to other sites.  See Also: global data
maintenance windowA period of time, defined by administrators, when changes can be made on the computers that are members of a Configuration Manager collection.
Managed Object Format (MOF)The file type, based on the Interface Definition Language (IDL), that describes management information. The MOF syntax is a way to describe object definitions in textual form.
management controllerThe hardware and firmware component on computer motherboards that supports out of band management.
Management Information Format (MIF) fileThe file type (.mif) that can be used to modify the Configuration Manager database by creating architectures, object classes, and attributes.
management pointA site system role that provides policy and service location information to clients and receives configuration data from clients.
membership ruleThe criteria by which Configuration Manager evaluates whether a resource belongs to a particular collection.
Network Discovery methodThe Configuration Manager discovery method that enables the Configuration Manager administrator to discover any network resources that are IP addressable.
NOIDMIF fileA custom Management Information Format (MIF) file that Configuration Manager administrators can use to modify or append object classes and properties to existing client inventory data.
non-peak power planA Configuration Manager power plan that you can configure with power settings that are applied outside peak hours or business hours.
operating system deploymentA Configuration Manager feature that allows you to create operating system images and deploy those images to target computers
Operating System Deployment ManagerA security role that grants permissions to administrative users so that they can create, deploy, and manage operating system images.
Operations AdministratorA security role that grants permissions to administrative users so that they can perform all actions in Configuration Manager except for those that are required to manage security.
out of band managementA feature in Configuration Manager that allows computers to be managed outside standard management channels by connecting to a supported management controller. This management channel is independent from the Configuration Manager client and the operating system.
out of band service pointA site system role that provisions and configures Intel AMT-based computers for out of band management.
packageA Configuration Manager object that contains the content files and instructions for distributing programs, software updates, boot images, operating system images, and drivers to Configuration Manager clients.
package definition fileAn ASCII text file that contains predefined software distribution objects, such as programs and packages that are used for software deployment.
package shareA network share that includes the software installation files for a package.
package source directoryA directory that contains Configuration Manager package source files that are used for package distribution.
package updateA Configuration Manager operation that increments the package version and updates all distribution points with only the files that have changed in the package.
peak power planA Configuration Manager power plan that you can configure with power settings that are applied during the peak hours or business hours that you specify.
power planA group of Windows-based power settings that you can apply to computers by using Configuration Manager power management.
preferred distribution pointA distribution point with an associated boundary group that includes the client’s current location on the network.
prestart commandA script or an executable file that supports operating system deployment and that can interact with the user in Windows PE before a task sequence runs.
primary deviceA software deployment condition that defines one or more devices that a specific user uses. A primary device is typically determined either by frequency of use or by business requirements.
primary siteA Configuration Manager site that has clients assigned to it and that processes client-generated data.
primary userThe main user of a device. (A device can have more than one primary user.)
Read-only AnalystA security role that grants permissions to administrative users so that they can view all objects in Configuration Manager.
reinstateTo bring an application out of retirement and back into service.
remediation serverA server that is used to update the computer state by providing software updates, new antivirus signatures, additional intrusion detection signatures, and so on.
Remote Tools OperatorA security role that grants permissions to administrative users so that they can run and audit remote administration tools.
Replication Link AnalyzerA Configuration Manager tool that detects, analyzes, and remediates database replication issues in a hierarchy.
reporting services pointA site system role that integrates with SQL Server Reporting Services to create and manage reports for Configuration Manager.
Resource ExplorerA Configuration Manager console feature that displays the hardware and software inventory that has been collected from clients.
retireTo remove an application from service.
role-based administrationThe method in which System Center 2012 Configuration Manager secures objects.
secondary siteA child of a primary Configuration Manager site.
Security AdministratorA security role that grants permissions to administrative users so that they can add, remove, and modify administrative users and their administrative assignments.
security roleA set of permissions that defines what an administrative user can do and see in the Configuration Manager console.
security scopeA method that, when used in conjunction with security roles, limits which objects an administrative user can use and see.
senderA Configuration Manager communication mechanism that lets you create and send package information to another Configuration Manager site by using standard network channels.
shared distribution pointA distribution point in a Configuration Manager 2007 hierarchy that clients can use to download the content and packages that have been migrated to System Center 2012 Configuration Manager.
site assignmentThe process of including selected resources in a Configuration Manager site.
site codeA three-character code that Configuration Manager uses to uniquely identify a Configuration Manager site.
site control fileAn ASCII text file that contains the settings of a Configuration Manager site.
site dataThe operational information that is created by a Configuration Manager site and that is replicated to the central administration site. Site data includes hardware inventory data, status messages, alerts, and the results of query-based collection rules.
site database serverA server that hosts the SQL Server database, which stores information about Configuration Manager assets and site data.
site serverA computer on which you run the Configuration Manager setup program and which provides the core functionality for the site.
site systemA server that provides Configuration Manager functionality to a Configuration Manager site.
SMS ExecutiveThe primary Configuration Manager service that accesses and updates the database and manages many different process threads.
SMS ProviderA WMI provider that allows both read and write access to the Configuration Manager site database.
software update pointA site system role that integrates with Windows Server Update Services (WSUS) to provide software updates to Configuration Manager clients.
stand-alone siteA Configuration Manager primary site with no parent sites and no child sites.
state messageA message type that is used to identify at what stage a Configuration Manager client process has succeeded, failed, or stopped.
state migration pointA site system role that stores user state data when a computer is migrated to a new operating system.
status filter ruleA filtering rule that controls how status messages are reported and viewed.
status messageA message generated by a Configuration Manager component and viewed in the Status Message Viewer.
status message thresholdThe limit that defines when the summary status for a component or site system should indicate OK, Warning, or Critical status.
Status Message ViewerA tool in the Configuration Manager console that is used to browse the status messages in the Configuration Manager site database.
status summarizerA component that consolidates the data generated by Configuration Manager status messages into a succinct view of the status of a component, a server, a package, or an advertisement.
supersedenceA deployment behavior that specifies how new software replaces existing software.
System Health Validator pointA site system role that validates Configuration Manager Network Access Protection (NAP) policies. It must be installed on a NAP health policy server.
task sequenceThe mechanism in Configuration Manager for performing multiple steps or tasks on a client computer at the command-line level without requiring user intervention.
tiered secondaryIn Configuration Manager, a secondary site that receives deployment content from another secondary site.
trusted root keyAn encryption key used in Configuration Manager to help clients identify valid management points.
uninterpreted configuration itemAn imported configuration item that cannot be interpreted by the Configuration Manager console and whose properties cannot be viewed or edited in the console.
unmanaged clientA client that is not communicating with its assigned site in the Configuration Manager hierarchy and therefore cannot receive policy or upload inventory data.
user device affinityThe mapping of a user to a device, which enables deployment conditions and simplifies the complexity of the deployment.
wake-up packetA packet that is sent by a Configuration Manager primary site server to bring computers out of a sleep state so that they can perform a management function, such as installing a mandatory software update.
wipeTo remove all data from a mobile device that has been lost, stolen, or compromised.