Logo
CAR REVIEW
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
PREGNANCY
 
 
Windows 7

Designing an Update Management Strategy : Updating with System Center Configuration Manager

1/14/2013 11:51:22 AM

System Center Configuration Manager is a product available from Microsoft that allows for more sophisticated deployment and management of software updates. System Center Configuration Manager allows you to accomplish the following tasks that are not possible with WSUS:

  • Allows updates for third-party applications to be deployed to client computers running the Windows 7 operating system.

  • Allows update deployment to be scheduled to occur at a specific time rather than at the time the update is approved.

  • Allows more flexible control of the distribution of updates.

  • Allows use of Wake On LAN feature to wake clients at a specific time for software update deployment.

More Info

USING SYSTEM CENTER CONFIGURATION MANAGER FOR SOFTWARE UPDATES

To learn more about using SCCM for software updates, consult the following TechNet Web page: http://technet.microsoft.com/en-us/library/bb633264.aspx.

Exam Tip

Remember what the prerequisites are for using WSUS with BranchCache.

Practice: Verifying Update Deployment

In this set of exercises, you use different techniques to verify the deployment of updates to client computers running the Windows 7 operating system. Verifying the deployment of updates is an important step in the update deployment cycle. Although you can deploy updates from a WSUS server fairly easily, you cannot be certain that client computers have installed those updates until you perform some type of check.

EXERCISE 1 Manually Verifying Installed Updates

You can use Windows PowerShell, which is installed by default on computers running the Windows 7 operating system, to generate a list of installed updates. It is also possible to generate a list of updates on remote computers by running this command against a remote computer that is specially configured for remote management through Windows PowerShell. To complete this exercise, perform the following steps.

  1. Log on to computer WKSTN1 with the Mark Lee user account.

  2. Start a Windows PowerShell session.

  3. Enter the command Get-HotFix, and then review the results.

  4. In the Search Programs And Files text box, type View Installed Updates, and then click the View Installed Updates item. Review the list of installed updates, as shown in Figure 1.

    Installed updates

    Figure 1. Installed updates

EXERCISE 2 Installing and Using Microsoft Baseline Security Analyzer

The Microsoft Baseline Security Analyzer allows you to scan a computer to see if it is missing any updates.

  1. If you have not done so already, log on to computer WKSTN1 with the Mark Lee user account.

  2. Locate the Microsoft Baseline Security Analyzer installation file. Double-click this file to begin the installation. You will receive a security warning informing you that the file has been obtained from the Internet. Click Run to start the installation process.

  3. On the Microsoft Baseline Security Analyzer Setup page, click Next.

  4. On the License Agreement page, select the I Accept The License Agreement option, and then click Next.

  5. On the Destination Folder page, review the default location, and then click Next. On the Start Installation page, click Install. The Microsoft Baseline Security Analyzer begins to install on the computer. You will be presented with another User Account Control dialog box at which you should click Yes. Click OK when you are informed that the Microsoft Baseline Security Analyzer has installed successfully.

  6. Double-click the shortcut to the Microsoft Baseline Security Analyzer that has been placed on the desktop by the installation process. At the User Account Control dialog box, click Yes.

  7. On the Check Computers For Common Security Misconfigurations page, click Scan A Computer.

  8. The default values allow for the local computer to be scanned. Select the Advanced Update Services Options check box and then select the Scan Using Microsoft Update Only option. Then click Start Scan.

  9. Review the generated report, and then close the Microsoft Baseline Security Analyzer.

Other -----------------
- Designing an Update Management Strategy : Configuring an Update Testing Infrastructure, Verifying Update Deployment
- Zero Touch Installations : Creating and Capturing a Reference Image (part 3) - Advertise the Reference Image Task Sequence, Run the Reference Image Task Sequence
- Zero Touch Installations : Creating and Capturing a Reference Image (part 2) - Install Packages on the Distribution Points, Create a Collection and a Computer Association
- Zero Touch Installations : Creating and Capturing a Reference Image (part 1)
- Preparing and Configuring Boot Images (part 2) - Adding Drivers to a Boot Image
- Preparing and Configuring Boot Images (part 1) - Creating Boot Images
- Microsoft Access 2010 : Using Reports to Print Information - Printing a Report
- Microsoft Access 2010 : Using Reports to Print Information - Opening and Viewing a Report
- Programming Drivers for the User Mode Driver Framework - Driver Dynamic-Link Library and Exports
- Creating a Home Network : Setting Up a Wireless Network
- Creating a Home Network : Setting Up a Wired Network with a Router
- Creating a Home Network : Setting Up a Wired Network with an ICS Host
- Creating a Home Network : Creating a Wired LAN, Creating a Wireless LAN
- Microsoft Project 2010 : Setting Up a Project Budget - Assigning Accounting Codes
- Microsoft Project 2010 : Setting Up a Project Budget - Setting the Project Fiscal Year
- Microsoft Project 2010 : Setting Up a Project Budget - Reducing Project Costs
- Microsoft PowerPoint 2010 : Incorporating Motion Video - Placing a Video on a Slide
- Microsoft PowerPoint 2010 : Incorporating Motion Video - Understanding Video Types
- Microsoft Excel 2010 : Using Formulas - Using Names To Simplify References, Inserting Formulas into Tables
- Microsoft Excel 2010 : Using Formulas - Copying a Formula, Formula Operators
 
 
Most view of day
- SharePoint 2010 : Packaging and Deployment Model - Features (part 2) - Feature Receivers
- Windows Server 2008 R2 high-availability and recovery features : Installing and Administering Failover Clustering (part 7) - Create shared folder on cluster, Testing Failover of Cluster
- Windows Live Services That Make Windows 7 Better (part 5) - Windows Live Essentials
- SQL Server 2008 R2 : Performance Monitoring Tools (part 2) - Installing and Configuring the Data Collector
- System Center Configuration Manager 2007 : Creating and Modifying Configurations (part 1)
- Microsoft Excel 2010 : Calculating the Mean (part 2) - Minimizing the Spread - About Solver, Finding and Installing Solver
- Microsoft Exchange Server 2010 : Managing Message Pickup, Replay, Throttling, and Back Pressure (part 2) - Configuring Message Throttling
- Microsoft Exchange Server 2007 : Consolidating a Windows 2000 Domain to a Windows Server 2003 Domain Using ADMT (part 2) - Installing a Password Migration DLL on the Source Domain
- Windows Server 2012 : Managing Users with Local Security and Group Policies (part 2) - Configuring and Optimizing Group Policy
- BizTalk Server 2009 : Use The Business Rule Engine (part 2) - What Are the Artifacts That Constitute a Business Rule?
Top 10
- Microsoft Lync Server 2013 : Director Troubleshooting (part 3) - Synthetic Transactions,Telnet
- Microsoft Lync Server 2013 : Director Troubleshooting (part 2) - DNS Records, Logs
- Microsoft Lync Server 2013 : Director Troubleshooting (part 1) - Redirects, Certificates
- Microsoft Lync Server 2013 : Administration of the Director Role (part 4) - Services Management, Client Version Filter
- Microsoft Lync Server 2013 : Administration of the Director Role (part 3) - Topology Status
- Microsoft Lync Server 2013 : Administration of the Director Role (part 2) - Ports,Firewall Rules
- Microsoft Lync Server 2013 : Administration of the Director Role (part 1) - Services
- Microsoft Lync Server 2013 : Configuring the Director (part 2) - Web Services Ports,Reverse Proxy
- Microsoft Lync Server 2013 : Configuring the Director (part 1) - SRV Records, Web Services FQDN Overrides
- Sharepoint 2013 : SharePoint Designer 2013 (part 2) - Locking Down SharePoint Designer
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro