- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This is the definitive real-world guide to Microsoft System Center 2012, Microsoft's newest and most powerful version of System Center. Authored by consultants who've deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and techniques you just won't find anywhere else.You'll learn how to use System Center's powerful capabilities to build highly-efficient managed environments that encompass datacenters, cloud environments, client computers, mobile devices, and more. The authors address planning, design, implementation, integration, and administration, and cover every component, including Configuration Manager, Operations Manager, Data Protection Manager, Virtual Machine Manager, Service Manager, and Orchestrator. Use Configuration Manager 2012 to deliver software and updates in highly-distributed environments including datacenters, clouds, and mobile devices Reliably manage and report on assets with Configuration Manager 2012 Perform monitoring, alerting, operations, and security reporting with Operations Manager 2012 Use Data Protection Manager 2012to protect file systems, SQL, Microsoft Exchange, and SharePoint Leverage Data Protection Manager 2012's improved central monitoring and remote recovery Run Hyper-V virtualized environments with VMM 2012-including new private clouds and mixed private/public fabrics Use Service Manager 2012 to provide top-down integration, and use Orchestrator 2012 for bottom-up process automation and integration "glue" Give users an efficient self-service portal for creating service and incident requests and browsing service catalogs Manage service offerings and implement enterprise-wide change control with Service Manager 2012 Ensure compliance by creating, executing, and repeating auditable, documented processes with Orchestrator 2012
Contents
Introduction 11 Overview of the System Center Suite 5What Is System Center? 6Understanding System Center Configuration Manager 9Understanding System Center Operations Manager 18Understanding System Center Data Protection Manager 26Understanding System Center Virtual Machine Manager 34Understanding System Center Service Manager 40Understanding System Center 2012 Orchestrator 45Understanding System Center Licensing 50Summary 51Best Practices 522 Configuration Manager 2012 Design and Planning 55What's New in ConfigMgr 2012 56Explaining How Configuration Manager Works 60Understanding Content Distribution 66Understanding Asset Management 70Reporting from Configuration Manager 74Configuration Manager Architecture Components 75Securing Configuration Manager 88Understanding Component Requirements 92Configuration Manager Design Considerations 94Understanding Client Schedules 105Planning for Internet-Based Client Management 106Putting It All Together in a Design 110Summary 112Best Practices 1123 Configuration Manager 2012 Implementation and Administration 115Sample Organization 115Configuring Installation Prerequisites 118Implementing the Central Administration Site 124Deploying the Primary Sites 129Deploying the Secondary Sites 134Configuring the Hierarchy 138Configuring Sites 148Configuring Client Settings 156Implementing Internet-Based Client Management 163Summary 177Best Practices 1784 Using Configuration Manager 2012 to Distribute Applications, Updates, and Operating Systems 181Understanding Content Distribution 181Defining Collections 185Understanding Application Management 189Managing Deployments 203Understanding Software Updates 215Deploying Software Updates 219Understanding Operating System Deployment 225Deploying Operating Systems 234Extending with Microsoft Deployment Toolkit 238Summary 243Best Practices 2435 Using Configuration Manager 2012 for Asset Management and Reporting 245Understanding Asset Data 246Configuring Client Settings for Inventory Collection 248Understanding Reporting 249Customizing Hardware Inventory 261Understanding Asset Intelligence 269Understanding Software Metering 277Understanding Compliance Settings 278Monitoring the Baselines and Compliance 283Summary 285Best Practices 2856 Operations Manager 2012 Design and Planning 289What's New With Operations Manager 2012 290Understanding How OpsMgr Works 291OpsMgr Architecture Components 296Securing OpsMgr 311Fault Tolerance and Disaster Recovery 317Understanding OpsMgr Component Requirements 323OpsMgr Design Considerations 328Putting It All Together in a Design 335Planning an Operations Manager Deployment 345Summary 353Best Practices 3547 Operations Manager 2012 Implementation and Administration 355Installing Operations Manager 2012 356Deploying OpsMgr Agents 373Monitoring DMZ Servers with Certificates 385Configuring Operations Manager 2012 393Administering Operations Manager 2012 403Backing Up OpsMgr 2012 411Summary 418Best Practices 4188 Using Operations Manager 2012 for Monitoring and Alerting 421Using OpsMgr Consoles 422Working with Management Packs 425Exploring the Operations Manager Management Pack 432Exploring the Windows Management Pack 440Exploring the Active Directory Management Pack 451Exploring the Exchange 2010 Management Pack 466Exploring the SQL Server Management Pack 478Exploring the Cross Platform Management Packs 487Management Pack Templates 491Custom Management Packs 503Summary 508Best Practices 5089 Using Operations Manager 2012 for Operations and Security Reporting 511Reporting from OpsMgr 512Generating and Scheduling Reports 514OpsMgr 2012 Maintenance Reports 532Audit Collection Services Reporting 541Service Level Tracking 548OpsMgr 2012 Dashboards 554Publishing Dashboards into SharePoint 2010 561Summary 565Best Practices 56610 Data Protection Manager 2012 Design, Planning, Implementation, and Administration 567What Is System Center Data Protection Manager? 568Data Protection Manager Background 572Data Protection Manager Prerequisites 578Planning a Data Protection Manager Deployment 580Deploying Data Protection Manager 587Completing Required Configuration Tasks 591Creating Protection Groups 601Administrating Data Protection Manager 606Summary 616Best Practices 61711 Using Data Protection Manager 2012 to Protect File Systems, Exchange, SQL, and SharePoint 619Protecting File Servers 620Protecting System State 622Protecting Exchange Servers 624Protecting SQL Servers 635Protecting SharePoint Farms 643Protecting Virtualized Environments 654Summary 660Best Practices 66112 Virtual Machine Manager 2012 Design, Planning, and Implementation 663Understanding Virtual Machine Manager 663Virtual Machine Manager Background 673What's New in System Center Virtual Machine Manager 2012 677Virtual Machine Manager Prerequisites 678Planning a Virtual Machine Manager Deployment 682Deploying Virtual Machine Manager 687Summary 700Best Practices 70113 Managing a Hyper-V Environment with Virtual Machine Manager 2012 703Understanding the VMM Private Cloud 704Using the VMM Management Interfaces 707Understanding Virtual Machine Conversions 716Managing VMM User Roles 729Deploying Virtual Machines 740Migrating Virtual Machines 747Understanding and Implementing Server App-V 753Summary 758Best Practices 75914 Service Manager 2012 Design, Planning, and Implementation 761What's New in Service Manager 2012 762Explaining How Service Manager Works 763Service Manager Design Parameters 769Putting It All Together in a Service Manager Design 775Planning a Service Manager Deployment 783Deploying Service Manager 791Deploying Service Manager Connectors 805Backing Up Service Manager 2012 814Summary 817Best Practices 81715 Using Service Manager 2012 for Incident Tracking and Help Desk Support 819Incidents and Problems 819Configuring Incident Settings 821Service Manager Notifications 830Creating New Incidents 836Working with Incidents 846Configuring Problem Settings 856Working with Problems 859Incident and Problem Reports 863Summary 869Best Practices 87016 Using Service Manager 2012 for Service Offerings and Change Control Management 871Service Manager 2012 and the Infrastructure Optimization Model 871Service Offerings and Request Offerings in SM 2012 872Release Management in SM 2012 882Change Requests and Activities 885Configuring Change Settings 887Change Management Templates and Workflows 889Initiating Change Requests 892Working with and Approving Change Requests 896Implementing Change Requests 903Managing Configuration Items 910Working with Change, Activity, and Configuration Management Reports 914Summary 919Best Practices 92017 System Center Orchestrator 2012 Design, Planning, and Implementation 921Overview of System Center Orchestrator 921History of System Center Orchestrator 924System Center Orchestrator 2012 Installation Prerequisites 924Orchestrator Security Planning 926Installing System Center Orchestrator 2012 on a Single Server 928Installing System Center Orchestrator 2012 on Separate Systems 933Additional Tasks Following Orchestrator Installation 939Getting Familiar with the Orchestrator 2012 Management Consoles 942Installing Integration Packs 949Designing and Using Runbooks 952Runbook Permissions 967Summary 967Best Practices 968Index 969